Let more people rest assured to embrace the Internet and build a highland of network security industry in Zhejiang.
From November 7 th to 9 th, more than 1,000 important guests from all over the world will gather in Wuzhen, the ancient town, to open the grand event of the global Internet for the fifth time. World internet conference has been held for five consecutive years, which is an extraordinary five years. Big Data, Artificial Intelligence, Internet of Things … … The endless stream of new technologies and applications is gradually uncovering the future of digital China. From now on, Zhejiang Online launched the column "Extraordinary Five Years" to review and summarize Zhejiang’s extraordinary achievements in the field of digital economy and its increasingly prominent conference effect in social life.
The scale of network security industry has reached more than 20 billion, and the scale of enterprises has exceeded 100, which has formed an industrial agglomeration effect. This is the data obtained by an expert group led by an academician of China Academy of Engineering during an inspection tour in Zhejiang in April this year.
In addition to the output value, as one of the hot spots with the most Internet genes in China, Zhejiang has created a unique environment for the development of the network security industry: Greater Bay Area’s development strategy creates opportunities for enterprises to accelerate their development; The Hangzhou model of Internet Court was established to further purify cyberspace; Colleges and universities represented by Zhejiang University should improve the personnel training mechanism and enhance their future "hematopoietic" ability … …
With artificial intelligence, the information superhighway has been speeding up. Only by making the roadbed more stable and the road network layout more smooth can safety not be left behind. With a solid foundation and long-term planning, Zhejiang is catching up.
Move the court into cyberspace with the network management network
"Now in court!" At 9: 40 am on August 18, 2017, with the sound of a gavel, the "first case" of Hangzhou Internet Court was officially opened for trial.
In this special trial, there was only one judge at the scene. The original defendants in Hangzhou and Beijing, respectively, learned about the trial online in real time through the screen display in front of the judge. From "face to face" to "key to key", the centralized management and professional trial of network-related cases have opened a new chapter.
Nowadays, in Hangzhou Internet Court, the whole process of prosecution, filing, giving evidence, trial and judgment is online, and the online trial mode has been normalized. According to court statistics, from the trial operation on May 1 last year to October 30 this year, 14,233 Internet cases were accepted and 11,794 cases were concluded, saving 65% and 25% of the average court session time and trial period respectively.
Dean Du Qian said that as the first Internet court in China, over the past year or so, Hangzhou Internet Court has innovated the trial mode and re-engineered the litigation process, forming a "Hangzhou sample" for the construction of "six platforms, three models and one system" Internet courts:
Initiate the "asynchronous trial mode" to further break the time and space restrictions and allow the subjects to complete the litigation in an asynchronous way; The first electronic evidence platform and judicial blockchain in China were launched to solve the problem of electronic evidence access certificate, which is conducive to pre-solving disputes. "The continuous pioneering of the Internet Court in Hangzhou has directly" moved "the solemn court of reality into the virtual space of the network, which really makes the lawsuit ‘ Don’t have to run once ’ " Du Qian added.
At the beginning of the establishment of Hangzhou Internet Court, Shao Jingteng, vice president of Hangzhou Intermediate People’s Court, once said that "the first Internet court in China came into being in Hangzhou". Nowadays, with the landing of Internet courts in Beijing and Guangzhou, the "Hangzhou Experience" is being further spread across the country. Du Qian said: "Internet courts do not simply put ‘ Internet ’ With ‘ Court ’ The superposition of the two words, or the auxiliary use of Internet technology in judicial practice, is a major institutional innovation in which the judiciary actively adapts to the development trend of the Internet. "
Cloud online and offline escort data
How much volume data can a 7.8 cm *1.8 cm snowflake QR code hold? Yi Shen, general manager of Unitek, gave the answer of 32 A4 sheets.
With only one mobile phone, one code and several original documents, Unitek’s digital information verification service technology can store, read and verify the authenticity of original documents such as ID cards, insurance policies and passports offline. "We condense the complete information of the document into a high-capacity two-dimensional code, which can only be opened by the authorized person to identify and read the compressed information and visually compare it." Yi Shen introduced that this technology is still the first at home and abroad.
While the tangible personal information on the "ground" is secured, the wave of cloud computing is coming. With the rapid development of big data technology, many large, medium and small enterprises are trying to migrate various business processes to the cloud.
At the nail carnival week in August this year, Hangzhou Anheng Information Technology Co., Ltd. launched the world’s first third-party security module — — Nail a secret shield, ranking first in thousands of paid applications. "In the era of digital economy, the concern of enterprises and governments for data security shows that data security has become an important issue for them to move towards digital economy and transformation." In the view of Fan Yuan, president of Anheng, enterprises’ concerns about data security and privacy are the main obstacles to the development of digital industrialization and industrial digitalization.
Who can see the data sent to the cloud? Will it be lost or changed? How can I compensate if I lose it? In the past ten years, Anheng has been insisting on escorting industrial enterprises to the cloud. From the "old three samples" such as database audit to the combination of cloud security, situational awareness, big data and threat intelligence, Anheng has formed a three-dimensional and in-depth security system at three levels: before, during and after.
Fan Yuan said that the decade of Anheng’s development is a microcosm of national cyber security. "In the era of new digital economy, security will eventually become a basic attribute. It is everywhere, and it will not make you feel its existence deliberately." He believes that with the comprehensive development of security technology and digital economy, security will really become a driving wheel to promote the development of digital economy.
Professional training talents to light up the light of safety
"Where there is network or information system coverage, fierce offensive and defensive confrontation may occur at any time." Ren Kui, director of the Cyberspace Security Research Center of Zhejiang University, mentioned that the arrival of new technological changes such as artificial intelligence and the Internet of Things is making the boundaries between online and offline gradually disappear.
Cyberspace security governance shows the other side of "easy to attack and difficult to defend", which is the lack of professionals in the field of information security. The data shows that the gap of cyber security talents in China has reached more than 700,000 in 2017, and the demand for talents will increase to 1.4 million in 2020.
"In developed countries such as the United States, computers started earlier, disciplines were laid out earlier, and the talent pool was undoubtedly more solid", but Ren Kui said that the talent potential of students in China’s first-class universities is the biggest bargaining chip to catch up with foreign advanced levels.
He believes that compared with other regions, Zhejiang has formed an obvious Internet industry cluster around leading enterprises such as Alibaba and Hikvision, and the high-end talent agglomeration effect has been revealed; Active start-ups and private economic foundations will also provide service channels and landing soil for scientific research achievements used in Industry-University-Research; The implementation of policies such as the "West Science and Technology Corridor" has promoted major scientific research projects and application needs to go further and further in Zhejiang.
Fan Yuan is also concerned about the cultivation of network security talents. From the enterprise’s point of view, he hopes to promote the development of network security by replacing training with competition and promoting learning with competition. In 2014, Anheng Cyber Security College was established, and in 2017, the certification and training system for cyber security talents was launched. Now, we have jointly built training bases with many universities in China. "We hope to cultivate talents through some practical experience to make up for the gap between college education and practical application."
"The competition in cyberspace is, in the final analysis, the competition for talents." In the field of network security, the contest between hackers and Ke Bai is like the contest between spears and shields, which is endless. The cultivation of talents may be the constant pursuit of making the shield more solid, making new technologies better used by people and making the light of safety shine more brightly. (trainee reporter Zhao Mingjie)