Rewriting the Technological Scenario

Chapter 644, light sketching

"What do you think about this?" Meng Qian came up with James' view.

"Meng always said that the opponent is obviously fuzzy concept, in the understanding of the Ministry of Migan, this attitude in the recent time can see that the Migi Government does not mean toughly, but also willing to be the Ministry of Technology Company Provide some help.

If you respond, this matter will pass over a period of time, just ... "

"Only a certain market question will definitely exist, but the safety card is the biggest variable, no one can accurately predict the results, but the opponent is tested our reaction, if we don't have any more tough response Measures, this will become a sign of nausea from time to time. "

James nodded, "Just like Gu Qing said that another purpose is to wait for us to go to talk."

"Oh." Meng Qian quickly laughed, "the future of the wind group only stood and stood in these two roads."

The office was silent for a while, Meng Qian turned to Xiao Bo, "Xiao, your things on your side, you can use this card in your hand."

"Okay, I understand."

Then Meng Qian turned to James, "The card in Xiao Hong should play a certain role, but before this, I don't want to be so passive on security issues. When I went to Yanjing, I got this time. A little search is also because of the security reasons, we have encountered a lot of trouble in the West. Our big wind group's brand can support us better facing this kind of thing, but other Chinese companies are different.

More importantly, since the war begins, every trick out, we should we all want to respond. "

"What is going to" "James thought about it," This is something that is unclear. "

"How big is your safety system?"

"The direction of Meng Mong is all right, we have a bottom to see if the safety defense system built in these directions is at least."

"That's, the opponent is not ambiguous concept, then we simply put the concept clearly and clearly."

...

On March 10, the Great Breeze Group suddenly held a temporary conference, and this post conference received attention because the main lecturers were Meng Qian.

Meng Qian station stage, direct theme, "A few years ago, the development of the Internet made us realize the importance and urgency of network security, and security issues become more and more important, we also see more and more companies Note in the security field investment.

But today I can say a reality with you, with the development of cloud computing, the security issue will enter a new stage, and all the investment in the past, many can only be in the past.

I believe that everyone has noticed that more and more hackers attack through a variety of cloud computing platforms, Microsoft's Azure has been hurting, and a large number of user information is damaged, even Microsoft is still, and this other companies. It can be imagined.

Obviously, everyone does not do it well on the security of cloud computing age.

This is also the purpose of our conference today, because seeing such a social phenomenon, in order to protect the development of cloud computing, in order to protect more users, we decided to take our safety system. "

Meng Qian's opening is a smell of gunpowder. Ou rice said that the product of the wind group is not safe. As for the unsafe, I can't tell, and Meng Qian wants to tell the world in white, this batch of companies headed by Microsoft. There is a lot of rotten in the safe and secure of cloud computing, and it is also known that the wind group has a level in this field, and the wind group can bring anything for this field.

"First of all, we must understand why cloud computing has brought new security challenges. This is related to the characteristics of cloud computing. First, the cloud computing platform gathers a large number of user data, and the user's data has a data storage location in the cloud computing system. , Uncontrollable, many security hazards.

Second, cloud computing has higher openness, resource sharing is the advantages and characteristics of cloud computing, but at the same time, the higher the sharing level, the more vulnerabilities. In addition, open cloud computing requires a large number of network interfaces and APIs to integrate resources and increase security risks.

Therefore, for the characteristics of cloud computing, we have adopted three major security measures. First, in order to ensure data isolation and security accesses between cloud computing platforms, we establish an identity management in the cloud computing system shared by multiple users. And access control systems, adopted identity authentication methods that bind identity management and personal identity.

Second, data security is the core of cloud computing security, including static storage data protection and dynamic data isolation protection. We use data encryption and access control mechanisms to ensure data integrity using more efficient integrity verification algorithms. Data security protection mechanism based on the information flow model is the main means of realizing dynamic data isolation protection.

In addition, virtualization technology is the basis of cloud services. Therefore, server virtualization, storage virtualization, network virtualization security issues are critical to cloud computing system security. To achieve the security of server virtualization, establish a comprehensive virtual machine security isolation, access control, malicious virtual machine protection, virtual machine resource restrictions, etc. "

Meng Qian said that there is a huge system on the big screen. It has a corresponding explanation for each key technique. "Through all security technical means used for cloud computing features, we have built such a defense system. We named them as the Great Wall defense system.

At this conference today, in addition to showing our Great Wall defense system, it is more important to announce to the world, we are willing to share our Great Wall defense system to this world.

As a leading company of Yunzhi, as a leader of cloud computing, when we pay attention to cloud computing in the world's development problems, we realize that we should take us responsibility, if the security problem is not solved, cloud The development of calculations is a mistake because any technique that is not responsible for the user security is shameful.

So today we will launch cloud computing World Security Alliance.

The establishment of the alliance aims to promote the development of cloud computing safety technology, in addition to safety technology itself, cloud computing development to the company's moral requirements, users' data is in the company, the company itself is A security vulnerability.

And the cloud computing World Security Alliance we launched today is to join more companies with moral guidelines, jointly sign the cloud computing security, jointly maintain user data security and privacy.

As for our Great Wall defense system, it will pass each member of the Cloud Computing World Security Alliance with technical counseling models. "

Many people in the scene didn't realize that I should applaud, because it is still immersed in shocking, the wind group actually uses safety to drive an international alliance, but also taunt some countries.

However, Meng Qian's performance has not ended, Meng Qian quickly continued, "In addition to helping more companies, we are willing to help more government to build a safe government network, we still have some experience on this issue.

For example, in the eve of the Migi Guanfu proposed the security hidden dangers of the official website, I heard that the Mioguang government will build a special committee against the official website security. "

This is a thing that has also happened. In 2010, the new network security challenge is coming. The Migi Government has launched a special committee to recruit a group of security talents to protect the network security of rice.

"For the security technology in the new era, the company may do some lag, and in this era of globalization, our wind group is very sincerely hoping to help Miki to create a safe government network defense system."

A taunt of a tapped, triggered the on-site applause.

...