Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • The development paradigm of separation between network technical system and supporting environment
    • WU Jiangxing, HU Yuxiang,
    • Information and Communications Technology and Policy. 2021, 47(8): 1-11.
    • Abstract ( 327 )   
    • From the perspective of thinking and methodology, this paper introduces the challenges that existing network technical system development paradigm is encountering, analyzes their respective presuppositions and universal application categories, and points out that some assumptions and implementation norms that were originally considered reasonable have now become insurmountable genetic defects when facing strong diversified application scenarios.Hence, under the conditions of today's technology level, network security, engineering capabilities, and diversified application requirements, the current “single network system evolution or replacement冶methodology has severely restricted the development of network technical systems and service capabilities.Therefore, it is urgent to propose a new paradigm for the development of network technical systems based on new thinking perspectives and methodology in order to adapt to the requirements of the era of diversified networks and diversified application symbiosis and coexistence, evolution and change, and compatibility of functional safety and network security.The introduction of the paper briefly describes the scientific definition of the paradigm, the first part is a brief review of the network technical system development paradigm, the second part briefly explains the predicament of the existing network technical system
      development paradigm, the third part gives the origin of the polymorphism concept and the interpretation of network polymorphism, and the fourth part proposes a new development paradigm which separates network technical system from the supporting environment.
    • Related Articles | Related Articles | Metrics
    • Promoting the modernization of national governance with digital governance
    • SONG Ling'en
    • Information and Communications Technology and Policy. 2021, 47(8): 12-16.
    • Abstract ( 287 )   
    • At present, modern information technology is changing with each passing day, leading to new changes in social production and expanding new areas of national governance.With the development of modern information technology and the improvement of government application ability, the fields and application scenarios of digital governance are constantly expanding, which will become a strong support for the modernization of national governance.We must adhere to Xi Jinping's socialist ideology with China's characteristics in the new era, grasp the opportunities of digitalization, deal with the challenges of digitalization, and constantly modernizing the national governance system and governance capabilities with digital governance.
    • Related Articles | Related Articles | Metrics
    • Development status and trend of network security.
    • WEI Liang, TIAN Huirong,
    • Information and Communications Technology and Policy. 2021, 47(8): 17-23.
    • Abstract ( 1911 )   
    • Currently, network security has become an important basis of national security.Since the 13th Five-Year Plan period, China has made remarkable achievements in completing network security laws and regulations, improving network security technical capabilities, and promoting the industrial digital security and digital industrialization security.In this key period of transformation in the past hundred years, especially accompanying with novel coronavirus pneumonia, it is very significant to make the digital economy growing rapidly and stronger, and to strengthen the network security.Looking forward to the 14th Five-Year plan period, China will take the initiative to grasp the future trend of cyberspace development, improve the comprehensive network security capabilities on the aspects of forward-looking strategic planning, protection evolution and upgrading, security strengthening of industrial chain, development and growth of security industry, and vigorously promote the safe and high-quality development of digital economy.By analyzing the current development of digital economy and the security situation, this paper presents the achievements and future trends of network security in China.
    • Related Articles | Related Articles | Metrics
    • Risk analysis and countermeasure design for Industrial Internet under the scenario of Intelligent Manufacturing
    • SUN Limin, PAN Zhiwen, LYU Shichao, SHI Zhiqiang, ZHU Hongsong,
    • Information and Communications Technology and Policy. 2021, 47(8): 24-29.
    • Abstract ( 531 )   
    • The Intelligent Manufacturing scenario aims at improving the benefit and competitiveness of industries by leveraging the next.generation information technologies, yet making the isolated industrial assets interconnected as Industrial Internet.Since these interconnections extend the attack surfaces, the industrial networks are facing the severe threats from both inside and outside Internet.This paper aims at analyzing the security risk of Industrial Internet under the scenario of Intelligent Manufacturing, and proposing the corresponding technical countermeasures.Specifically, the risk analysis is conducted from three perspectives: risk of supply chain, risk of terminal asset, and risk of stealthy attack.Through investigating the advancement of industrial security techniques, three technologies and their affiliated framework are proposed as countermeasures.The future working directions for protecting Chinese industrial networks are concluded at the end.
    • Related Articles | Related Articles | Metrics
    • Practice and thinking of cyberspace surveying and mapping technology
    • CHEN Qing, LI Han, DU Yuejin, ZHANG Yirong,
    • Information and Communications Technology and Policy. 2021, 47(8): 30-38.
    • Abstract ( 1179 )   
    • As the foundation for supporting digital transformation, the digital upgrade and transformation of network security itself is also facing urgent requirements.As an important part of the intersection of cyberspace security and cyberspace geography, cyberspace surveying & mapping technology is also a fundamental technical support for the digital transformation of cybersecurity.Therefore, it has received more and more attention from related industries.The practice of related technologies in the field of network security has included a series of application directions such as asset management, attack surface discovery, automated penetration testing, vulnerability incident response, map.supported operations, situational awareness, and some other related applications, as well as some problems revealed.This article briefly analyzes these typical problems, and finally puts forward some specific suggestions for application directions.
    • Related Articles | Related Articles | Metrics
    • Research on security isolation of network slicing for vertical industries based on 5G public network
    • LIN Zhaoji, YOU Shilin, LIU Yuze, PENG Jin, XING Zhen,
    • Information and Communications Technology and Policy. 2021, 47(8): 39-44.
    • Abstract ( 363 )   
    • In the 5G public network scenario, using network slices can provide differentiated service for different vertical industry and thus improve network utilization efficiency.For vertical industry users with very demanding security requirements, the network slices of different vertical industries require strict isolation.Therefore, when it is found that the initial slice network cannot be served for the user terminal of the vertical industry, the initial slice network cannot pass the security context through the inter-slice channel, and the security context can only be routed to the target slice network through the 5G base station.This paper studies how to ensure the isolation of the security context and the business continuity of the terminal during the routing process without modifying the terminal as much as possible.
    • Related Articles | Related Articles | Metrics
    • Research and practice of data security classification and grading
    • ZHANG Feng, YU Le, MA Yusheng, ZHANG Hongyang, JIANG Weiqiang,
    • Information and Communications Technology and Policy. 2021, 47(8): 45-50.
    • Abstract ( 780 )   
    • With the rapid development of information security technology, network information security technology has been widely used and popularized in the manufacturing industry, financial industry, communication industry, internet industry and so on.Data security problems are increasing day by day, the manufacturing, circulation and sharing of data have not been effectively protected, the progress of data security classification and classification is lagging, and the data security classification and classification of various industries need to be solved.In this paper, the development of data security classification and classification is introduced, the principles of data security classification and classification in some fields are analyzed and the practice is shared.Finally, the ideas and development suggestions for data security classification and classification are put forward.
    • Related Articles | Related Articles | Metrics
    • Research on data security governance architecture and technology
    • LI Xiaowei, WU Ying, ZOU Yu, BAI Yunfei,
    • Information and Communications Technology and Policy. 2021, 47(8): 51-55.
    • Abstract ( 392 )   
    • With the rapid development of digital industrialization and industry digitization, data has become the core competitiveness in the era of digital transformation.As data becomes assets and infrastructure, the security of data has received unprecedented attention which should be protected.Data security governance integrates data security technology and data security management, and is a technical system aiming at “data-use security.This paper analyzes the necessity of data security governance, summarizes its development status, and proposes a data security governance framework as well as technical architecture based on data security identification.
    • Related Articles | Related Articles | Metrics
    • An overview of artificial intelligence system security
    • CHEN Lei, LI Yajing,
    • Information and Communications Technology and Policy. 2021, 47(8): 56-63.
    • Abstract ( 620 )   
    • The rapid development of artificial intelligence makes people pay more and more attention to the potential impact of artificial intelligence technology on society.In this paper, the basic components of artificial intelligence safety technology are introduced, and the research status at home and abroad is expounded from the research direction of endogenous safety and derivative endogenous safety.In terms of technology, the security challenges of machine learning due to reward function, data change and algorithm exploration are analyzed.In terms of application, the ethical and legal issues worth studying and solving are proposed.From the perspective of national security, the autonomous controllability of the technology is proposed.Finally, the future research direction of artificial intelligence security is prospected.
    • Related Articles | Related Articles | Metrics
    • Research on security threats of AI application landing
    • NING Tingyong, XIONG Jie, HU Yongbo,
    • Information and Communications Technology and Policy. 2021, 47(8): 64-68.
    • Abstract ( 409 )   
    • With the rapid popularization of automatic driving technology, intelligent assistant, face recognition,intelligent factory, smart city and other AI Artificial intelligence technologies and the rapid growth of related security incidents, consumers and the industry are paying more and more attention to AI network security issues and threats.The security of artificial intelligence applications and the dividends brought by intelligent applications, like two sides of a coin, always exist at the same time and the importance is highlighted.This paper discusses the development process of AI security in recent years and the security threats faced by AI application landing, and puts forward a set of reference security framework and landing implementation methods.
    • Related Articles | Related Articles | Metrics
    • Research on the minimal necessity of APP personal information collection and use
    • NING Hua, WANG Yanhong, WU Linna, DU Yun,
    • Information and Communications Technology and Policy. 2021, 47(8): 69-73.
    • Abstract ( 261 )   
    • The collection and use of personal information by APP in violation of the principle of minimal necessity is themain challenge of current personal information protection work.This paper analyzes the reasons for illegal collection and over collection of personal information,lists the minimal necessary basic principles of APP,puts forward the mechanism of itemized notification and unilateral consent, designs the minimal specification of permission request and data collection and provides the minimal necessary scheme for APP to collect and use personal information.
    • Related Articles | Related Articles | Metrics
    • Shenzhen 5G infrastructure public policies and effect research
    • ZHU Huibin
    • Information and Communications Technology and Policy. 2021, 47(8): 74-80.
    • Abstract ( 230 )   
    • 5G technology is important for ICT development and new industry application scene because of its character while becoming the important strategy of high-quality development stage.The rationality and innovative effect of government policy is important for the efficiency and safety of 5G construction because 5G construction relates to multi-government departments.Shenzhen as the first batch cities to start 5G network construction possesses good 5G infrastructure.The paper researches on the public policy and its effect of 5G infrastructure and has great reference to the follow-up city starting 5G construction.
    • Related Articles | Related Articles | Metrics
    • Integration of SPN and PTN networking in the era of 5G
    • LIN Yan, SHI Qiliang,
    • Information and Communications Technology and Policy. 2021, 47(8): 81-85.
    • Abstract ( 643 )   
    • Integration of SPN and PTN networking is a core topic of metropolitan area network in the era of 5G.This paper firstly compares using PTN network and building SPN network in carrying 5G base stations.It elaborates integration of SPN and PTN networking in urban and rural areas.It discusses the interconnection of SPN network and PTN network and so on.It emphasizes the significance of integration of SPN and PTN networking for 5G construction at present and metropolitan area network construction in the future.
    • Related Articles | Related Articles | Metrics
    • Construction method of user behavior trust evaluation model in cloud computing environment
    • WANG Na, ZHAO Bo, LI Ang,
    • Information and Communications Technology and Policy. 2021, 47(8): 86-91.
    • Abstract ( 268 )   
    • Aiming at the problem that the prediction accuracy of traditional trust model in cloud computing environment is too low, this paper proposes a method to build user behavior evaluation model in cloud computing environment based on deep learning.The long-term and short-term memory network of prediction residual framework is used to extract the temporal features of users爷access behavior in the cloud computing environment.On this basis, combined with the error mechanism to modify the feature vector, the trust evaluation model of users 爷behavior in the cloud computing environment is constructed.The model can realize real-time monitoring of user behavior security in cloud computing environment, and solve the problem of low trust evaluation of users in cloud computing environment.Experimental results show that the proposed method can effectively improve the accuracy of real-time evaluation of user credibility,and provide data support for later security situation deduction.
    • Related Articles | Related Articles | Metrics