The “Number Expo” held in Guiyang proposes that information infrastructure protection is the key to big data security.

In April this year, the National Cyber ​​Security and Informatization Work Conference was held in Beijing, with far-reaching implications. At the “Number Expo” held in Guiyang from May 25th to 29th, the issue of big data security is still one of the hot topics of discussion. Many experts expressed that data security is the premise of realizing the value of data.

With the gradual deepening of the understanding of big data security issues, experts at the conference believe that key basic information facilities are the top priority of network security, and the standard system for certification testing is an important means to solve the protection of basic information facilities; Big data security also has to emphasize controllability. In addition, as the EU's GDPR comes into effect, personal big data security is considered to be as important as national security.

The “Number Expo” held in Guiyang proposes that information infrastructure protection is the key to big data security.

Big data security should emphasize controllability

Facebook user information disclosure is an important event node under the big data security issue, and its impact has not yet been settled.

The other side of the data security issue is the proliferation of data. Chen Xiongxiong, deputy director of the Ministry of Industry and Information Technology, said at the "Number Expo" that by 2020, China's total data will account for 20% of the total, and China will become one of the countries with the largest amount of data and the most abundant data types.

In response to the security problems in the era of big data, as early as the end of 2016, China introduced the "Network Security Law", which was officially implemented on June 1, 2017. At the same time, the National Information Security Standardization Technical Committee has also developed the 2017 and 2018 editions of the “Big Data Security Standardization White Paper” for two consecutive years.

"However, our standards and laws and regulations are not enforced to a high degree, and the company's self-prevention ability and security control ability are not enough." Wei Wei, director of the China Cyber ​​Security Review Technology and Certification Center, said, "Data ownership must be control".

The same emphasis on controllability is also the academician of the Chinese Academy of Engineering Ni Guangnan, which said that in fact, the core technology is subject to people not only bring supply chain risks, but also bring security risks, the latter is as serious as the former; China needs to break in the field of network information Foreign monopoly, reducing the dependence of foreign technology.

Basic information facility protection is the focus

Critical infrastructure information facilities are considered to be the top priority of cybersecurity, and current critical information infrastructure is also an easy target. For example, in 2015, the Ukrainian power system was invaded by malicious code, and the US broke the Internet event in October 2016.

On July 11, 2017, the National Internet Information Office and relevant departments drafted and promulgated the “Regulations on the Security Protection of Key Information Infrastructures (Draft for Comment), which will provide guidance to supervisors and operators.

Standard norm-setting is the main means to strengthen the protection of key infrastructure information facilities. Countries around the world also use standard measurement, inspection, testing, certification and other means to build a network and information security system.

"The infrastructure for certification testing can effectively protect the security system, protect big data security from the source, promote institutional rules, improve the quality of supply of big data product systems and applications, establish and transfer trust, and promote open sharing of big data." Bo Yimin, chief engineer of the Accreditation Supervisory Committee, said.

In 2016, China also issued a standard system for information security product certification by the National Certification and Accreditation Administration.

In addition to the standardization of standards, Shen Changxiang, an academician of the Chinese Academy of Engineering, said, "Our computing science still lacks the concept of attack and defense. The architecture lacks protective components, and engineering applications have no security services. That is, we have defects in design and manufacturing. Defects can be exploited to attack, so it is difficult for us to form a security proposition to deal with artificial exploitation of defects."

In this regard, Shen Changxiang proposed to establish an active immune computing architecture, that is, using a secure and trusted strategy to control the active immunity of computing and protection coexist, changing the traditional only to calculate the efficiency, rather than the one-sided computing mode of security protection.

In addition, the same technological innovations are also reflected in data encryption. Pan Jianwei, an academician of the Chinese Academy of Sciences, said that the current information security bottleneck relies on the classical encryption algorithm of computational complexity, which can be cracked in principle. Quantum communication is an unconditionally secure communication method in principle.

Personal big data security is equally important

On May 25 this year, the EU's General Data Protection Regulations (GDPR), known as the most stringent data protection regulations, came into force.

"In the era of big data, personal privacy and national security are equally important." Wei Wei said.

China's laws on the protection of personal data privacy are mainly embodied in the "Network Security Law". Article 45 stipulates that the departments and their staff members who are responsible for network security supervision and management must have personal information that they are aware of in performing their duties. Privacy and trade secrets are strictly confidential and must not be disclosed, sold or illegally provided to others.

But in fact, the incident of personal data leakage in China has occurred from time to time, and there are even black industry chains for data transactions.

“Companies that have control over a large amount of data have not kept up with the awareness, willingness, and ability of personal data privacy protection.” Wei Wei said, “A good job was done some time ago, that is, the privacy policy of network service companies must be It is good to carry out the specification, but from the point of view of the specification, the specification itself needs to be standardized, that is to say the same thing, the privacy provisions are different."

It is worth mentioning that many companies have expressed respect and attention to the privacy of personal data in this “number fair”.

“The EU's GDPR regulations have come into effect, and it also emphasizes that genetic data is highly sensitive data. You have to re-examine your privacy rules.” Yang Meng, head of the blockchain of Huada Gene Technology Co., Ltd., said, “We hope to give All personal data is provided with good privacy protection and can be traced and supervised throughout the process."

Disposable Vape Pen

Tobacco control has been a common global concern, while the traditional tobacco industry gradually, new tobacco has become the new strategic layout of tobacco giants. In this context, the emergence of e-cigarettes has further led to the replacement of traditional tobacco. At present, there are already a thousand different types of e-cigarettes, which have undergone several stages of development. The e-cigarette we are introducing today is the CBD pod systewm, a new type of e-cigarette. In this article we will combine the characteristics of the CBD with a brief analysis of it.


·Anti-anxiety

According to scientific studies,CBD can help depressed patients reduce their anxiety. The use of CBD can help maintain endogenous cannabinoids at a reasonable level, making the patient feel good and happy physically, and without any dependence.

·Anti-ageing

CBD is very powerful in anti-ageing. As a non-psychoactive component of the cannabis plant CBD inhibits the glutamate toxic response of cortical neurons and suppresses excessive oxidative stress, helping the body to achieve anti-ageing effects.

·Anti-inflammatory

CBD reduces the free radicals that cause neurodegenerative diseases and reduces swelling through its anti-inflammatory effects. In addition, CBD stimulates appetite and relieves pain.

China Disposble Vape Pen,E-Cigarette Cbd Vaporizer,Best Disposable Cbd Vape Pen,Disposable Cbd Vape

Shenzhen MASON VAP Technology Co., Ltd. , https://www.cbdvapefactory.com