The rise of a great power: starting with military industry
Chapter 372 Internet
Chapter 372 Internet
The party group meeting lasted for two full days before it ended.
Liu Tao came to the Computer Research Institute, which is directly under the jurisdiction of Panshan Group and specializes in research in the computer field.
The Internet Research Institute is an important research institute of the Computer Research Institute, which studies the Internet.
At this point, the entire headquarters has implemented a LAN.
The so-called local area network is a computer communication network that connects various computers, external devices, databases, etc.
Each production base and each factory has a local area network, which is then connected through a data communication network to form a large-scale information processing system.
At present, this information processing system is only included in Yunnan Province. As for Guizhou Province, Guangxi Province, Sichuan Province, and Guangdong Province, the construction has not been completed yet and has not been incorporated.
This can be said to be the birthplace of the Internet in China, and it is also the most cutting-edge place in the world for Internet research.
Within Panshan Group, it is used as a research pilot for the Internet.
Later, it will extend from Panshan Group to universities, research institutes, and the military in the four southwestern provinces, and then radiate to universities, research institutes, and the military across the country.
When everything is fully prepared, it will extend to the entire society, and then China will welcome the Internet age.
And this time will take at least ten years.
For the experts and scholars at the Computer Research Institute, it was like a dream.
Last year, the "Galaxy" supercomputer was successfully developed by the Computer Research Institute of the National University of Defense Technology in Changsha, which caused a huge sensation across the country because it filled the gap in domestic supercomputers and marked that China had entered the ranks of the world's supercomputer development.
But when they came to Panshan Computer Research Institute, they found a small desktop computer, a personal computer, with a computing speed of over 100 million.
The impact this brought to everyone was enormous.
The Galaxy supercomputer is a very large, cylindrical machine consisting of seven cabinets.
The desktop computers they use for work have pitifully small hosts.
Advanced computers, as well as local area networks and the Internet that have never been heard of or seen before, hold too many surprises.
Even emails can be sent internally.
Panshan Computer Research Institute is a unit with a very high level of confidentiality. Every expert and scholar has to undergo strict political review, and almost all of them have to remain anonymous.
The truth is that they have access to too many secrets that cannot be leaked, and this is also to protect them.
Liu Tao has an extremely high security force, and he rarely appears in public. When he does appear, it is in Sijiu City, which is arguably the safest place in the world.
But not everyone can enjoy this high level of protection.
Under such circumstances, the best way for these experts and scholars is to keep a low profile, or even remain anonymous.
It is no exaggeration to say that the entire Panshan Computer Research Institute concentrates one-third of China's computer talents.
In terms of strength, it is undoubtedly the strongest in the country, exceeding the strength of Huaxia Computer by 100%. Each expert and scholar here has at least three students.
Liu Tao came to the Internet Center this time mainly to participate in the Internet security research meeting.
Safety issues can never be ignored.
Internet security must be considered and prepared in advance, rather than being caught off guard when the time comes.
Computers have their own security issues, and the Internet has its own security issues.
The two are different, yet closely connected.
In Liu Tao's view, Internet security has three characteristics: confidentiality, integrity, and availability!
Confidentiality means that network resources can only be accessed by authorized entities.
Integrity: information is not modified during storage or transmission, and the information package is complete and cannot be modified by an unauthorized second party.
Availability, including operability of static information and visibility of dynamic information content.
Internet security flaws mainly include operating system vulnerabilities, network protocol vulnerabilities, application system security vulnerabilities and security management vulnerabilities.
The vulnerability of the operating system is mainly reflected in the fact that the operating system is a complex software package. The biggest vulnerability of the operating system is I/O processing - I/O commands usually reside in the user memory space, and any user can change the source address or destination address of the command after the I/O operation starts.
The vulnerability of the network protocol is that the protocol uses plain text transmission. During the transmission process, attackers can intercept emails to attack. It is also easy to attack by entering passwords or filling in personal information on the web page.
Application system security vulnerabilities are caused by the difficulty in ensuring the security of servers and browsers. When programming, new programs are not written, but appropriate modifications are made to the programs. In this way, the programs will inevitably have the same security vulnerabilities.
The loopholes in security management are the lack of network administrators, irregular information system management, failure to conduct regular security tests and inspections, lack of network security monitoring, etc., all of which pose threats to network security.
This puts forward several functions for the Internet security mechanism, namely, identity recognition, access permission control, digital signature, audit tracking, key management and other functions!
Commonly used prevention and control technologies for Internet security include encryption technology and firewall technology!
The role of encryption on the Internet is to prevent important information from being intercepted and stolen on the network. Encryption technology is the main means to achieve confidentiality. This technology can transform important information or data from an understandable plain text into a messy, incomprehensible ciphertext form, and transmit the information on the line in ciphertext form, and restore the ciphertext to plaintext when it reaches the destination port.
Firewall technology is actually an isolation technology!
Liu Tao attaches great importance to computer security and Internet security, because these two security can be regarded as the security of China!
If these two security cannot be achieved, then China will be unsafe.
The Internet Research Institute studies all aspects of the Internet, and security issues are naturally an important topic of the Internet Research Institute.
Although the current scientific research team is very weak, the technical talents in the entire Chinese computer field may not even be one thousandth of those in the United States. The research strength on the Internet is estimated to be less than one percent of that in the United States.
But as the saying goes, the early bird catches the worm, and with Liu Tao's golden finger, the development speed in this area will naturally not be slow.
However, if China wants to become a world leader in computers and the Internet, it still has a lot of work to do and needs to work hard.
This is why Liu Tao did not sell computers that were too advanced. This was because if his own strength was not enough, others would quickly master the products he sold, quickly catch up, and then quickly surpass him.
This situation is a disaster for China, a huge disaster.
Liu Tao wants to lay a solid foundation for China's computer and Internet in the next few years, so as to help China's computer and Internet to be invincible in the future.
(End of this chapter)
You'll Also Like
-
Traveled through time and space and became Sukuna, but the host was Yukinoshita?.
Chapter 202 20 hours ago -
The Return of the Great Emperor
Chapter 972 20 hours ago -
Martial Arts: Killing enemies will increase your power, my skills are overwhelming!
Chapter 285 20 hours ago -
Dark Fairy Tale: The Evil Queen Rolls Her Eyes at the Beginning
Chapter 128 20 hours ago -
I pretend to cultivate immortality in kindergarten.
Chapter 216 20 hours ago -
The Martial Saint who slays demons starts with refining insects
Chapter 195 20 hours ago -
Unknown Coming: I have an invincible domain
Chapter 477 20 hours ago -
I am writing a diary in a crossover manga.
Chapter 193 20 hours ago -
I asked you to be a mage, not to raise a nine-tailed fox.
Chapter 406 20 hours ago -
Taiping Inn
Chapter 2150 20 hours ago