Strategic Study of CAE >> 2016, Volume 18, Issue 6 doi: 10.15302/J-SSCAE-2016.06.012
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Center of Information Security Architecture in Beijing Jiaotong University, Beijing 100044, China
Next Previous
Abstract
This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.
Keywords
active defense ; active immunity ; trusted computing ; trusted technology insurance system ; cybersecurity infrastructure
References
[ 1 ] Zhang W L. Discussion the status of information security base on graded protection [J].Information Security and Technology, 2014, 9 (1): 9–13. Chinese. link1
[ 2 ] Wang D C, Wang Y S, Lin H. Analysis of computer information system hierarchical protection [J]. China Public Security (Academy Edition), 2009, 16 (3): 4–10. Chinese. link1
[ 3 ] Zhu J P, Li M. Research on information security classified protec-tion standard system [J]. Information Technology & Standardiza-tion, 2005 (5): 21–24. Chinese.
[ 4 ] Luo L. Analysis of information security and hierarchical protection technology [J]. Heilongjiang Science and Technology Information, 2015 (12): 155–155. Chinese. link1
[ 5 ] Shen C X. The rectification routes of hierarchical protection [J]. Netinfo Security, 2008 (11): 14–15. Chinese. link1
[ 6 ] Shen C X, Zuo X D. Focus of hierarchical infosec protections [J]. Information Security and Communications Privacy, 2004 (4): 16–18. Chinese. link1
[ 7 ] Shen C X. Accelerate the work of information security hierarchical protection [J]. Netinfo Security, 2008 (5): 4–7. Chinese. link1
[ 8 ] Ma L, Bi M N, Ren W H. Research of the relationship between popular security protection model and security protection require-ments for classified protection of information system security [J]. Netinfo Security, 2011 (6): 1–4. Chinese. link1
[ 9 ] Shen C X, Zhang H G, Wang H M, et al. Research and develop-ment of the trusted computing [J]. Scientia Sinica Informations, 2010, 40 (2): 139–166. Chinese. link1
[10] Shen C X. Developing the trusted computing technology and industry [J]. Information Security and Communications Privacy, 2007 (9):19–21. Chinese. link1