China Unicom's Five Key Ideas for Cyber ​​Security - Three-point Technology Seven-point Management

“China Data Center Network and Information Security Forum 2010”, Ma Guangyu, deputy manager of the Network Security Division of Operation and Maintenance Department of China Unicom Network, said that the terminal’s intelligence is getting higher and higher, the network function is more and more powerful, and the access method is diversified. In particular, the mobile and wireless access methods lead to more powerful clients and more access methods, further exacerbating the problem of network security.

In this regard, Ma Guangyu introduced China Unicom's work on cyber security protection: “First, there are two parts in terms of technical means: The first part puts forward a mature and stable application of technology in the design and construction phase of the network; At the same time as the construction of the network, the implementation of network security assurance was synchronized and the main project was adhered to and put into operation.”

"Secondly, in the aspect of system flow, the three-point technology and seven-point management are advocated." Ma Guangyu believes that it is applicable from the perspective of network security or from the perspective of network operation and maintenance.

"Third, in terms of organizational structure, cyber security also involves various aspects of the public communications network and intranet. Therefore, for China Unicom, it involves departments such as planning, planning, procurement, strengthening, maintenance, and business; Network security also involves industry management, support units, and a large number of third-party partners, and it also involves ordinary public users.” Ma Guangyu said that network and information security are inseparable in certain aspects. Therefore, we establish it within the company. An inter-departmental communications network security agency coordinates the company's internal security efforts.

"Fourth, in respect of the personnel team, because all the work is required to be implemented by personnel, there is no special network security position in our existing personnel team position system." Ma Guangyu said that after this adjustment, the operation The Ministry has just established a Cyber ​​Security Department. We are now also seeking to create additional network security positions within the company and can place our responsibilities at headquarters, provincial and municipal levels.

"Fifthly, in terms of external environment, when all means, systems, processes, institutions, and personnel are available, we must also develop a good external environment. At present, it involves government departments, industry units, operating companies, and technology. The cooperative partners provided are provided.” Ma Guangyu believes that we should strengthen assistance and exchanges between related parties through various channels, and actively defend and effectively combat the illegal use, detection and attack of communications networks.

This entry was posted in on