Netinfo Security ›› 2015, Vol. 15 ›› Issue (2): 1-6.doi: 10.3969/j.issn.1671-1122.2015.02.001

    Next Articles

Security Protection of Critical Infrastructure

QING Si-han1,2,3   

  1. 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    2. State Key Laboratory of Information Security, Beijing 100093, China
    3. School of Software & Microelectronics, Peking University, Beijing 102600, China
  • Received:2015-02-01 Online:2015-02-10 Published:2015-07-05

Abstract:

The network security threats continuously increase with the rapid development of Internet applications. The construction and security protection of critical infrastructure must be highly valued as it is related to national security. This paper addresses the measures US and Europe have taken, analyzes what China should do, and describes the challenges faced by basic software and hardware, cloud computing infrastructure, trusted computing technology, and identity authentication mechanism, etc. from a technical perspective, and analyzes the trend of technology and latest advances.

Key words: critical infrastructure, cloud security, OS security, trusted computing, identity authentication

CLC Number: