Secretarial knowledge > Secretary basis

Do a good job of confidentiality under the informationization situation



With the continuous acceleration of the national informatization process, the issue of information security has become more and more prominent, which has aroused the great attention of the party and the government and the widespread concern of all sectors of society. Information security is related to the country's political security, military security, economic security, science and technology security, and social security. It is related to the success or failure of reform, opening up, and socialist modernization. The Party Central Committee and the State Council have made information security in the deployment of national informationization. The confidentiality work puts on a strategic position, pointing out that it is necessary to grasp the information construction in one hand and the information security guarantee work in one hand. In September last year, the National Informatization Leading Group clearly put forward the overall objectives, specific countermeasures and requirements for establishing China's information security system. This has important guiding significance for strengthening China's information security work. The implementation of the spirit of the No. 27 archives of the Central Office and the protection of state secret information security are an important part of the entire information security work and a very important and urgent task in the current e-government construction.
In XX, the State Secrecy Bureau conducted a nationwide inspection of classified computers on the Internet and processed confidential information on the public network, and found many problems, both technical and administrative. In addition, the number of leaks related to the Internet has been increasing in recent years, and according to statistics, it has accounted for more than 60% of leaks. It can be seen that the information security situation is very serious, and it is imperative to strengthen the technical prevention and confidentiality management of classified networks. In this regard, the author believes: First, based on the overall situation, attach importance to the confidential work in the construction of e-government. It is necessary to clearly define the location of a regional network and a government external network. The internal office network of the government department, the government-oriented social open network and the Internet are three different levels of networks. The reason why the state puts different requirements on its security and management is because the government regional network and the government external network. It is different from the nature of the information running on the Internet, the object of the service, and the level of information security. Since the government regional network inevitably does not run confidential information, it must be physically isolated from the government external network and the Internet. The second is to clarify the standards. The government regional network must be constructed and managed strictly according to the requirements of the classified network. Since state secrets are basically concentrated in party and government organs, the party and government regional networks should be treated according to the secret network. In this regard, we must further unify our understanding, clarify our responsibilities, and consciously incorporate the party and government regional networks into the scope of examination and approval of the secrecy department in accordance with the requirements of the Central and Central Secrecy Committee, and do a good job in regional network security and confidentiality management. The third is the scope of control, and the extension of the secret system should follow the principle of "minimization." The greater the construction of a classified system, the wider the scope and the higher the level, the lower the safety factor. Therefore, the definition of the boundary of the classified network should follow the principle of “minimizing the confidentiality system” on the premise of fully satisfying the application requirements, minimize the contact scope of the classified information, and maximize the sharing and sharing of general information. It must be guaranteed. "Two, two-pronged approach, and effectively strengthen the technical prevention and confidentiality management of the administrative regional network. First, the principle of simultaneous planning and simultaneous implementation. To plan and build a classified computer information system, the corresponding confidential facilities should be planned and implemented simultaneously; The confidentiality plan is based on the principle of argumentation. The overall plan for the construction of the government regional network must have a security and confidentiality system design plan, or a comprehensive security and confidentiality solution should be separately formulated under the guidance of the confidentiality department. The technical measures adopted must conform to the technical standards promulgated by the State Secrecy Bureau. And the feasibility of the expert is demonstrated. The third is the principle that the strength of the confidential technical measures is consistent with the level of confidentiality of the information to be protected. Fourth, the principle of qualification certification. The confidential system may not use confidential equipment that has not been identified and approved by the state secrets department. Security products; the design, system integration and maintenance support of the confidential information system construction plan must be entrusted to the units with confidentiality approval approved by the state secrecy department. The fifth is the principle of equal emphasis on management technology. As the saying goes, "three-point technology , seven points management", for confidential information System management is particularly important. It is necessary to establish and improve the network secrecy system, strengthen information security and confidential education and daily supervision, and improve staff safety and confidentiality awareness and safety skills. Sixth is the principle of approval before use. According to the requirements of the central government and the State Secrecy Bureau According to the regulations, the confidential system must be approved by the secrecy department above the certain level before it is put into use.
In short, jointly promote the construction of an information security and confidentiality guarantee system. First, it requires the guidance of laws and policies. The second is to continuously innovate on the basis of the introduction of a certain demand and foreign advanced technology. The third is the rational division of labor and close cooperation between relevant government departments. . Fourth, it requires the attention, recognition and active support of all government departments, enterprises and the community.
Status of China's information security industry:
According to estimates, at present, more than 55% of computers in China are infected with viruses, 80% of Chinese websites lack comprehensive security protection systems, and 70% of information security equipment in economic sectors come from abroad, especially China's information systems and network equipment. Most of the key chips and core software used are imported, which poses a great hidden danger. If the information security is not well resolved, it will not only cause huge economic losses, but even endanger the security of the country and the stability of society. The foundation of the national information and network security system is information products and information systems. Establishing autonomous and powerful information security industry is the key to ensuring national and information security. Therefore, it is imperative to vigorously develop independent information security technologies and products.
According to estimates, at present, more than 55% of computers in China are infected with viruses, 80% of Chinese websites lack comprehensive security protection systems, and 70% of information security equipment in economic sectors come from abroad, especially China's information systems and network equipment. Most of the key chips and core software used are imported, which poses a great hidden danger. If the information security is not well resolved, it will not only cause huge economic losses, but even endanger the security of the country and the stability of society. The foundation of the national information and network security system is information products and information systems. Establishing autonomous and powerful information security industry is the key to ensuring national and information security. Therefore, it is imperative to vigorously develop independent information security technologies and products.
Difficulties and problems:
China's information security industry is still in its infancy, and it faces many difficulties and problems. Wu Shizhong, director of China Information Security Product Evaluation and Certification Center, pointed out that the problems in the development of China's information security industry are mainly as follows: First, the demand for security applications is unclear, the technology of the industry is too strong, and the application is not targeted. Mainly reflected in the development trend of technology and products, mainly tracking the business trends of foreign information development, and the domestic information security needs are not well met. Second, the product is over-concentrated, the low-level repetition is more serious, the industrial structure is out of balance, the resources are not properly allocated, and the competitiveness is lacking. The main performance is that the products are highly concentrated on the network perimeter protection and password devices, while the identification and information auditing products are relatively few. Third, the core technology is still constrained, the level of industrialization is low, and the quality of products is worrying. Mainly in addition to os, wafers, application of soft body, but also a number of special agreements, standards and other restrictions, exhibits, samples, test supplies, the certification pass rate is low. Fourth, the lack of industrial policy support, especially the lack of financing policies and procurement policies, it is difficult to adapt to the severe challenges of wto. Government management multi-party policies should be coordinated, government and business needs should have different procurement policies, and a reasonable industrial protection policy should be formulated under the wto/tbt framework.
Prospects for China's information security industry:
After joining the WTO, China is facing a more open development environment. With the continuous advancement of national informatization, new and higher requirements for information security have been put forward, which has also provided new development opportunities for China's information security industry. Whether considering the complicated and ever-changing international situation, enhancing the shape of national information security, or considering the new growth point of supporting the development of China's information industry, it has become a top priority to establish China's independent information security industry.
Zhang Qi, Director of the Electronic Information Product Management Department of the Ministry of Information Industry, has proposed several key tasks on how to promote the development of China's information security industry: Accelerate research and development of national information security industry development strategies and related policies, and strive to create a good development environment; Product-related standards, guide and promote the development of the information security industry; actively develop network security technologies, support research and development and industrialization of products with independent intellectual property rights; strengthen scientific and technological research and innovation of key core technologies, and strive for information on cpu, operating systems, etc. Breakthroughs in the independent research and development of safety core technologies and products; the introduction of government procurement and equipment policies as soon as possible to promote the universal application of products with independent intellectual property rights.
In the next five to ten years, China is likely to become the world's largest information security product. Under such conditions, the development of China's information security industry will become the focus of future government and enterprises.

recommended article

popular articles