Cracking the Risk of Foreign Technology Monopoly to Ensure National Information Security

Norton’s “manslaughter” case exposed an American operating system vendor and reserved a backdoor program for Chinese users’ computers. Russian IT experts found that a notebook made in the United States had an unknown port on the CPU of the computer. Suspicious; European scientists experimented and found that operating computers on three floors, hackers on the first floor can use electromagnetic interception tools to restore all the information on the computer screen ... ... more and more similar cases are illustrating, the information age, data security has become a national The core topics of social and business development. In the realistic environment in which Chinese government procurement has been led by foreign brands for many years, the issue of information security should be put on the agenda.

To build a protective barrier for China’s information security and raise the awareness of information security across the nation and society requires the vigorous promotion and advocacy of the government procurement system. However, the reality is that today's government procurement has not yet introduced relevant policies and put forward clear requirements and specifications for information security products. In addition, whether China's autonomous security technology development has initially possessed the ability to escort national information security, it is also the fundamental and prerequisite for the government to issue information security related procurement policies.

China has a long history in the research and development of information security technologies. In 2008, it also established the “China Trusted Computing Task Force” to integrate the technological R&D capabilities of leading national and domestic IT companies and develop information security technologies and solutions. In recent years, Lenovo, Tongfang and Other core members of the China Trusted Computing Task Force have successively introduced a variety of hardware and software-based information security solutions. The strength of China’s information security technology, whether it is core technology or solution development combined with actual needs, Rapidly approach and reach the world's leading level.

When interviewing Zou Yong, general manager of Tongfang Computer Innovation Development Center, the reporter stated that Tongfang Computer has launched many credible security solutions for the actual security needs of government departments. For example, the TST2.0 security platform for single-machine applications, the “high-speed stream encryption chip” for mobile storage security, and various trusted security solutions based on this chip, and even the low-level global electromagnetic issues Solutions and products such as one-off machines are gradually serving government agencies such as scientific research and military industry, and have been widely used by users.

Experts in the industry once made an image metaphor. Information technology is like a double-edged sword. It brings convenience to users and hurts themselves. For national IT applications, this 'sword' has accelerated the country's information construction and accelerated the development of China. At the same time, it has also brought a number of information security risks. The credible security products and solutions are precisely for this "sword" produced a set of credible "sword sheath", so that the government, enterprises in the application of information technology this "treasure sword" when it has a blade, no worries.

It is true that China has not yet possessed the strength to master key technologies such as IT hardware, software, and networks. However, it has already achieved certain strength in terms of information security technology and solutions for independent intellectual property rights. With the increasing emphasis on the information security of the country, the government has successively issued relevant policies and regulations on information security products and solution procurement requirements, and the continuous upgrading and improvement of enterprise information security products and solutions. China’s information security will also be improved. Into a new era of development, for the protection of national construction and development.

Other

HDD Protector Box, Express Card Co., Ltd. , http://www.chhddstorage.com