In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
The concept of trusted computing can be traced back to the TCSEC criterion of the US Department of Defense in 1983, while the widely accepted concept was put forward by the trusted Computing platform Alliance (Trusted Computing Platform Alliance) 1 in 1999. The main idea is to introduce the security chip architecture into the hardware platform to improve the security of the terminal system, so as to turn part or the whole computing platform into a "trusted" computing platform. Its main goal is to solve the problem of system and terminal integrity.
Trusted computing has three main lines on the technical level: the first line is the integrity measurement of the platform, which is related to the integrity of this link from every link of the operation of the platform; the second is data protection, the data protection system based on the security chip; the third is the platform integrity report, which uses the results of the measurement to verify whether the integrity of the flat body has been damaged to the remote platform.
1. Research and development status of international trusted computing.
In the aspect of trusted computing research, the main research institutions of trusted computing technology include Stanford University, MIT, CMU, Cambridge University, Dartmouth University, IBM Waston Research Center, HP Laboratory and so on. The current main research directions include trusted computing security architecture, secure startup, remote certification, security enhancement, trusted computing application and evaluation, and so on. In the application field, trusted computing was initially located in PC terminals, and IT manufacturers gradually withdrew products such as TPM chips, secure PC, trusted application software and so on. With the progress of technology and the development of applications, it has gradually turned to the application of mobile devices, and storage is also developing on a large scale, including mobile storage and large-scale network storage. At present, the international TCG organization is working on the next generation trusted chip (TPM.next) standard, the goal is to make a unified platform module standard, compatible with the algorithms of various countries in the world, including China, Russia, and the ultimate goal is to make trusted computing chips and systems into a unified technical system.
2. Research and development status of trusted computing in China trusted technology related research probably started from 2003 to 2004. Since then, the government has focused on the research and application of trusted computing technology in various important science and technology and industry plans. Academia is actively carrying out research work on TPM/TCP, remote certification, trusted computing evaluation, trust chain construction technology, key technical standards and so on. The industry is also actively studying various security solutions based on TCM, and the National Information Security Standardization Technology Committee is also actively promoting the research and formulation of trusted computing related standards. China trusted Computing working Group (China TCM Unit,TCMU) has played an important role in the development of autonomous trusted computing. The organization was established by × ×, and in the course of operation, it got the Ministry of Science and Technology, the Development and Reform Commission, the Ministry of Industry and Information Technology, and so on.
1 in 2003, it was reorganized into the Ministry of trusted Computing Organization (Trusted Computing Group, TCG) with strong support. TCMU has a clear idea in the development of trusted computing technology: (1) taking trusted cryptographic module chip TCM as the core; (2) taking trusted computing platform, trusted computing infrastructure and trusted computing detection platform as support; (3) establishing trusted computing application system with the development goal of trusted computing password application and next generation secure Internet application.
Today, when the Internet is highly developed, there are many kinds of information spread on the network, and the impact on people's daily life is becoming more and more important. The unprecedented freedom of Internet information dissemination collides with social control, forming a distinct opposition. The governance of Internet information dissemination has brought challenges to the original governance experience of social communication, in addition to fully recognizing the advantages and importance of Internet information dissemination. What's more, we should deeply understand the difficulty of maintaining network and information security, deeply study and analyze the defects of this communication phenomenon, and formulate reasonable and effective Internet governance measures to make it develop in the direction we expect.
I. the disadvantages and shortcomings of Internet information dissemination
While we benefit from the convenient and effective transmission of information on the Internet, we should also clearly see the disadvantages and deficiencies in the dissemination of information on the Internet. In the era of the Internet, there is an obvious feature: it is not lack of knowledge, but excess knowledge. As a result, we have entered an era of rampant knowledge from an era of lack of knowledge. there is too much information on the network, and people often do not know which useful information to choose.
II. Anonymity of Internet Information dissemination
Anonymity (anonymity) is not only an important situational feature of the Internet, but also an important factor affecting online behavior, that is, "in a certain situation, the actor's perception of whether he or she is perceived by others". That is, netizens can use code names to hide some or all of their identities and characteristics in the real world, including gender, age, education, occupation, social status and even temperament, personality, self and so on. This gives people an illusion: "in the online world, I communicate with others in a virtual image and identity. Online communication activities are no longer as attached to specific physical entities and space-time locations as general social actions." therefore, I can play my imaginary role without thinking about the consequences. " On the one hand, this makes it difficult for us to find out the exact authenticity of the flooding of information on the Internet; on the other hand, it raises doubts about the authority and impartiality of the people who spread the information. This also causes the Internet to be more unreal and reliable than other traditional media.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.