物联网学报 ›› 2019, Vol. 3 ›› Issue (3): 1-4.doi: 10.11959/j.issn.2096-3750.2019.00114

• 前言与综述 •    下一篇

用科学的网络安全观指导关键信息基础设施安全保护

李旸照1,2,沈昌祥3,田楠4   

  1. 1 中国长江三峡集团有限公司,北京 100038
    2 浙江大学控制科学与工程学院,浙江 杭州 310027
    3 中国工程院,北京 100088
    4 中国人民解放军91977部队,北京 100089
  • 修回日期:2019-09-12 出版日期:2019-09-30 发布日期:2019-10-14
  • 作者简介:李旸照(1986- ),男,湖北黄冈人,博士,中国长江三峡集团有限公司高级工程师,主要研究方向为网络安全和工业控制。|沈昌祥(1940- ),男,浙江奉化人,中国工程院院士,国家集成电路产业发展咨询委员会委员、国家信息化专家咨询委员会委员、国家三网融合专家组成员,主要研究方向为网络安全和密码工程。|田楠(1988- ),男,湖北宜昌人,中国人民解放军 91977 部队工程师,主要研究方向为网络安全和密码工程。

Guiding the security protection of critical information infrastructure with scientific network security concept

Yangzhao LI1,2,Changxiang SHEN3,Nan TIAN4   

  1. 1 China Yangtze Three Gorges Group Co.,Ltd.,Beijing 100038,China
    2 School of Control Science and Engineering,Zhejiang University,Hangzhou 310027,China
    3 Chinese Academy of Engineering,Beijing 100088,China
    4 Chinese People’s Liberation Army 91977 Force,Beijing 100089,China
  • Revised:2019-09-12 Online:2019-09-30 Published:2019-10-14

摘要:

在当前竞争日益激烈的国际网络空间安全博弈中,关键信息基础设施安全形势严峻。从科学原理上看,网络安全风险的实质是人们对信息科学认知逻辑的局限性,建设“刀枪不入”的网络防御体系是不可能的;从经济效益上看,建设这种网络防御体系也不一定划算。网络安全工作的关键是安全目标的收敛,重点是确保完成计算任务的逻辑组合不被篡改和破坏,从而实现正确计算。围绕这个安全目标,从逻辑正确验证理论、计算体系结构和计算工程应用模式等方面进行科学技术创新,解决了逻辑缺陷不被攻击者利用的问题,形成攻防矛盾的统一体,为信息系统建立主动免疫能力。

关键词: 关键信息基础设施, 网络安全, 可信计算, 主动免疫

Abstract:

In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.

Key words: critical information infrastructure, network security, trusted computing, active immunization

中图分类号: 

No Suggested Reading articles found!