Sunday, January 15, 2012

American information installs all making to reveal 3 big change

Moor of institute of information of university of capital economy commerce



"9 · 11 " later, information security policy of the United States and administrative system change are main body is the following now 3 respects: It is data gathering, analysis is mixed share, 2 it is protection of important information infrastructure, 3 it is construction of network attack ability.



On May 29, american government was released " network space policy evaluates a report " . Meanwhile, american president Aobama publishs an address, the information that elaborates the United States in the round brings whole new policy. The information safety that the main content of new policy is leader of the member that one is established to be coordinated by information safety in the White House coordinates the office, the information security policy that plan as a whole in order to be in charge of and coordinates a government. The member that information safety is coordinated is one of the most principal officers in American government service, safe to the United States, diplomacy and Wu of classics be of use have the force that hold the balance. Create office of the member that information safety is coordinated, appoint information the member that safety is coordinated, the heavy major key that can consider as government of abstruse Ba Ma system of safe to bush-administration information management is whole. "9 · 11 " before, policy makes information safety of the United States be carried out with the plan be in dispersedly different function branch. "9 · 11 " after incident, american society thinks, so many American information orgnaization fails to discover and be prevented unexpectedly " 9 · 11 " incident, this shows issue of American information and safe system existence. Accordingly, the component that information security policy must regard a country as safe policy considers as a whole. "9 · 11 " later, information security policy of the United States and administrative system change are main body is the following now 3 respects: brass faucet



It is data gathering, analysis is mixed share.



The information that concerns with information safety includes two fields: It is the menace that is aimed at a network, the safe flaw that is like infrastructure of network attack, crucial information; 2 it is the information that uses a network to transmit minatory state security. The United States has 10 federal dvd discovery best buy ly many information office, cent belongs to different branch, although be in early,Committee on Information held water 1981, but till 2004, of information gather together with share and make progress without materiality. "9 · 11 " later, media criticizes American information orgnaization to discriminate ability to be not worth to the analysis of information, processing is not seasonable, the government begins to reform information system instantly, issue patriot law and information reform standard. Among them, the main content of patriot law is to relax to executing the law the branch is restricted, expand execute the law sectional influence. The analysis of the harmonious mechanism that the main content of information reform law is pair of information activities and information grinds sentence, shared a mechanism to undertake reform. Information reform law created national information inspector general one duty, gift national information chief inspector coordinates the influence that acts related each information office.



dog stairs

2 it is protection of important information infrastructure.



Important information infrastructure protects the one part that makes information safety strategy, because the crucial infrastructure of all countries needs information system to support its,be safe stability moves.



In important information infrastructure of the United States, of be the first to be affected is federally information system. 2002, the United States promulgates information safety to administer a law, made clear federally the safety dvd discovery channel administration responsibility of information system. Information safety runs law requirement, the United States the comprehensive plan that departmental door must be made and implements safety of information of safeguard cadre door and information system federally, must undertake information safety is evaluated every year.



2003, the United States was made " the national strategy that ensures information is safe " , defined 3 strategies goal and 5 first moves. 3 strategies goal is: Prevent the network attack that is aimed at American crucial infrastructure; Reduce the frangibility of American information infrastru dog stairs for bed cture; When producing a network to atttack, make damage degree the smallest, restore time the shortest. 5 first moves are: Build information safety lash-up to answer a system; Reduce network safety menace and frangibility; Enhance network safety consciousness, begin network safety to groom; Ensure safety of information of governmental information system; Strengthen coo most popular selling dog stairs peration of international of information safety domain.



" the national strategy that ensures information is safe " put forward clearly, how is land the core branch that the United States ensures the network is safe federally entirely, support federally departmental door, each orgnaization is atttacked to the network make answer, the command center between public sector, private sector and research organization is when ensuring information safety. mountain t shirts



In January 2008, american president signs national security the 54th president makes / the 23rd president makes land safety, offer national information security integrated action plans (CNCI) . Although should plan to belong to top-secret, but can see from each respect analysis, should plan main content to include: (1) begins lash-up to answer monitor with the network. Support " American computer lash-up answers a mechanism (US_CERT) " and " system of American government network is monitored and early-warning center " , build provide network menace and frangibility analysis, judgement and response mechanism for government and enterprise. (2) expands Einstein plans. Monitor all federally the information system of branch and orgnaization, in order to discover ill will atttacks an activity, offer information safety early-warning for the government, the help enhances information safety consciousness federally, increase the integrated capacity that the network is on guard. (3) begins authentic Internet to accept a plan. Federally the amount that Internet receives a point from 2000 reduce 50 less than more, undertake more active management and safety monitor to confederative information network, provide more omnibus protection to governmental network. (4) builds center of national network safety. (5) increases national network to survey teamwork work group (NCIJTF) member unit. (6) is strengthened supply catenary safety. The technology of system of important to entering the United States informatio the best selling dvd discoveryn and product undertake be controllinged strictly. (7) begins network menace Information Circular and early-warning. (8) is begun " network storm " maneuver. Ally of constituent federal, city and local government and private sector, international is participated in jointly, the network security dvd discovery 4 precaution that examine and strengthens a country and answer ability. (9) strengthens information safety to groom, ensure the system that has qualification maintains staff. (10) increases safe to information finance investment.



3 it is construction of network attack ability.



In recent years, american army pays attention to a network to atttack ability construction, everywhere collect network elite even hacker, establish network unit, but these movements only confine is in system of major army arm of services, be like the network unit that air force builds.



On June 23, robert Gates releases American defense minister command, establish network battle headquarters of the U.S. Army, network battle headquarters is subject headquarters of Yu Meijun strategy. Gates asks network battle headquarters will begin to handle official bussiness external this year in October, will fulfil obligation in the round in October next year. The network battle headquarters that establishs this will assume safeguard in the round the legionary network and information system safety, responsibility that undertakes in the light of hostile country and organization the network is hit.



This American system is adjusted basically is to raise national information infrastructure to protect the job to head the layer step that chime moves, by class of original governmental minister layer, raise presidential layer level, and safety of the job, as military as data gathering information ensures conformity rise, the security of omnibus state information that forms unifinication is led and coordinate system. The network battle headquarters that the information safety of network of American military affairs works to establish You Xincheng is responsible, and the information safety that national security bureau will continue to be governmental network and commercial network defends provide professional support, land installs the information system safety that concerns with infrastructure in network of entire will main responsible government and blame government network. Afore dog crates large strong -mentioned these works are complete place of the member that the assemble is dog crates large best buy coordinated to safety of information of the White House, the member that coordinate by information safety passes national safety commission and national Economic Commission two orgnaizations conformity arrives in dog crates large dogs policy of the safe policy of American country and economic development.

No comments:

Post a Comment