The first thousand and eighty-fifth chapters have to rely on themselves in everything
.I came down and Fan Maodian visited another laboratory, which is also the focus of the entire Southeast Muyi Office system, the computer network defense project laboratory.
Compared with other laboratories, the situation in the computer network defense project laboratories is different, and all of them are younger technicians taking the overall situation.
When Fan Wubing came, he saw that most of them were staff members in their early twenties. The oldest was just a few doctoral students in their early thirties, and several experts from the Institute of Computing of the Chinese Academy of Sciences. There were about 100 people in total, which was considered a relatively large laboratory.
Fan Wubing is still quite interested in this area of business. After all, he obviously has a much better understanding of computers than radar arrays and fire control systems, and he is also more clear in some general directions.
And in terms of the employee atmosphere, this laboratory is much more active.
When Fan Wubing came, he immediately encountered an unprecedented warm welcome. It seems that Fan Gui, who is very well-known among young employees, especially young employees engaged in the computer industry, whether it is the wealth effect. Or Fan Wubing's actions to revitalize the national industry have always been the goal of young people.
Subsequently, Fan Wubing learned in detail about the various goals and progress of the laboratory.
In modern warfare, computer network defense has become very important. Its application and principle of conducting computer network warfare are crucial to all combat areas, mainly including computer network attacks, computer network utilization and computer network defense.
Computer cyber attacks refer to the activities of cyber warriors using computer networks to interrupt, resist, weaken or destroy information in enemy computers and networks, as well as the activities of computers and networks themselves.
Computer network utilization refers to network activities that enable us to have combat and intelligence collection capabilities and guide us to use computer networks to collect data from enemy automatic information systems and networks.
Computer network defense refers to the use of computer networks by cyber warriors to protect, monitor, analyze, detect and respond to unauthorized behaviors within the computer information system and network of the Ministry of Defense.
Overall, the goal of computer network defense strategies is to build trustworthy information and network infrastructure. In other words, it is to minimize the impact of enemy attacks, and the enemy must be blocked from entering, stranding and activity.
"Simply put, network workers will realize this strategy in a complex and changeable environment. By achieving in-depth defense, they will force the enemy to break through multiple defense layers or go through multiple defense layers to achieve manipulation of the network, thereby reducing the chance of success. Based on the principle based on strong information guarantee, the computer network defense strategy relies on effective cooperation in three aspects: personnel, technology and computer network defense." A laboratory director explained to Fan Wubing.
Fan Wubing nodded, knowing that the progress in this area of the country is much slower. After all, the digital replacement of the entire army is far from reaching, and the popularity of computers needs to be further improved. In the absence of reorganized hardware utilization, it is obviously a bit indifferent to the fact that the entire army's digital integrated command and control system is swallowed by a snake.
But this work is also very important. It must be done in advance, otherwise it will be difficult to change the clothes in the future. After fully using digital combat equipment or digital command system, it will be a big problem. After all, a complete set of digital command and decision-making systems with complete content and powerful functions cannot be created in a short while.
This work not only requires design in the laboratory, but also requires actual inspection, and also reserves module interfaces that can be continuously developed, so it is not something that can be done well in a short period of time.
The main service content of computer network defense is to protect, monitor, analyze, detect and respond to network attacks. These services refer to combat operations carried out to prevent or weaken network attacks that may cause computer network interruption, denial of access, degradation, collapse, and computer networks and information systems to be invaded and information stolen.
In order to display domestic computer network defense systems, the research office is carrying out some initial work. First, it is to collect, associate, integrate, analyze, display and distribute data from various channels, create a comprehensive command and practical system with powerful functions and complete coverage, and continuously expand its functions.
In this case, it not only includes the host security system, but also includes malicious adware and spyware detection, clearing and protecting systems, and relies on the active defense function of the host-based security system to achieve defense purposes.
One of the important means is to strengthen the protection of internal and external networks. Researchers said that they are now working with the Security Bureau and the Information Department of the Ministry of Defense to strengthen information guarantee strategies when exchanging information with the internal and component networks. While protecting the internal network from external network attacks, they restrict the use of public information for untrusted external resources.
Also, by running an intrusion protection system, monitoring activities in the network and system, finding malicious and redundant network behavior, and allowing network defense personnel to take decisive actions in real time to block or prevent them.
Through intelligent proxy security management, security event logs and alerts from the main sensors, firewalls, routers and operating systems can be obtained and standardized almost in real time, and analyses of standardized events based on signatures are completed. Exception events that trigger specific security attack alerts can be evaluated. Intelligent proxy security management can monitor communications in the network and determine whether it is an incorrect operation, fraudulent behavior or a network attack based on multiple standards.
It can collect, standardize, correlate and analyze data, and judge the overview of cyber attacks in real time.
To overcome the weaknesses of software public key infrastructure, they are now completely shifting to using hardware codes such as general access cards, alternating codes, hardware-based external authorization codes and hardware-based joint codes.
In order to improve security, reduce costs and reduce software compatibility issues, a unified standard enterprise-level operating environment will be provided for desktop computers and microcomputers running Microsoft operating systems, and a general configuration for enterprises is adopted rather than various self-created configurations.
"But now there are two main problems facing us, one is the underlying core chip that can be used with independent knowledge and only the property rights, and the other is the own operating system. If these two problems are not solved, our work is built on the sand and it is meaningless.
The person in charge of the Bushi said to Fan Danbing with this. "Well, Fan Wubing nodded, indicating that it is understandable.
In fact, without saying much, Fan Wubing is also very clear that these two problems have always been major problems that plague domestic national defense construction. If these two problems are not solved, many of the work will be useless.
Most domestic units use computers that use American companies to delete processor chips, while operating systems are all like Microsoft's window operating system or some other operating systems. There are many problems in these processor chips and operating systems.
There is evidence that both the company and Microsoft have set up backdoors in their products by the US security department on the grounds of national security; therefore, when the US military strikes on a certain country, it can use some other backdoors to carry out targeted cyber attacks on them to achieve the purpose of stagnating their command system and weapon control system.
Although it may sound very complicated, it will actually be very simple to operate in detail. You only need to issue some very simple instructions to achieve the strategic goal of defeating others without fighting.
Therefore, it is no exaggeration to say that having your own core chip technology and products and having your own computer general operating system opened from the bottom is of great significance, no less than building an invisible steel Great Wall for yourself.
At this time, the laboratory is still making some solutions to Microsoft's software and hardware architecture. Although the military is also using its own professional chips and operating systems, these software and hardware devices that were opened earlier are obviously too behind.
Although some people have said before that even on space shuttles, using jin chips is enough to do all kinds of work, in fact, with the development of the times and the advancement of science and technology, people now have more and more difficulties to solve and face, and more and more problems need to be considered. The development of computer software and hardware will never satisfy people's practical applications.
Under such circumstances, it is urgent to open more high-end chip technology and software technology.
However, seeing the expressions on the faces of these young people in the laboratory, Fan Wubing couldn't help but reveal a little news, "We are currently launching issues with general-purpose core chips and operating systems. Some underlying application products have been launched. It is estimated that at this time next year, technical products that are close to the current trend should be launched."
Then he added, "This is a product that we rely entirely on our own research and is made from the bottom. We don't need to worry about any backdoor problems. Even if there is a backdoor, it is left by ourselves. Let's take a look. I will let someone share relevant technical information with here. In addition to planning network defense for American software and hardware systems, we can also start to comprehensively design our own software and hardware network defense systems."
When everyone heard the news about Fan Wubing, the crowd was immediately filled with enthusiasm and the laboratory was filled with enthusiastic applause.
In fact, young people in China have always been the most distressed about not being able to provide general-purpose computer core chip products and their own operating systems. At this time, I heard that it was expected to be realized, so I naturally couldn't control my inner joy.
As we all know, Kan is the core component that determines the performance of computers and the core of the entire system. It is responsible for the execution of the entire system instructions, the storage and transmission of mathematical and logical operation data, and the control of internal and external inputs and outputs.
And in this computer core component market field, the two most familiar brands are undoubtedly. And, their strong position in the processor market seems to be unshakable.
In terms of technology, we have a big gap with foreign manufacturers. The lack of chips with independent intellectual property rights is a major core disease in my country's computer industry and an electronic worker. The Internet gives people eternal pain in their chest.
In the past, the chips representing the International Four and top-notch technology have been interrupted by foreign giants such as Intel, and Chinese companies and consumers have paid huge copyright fees. Fortunately, the chip companies under Fan's Investment Group have successively launched a series of independent research core chips, breaking the history of China's chiplessness.
The birth of the domestic Kung Fu under Fan's family is also hailed by industry insiders as a milestone on the road of national science and technology industrialization. The successful development of the commercialized Kung Fu also marks the breaking of foreign monopoly and initially mastering the key technologies of contemporary Kung Fu's design, taking important steps to change the situation of the domestic information industry, and play an important role in the formation of a computer industry with independent intellectual property rights in China, and plays an important role in China's Kung Fu's core technology, national security, and economic development.
Especially in some commercial fields, such as embedded chips in smart home appliances, Fan already has a large part of the market. After all, the price advantage of low-end general-purpose chips produced in China is unmatched.
Although there are many problems with domestic products now, and there is still a lot of performance gap compared to the current mainstream products, and it is not possible to compete with SiRang and Xin in comparison with the market, frankly speaking, the situation of domestic chips today is much better than that of Hanka and other products back then.
Looking back at the time when Fan Wubing's company made Han cards, they were made by scientific researchers with no industrial experience who were born in mainframes and had manual welding pieces one by one, and then manual testing pieces were carried out.
Fan Wubing still remembers that the front-line sales staff of Fan's family received almost as many complaints as order calls every day. For every 100 Han card sold, there would be almost ten yuan. Today's domestic new project not only received strong support from all parties, but passed strict results appraisal, benchmark program testing and product testing, entered commercial production, and also received strong support from local governments and enterprises. Industrialization bases have been established in Shanghai, Chongqing, Jiangsu, Guangdong and other places, and domestic home appliances have been used. It has replaced foreign general-purpose chips in large quantities.
And there is another news recently, that is, the Chinese Academy of Sciences is also working on a Loongson project, and China is paying more and more attention to research in this area.
Chapter completed!