检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:万俊伟[1] 赵辉[1] 鲍忠贵[1] 陈洪雁[1] 汪琦[1]
出 处:《飞行器测控学报》2015年第4期318-324,共7页Journal of Spacecraft TT&C Technology
摘 要:针对进口信息产品带来的安全隐患,系统地梳理了自主可控信息技术发展现状,提出了相应的应用策略及过渡策略,分析了自主可控存在的主要问题并提出了相应解决方法。"棱镜门"事件暴露出进口信息产品存在后门、漏洞、逻辑炸弹等潜在安全危害,其根本解决方法是采用自主可控技术。经过近些年在核心器件、高端芯片、基础软件等领域的迅速发展,我国已经具备建立自主可控信息系统的条件和基础,可遵循"顶层规划、强制推行;统一部署,分步实施;加强测评,充分验证"的思路,切实推行国产自主可控核心装备的使用。在全面实现自主可控的过渡期内,可采用可信计算、内核加固、强化管理等措施,有效降低非自主可控信息产品带来的安全隐患。This paper is a systematic review of the development status of proprietary and controllable information technology in view of security risks brought by imported information products.Application strategy and transition strategy are presented and the main existing problems in proprietary and controllable information technology and corresponding solutions are recommended.The "Prism Gate"event exposed that imported information products may bring potential security risks such as back door,loophole,logic bomb and so on and the radical solution is to use proprietary and controllable information technology.As a result of rapid development in core devices,high-end chips,basic software and other fields in recent years,our country already has the foundation and conditions for establishing proprietary and controllable information systems.To promote the use of domestic proprietary and controllable core devices,we should follow the thinking of"top-level planning,enforcement,unified deployment,stepby-step implementation,strengthening evaluation,and full validation".During the transition period prior to full implementation of proprietary and controllable systems,measures such as trusted computing,kernel strengthening,management augmentation should be adopted to reduce safety risks brought by non-proprietary and controllable information products.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.29