Strengthening the awareness of data risk and enhancing social security is an inevitable trend in the development of modern society

2019-03-22

Driven by the wave of the fourth information revolution, mankind has entered a new era of Internet transformation of industrial digital transformation, data-driven development, and Internet of Everything. New technologies such as big data, artificial intelligence, and cloud computing are developing in depth. The applications of 5G IoT communication modules, intelligent software and hardware are widely expanded, and the data security risks behind various technology applications are becoming increasingly prominent.


Big data is known as "the 21st century oil and diamond mine." In the information age, data has become a core strategic resource and is gradually having a profound impact on national governance capabilities, economic operating mechanisms, and social lifestyles. It is predicted that by 2020, global IP traffic will reach 2.3 trillion GB, and the global data will reach 44 trillion GB, of which China's data will account for 18%. Humanity has already ushered in the era of big data.


The government work report pointed out that it is accelerating the promotion of "Internet +" in various fields of various industries. In fact, the essence of the Internet is data. Big data security is the core of cyberspace security, and it is the foundation for the healthy development of the Internet. Data is the core carrier and key content of network operation. Without data security, there is no network security, which in turn affects national security.




The size and capacity of data owned by the state has gradually become an important part of comprehensive national strength. China is faced with complex and severe internal and external situations. The network security prevention and control capability is weak in many risk challenges, and it is difficult to effectively cope with national-level and organized high-intensity cyber attacks, which is an outstanding risk. The important information system and information infrastructure are in low level protection and even ineffective protection, which is a serious hidden danger to national security and stability.


With the new round of development of Internet technology, big data, artificial intelligence, Internet of Things, cloud computing and other fields are highly dependent on the reading, collection and application of personal data, and there are serious data security risks. At the terminal, personal privacy data is collected and used without restraint and without a bottom line. Once the data is leaked, it not only endangers the privacy, property and personal safety of the people, but also causes social panic. Under certain circumstances, it will also become a distrust of government supervision; In the cloud, cloud computing, open source software, and Internet of Things devices have hidden dangers in security defense. Once collected massive personal and social data information is attacked by illegal forces at home and abroad, it will endanger social security and national security.


To ensure big data security, the core issue is data ownership. In the data collection phase, there is a lack of a reasonable authorization system and effective restraint measures. In the data storage phase, the collector's power is over-amplified. Reselling user data events occurs during the data transfer phase. In the data processing stage, the new data obtained by processing and processing the data set belongs to anyone. There is no clear statement. Whether the data after “cleaning” or “desensitization” is safe is still questionable. In the data use phase, the distribution of the economic benefits generated by the data is still lacking the applicable theoretical guidance.




More and more data is concentrated in the hands of a small number of enterprises, and clear data ownership is an important step in regulating the use of Internet information. Legislation on big data security should be put on the agenda as soon as possible. Through legislation, we can truly protect the privacy of personal data and prevent enterprises from freely picking up and using it. Internationally, governments of all countries attach great importance to the construction of laws related to big data. As a big data country, China must accelerate the improvement of the data protection legal system, otherwise it will be in a passive position in the international competition of big data resources. It is necessary to further study the data collection rules, how to collect data, who uses the data, and what use of the data.


In the process of data formation, it is necessary to clarify the right to acquire, analyze, store, and use; in the process of data and the integration of the real economy, it is necessary to clarify the ownership, use, management, distribution, and consumption rights; In the activity, the data assets should be evaluated for value, and then the issues such as taxation, equity allocation, income distribution, and market transactions should be determined. The network security defense capacity building of central enterprises and enterprises should be upgraded to the strategic level of implementing the goal of building a network strong country. At the same time, it is necessary to promote the network security and informatization synchronization planning and construction, fill in the pitfalls of the protection, fill in the lessons, ensure the effective budget investment of data security, and accelerate the formation of a dynamic and comprehensive network security defense system.


Establish data security protection laws and regulations, establish security technology and process standards that enterprises must follow when collecting personal privacy data, and strictly guard against data security risks. Develop a data protection list from the government level, and strictly control the application of data in key areas such as biology and medicine on the Internet. Establish strict management regulations for information collection of Internet companies, and no additional excessive collection of user data. Strengthening the emphasis and investment in information encryption technology, cryptography technology to accelerate the realization of comprehensive localization and substitution, and completely change the core technology is subject to the status quo.

扫描二维码分享到微信