Table of Content

    09 July 2021, Volume 7 Issue 7
    Active Security Network Architecture——Network Safety Technology Based on Social Control Principles
    2021, 7(7):  590-597. 
    Asbtract ( )   PDF (1333KB) ( )  
    References | Related Articles | Metrics
    This article is the beginning of a series of articles on active safety network architecture. Since network security problems have root causes in terms of history, culture, technology, etc., it is necessary to start with the root causes in order to find a fundamental solution to solve network security problems well. Through the analysis of the development history and key elements of social control, and the analogy of social security with network security, it is found that network security problems can also be effectively solved by the method of social control principles. In the past, various network security protection theories such as OSI, PDR, P2DR, IATF, and plug-in security protection methods have a certain degree of complement in solving network security problems, and they have not solved network security problems fundamentally; instead, using the new network security protection concepts and methods of social control principles can establish A secure network architecture, make the network generate security capabilities endogenously, solve the fundamental problems of network security well, bring new security values such as main network security protection, unified management and control, and active defense, and significantly improve network security protection capabilities.
    Research on Secure Governance of Digital Identity 
    2021, 7(7):  598-605. 
    Asbtract ( )   PDF (1649KB) ( )  
    References | Related Articles | Metrics
    In the era of Internet of things, the scale of entity identities in cyberspace is expanding rapidly, and the security risks are increasing, which challenges the implementation of digital identity secure governance. Firstly, the basic concept of digital identity is described, the meaning of identity, credential and authenticator is defined, and the classification of digital identity is proposed. Then the architecture of digital identity model and the life cycle of digital identity are described, and the activities, roles and functions around digital identity are elaborated. Then, according to the security risks existing in the activities of the digital identity model, the security assurance framework is proposed, and three different security levels of assurance with the security framework are elaborated: identity assurance level, authenticator assurance level and federation assurance level. Finally, the ideas of digital identity secure governance are proposed, including making strategy, establishing rules and regulations, utilizing technologies, building the ecosystem and strengthening supervision.
    Blockchain-based scheme for secure sharing of business collaboration data 
    Wang Guan Ding Hao
    2021, 7(7):  606-614. 
    Asbtract ( )   PDF (1731KB) ( )  
    References | Related Articles | Metrics
    In the current e-government environment, there are problems such as unknowable data sources, disputes over the authenticity of data, leakage of data privacy, and difficulties for accountability due to denial after data users using illegal data or data providers providing fake data in the existing data sharing process. In response to the above problems, this paper proposes a business collaborative data sharing scheme based on blockchain. Through the blockchain, the data sharing process in the e-government environment is open, transparent and decentralized, the data cannot be tampered with during the sharing process, and the sharing process can be traced. This solution deploys smart contracts based on business logic to perform data processing on data ciphertext to obtain data processing results, and realizes sharing of data processing results without sharing data ciphertexts, which fundamentally solves the problem of data privacy leakage. Solve the problem of blockchain memory through off-chain storage of data, and improve consensus efficiency. In addition, access control is achieved by designing the authorization token Token and recording it in the block. Finally, security analysis and performance analysis show that the scheme is feasible, and it can meet the requirements of business collaborative data sharing in the e-government environment.
    The Research Status of Blockchain-based Technology Against Deepfake 
    2021, 7(7):  615-620. 
    Asbtract ( )   PDF (1114KB) ( )  
    References | Related Articles | Metrics
    The rapid and extensive spread of Deepfakes on the Internet brings great information security risks to individuals, society and countries. Blockchain technology can provide a trusted de-centralization network and consensus mechanism, ensure the integrity and traceability of digital content, and provide new ideas for the governance of Deepfakes. This paper reviews the research status of blockchain-based technology against Deepfake from three dimensions, including the construction of trusted network, Deepfakes traceability and content tamper-proof, analyzes the risks and challenges in the practice, and discusses the key tasks and research directions of blockchain technology against Deepfake technology in the future.
    Design and Implementation of RFID Data Collection and Traceability System Based on Blockchain
    2021, 7(7):  621-631. 
    Asbtract ( )   PDF (3526KB) ( )  
    References | Related Articles | Metrics
    Data collection and traceability of critical equipment such as critical infrastructure and special equipment needs to be carried out throughout the life cycle of scientific production, registration, distribution, transfer, maintenance and destruction. Currently, most critical equipment data is stored in systems such as government agencies, users, warehouses, and scientific research and production units, which can easily lead to redundancy and ambiguity of critical equipment data between different departments. This paper focuses on the safety and traceability problem of critical equipment such as critical infrastructure and special equipment, proposing a data acquisition traceability system based on the combination of blockchain and RFID. The system is designed and implemented using key technologies such as unique identification of RFID hardware devices , zero storage and smart contract, constructing a chain of critical device data records that cannot be tampered with. The system can enable real-time sharing, traceability and audit oversight of critical equipment data, which in turn enables production, usage, and regulatory authorities to monitor the full lifecycle status of critical equipment in real time. Finally, critical operations can be traceable and important data can be protected, security and traceability requirement for critical data can be met. In addition, the system is designed and implemented using RFID equipment modified from domestic chips and adaptive audit software developed independently, which greatly improves the degree of autonomy and control of the software and hardware in this system.
    Research on the Governance Capacity Building of Cyber Threat Intelligence under the Digital Transformation
    2021, 7(7):  632-639. 
    Asbtract ( )   PDF (1079KB) ( )  
    References | Related Articles | Metrics
    Digital transformation has spawned a large number of new complex network threats, and threat intelligence has become an important tool for cyber security governance. The paper analyzes the characteristics of cyber threat and the function of threat intelligence, expounds the countermeasures of strengthening the governance capacity of threat intelligence in the United States and the European Union, and finally discusses the effective measures of improving the governance capacity of threat intelligence in China, which has practical guiding significance to the construction of governance capacity of cyber threat intelligence in China.
    Research on Industrial Chain Security of Semi-Conductor on the Background of Digital Economy
    2021, 7(7):  640-645. 
    Asbtract ( )   PDF (1125KB) ( )  
    References | Related Articles | Metrics
    The rapid development of digital economy has accelerated the scale expansion of China's semiconductor industry. Chip is the core of high-end manufacturing industry, and the semiconductor industry is the key area of China's economic transformation and upgrading. However, under the impact of China-US trade friction and the overseas epidemic continues to expand, the vulnerability of China's semiconductor industry chain increasingly improved. Based on the industrial security concept from the perspective of global value chain, this paper constructs a index system of industrial chain security of China's semiconductor industry. It shows that in the short term, the industrial security declined significantly due to the superimposed impact, and decreased technological control and industrial chain participation are the main factors driving the decline. In the long run, in order to resist external risks, the security of China's semiconductor industry chain is increasingly improve, but the level is still low. Therefore, we should seize the opportunity of technological revolution and the wave of the digital economy to comprehensively improve the resilience and security of industrial chain by strengthening the industrial foundation to enhance the controllability of technology, making up for the shortcomings of industries to consolidate the industrial foundation, and increasing government support to consolidate our global consumption presence.
    On the Evolution of Five Eyes Intelligence Alliance and Research on Its Countermeasures
    2021, 7(7):  646-651. 
    Asbtract ( )   PDF (934KB) ( )  
    References | Related Articles | Metrics
    "Five Eyes Intelligence Alliance" is the most exclusive intelligence sharing club in the world. The intelligence-sharing entity has established a huge monitoring and surveillance network all over the world, and collected various valuable intelligence, playing a huge role in responding to global threats, combating terrorism, and maintaining the hegemony of Western countries such as the United States. Through the declassified intelligence files of the United States in recent years and related research results at home and abroad, we try to clarify its historical context, evolution trends, and operating mechanisms, and analyze the internal and external influence factors of the alliance, so as to further deepen and enrich the intelligence network of our country The research provided by my country has provided reference and suggestions for our country to do a good job in countermeasures.
    Research on Chinese Named Entity Recognition Method Based on Pre-training Model for Public Safety Events
    2021, 7(7):  652-660. 
    Asbtract ( )   PDF (2281KB) ( )  
    References | Related Articles | Metrics
    To improve the efficiency of chinese named entity recognition in public safety events, we study the "Chinese Emergency Corpus", and propose a novel domain adaptive pre-training based named entity recognition model by optimizing the pre-training subtasks and transfer learning of domain datasets. First, the dictionary of pre-training model RoBERTa is updated by adding the terms of public safety events, and the mask subtask of pre-training with single character in chinese RoBERTa model is replaced with the chinese whole word masking, which can learn the more grammatical and semantic information of public safety events. And then, 100k online news unlabeled corpus is pre-trained to enhance the ability of identify downstream named entities, and the chinese pre-training model RoBERTa+ is generated for public security. The bidirectional long short-term memory network BiLSTM is employed to acquire the contextual abstraction feature, and the entities is final recognized by the sequence decoding with the conditional random field. Experimental result shows that the proposed model reaches an accuracy rate of 87%, the recall rate and F1-value of 81%, which indicates that the domain adaptive pre-training has considerable potential for natural language processing tasks.
    Research on the Data Security Management and Application Mode of Audit Informatization
    2021, 7(7):  661-668. 
    Asbtract ( )   PDF (971KB) ( )  
    References | Related Articles | Metrics
    Research on Network Security Monitoring in Attack and Defense Drill 
    2021, 7(7):  669-673. 
    Asbtract ( )   PDF (783KB) ( )  
    References | Related Articles | Metrics
    With the rise of new technologies such as big data, Internet of Things and cloud computing, traditional and new cyber security threats have become a new challenge to enterprise cyber security. Enterprises in the construction of network security at the same time also need certain technical means and methods to test the ability of enterprise network security protection. At present, the network attack and defense drill is the main way for enterprises to test their own network security protection ability in the real environment. In the attack and defense drill, the network security monitoring is the focus of the defense. This article mainly from the role of the offensive and defensive drills in network security monitoring, offensive and defensive drills in network security monitoring and network security monitoring work challenges of three aspects, systematically in this paper, the network security monitoring in the whole work methods and focus on the difficulty in the offensive and defensive drills, and combining with the working experience, the author puts forward a solution. In order to help enterprises to better carry out network security monitoring in the offensive and defense drill, improve the level of enterprise network security protection and network security operation level
    The Way to Improve Government Information Disclosure System in Major Public Health Emergency
    2021, 7(7):  674-681. 
    Asbtract ( )   PDF (1252KB) ( )  
    References | Related Articles | Metrics
    The Covid-19 epidemic that broke out in early 2020 has been fully and effectively controlled after a protracted struggle against the disease, but there are still issues such as the disclosure of government information exposed in this major public health emergency. The lack of emergency response and early warning and prediction mechanisms, the unreasonable allocation of the right to issue epidemics, and the need to improve the ability of government information disclosure under special circumstances are real problems. Transparency is the cornerstone of the rule of law and an inevitable requirement for the construction of a government under the rule of law. Openness and transparency in major public health emergencies is the basic guarantee for the stable operation of society and the effective administrative operation during the special period. Based on the research of existing theories and the research and judgment of new problems during the epidemic, the improvement of the government information disclosure system in major public health emergencies is proposed, including the improvement of existing systems and mechanisms, the reconfiguration of the right to publish the epidemic, and the establishment of basic principles and construction Emergency legal system, improve the specific system for the disclosure of epidemic-related information, etc.
    Research on Cybersecurity in Cross-border Data Flow Scenario    
    2021, 7(7):  682-686. 
    Asbtract ( )   PDF (732KB) ( )  
    References | Related Articles | Metrics
    With the development of global digital economy, multinational enterprises need to deploy their industrial chains around the world, and cross-border data flow has become the only way to promote the process of global economization. On the one hand, cross-border data practice brings huge economic dividend, on the other hand, it will cause personal privacy disclosure and national data sovereignty game and other problems. It is necessary for countries around the world, within their respective legal frameworks and international trade rules, to formulate network security systems and trade rules that are conducive to both data flow and commercial data security, personal privacy protection and national security, and to share the dividends of the rapid development of the digital economy. This paper combs the current challenges of cross-border data flow in the world, puts forward the security requirements from the perspective of network security risk, and gives the network security system in the cross-border data flow scenario from the technical point of view. Suggestions for the next stage are put forward.