Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2022, Vol. 48 ›› Issue (8): 1-6.doi: 10.12267/j.issn.2096-5931.2022.08.001

    Next Articles

Active immune trusted computing to create a secure and trusted network industry ecosystem

SHEN Changxiang, TIAN Nan   

  1. Chinese Academy of Engineering, Beijing 100088, China
  • Received:2022-06-30 Online:2022-08-15 Published:2022-08-26

Abstract:

As the fifth largest domain of sovereignty, cyberspace security is of vital importance to national security. In recent years, driven by the requirements of relevant national laws and regulations and industrial policies, secure and trusted computing-related products and services represented by active immunity have flourished and become an important force in promoting the development of China’s cybersecurity industry. The introduction of the article briefly describes the importance of promoting the development of the trusted network industry and China’s requirements for the development of the trusted network security industry. The first part introduces the definition and requirements of the security and trusted industry, and the second part describes the active immunity and trustworthy industry. The status of computing in the development of trusted computing theory is becoming more and more important. The third part gives the main content of the security and trusted innovation system based on trusted computing 3.0, and the fourth part proposes the idea of construction of cybersecurity defense system based on classified protection 2.0 and trusted computing 3.0.

Key words: active immunity, trusted computing, security and trustworthiness, cybersecurity, industrial ecology

CLC Number: