Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2016, Volume 18, Issue 6 doi: 10.15302/J-SSCAE-2016.06.012

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Center of Information Security Architecture in Beijing Jiaotong University, Beijing 100044, China

Funding project:中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10) Received: 2016-10-12 Revised: 2016-10-18 Available online: 2016-12-13 15:28:28.000

Next Previous

Abstract

This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.

References

[ 1 ] Zhang W L. Discussion the status of information security base on graded protection [J].Information Security and Technology, 2014, 9 (1): 9–13. Chinese. link1

[ 2 ] Wang D C, Wang Y S, Lin H. Analysis of computer information system hierarchical protection [J]. China Public Security (Academy Edition), 2009, 16 (3): 4–10. Chinese. link1

[ 3 ] Zhu J P, Li M. Research on information security classified protec-tion standard system [J]. Information Technology & Standardiza-tion, 2005 (5): 21–24. Chinese.

[ 4 ] Luo L. Analysis of information security and hierarchical protection technology [J]. Heilongjiang Science and Technology Information, 2015 (12): 155–155. Chinese. link1

[ 5 ] Shen C X. The rectification routes of hierarchical protection [J]. Netinfo Security, 2008 (11): 14–15. Chinese. link1

[ 6 ] Shen C X, Zuo X D. Focus of hierarchical infosec protections [J]. Information Security and Communications Privacy, 2004 (4): 16–18. Chinese. link1

[ 7 ] Shen C X. Accelerate the work of information security hierarchical protection [J]. Netinfo Security, 2008 (5): 4–7. Chinese. link1

[ 8 ] Ma L, Bi M N, Ren W H. Research of the relationship between popular security protection model and security protection require-ments for classified protection of information system security [J]. Netinfo Security, 2011 (6): 1–4. Chinese. link1

[ 9 ] Shen C X, Zhang H G, Wang H M, et al. Research and develop-ment of the trusted computing [J]. Scientia Sinica Informations, 2010, 40 (2): 139–166. Chinese. link1

[10] Shen C X. Developing the trusted computing technology and industry [J]. Information Security and Communications Privacy, 2007 (9):19–21. Chinese. link1

Related Research