Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Industrial status and development suggestions of Mobile Edge Computing
    • TANG Xiongyan, WANG Youxian, CHEN Gao, HUANG Rong
    • Information and Communications Technology and Policy. 2020, 46(2): 1-5.
    • Abstract ( 333 )   
    • With the commercialization of 5G network,and the development of IoT and AI, the scale and complexity of edge computing have increased significantly. New services such as edge real-time computing, edge real-time analysis and edge intelligence are emerging, which require higher efficiency, reliability and resource utilization of edge infrastructure. How to adapt to the development trend of cloud computing and build Mobile Edge Computing (MEC)
      infrastructure has become a new topic. This paper reviews the development status of MEC, including the scale of MEC industry and the pilot work results of international and domestic telecom operators in MEC, and discusses the impact of the multi-cloud and hybrid cloud on MEC. Afterwards, the issues and challenges of MEC are analyzed and some suggestions based on the telecom operators’ practices are proposed.
    • Related Articles | Related Articles | Metrics
    • The development of 5G technology in Jiangsu and suggestions on the next phase of growth
    • CHEN Ying, SUN Xiaoqin, YU Haiyang
    • Information and Communications Technology and Policy. 2020, 46(2): 6-9.
    • Abstract ( 264 )   
    • 2019 is the epoch-making year for commercial application of 5G. To seize the opportunities, Jiangsu is accelerating the building of 5G network and the layout of the industrial chain. At the same time, Jiangsu is promoting pilot application and improving industrial ecosystem. However, there are challenges in construction of network facilities,applications of industrial convergence and business-model innovations. Under the circumstances, Jiangsu must be well prepared in terms of industrial chain extension, pilot demonstration applications and organizational collaborative promotion.
    • Related Articles | Related Articles | Metrics
    • Risk analysis and evaluation of Blockchain infrastructure
    • WEI Liang, ZHA Xuan
    • Information and Communications Technology and Policy. 2020, 46(2): 10-13.
    • Abstract ( 262 )   
    • Blockchain has become a hot issue in global technology and economy with its anti-tampering, transparency and decentralization. Blockchain infrastructure carries various blockchain applications on the top and connects network infrastructure on the bottom, and therefore its security is key to the high-quality development of blockchain. This paper surveys the effort of global governments, industries and standardization institutions in blockchain infrastructure security.Then it analyzes the security risks of blockchain infrastructure and ends up with the corresponding security evaluation indicators to evaluate the ability of blockchain infrastructure in tackling security risks.

    • Related Articles | Related Articles | Metrics
    • Analysis on Blockchain technology enhancing the security of UAV swarm system
    • FENG Zebing, LU Yue
    • Information and Communications Technology and Policy. 2020, 46(2): 14-18.
    • Abstract ( 310 )   
    • Unmanned aerial vehicle (UAV) swarm warfare has advantages of scale and cost when facing high-intensity confrontation and dynamic battlefield changes. It has been widely used in the military field by countries around the world. At the same time, the drone swarm system has also become the target of network attacks, including malicious node intrusion, drone hijacking, wireless interference, data theft and other security risks. Blockchain, as a technology equipped with the characteristics of asymmetric encryption, chained data storage, node collaboration and consensus, has been studied as an effective technical means to resist the threat of distributed network attack, and can be utilized to effectively enhance the security of UAV swarm system. This paper firstly analyzes the current development situation and security risks of UAV swarm system. Then the feasibility of enhancing the UAV swarm system security with Blockchain technology is proposed. Finally, we introduce some technical challenges of applying Blockchain technology.
    • Related Articles | Related Articles | Metrics
    • Research on threat intelligence sharing and rating technology based on Blockchain
    • CHENG Yexia, FU Jun, CHEN Dong, DU Yuejin
    • Information and Communications Technology and Policy. 2020, 46(2): 19-25.
    • Abstract ( 306 )   
    • With the rapid development of computer and network technology, cyber security incidents occur frequently and security vulnerabilities are emerging endlessly, so the role and value of threat intelligence are increasing. Based on the characteristics of blockchain such as openness, consensus, autonomy and decentralization, trustlessness, nontampering, and traceability, the paper proposes using blockchain technology to build blocks of threat intelligence information, including IP address information, domain name information, URLs Information, security incident information, vulnerability information, threat intelligence source credibility, threat intelligence source contribution rate,etc. A threat intelligence sharing and rating system based on blockchain is designed in the paper, and the corresponding threat intelligence sharing method and rating method based on blockchain are given. It can acquire and analyze the latest and most valuable threat intelligence information timely and effectively, so as to perform protection and emergency response timely, and promote the continuous and effective development of the closed loop of the entire threat intelligence ecosystem.
    • Related Articles | Related Articles | Metrics
    • Application and security analysis of 5G Network slice
    • YANG Hongmei, XIE Jun
    • Information and Communications Technology and Policy. 2020, 46(2): 25-29.
    • Abstract ( 265 )   
    • Network slicing is one of the important characteristics of 5G network architecture. Operators can support different vertical industry applications by 5G Network slicing, realize flexible and efficient network resource arrangement and scheduling, and meet the differentiated business characteristics and security requirements. This article introduces the concept and implementation scheme of 5G network slicing, describes the application scenario and security requirements of 5G Network slicing, analyzes the security risks and the countermeasures, introduces the related international and domestic specifications, Finally, the development trend of 5G Network slicing is prospected.
    • Related Articles | Related Articles | Metrics
    • Security vulnerability analysis and protection research of virtualization platform
    • ZHANG Jian, TANG Hongyu, LIU Wentao
    • Information and Communications Technology and Policy. 2020, 46(2): 41-45.
    • Abstract ( 239 )   
    • The virtualization platform is the core infrastructure of cloud computing services, therefore, security research for virtualization platform plays a key role in cloud security. This paper first summarizes the typical architecture and mainstream platform of virtualization, then deeply analyzes the types, impacts and major high-risk events of virtualization platform security vulnerabilities, finally analyzes the virtualization security protection system of mainstream manufacturers and puts forward protection solutions.
    • Related Articles | Related Articles | Metrics
    • A traceable and lightweight protection method for user information against leakage
    • ZHANG Yan, HE Shen, SU Li
    • Information and Communications Technology and Policy. 2020, 46(2): 46-49.
    • Abstract ( 246 )   
    • In order to solve the problem of user information leakage, this paper proposed the lightweight protection method for user information. The digital contents such as ID number and phone number in the user information are encoded by the mask, stored with other information and decoded when used. The mask can be calculated by server flags, time and so on. When user information is leaked, only the encoded information will be exposed. By calculating the digital contents in the leaked information with the real digital content to get the mask, the source and time of information leakage can be traced, which can achieve the effect of anti-leakage and traceability.
    • Related Articles | Related Articles | Metrics
    • Analysis of security evaluation system on 5G network equipment
    • LIU Jingxuan, HAN Jialin
    • Information and Communications Technology and Policy. 2020, 46(2): 53-56.
    • Abstract ( 226 )   
    • With the rapid development of 5G commercialization, 5G security issues have become the focus of international attention. When operators deploy 5G network equipment, it is crucial to ensure that the security of equipment should meet security requirements. In this paper, the significance of establishing security evaluation system on 5G network equipment is analyzed. Two international security evaluation methods, Common Criteria (CC) and Network Equipment Security Assurance Scheme (NESAS), are introduced and discussed. In addition, suggestions for promoting security evaluation on 5G network equipment in China are also proposed.
    • Related Articles | Related Articles | Metrics
    • The IoT Security Maturity Model Practitioner's Guide and its enlightment for China
    • LIU Xiaoman, DONG Yue, ZHANG Yu, YANG Dongmei
    • Information and Communications Technology and Policy. 2020, 46(2): 57-60.
    • Abstract ( 254 )   
    • In order to accelerate the application of the security maturity model in important areas of the Industrial Internet, on February 25, 2019, the American Industrial Internet Industry Alliance released the “IoT Security Maturity Model: Practitioner􀆳s Guide” to build a comprehensive security maturity model, Formed a dynamic industrial Internet security assessment process, and successfully applied the model to conduct security practice assessment work. In this regard, China should pay full attention to speeding up the implementation of safety assessment management practices in key areas, speeding up the development of safety evaluation standards, accelerating the application of safety practices in key areas, strengthening the building of security situation awareness capabilities, and playing the role of bridges of China􀆳s industrial alliance to build a complete and reliable Industrial Internet security assessment system.

    • Related Articles | Related Articles | Metrics
    • Reference and inspiration of cyber security drill of critical information infrastructure in Europe and the United States
    • FENG Shiduo, LI Shenzhi, GAO Jingjie, GUO Xiaoran
    • Information and Communications Technology and Policy. 2020, 46(2): 61-64.
    • Abstract ( 241 )   
    • Nowadays, with the continuous popularization of ICT network, and the rapid development of ICT technology, the importance of critical information infrastructure is increasingly highlighted. While critical information infrastructure has become the core of cyber security for all countries, it also faces increasing security risks and problems. This article focuses on cyber security drill of critical information infrastructure in Europe and the United
      States, analyzes its characteristics, summarizes its practical results, and drawing on its exercise model. And this article puts forward some suggestions on the security protection of critical information infrastructure in China from the aspects of actual combat exercises, emergency coordination, technology development and personnel training.
    • Related Articles | Related Articles | Metrics
    • Analysis and significance of attack protection response in APT supply chain
    • GOU Wenqi, LI Mingqiang, HUANG Dekan
    • Information and Communications Technology and Policy. 2020, 46(2): 65-68.
    • Abstract ( 355 )   
    • In recent years, with the rapid development of digital era, key infrastructure and important resources are increasingly dependent on the supply chain. Internet criminals and hackers have also found that the supply chain is filled with available vulnerabilities. Many governments have expressed their concern about the integrity and vulnerability of the supply chain. This paper analyzes the principles and detection difficulties of APT supply chain attacks, and draws on the measures taken by governments and foreign enterprises from various countries.
    • Related Articles | Related Articles | Metrics
    • Network data security analysis of new technologies and new services in the telecommunications industry
    • GUO Jiannan
    • Information and Communications Technology and Policy. 2020, 46(2): 69-73.
    • Abstract ( 225 )   
    • With the technological innovation and rapid iteration of the telecommunications industry, 5G, ArtificialIntelligence, Big Data analysis, the Internet of  Things and other technologies continue to emerge, providing a technical premise and a basic platform for the digital and intelligent transformation of the telecommunications industry. This paper summarizes the five major services types and application prospects of the telecommunications industry. Taking business support systems, big data platforms, cloud computing services, and IoT services as typical cases, and combining services characteristics to analyze network data security risks in business management and technology, this paper proposes the countermeasures and suggestions for the establishment of a data security management work system and the improvement of data security technology support capabilities, and provide ideas for relevant companies in the telecommunications industry to actively respond to new trends, situations and problems.
    • Related Articles | Related Articles | Metrics
    • Implications of Novel Coronavirus Pneumonia on digital economy consumption and countermeasures
    • ZHENG Anqi
    • Information and Communications Technology and Policy. 2020, 46(2): 78-82.
    • Abstract ( 570 )   
    • As the outbreak of the Novel Coronavirus Pneumonia hit China during the 2020 Lunar New Year holiday,Chinese central government seeks touse maximum efforts to contain the outbreak of the novel coronavirus, resulting in a sharp plunge in offline consumption. Under this circumstance, people have to depend more on digital consumption. In the short run, online entertainment industry will see explosive growth, while OTAs (Online Travel Agency) and other travel-related platforms will have a short window period. E-commerce platforms will absorb the shocks of the outbreak on consumption, and traditional offline businesses will be largely substituted by online modes such as online collaborative office, remote diagnosis and treatment andnetwork-based distance education. In the long run, the outbreak will help digital economy performs better in coordination and response, so that online collaboration model will become more mature, together with continuously accumulated resources and well-maintained digital consumption habits, digital onsumption will embrace a bright prospect.
    • Related Articles | Related Articles | Metrics
    • Economic policy analysis and suggestions for the response to the Novel Coronavirus Pneumonia#br#
    • HU Yanni, ZHANG Lin
    • Information and Communications Technology and Policy. 2020, 46(2): 83-86.
    • Abstract ( 505 )   
    • The outbreak of the Novel Coronavirus Pneumonia during the 2020 Spring Festival transportation has brought a huge impact on the people􀆳s production and life as well as social and economic development. Based on international experience, the focus of economic policy responses varies at different stages of the epidemic. After the outbreak of the Novel Coronavirus Pneumonia, the Chinese central government responded quickly, and local governments also successively issued a series of policy combinations to ensure the restoration of production, mainly including three aspects of policies. First, fiscal policies to protect the supply of epidemic prevention and control, and strengthen tax reduction. Second, financial policies to reduce corporate financing costs and prevent systemic financial risks. Third,employment policies to protect workers’ rights and benefits and share the cost of stable employment. With the gradual mitigation of the Novel Coronavirus Pneumonia, economic risks will gradually be exposed. Sober awareness should be maintained, and economic policy support should be further strengthened to promote a stable return to economic society.
    • Related Articles | Related Articles | Metrics
    • MEC technology and application in the video surveillance field
    • XU Muhong, WANG Xingyan
    • Information and Communications Technology and Policy. 2020, 46(2): 87-91.
    • Abstract ( 247 )   
    • According to the development of the mobile communication technology and artificial intelligence technology,there are more and more mobile inspection equipments which will be used in the surveillance field. That will create tons of data and huge transmission press for the mobile network. MEC (Multi-access Edge Computing) servers may be one of the methods to solve this problem if they will be used in the edge of the mobile network. In this paper, the intelligent and mobile process of the video surveillance is introduced first, and the coordination between the cloud technology and the edge computing technology in video surveillance area is then given in brief. The main topics of this paper are what MEC is and how the MEC technology will be used in the video surveillance service.
    • Related Articles | Related Articles | Metrics
    • The application of Beidou satellite navigation system in emergency rescue of typhoon disaster
    • LUO Zheng
    • Information and Communications Technology and Policy. 2020, 46(2): 92-96.
    • Abstract ( 268 )   
    • During the process of responding to natural disasters like severe typhoons, current emergency command and rescue methods are still insufficient. Through analyzing the current situation and development trend of Beidou satellite navigation system, this article focuses on the difficulties and key issues of typhoon emergency rescue, and explores the application of Beidou satellite navigation system in it, including disaster information collection and area delineation,emergency rescue force deployment and dispatch, location rescue of disaster victims, material distribution of emergency rescue, establishment of cooperative rescue networks between rescue teams and victims. Finally, relevant conclusions and development suggestions are proposed.
    • Related Articles | Related Articles | Metrics