Wealth

Chapter 1085 You Have to Rely on Yourself for Everything

When I came down, Fan Maobing visited another laboratory, which was also the entire Southeast Muyi. Laboratory Systems Emphasis, Computer Network Defense Project Laboratory.

Compared with several other laboratories. The situation in the Computer Network Defense Project Laboratory is different. All of them are young technicians taking charge of the overall situation.

When Fan Wubing came over, he saw that most of the staff were in their early twenties. The oldest ones were only a few doctoral students in their early thirties, and a few experts from the Institute of Computing Technology, Chinese Academy of Sciences. A total of probably With more than a hundred people in it, it can be considered a relatively large research laboratory.

For this piece of business. Fan Wubing was quite interested. After all, he obviously knew much more about computers than radar arrays and fire control systems, and he was also relatively clear about some general developments.

And in terms of employee atmosphere, this laboratory is much more active.

When Fan Wubing came over, he immediately encountered an unprecedented warm welcome. It seemed that Fan Gui and Wubing had a very good impression among young employees, especially those working in the computer industry, whether it was a wealth effect or not. It has always been Fan Wu's urgent and righteous move to revitalize national industry, which is the goal that young people are striving for.

Later, Fan Wuyi learned in detail about the various goals and progress of the laboratory.

In modern warfare, computer network defense has become very important. Its application and principles are an active part of conducting computer network warfare and are crucial to all combat fields, including computer network attacks. Computer network exploitation and computer network defense.

Computer network attacks refer to activities in which cyber warriors use computer networks to interrupt, resist, weaken or destroy information in enemy computers and networks, as well as the computers and networks themselves.

Computer network utilization refers to network activities that enable us to have combat and intelligence collection capabilities and guide us to use computer networks to collect data from enemy automatic information systems and networks.

Computer network defense refers to the use of computer networks by cyber warriors to protect, monitor, analyze, detect and respond to unauthorized behavior within the Department of Defense's computer information systems and networks.

Overall, the goal of a computer network defense strategy is to establish a trustworthy information and network infrastructure. In other words, to minimize the impact of enemy attacks, enemy entry, retention, and movement must be prevented.

"To put it simply, network staff will implement this strategy in a complex and ever-changing environment. By implementing a defense-in-depth approach, they will force the enemy to break through multiple defense layers or pass through multiple defense layers to control the network. This will reduce Its chances of success are based on principles based on strong information assurance.

Computer network defense strategy relies on the effective cooperation of personnel, technology and computer network defense. "A laboratory supervisor explained to Fan Wubing.

Fan Wubing nodded, knowing that domestic progress in this regard is much slower. After all, the digital transformation of the entire army is far from being achieved, and the penetration rate of computers also needs to be further improved. In the absence of reorganized hardware utilization, Under the premise, if you want to build a digital integrated command and control system for the whole army, it is obviously a bit unpopular.

But this work is also important. You have to do it in advance, otherwise you will have to change your clothes later. After the full use of digital combat equipment or digital command systems, the trouble will be big. After all, a complete digital command and decision-making system with complete content and powerful functions cannot be built in a short time.

This work not only requires design in the laboratory, but also needs to be tested in actual combat, and module interfaces that can be continuously developed must be reserved, so it is not something that can be done in a short time.

The main service content of computer network defense is to protect, monitor, analyze, detect and respond to network attacks. These services refer to computer networks and information systems in order to prevent or weaken computer networks that may cause interruption, access denial, degradation, and collapse. Operations conducted during cyberattacks in which compromised information is stolen.

In order to develop domestic computer network defense systems, the research laboratory is conducting some initial work. The first step is to collect, correlate, integrate, analyze, display and distribute disparate data from various channels to create a set of comprehensive command and control systems with powerful functions and complete coverage. actual combat system and continuously expand its functions.

inside. It not only includes the host security system, but also includes malicious adware and spyware detection, removal and protection systems, relying on the active defense function of the host-based security system to achieve defense purposes.

One of the important means is to strengthen the protection between internal and external networks. Researchers said that they are now working with the Security Agency and the Department of Defense Information Department to strengthen information assurance strategies when exchanging information between internal and external networks. While protecting internal networks from external network attacks, restrictions are placed on the use of public information by untrusted external resources.

There is also the idea of ​​running an intrusion protection system to monitor activities on the network and systems, looking for malicious and redundant network behaviors, and allowing network defense personnel to take decisive action in real time to block or prevent them.

Through intelligent agent security management, security event logs and alerts from primary sensors, firewalls, routers, and operating systems can be acquired and standardized in almost real-time, and analysis of signature-based standardized events can be completed. and evaluate unusual events that trigger specific security attack alerts. Intelligent agent security management monitors communications on the network and determines whether they are misoperations, deceptive behavior, or cyberattacks based on a variety of criteria.

It can collect, standardize, correlate and analyze data to determine the profile of cyber attacks in real time.

To overcome the weaknesses of software public key infrastructure, they are now moving entirely to the use of hardware codes such as universal access cards, alternate codes, hardware-based external authorization codes, and hardware-based federation codes.

In order to improve security, reduce costs and reduce software compatibility issues, a unified standard enterprise-level operating environment will be provided for desktop computers and microcomputers running Microsoft operating systems, using common configurations developed for enterprises rather than various self-created ones. configuration.

"But there are two main problems before us now. One is the underlying core chip with independent intellectual property rights available, and the other is its own operating system. If these two problems are not solved, our work will be based on Above the sand, it’s meaningless.

The person in charge of the divination room had this to say to Fan Dan Bing. "Well. Fan Wubing nodded, indicating that he understood.

In fact, they don't need to say much. Fan Wubing also knows very well that these two problems have always been major problems plaguing domestic national defense construction. If these two problems are not solved, then a lot of work will be in vain.

Most units in the country use computers using processor chips from American companies, and the operating systems are all like Microsoft's Windows operating system or some other operating systems. There are problems with these processor chips and operating systems. a lot of.

There is evidence that both the company and Microsoft have been installed backdoors in their products by the U.S. security department on the grounds of national security. Therefore, when the U.S. military attacks a certain country, it can completely use some backdoors set up by other countries. Conduct targeted cyber attacks against them to paralyze their command systems and weapons control systems.

Although it sounds complicated, it is actually very simple in practice. You only need to issue some very simple instructions to achieve the strategic goal of defeating the enemy without fighting.

Therefore, it is no exaggeration to say that having its own core chip technology and products, and having its own universal computer operating system developed from the bottom is of great significance, no less than building an invisible steel Great Wall for itself.

At this time, the laboratory is still working on some solutions to the software and hardware architecture of Microsoft. Although the military is also using its own professional chips and operating systems, this kind of software and hardware equipment developed earlier is obviously out of date. Too backward.

Although some people have said before that even on the space shuttle, the use of powerful chips is sufficient for various tasks, but in fact, with the development of the times and the advancement of technology, people will now need to solve and face more and more difficulties. , there are more and more issues that need to be considered, and the development of computer software and hardware can never meet people's practical applications.

Under this situation, it is urgent to develop more high-end chip technology and software technology.

However, seeing the expressions on the faces of these young people in the laboratory, Fan Wubing couldn't help but reveal a little bit of news, "Regarding the issue of universal core chips and operating systems, we are in the process of developing them, and there are already some low-level applications. Product launch, it is estimated that by this time next year, we should be able to launch technology products that are close to the current popular trends.”

Then he added, "This is a product we made entirely from the bottom up based on our own research. There is no need to worry about any backdoor problems. Even if there is a backdoor, it is our own. After a while, Eyes. I will ask people to share the relevant technical information with you. In addition to making network defense plans for Americans’ software and hardware systems, you can also start to conduct comprehensive research on our own software and hardware network defense systems. designed."

When everyone heard the news about Fan Wubing, the crowd immediately became excited, and the laboratory was filled with enthusiastic applause.

In fact, young people in China have always been the most distressed about the inability to provide universal computer core chip products and their own operating systems. Now that they heard that it is expected to be realized, they naturally cannot contain their joy.

As we all know, steel is the core component that determines computer performance and is also the core of the entire system. It is responsible for the execution of the entire system instructions, the storage and transmission of mathematical and logical operation data, and the control of internal and external input and output.

And in this computer core components market. The two brands that people are most familiar with are undoubtedly. And, their strong position in the processor market seems unshakable.

Technically, there is a big gap between us and foreign manufacturers. The lack of chips with independent intellectual property rights is a major problem in my country's computer industry, and it is also a permanent pain in the chests of electronic workers and Internet workers.

In the past, Gangnam chips, which represent the world's top technologies, have been blocked by foreign giants such as Intel, and Chinese companies and consumers have paid huge royalties for them. Fortunately, chip companies under Fanshi Investment Group have successively launched a series of independently developed core chips, breaking China's coreless history.

The birth of Fan's domestically produced steel has also been hailed by industry insiders as a milestone on the road to the industrialization of national science and technology. The successful development of the commercialized Fan Shi Gang also marks the breaking of the foreign monopoly and the initial mastery of the key technologies of contemporary steel design. It has taken an important step to change the unfavorable situation of the domestic information industry and has an independent role in the formation of domestic products. Intellectual property rights play an important role in promoting the computer industry and play a decisive role in China's core technology, national security, and economic development.

Especially in some commercial fields, such as embedded chips in smart home appliances, Fan has occupied most of the market. After all, the price advantage of domestically produced low-end general-purpose steel chips is unmatched.

Although there are many problems in the current domestic products, there are still many gaps in performance compared with the current mainstream models, and they cannot be reconciled with the four concessions. They are just competing in the market, but frankly speaking, the situation of domestic chips today is much better than that of products like Hanka back then.

I recall that when Fan Wubing's company was making Hanka, it was all hand-welded piece by piece by scientific researchers with mainframe background and no industrial experience, and each piece was manually inspected.

Fan Wubing still remembers that back then, Fan's front-line sales staff received almost as many complaint calls as ordering calls every day. For every 100 Hanka sold, almost 10 had problems. Today's domestically produced Hanka cards The project has not only received strong support from all aspects, passed strict achievement appraisal, benchmark program testing and product testing, and entered commercial production, it has also received strong support from local governments and enterprises. It has been deployed in Shanghai, Chongqing, Jiangsu and , Guangdong and other places have established industrialization bases and used domestic appliances. A large number of foreign general-purpose chips have been replaced.

And there was another one recently. The news is that the Chinese Academy of Sciences is also working on a Godson project. China is paying more and more attention to this research work.

1, 1 Today’s first update is sent to 11. To be continued.

Chapter 1617/1761
91.82%
WealthCh.1617/1761 [91.82%]