Rewrite the Technological Landscape

Chapter 635 An understatement of ridicule

"What do you think of this matter?" Meng Qian asked James' opinion when he came up.

"Mr. Meng is right. The opponent is clearly ambiguous. Based on my understanding of the government of the United States, I can see that the government of the United States has no intention of a tough end from this recent attitude, but they are also willing to fight for the US technology company. Offer some help.

If we deal with it according to the general explanation plan, this matter will pass after a while, but "

"It's just that certain market doubts will definitely exist. It's just that things like safety cards are the most variable. No one can accurately predict the result. It's just that the opponent is testing our reaction. If we don't have any tougher response If there is no way, this will become a card that is used to disgust us from time to time."

James nodded, "As Mr. Gu said, their other purpose is to wait for us to negotiate with them."

"Heh." Meng Qian sneered, "The future of Dafeng Group is to die standing up and live standing up."

The office was silent for a while, and Meng Qian turned to Xiao Boshi first, "Mr. Xiao, get your affairs in order as soon as possible, and the card in your hand may have to be used sooner."

"Okay, I understand."

Then Meng Qian turned to James again, "The card in Mr. Xiao's hand should be able to play a certain role, but before that, I don't want to just be so passive when it comes to safety issues. Zhang Shuxin told me when I went to Yanjing this time." A little search has also encountered a lot of trouble in the West due to security reasons. The brand power of our Dafeng Group can support us to better face this kind of thing, but other Huaxia companies are different.

More importantly, since the war has begun, we should find a way to respond well to every move made by the opponent. "

"What's Mr. Meng's plan?" James thought for a while and said, "This is an unclear matter."

"How sure are you about our security system?"

"The directions given by Mr. Meng are all correct, and the security defense system we have built around these directions is at least for now confident."

"That's fine. The opponent wants to blur the concept, so let's just make the concept clear."

On March 10th, Dafeng Group suddenly held an impromptu press conference, which attracted much attention because the keynote speaker was Meng Qian.

Meng Qian stood on the stage and went straight to the topic, "A few years ago, the development of the Internet made us aware of the importance and urgency of network security. Security issues have become more and more important, and we have also seen more and more enterprises joining Note the investment in the field of security.

But today I have to tell you a reality. With the development of cloud computing, security issues will enter a new stage. All the investments you made in the past can only be the past.

I believe that everyone has noticed that more and more hackers are attacking through various cloud computing platforms in the past year. Microsoft’s Azure was hit hard by hackers not long after its launch, and a large number of user information was damaged. Even Microsoft is like this, and everyone in other companies can imagine.

Obviously, everyone is not ready to deal with security issues in the cloud computing era.

This is also the purpose of our press conference today, because we have seen such social phenomena, in order to ensure the development of the cloud computing era and to protect the safety of more users, we decided to take out our security system. "

Meng Qian's opening made people smell a bit of gunpowder. Omi said that Dafeng Group's products are not safe, and it is not clear what is not safe, but Meng Qian wants to tell the world clearly that this group of companies headed by Microsoft How poor is the security of cloud computing, and at the same time let the world know what level the Dafeng Group has in this field and what the Dafeng Group can bring to this field.

"First of all, we need to understand why cloud computing brings new security challenges. This is related to the characteristics of cloud computing. First, the cloud computing platform gathers a large amount of user data, and the user's data has an unknown data storage location in the cloud computing system. , uncontrollability and many other security risks.

Secondly, cloud computing has higher openness. Resource sharing is the advantage and characteristic of cloud computing, but at the same time, the higher the degree of sharing, the more vulnerabilities there will be. In addition, open cloud computing requires a large number of network interfaces and APIs to integrate resources, which also increases security risks.

Therefore, in view of the characteristics of cloud computing, we have adopted three major security measures. First, in order to ensure data isolation and safe access among multiple users of the cloud computing platform, we have established user identity management in the cloud computing system shared by multiple users. And the access control system adopts an identity authentication method that combines identity management and personal identity layered encryption.

Secondly, data security is the core of cloud computing security, including static storage data protection and dynamic data isolation protection. We use data encryption and access control mechanisms, and use more effective integrity verification algorithms to ensure data integrity. The data security protection mechanism based on the information flow model is our main means to realize dynamic data isolation protection.

In addition, virtualization technology is the foundation of cloud services. Therefore, the security issues of server virtualization, storage virtualization, and network virtualization are crucial to the security of cloud computing systems. To realize the security of server virtualization, it is necessary to establish a complete security protection system including virtual machine security isolation, access control, malicious virtual machine protection, and virtual machine resource limitation. "

When Meng Qian said this, a huge system appeared on the big screen, and there was a corresponding explanation for each key technology, "We have built such a defense system through all the security technologies adopted for the characteristics of cloud computing, We named it the Great Wall Defense System.

At today's press conference, in addition to showing our Great Wall defense system, it is more important to announce to the world that we are willing to share our Great Wall defense system with the world.

As the initiator of Yunzhilian, as a leader in cloud computing, when we noticed problems in the development of cloud computing in the world, we realized that we should shoulder our responsibilities. If security issues are not resolved, cloud The development of computing is a mistake, because any technology that is not responsible for the safety of users is shameful.

So today we will launch the Cloud Computing World Security Alliance here.

The establishment of the alliance aims to promote the development of cloud computing security technology. In addition to the security technology itself, the development of cloud computing will place high demands on the morality of enterprises. User data is in the hands of enterprises, and enterprises themselves are important to users. A security hole.

The Cloud Computing World Security Alliance we launched today hopes that more companies with ethical principles will join in, sign the Cloud Computing Security Code, and jointly maintain user data security and privacy security.

As for our Great Wall defense system, it will be delivered to every member of the Cloud Computing World Security Alliance in the form of technical guidance. "

Many people at the scene didn't realize that they should applaud, because they were still immersed in the shock that the Dafeng Group actually wanted to use security to pull an international alliance, and also mocked some countries by the way.

However, Meng Qian's performance was not over yet, and Meng Qian quickly continued, "In addition to helping more companies, we are also willing to help more governments build secure government networks. We still have some experience in this issue.

For example, not long ago, the government of the United States raised the issue of hidden dangers in the government's network security. I heard that the government of the United States will create a special committee for government network security issues. "

This is what happened in the previous life. In 2010, when new cyber security challenges came, the U.S. government launched a special committee to recruit a group of security talents to protect the U.S. cyber security.

"US companies may indeed lag behind in security technology in the new era, but in this era of globalization, we Dafeng Group sincerely hope to help the US build a secure government network defense system."

An understatement of ridicule, sparked thunderous applause.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like