当前位置:网站首页>The three-year action plan of the Ministry of industry and information technology has been announced, and the security industry has ushered in major development opportunities!
The three-year action plan of the Ministry of industry and information technology has been announced, and the security industry has ushered in major development opportunities!
2022-06-24 06:33:00 【Tencent security】
7 month 12 Japan , The official website of the Ministry of industry and information technology released 《 Three year action plan for high-quality development of network security industry (2021-2023 year )( Solicitation draft )》( hereinafter referred to as 《 A plan of action 》). Proposed in the industrial scale 、 Technological innovation 、 Business development 、 Demand release 、 personnel training 、 The development goals of ecological cultivation, etc . It explicitly refers to 2023 year , The scale of network security industry exceeds 2500 One hundred million yuan , The annual compound growth rate exceeds 15%.
One 、 National policy overweight , The information security industry has benefited as a whole
Following 2016 end of the year 《 National cyberspace security strategy 》 Since its release and implementation ,《 Network security law 》、《 Data security law 》、《 Personal information protection law ( The draft )》 And other major laws and regulations have been issued , Network security has been deployed as a national security work . this 《 A plan of action 》 It is classified protection 2.0 After the regulation, there is another national top-level planning policy in the field of network security , It not only defines the development goals of the network security industry in the next three years , And from the industrial supply to strengthen the action 、 Safety requirements lead to action 、 Deepening industrial and financial cooperation 、 Talent team building action 、 Industrial ecological optimization actions and other dimensions , Deployed 19 Key tasks .
At present, the overall scale of China's information security industry lags far behind that of European and American countries , The proportion of domestic network security investment in informatization is about 3%, And developed countries such as Europe and the United States are 10% above , Partial over 15%, This is not in line with China's current economic status and the current situation of the development of digital economy .《 A plan of action 》 The release of shows that the national strategic position of network security has been further affirmed , It will help to promote the rapid growth of China's information security industry , Close the gap with European and American countries , For network security enterprises and institutions , And all organizations of the industrial safety ecology will receive rare development dividends .
Two 、 The network security budget has increased significantly , Define the investment proportion of key industries
this 《 A plan of action 》 stay “ Demand release ” Specific plans are defined in the development goals , The proportion of network security investment in key industries such as telecommunications in information investment is 10%; Comprehensive acceleration of safety applications in key industries , The network security capability of small and medium-sized enterprises has been significantly improved , The network security protection level of infrastructure in key industries has been continuously improved .
In recent years, the digitalization of all walks of life has been accelerating , The security threat of industrial Internet has also become more hidden 、 complex 、 More destructive . Previously released by Tencent 《2020 Industrial Safety Report 》 It's said in , Industrial safety has become the lifeline of enterprises , It is about the survival of the enterprise , meanwhile , Industrial safety is also related to enterprise development , Digitalization runs through enterprise R & D 、 production 、 circulation 、 The whole process of service , All involve security requirements , Security has gradually become one of the core competitiveness of enterprises . In the past two years, foreign telecom giants have been attacked by hackers 、 Safety events such as industrial data leakage of automobile enterprises , It once again confirms the importance and urgency of safety construction investment in the process of digital development .
《 Action report 》 Not just about directing Telecommunications 、 Enterprises in key industries such as the Internet have increased their investment in network security , Promote the synchronous planning of network security and informatization 、 Synchronous construction and synchronous use , Improve the network security management and technical guarantee system . At the same time, it also specifically mentioned promoting small and medium-sized enterprises to strengthen network security capacity building , The implementation of small and medium-sized enterprises “ Go to the cloud safely ” Special operation , Build a network security operation service center , Provide high-quality services to small and medium-sized enterprises 、 Low cost 、 Intensive network security products and services . More comprehensively promote enterprises of all sizes in the industry to strengthen the construction of safety capacity , Release security requirements .
3、 ... and 、 Emerging technology is the focus of investment
In recent years, various new technologies have given birth to various new security requirements , This is what 《 A plan of action 》 Pointed out that the network security supply level should strengthen the key areas of investment .
《 A plan of action 》 stay “ Industrial Supply enhancement action ” It is mentioned in detail in , in the light of 5G、 Cloud computing 、 Artificial intelligence and other emerging technology fields , Accelerate the drive for native security 、 Smart choreography 、 Endogenous security 、 Dynamic access control 、 R & D and promotion of trusted computing and other technical products have been launched . For the industrial Internet , Strengthen the safety analysis of large traffic 、 Vulnerability mining and management 、 Data fusion analysis 、 Protocol ID resolution and other capabilities . For the Internet of vehicles and the Internet of things , Lightweight terminal security products or middleware that promote endogenous integration , And communication security 、 Identity Authentication 、 Application of protection schemes such as platform safety . Promote federal learning 、 Multi party security technology 、 Privacy computing 、 Dense state calculation 、 Secure retrieval 、 Research and application of data security technologies such as multi threshold cooperative tracking . At the same time, the innovative safety service mode is specially emphasized , Strengthen the cloud capability of security enterprise technology products , Promote the application of cloud security products , Encourage safety enterprises with strong comprehensive strength to develop flexibility 、 Flexible cloud mode network security services .
Four 、 Support excellent network security enterprises “ Be bigger and stronger ”
stay “ Business development ” On target ,《 A plan of action 》 Encourage network security enterprises with a strong foundation to go public , Support pilot enterprises to integrate resources through strategic investment , Be bigger and stronger , Improve the leading ability of network security ecology , At the same time, a number of vehicles are oriented to the Internet of vehicles 、 Industrial Internet 、 The Internet of things 、 Smart city and other new circuits “ Specialization and innovation ” The group of small and medium-sized enterprises is growing rapidly , Network security products 、 service 、 The number of solution single champion enterprises is gradually growing .
《 Research Report on the competitiveness of global network security enterprises 》 Show , Among the top 100 global network security enterprises , American companies occupy 58 mat , Monopolize half of the country , China 17 mat , Although ranked second , But the gap is obvious , China's network security industry is relatively backward in terms of market demand and industrial capacity . With the continuous development of digital economy , China is expected to have a number of more influential industries 、 Even the world's influential benchmarking network security company .
Based on this goal , Deepening actions through industrial and financial cooperation , We will increase investment in industrial funds and give them preferential treatment 、 Guide capital to accurately support enterprise development . Launch the network security industry capital empowerment project , From the industrial and financial cooperation mechanism 、 service 、 Make a clear landing plan in terms of insurance .
Besides ,《 A plan of action 》 It also mentions “ Talent team building action ” as well as “ Industrial ecological optimization action ” common 6 An important task , Including the continuous promotion of network security school enterprise cooperation 、 Cultivate high-quality network security talents ; Guide the network security industry to gather , Actively promote Beijing 、 Hunan Changsha National Network Security Industrial Park construction , Accelerate the layout of the national network security industrial park .
The Ministry of industry and information technology issued 《 Three year action plan for high-quality development of network security industry ( Solicitation draft )》, It is to carry out the Party Central Committee in depth 、 The State Council's strategic decision and deployment on manufacturing power and network power , To implement “ the 14th Five-Year Plan ” Plan important actions related to requirements . With the implementation of this plan , I believe it will bring great changes and development to the entire security industry .
Please click to find out 《 A plan of action 》 The detailed content .
边栏推荐
- Easycvr development environment startup program reports an error import cycle not allowed solution
- What is the difference between level 1, level 2 and level 3 domain names? How to register domain names
- Excel data extraction technique: a universal formula for extracting numbers from mixed text
- SAP hum unbinds Hu from delivery order
- Come on, it's not easy for big factories to do projects!
- The installation method of apache+mysql+php running environment under Windows
- Network review
- Analysis of official template of micro build low code (I)
- How to give full play to the advantages of Internet of things by edge computing intelligent gateway
- [in depth sharing] Devops evolution path -- Realizing R & D digital transformation based on four vertical and four horizontal Devops system
猜你喜欢

Technology is a double-edged sword, which needs to be well kept

A cigarette of time to talk with you about how novices transform from functional testing to advanced automated testing

Manual for automatic testing and learning of anti stepping pits, one for each tester
Oracle case: ohasd crash on AIX
Fault analysis | using --force to batch import data leads to partial data loss

Enter the software test pit!!! Software testing tools commonly used by software testers software recommendations

ServiceStack. Source code analysis of redis (connection and connection pool)

创客教育给教师发展带来的挑战

The product layout is strengthened, the transformation of digital intelligence is accelerated, and FAW Toyota has hit 2022million annual sales
![[fault announcement] one stored procedure brings down the entire database](/img/7c/e5adda73a077fe4b8f04b59d1e0e1e.jpg)
[fault announcement] one stored procedure brings down the entire database
随机推荐
Discussion on NFT Technology
Coding and codesign: make design and development easier
Analysis of official template of micro build low code (I)
Analysis of official template of wechat personnel recruitment management system (I)
How accurate are the two common methods of domain name IP query
The influence of TLS protocol and cipher on remote RDP
Analysis of official template of wechat personnel recruitment management system (II)
Micro build low code supports Excel to import data source
Multi objective Optimization Practice Based on esmm model -- shopping mall
Tencent launched the "reassuring agricultural product plan" to support 100 landmark agricultural product brands!
Intranet environment request Tencent cloud 3.0 API details
Small programs import Excel data in batches, and cloud development database exports CVS garbled code solution
How to build a website after having a domain name? Can you ask others to help register the domain name
In Tencent, my trial period summary
text classification with RNN
How to give full play to the advantages of Internet of things by edge computing intelligent gateway
PMP | 8 abilities that excellent project managers focus on training
Apache enables gzip compressed web page transmission method
Just now, we received a letter of thanks from Bohai University.
How to batch move topics to different categories in discover