Shunlongwei Co Ltd.

Shunlongwei Co. ltd.

IGBT Module / LCD Display Distributor

Customer Service
+86-755-8273 2562

Zhou Hongyi: It is recommended to formulate a special network security special talent identification policy

Posted on: 09/09/2022

 Proposal 1: Accelerate the construction of a smart city security base “city-level network security infrastructure”

【question】

my country’s urban network security infrastructure is very weak and not a system. Most of the existing network security systems are built for specific application scenarios and specific users. They are self-built and self-used, have a single function, and do not have public service attributes. The continuous accumulation of , so it is necessary to accelerate the construction of city-level network security infrastructure.

【Suggest】

1. Make city-level cybersecurity infrastructure the standard for smart cities

It is suggested that in major strategic planning, city-level network security infrastructure should be regarded as an essential part of smart city construction, and that its construction funds should account for no less than 20% of the total construction funds, focusing on the construction of threat intelligence centers, map surveying and mapping centers , Vulnerability management center, real network attack and defense shooting range, etc., and gradually form a security capability system;

At the same time, the service capability level of network security infrastructure is included in the evaluation index system of smart city governance capability, and the basic position of network security in smart city governance is strengthened.

2. Carry out unified security operation of city-level network security infrastructure

It is recommended to take the security brain as the core, connect various user networks and terminals in the city through the city-level network security infrastructure, and conduct unified security operations by security experts, unified command, coordinated linkage, and the first time to perceive attacks and threats. Security incidents are handled and responded to in a timely manner, which strongly supports smart city security management and network governance.

3. Service empowerment with city-level network security infrastructure as the carrier

It is recommended to use city-level network security infrastructure as a carrier to continuously provide public security services such as threat intelligence, threat research and judgment, vulnerability information, actual network attack and defense drills, personnel security training, and emergency response for city party and government departments, enterprises and institutions, and important users. , explore the organization and operation mode of forming security services, and improve the overall level of urban network security.

Proposal 2: Strengthening the Cybersecurity of Smart Vehicles

【question】

1. The security risks brought by the intelligent car networking are very large;

2. The security issues of smart car suppliers can also affect Chiyu;

3. All kinds of data collection leakage risks in smart cars are huge.

【Suggest】

1. Make the network security system like a “seat belt” as standard in smart cars

It is suggested that the state should increase the encouragement and guidance of automobile enterprises, incorporate the networked safety protection system of smart cars into the vehicle production, sales and service system, and gradually form mandatory requirements as standard requirements for automobile safety.

In addition, the automotive industry should increase investment in network security, and build a network security infrastructure such as an intelligent networked vehicle safety big data platform, a safety intelligent analysis platform, and an emergency response platform with the safety brain as the core, and form an intelligent networked vehicle safety capability system.

2. Promote mandatory testing of smart car network security

It is recommended to develop smart car attack test tools for real application scenarios, establish a systematic attack test case library covering the entire business process of car companies, sales, operation and maintenance, and users, build a smart car real network attack and defense security verification platform, and promote smart car networking Safety testing has become a new and conventional “car crash test”, and even a mandatory test is established in due course;

Regularly carry out actual offensive and defensive drills and ability assessments, and constantly test and improve the safety protection, emergency response and command and dispatch capabilities of auto companies in related industries.

3. Strengthen data security supervision generated by intelligent networked vehicles

It is recommended to strengthen the supervision of data collection during the use of smart cars, prohibit the collection of data that users do not know about, and prohibit excessive collection of geographic environment data that exceeds the functions of smart cars.

Formulate standards and specifications for the collection of user data and geographic environment data by intelligent connected vehicles, and strengthen the export supervision of these data. In accordance with relevant national data security laws and regulations, refine the data security requirements for ICVs.

 Proposal 3: Identification and Incentive Policies for Special Talents in the Cybersecurity Industry

【question】

Special talents in the cybersecurity industry are valuable resources of the country, but the talent gap is still huge, especially the top talents in cybersecurity are still very scarce. These people are often difficult to become professionals recognized by mainstream values ​​through normal career development because of their low education.

【Suggest】

1. Formulate a special network security special talent identification policy

It is recommended that the state formulate and issue the ability-oriented and achievement-based standards for the identification of special talents in network security, highlight professionalism, innovation, practicability, and the ability to solve practical problems, and maintain the independence and development potential of such special talents.

It is recommended to establish a targeted professional title evaluation institution and system, and make it clear that the established professional title system is widely recognized in the society.

2. Give individual tax preferential policies to qualified cybersecurity talents

It is suggested to increase the individual tax deductions and exemptions for special talents in network security, and also give individual tax deductions to the income from outstanding contributions. For qualified entrepreneurs and early employees in the emerging field of cyber security, their stocks and options will be taxed according to the principle of “capital gains”, and personal income tax will be paid according to the income from property transfer in the actual realization link, so as to stimulate their entrepreneurial enthusiasm and encourage innovation and development. .

3. Necessary incentives for network security special talents who meet the identification conditions

It is recommended to open up a green channel for the introduction of special talents in the cybersecurity industry, to provide special care in terms of settlement, car purchase, house purchase, and children’s schooling, and special allowances for those who have made outstanding contributions.