Big Data Era More Need to Strengthen Vulnerability Analysis and Risk Assessment
Big Data Era, the development of new technological innovations on the network and information security puts forward new requirements for the security of information security vulnerability mining analysis and comprehensive control of network security risks is increasingly important.
Beijing (CNFIN.COM / XINHUA08.COM) - "a nail loss of a horse, a horse lost the gods of earth and grain," the fable of England is a wake-up call, in the field of network and information security, "a hole in the loss of a network, a network loss of the overall situation "The same possibility exists in the field of network and information security. In the era of big data, the development of new technological innovations on the network and information security puts forward new requirements, the mining and analysis of information security loopholes and the comprehensive control of network security risks is increasingly important.
On the 23rd of the 8th Information Security Vulnerability Analysis and Risk Assessment Conference, the national information security authorities, experts, scholars and business representatives around the "big data era of vulnerability analysis and risk assessment technology" theme in-depth discussions, *** enjoy the theory, methodology, technology and practice results. The industry pointed out that a year ago, heart bleeding and other high-risk vulnerabilities on the global user impact has not yet been eliminated, this year, Android and Apple's two major operating systems were exposed to major vulnerabilities, the user's privacy, sensitive data at risk. And 1% omission may lead to 100% failure, strengthen the vulnerability analysis and information **** enjoy urgent.
Hu Xiao, deputy director of the Network Security Coordination Bureau of the Central Internet Information Office, said that vulnerability analysis and assessment is an important part of network security. Strengthening vulnerability analysis and technical testing, comprehensive assessment of the risks that may be faced by critical information infrastructure, timely detection of vulnerabilities to eliminate hidden dangers, is the key to the construction of national network security protection, but also to ensure the importance of national network security.
In recent years, China has made significant progress in network security vulnerability analysis and risk assessment, built the China National Information Security Vulnerability Database (CNNVD) with vulnerability data as the basic core, established a security inspection system at the national and industry levels, set up a national security team, and implemented regular security inspections of networks and important systems related to people's livelihoods, which have eliminated a number of major vulnerabilities and potential security risks. This has eliminated a number of major loopholes and hidden security risks in a timely manner and effectively controlled network security risks. However, the road is one foot tall and the devil is ten feet tall, vulnerability analysis and risk assessment work still needs the government, scientific research institutions *** with efforts in vulnerability resource management, information security **** enjoyment and other aspects need to be further improved.
China Information Security Evaluation Center Zhu Shengtao, director of the initiative put forward three points: First, the real work, as soon as possible, the country's comprehensive control of various resources to the new height of the information security strategy; second is to pay constant attention to, as soon as possible, institutionalized, legal risk assessment work as a new normal for information security; third is to work together, make every effort to all walks of life to the community to exchange the vulnerabilities and risks in the potential for cooperation experience to promote a new dimension. cooperation experience and promote the new dimension.
Fang Xing, security expert of Alibaba Group, and Wu Yunkun, president of 360 Enterprise Security Group, also repeatedly mentioned the concept of "threat intelligence", discussing how to strengthen the collection and excavation capabilities, strengthen the construction of the threat intelligence system, and improve the level of strategic intelligence prediction to help network emergency response. The Eighth Conference on Information Security Vulnerability Analysis and Risk Assessment hosted by the China Information Security Evaluation Center, Beijing Jiaotong University, Tsinghua University, the meeting was held at the same time the third batch of China's National Information Security Vulnerability Library **** 13 technical support unit of the award ceremony. Among them, the Great Wall of China Telecom InterNetwork System Application Co., Ltd, Beijing cloud between the Road Technology Co., Ltd, Beijing Jiangnan Tianan Science and Technology Co., Ltd. and previously approved 9 enterprises *** with the national information security vulnerability library of the first level of support units of the title
The above is the editorial share about the era of big data is more need to strengthen the analysis of vulnerabilities and risk assessment of the relevant content, more information you can pay attention to the Global Ivy share more dry goods