Information and Communications Technology and Policy ›› 2022, Vol. 48 ›› Issue (8): 1-6.doi: 10.12267/j.issn.2096-5931.2022.08.001
Next Articles
SHEN Changxiang, TIAN Nan
Received:
Online:
Published:
Abstract:
As the fifth largest domain of sovereignty, cyberspace security is of vital importance to national security. In recent years, driven by the requirements of relevant national laws and regulations and industrial policies, secure and trusted computing-related products and services represented by active immunity have flourished and become an important force in promoting the development of China’s cybersecurity industry. The introduction of the article briefly describes the importance of promoting the development of the trusted network industry and China’s requirements for the development of the trusted network security industry. The first part introduces the definition and requirements of the security and trusted industry, and the second part describes the active immunity and trustworthy industry. The status of computing in the development of trusted computing theory is becoming more and more important. The third part gives the main content of the security and trusted innovation system based on trusted computing 3.0, and the fourth part proposes the idea of construction of cybersecurity defense system based on classified protection 2.0 and trusted computing 3.0.
Key words: active immunity, trusted computing, security and trustworthiness, cybersecurity, industrial ecology
CLC Number:
TP309
SHEN Changxiang, TIAN Nan. Active immune trusted computing to create a secure and trusted network industry ecosystem[J]. Information and Communications Technology and Policy, 2022, 48(8): 1-6.
Add to citation manager EndNote|Ris|BibTeX
http://ictp.caict.ac.cn/EN/10.12267/j.issn.2096-5931.2022.08.001