信息网络安全 ›› 2022, Vol. 22 ›› Issue (10): 76-81.doi: 10.3969/j.issn.1671-1122.2022.10.011
收稿日期:
2022-07-25
出版日期:
2022-10-10
发布日期:
2022-11-15
通讯作者:
孟玺
E-mail:20052204@ppsuc.edu.cn
作者简介:
孟玺(1983—),女,河南,讲师,博士,主要研究方向为情报分析、情报安全与反情报研究
基金资助:
Received:
2022-07-25
Online:
2022-10-10
Published:
2022-11-15
Contact:
MENG Xi
E-mail:20052204@ppsuc.edu.cn
摘要:
网络信息环境下的情报威胁问题日益严峻,而面向这一安全态势的反情报工作机制仍不健全,文章对反情报工作机制进行研究并提出优化策略。文章从网络信息安全的情报治理角度着手,对网络信息安全新形势下反情报工作面临的挑战进行解读,文章围绕当前反情报机制存在的问题,阐释了建立面向网络信息安全的反情报工作机制的必要性,创新性地提出了面向网络信息安全的反情报工作流程和优化策略,对反情报工作机制进行体系化完善,在流程上实现了从识别到评估反馈的机制再造。
中图分类号:
孟玺. 面向网络信息安全的反情报工作机制及优化策略研究[J]. 信息网络安全, 2022, 22(10): 76-81.
MENG Xi. Study on Counter Intelligence Mechanism and Optimization Strategy for Network Information Security[J]. Netinfo Security, 2022, 22(10): 76-81.
[1] | The White House. Executive Order on Improving the Nation's Cybersecurity[EB/OL]. (2021-05-12)[2022-07-20]. http://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/ accessed 10 June 2021. |
[2] | National Internet Emergency Response Center (CNCERT). Overview of China's Internet Network Security Situation in 2020[EB/OL]. (2021-05-26)[2022-07-20]. http://www.cac.gov.cn/2021-05/26/c_1623610314656045.htm. |
国家互联网应急中心(CNCERT). 2020年我国互联网网络安全态势综述[EB/OL]. (2021-05-26)[2022-07-20]. http://www.cac.gov.cn/2021-05/26/c_1623610314656045.htm. | |
[3] | DUVENAGE P, VON Solms. Cyber Counter Intelligence: Back to the Future[J]. Journal of Information Warfare, 2014, 13(4): 42-56. |
[4] | JAQUIRE V. A Framework for a Cyber Counter Intelligence Maturity Model[D]. Johannesburg: University of Johannesburg, 2018. |
[5] | QIN Tiehui, LUO Chao. Construction of Enterprise Counter Competitive Intelligence System Based on Information Security[J]. Information Science, 2006, 24 (10): 1441-1445. |
秦铁辉, 罗超. 基于信息安全的企业反竞争情报体系构建[J]. 情报科学, 2006, 24(10):1441-1445. | |
[6] | ZHU Lilong. Study on the Mechanism of Supply Chain Information Leakage from the Perspective of Counter Competitive Intelligence Technology System[J]. Modern Information, 2017, 37 (3): 28-33. |
朱礼龙. 反竞争情报技术系统视角的供应链情报泄密机理的研究[J]. 现代情报, 2017, 37(3): 28-33. | |
[7] | ZHOU Haiwei, WANG Hongliang, HAO Yunjian. Construction of Competitive Intelligence Security Model for SMES under Cloud Computing Environment[J]. Library Theory & Practice, 2013(11): 44-47. |
周海炜, 王洪亮, 郝云剑. 云计算环境下中小企业竞争情报安全模型构建[J]. 图书馆理论与实践, 2013(11): 44-47. | |
[8] | GAO Jinhu. Integration of Counter Intelligence and Security Work — Based on the Analysis of the Strategic Plan of the National Counter Intelligence and Security Center[J]. Confidential Work, 2021(1): 65-68. |
高金虎. 反情报工作与安全工作一体化——基于美国《国家反情报与安全中心战略计划》的分析[J]. 保密工作, 2021(1): 65-68. | |
[9] | YU Jie, LI Lin. Security Protection of Critical Information Infrastructure Based on Intelligence Perception[J]. Information Theory & Practice, 2019, 42(4): 1-5. |
于洁, 栗琳. 基于情报感知的关键信息基础设施安全保护[J]. 情报理论与实践, 2019, 42(4): 1-5. | |
[10] | Lin Xin, Liu Yuejin, Yang Jianying. Some Thoughts on the National Intelligence Law of People's Republic of China[J]. Journal of Intelligence, 2022, 41(1): 24-30. |
林鑫, 刘跃进, 杨建英. 关于《中华人民共和国国家情报法》的若干思考[J]. 情报杂志, 2022, 41(1): 24-30. | |
[11] | LI Yiyu. Mechanism Theory: Meaning, Principle and Design[J]. Journal of Sichuan Institute of Engineering And Technology, 2006(4): 56-59. |
李以渝. 机制论:涵义、原理与设计[J]. 四川工程职业技术学院学报, 2006 (4): 56-59. | |
[12] | LI Ruiguang, SHEN Meng, YU Hao, et al. A Survey on Cyberspace Search Engines[C]// Springer. China Cyber Security Annual Conference. Berlin:Springer, 2020: 206-214. |
[13] | HULNICK A S. What's Wrong with the Intelligence Cycle[J]. Intelligence and National Security, 2006, 21(6): 959-979. |
[14] | JELEN G F. The Defensive Disciplines of Intelligence[J]. International Journal of Intelligence and Counter Intelligence, 1991, 5(4): 381-399. |
[15] | RIEHLE K P. A Counter Intelligence Analysis Typology[J]. American Intelligence Journal, 2015, 32(1): 55-60. |
[16] | PRUNCKUN H. Counter Intelligence Theory and Practice[M]. Maryland: Rowman & Littlefield Publishing Group, 2019. |
[17] | HAO Min. The U. S. Intelligence Community for China's Three Big Trends[EB/OL]. (2021-10-12)[2022-07-20]. https://m.thepaper.cn/baijiahao_14864237. |
郝敏. 美国情报界针对中国的三大动向[EB/OL]. (2021-10-12)[2022-07-20]. https://m.thepaper.cn/baijiahao_14864237. | |
[18] | Office of Director of National Intelligence. Intelligence Community Information Environment(ICIE)Data Strategy[EB/OL]. (2021-04-22)[2022-07-20]. https://www.dni.gov/files/documents/CIO/Data-Strategy_2017-2021_Final.pdf. |
[19] | SCOTT S. Deceive the Enemy with Emerging Technologies[EB/OL]. (2021-02-04)[2022-07-20]. https://www.rand.org/pubs/external_publications/EP68494.html. |
[20] | SITHOLE T, DUVENAGE P, VON S. Eating the Elephant-A Structural Outline of Cyber Counter Intelligence Awareness and Training[C]// Stellenbosch University. 14th International Conference on Cyber Warfare and Security. Stellenbosch: Stellenbosch University, 2019: 396-404. |
[21] | LIU Zhiwei, ZHOU Qingshan. Preliminary Study on Defense Science and Technology Information Working Mode Based on Qian Xuesen's Dacheng Wisdom[J]. Information Theory & Practice, 2021, 44(9): 55-60. |
刘芝玮, 周庆山. 基于钱学森大成智慧思想的国防科技情报工作模式初探[J]. 情报理论与实践, 2021, 44(9): 55-60. |
[1] | 周靖哲, 陈长松. 云计算架构的网络信息安全对策分析[J]. 信息网络安全, 2017, 17(11): 74-79. |
[2] | 韩欣毅. 特大型城市网络信息安全监管研究[J]. 信息网络安全, 2016, 16(6): 74-80. |
[3] | 刘燕. 基于城域网的网络安全应急响应系统[J]. 信息网络安全, 2015, 15(9): 163-166. |
[4] | 张宏远. 政务网的安全技术体系结构研究[J]. , 2013, 13(4): 0-0. |
[5] | 蒋天发;蒋巍;滕召荣. 对美国网络信息安全保障的思考与建议[J]. , 2009, 9(8): 0-0. |
[6] | 朱迎春;刘新. 浅析我国行政管理方式的电子信息化[J]. , 2007, 7(8): 0-0. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||