“China Data Center Network and Information Security Forum 2010â€, Ma Guangyu, deputy manager of the Network Security Division of the Operation and Maintenance Department of China Unicom Network, said that the terminal’s intelligence is getting higher and higher, the network functions are more and more powerful, and the access methods are diversified. In particular, the mobile and wireless access methods lead to more powerful clients and more access routes, further exacerbating the problem of network security.
In this regard, Ma Guangyu introduced China Unicom's work on cyber security protection: “First, there are two parts in terms of technical means: The first part puts forward a mature and stable application of technology in the design and construction phase of the network; At the same time as the construction of the network, the implementation of network security assurance was synchronized and the main project was adhered to and put into operation.â€
"Secondly, in the aspect of system flow, the three-point technology and seven-point management are advocated." Ma Guangyu believes that it is applicable from the perspective of network security or from the perspective of network operation and maintenance.
"Third, in terms of organizational structure, cyber security also involves various aspects of the public communications network and intranet. Therefore, for China Unicom, it involves departments such as planning, planning, procurement, enhancement, maintenance, and business; Network security also involves industry management, support units, and a large number of third-party partners, and it also involves ordinary public users.†Ma Guangyu said that network and information security are inseparable in certain aspects. Therefore, we establish it within the company. An inter-departmental communications network security agency coordinates the company's internal security efforts.
"Fourth, in respect of the personnel team, because all the work requires personnel to implement, there is no special network security position in our existing personnel team position system." Ma Guangyu said that after this adjustment, the operation The Ministry has just established a Cyber ​​Security Department. We are now also seeking to create additional network security positions within the company and can place our responsibilities at headquarters, provincial and municipal levels.
"Fifthly, in terms of external environment, when the means, institutional processes, institutions, and personnel are all in place, we must also develop a good external environment. At present, it involves the government authorities, the industry's own units, operating companies, and technology. The cooperative partners provided are provided.†Ma Guangyu believes that we should strengthen the assistance and exchanges between related parties through various channels, and actively prevent and effectively combat the illegal use, detection and attack of communications networks.
Waterproof Speakers,20W Waterproof Bluetooth Speaker,Waterproof Ipx7 Bluetooth Speaker,Portable Waterproof Bluetooth Speaker
Comcn Electronics Limited , https://www.comcnspeaker.com