当前位置:网站首页>The three-year action plan of the Ministry of industry and information technology has been announced, and the security industry has ushered in major development opportunities!
The three-year action plan of the Ministry of industry and information technology has been announced, and the security industry has ushered in major development opportunities!
2022-06-24 06:33:00 【Tencent security】
7 month 12 Japan , The official website of the Ministry of industry and information technology released 《 Three year action plan for high-quality development of network security industry (2021-2023 year )( Solicitation draft )》( hereinafter referred to as 《 A plan of action 》). Proposed in the industrial scale 、 Technological innovation 、 Business development 、 Demand release 、 personnel training 、 The development goals of ecological cultivation, etc . It explicitly refers to 2023 year , The scale of network security industry exceeds 2500 One hundred million yuan , The annual compound growth rate exceeds 15%.
One 、 National policy overweight , The information security industry has benefited as a whole
Following 2016 end of the year 《 National cyberspace security strategy 》 Since its release and implementation ,《 Network security law 》、《 Data security law 》、《 Personal information protection law ( The draft )》 And other major laws and regulations have been issued , Network security has been deployed as a national security work . this 《 A plan of action 》 It is classified protection 2.0 After the regulation, there is another national top-level planning policy in the field of network security , It not only defines the development goals of the network security industry in the next three years , And from the industrial supply to strengthen the action 、 Safety requirements lead to action 、 Deepening industrial and financial cooperation 、 Talent team building action 、 Industrial ecological optimization actions and other dimensions , Deployed 19 Key tasks .
At present, the overall scale of China's information security industry lags far behind that of European and American countries , The proportion of domestic network security investment in informatization is about 3%, And developed countries such as Europe and the United States are 10% above , Partial over 15%, This is not in line with China's current economic status and the current situation of the development of digital economy .《 A plan of action 》 The release of shows that the national strategic position of network security has been further affirmed , It will help to promote the rapid growth of China's information security industry , Close the gap with European and American countries , For network security enterprises and institutions , And all organizations of the industrial safety ecology will receive rare development dividends .
Two 、 The network security budget has increased significantly , Define the investment proportion of key industries
this 《 A plan of action 》 stay “ Demand release ” Specific plans are defined in the development goals , The proportion of network security investment in key industries such as telecommunications in information investment is 10%; Comprehensive acceleration of safety applications in key industries , The network security capability of small and medium-sized enterprises has been significantly improved , The network security protection level of infrastructure in key industries has been continuously improved .
In recent years, the digitalization of all walks of life has been accelerating , The security threat of industrial Internet has also become more hidden 、 complex 、 More destructive . Previously released by Tencent 《2020 Industrial Safety Report 》 It's said in , Industrial safety has become the lifeline of enterprises , It is about the survival of the enterprise , meanwhile , Industrial safety is also related to enterprise development , Digitalization runs through enterprise R & D 、 production 、 circulation 、 The whole process of service , All involve security requirements , Security has gradually become one of the core competitiveness of enterprises . In the past two years, foreign telecom giants have been attacked by hackers 、 Safety events such as industrial data leakage of automobile enterprises , It once again confirms the importance and urgency of safety construction investment in the process of digital development .
《 Action report 》 Not just about directing Telecommunications 、 Enterprises in key industries such as the Internet have increased their investment in network security , Promote the synchronous planning of network security and informatization 、 Synchronous construction and synchronous use , Improve the network security management and technical guarantee system . At the same time, it also specifically mentioned promoting small and medium-sized enterprises to strengthen network security capacity building , The implementation of small and medium-sized enterprises “ Go to the cloud safely ” Special operation , Build a network security operation service center , Provide high-quality services to small and medium-sized enterprises 、 Low cost 、 Intensive network security products and services . More comprehensively promote enterprises of all sizes in the industry to strengthen the construction of safety capacity , Release security requirements .
3、 ... and 、 Emerging technology is the focus of investment
In recent years, various new technologies have given birth to various new security requirements , This is what 《 A plan of action 》 Pointed out that the network security supply level should strengthen the key areas of investment .
《 A plan of action 》 stay “ Industrial Supply enhancement action ” It is mentioned in detail in , in the light of 5G、 Cloud computing 、 Artificial intelligence and other emerging technology fields , Accelerate the drive for native security 、 Smart choreography 、 Endogenous security 、 Dynamic access control 、 R & D and promotion of trusted computing and other technical products have been launched . For the industrial Internet , Strengthen the safety analysis of large traffic 、 Vulnerability mining and management 、 Data fusion analysis 、 Protocol ID resolution and other capabilities . For the Internet of vehicles and the Internet of things , Lightweight terminal security products or middleware that promote endogenous integration , And communication security 、 Identity Authentication 、 Application of protection schemes such as platform safety . Promote federal learning 、 Multi party security technology 、 Privacy computing 、 Dense state calculation 、 Secure retrieval 、 Research and application of data security technologies such as multi threshold cooperative tracking . At the same time, the innovative safety service mode is specially emphasized , Strengthen the cloud capability of security enterprise technology products , Promote the application of cloud security products , Encourage safety enterprises with strong comprehensive strength to develop flexibility 、 Flexible cloud mode network security services .
Four 、 Support excellent network security enterprises “ Be bigger and stronger ”
stay “ Business development ” On target ,《 A plan of action 》 Encourage network security enterprises with a strong foundation to go public , Support pilot enterprises to integrate resources through strategic investment , Be bigger and stronger , Improve the leading ability of network security ecology , At the same time, a number of vehicles are oriented to the Internet of vehicles 、 Industrial Internet 、 The Internet of things 、 Smart city and other new circuits “ Specialization and innovation ” The group of small and medium-sized enterprises is growing rapidly , Network security products 、 service 、 The number of solution single champion enterprises is gradually growing .
《 Research Report on the competitiveness of global network security enterprises 》 Show , Among the top 100 global network security enterprises , American companies occupy 58 mat , Monopolize half of the country , China 17 mat , Although ranked second , But the gap is obvious , China's network security industry is relatively backward in terms of market demand and industrial capacity . With the continuous development of digital economy , China is expected to have a number of more influential industries 、 Even the world's influential benchmarking network security company .
Based on this goal , Deepening actions through industrial and financial cooperation , We will increase investment in industrial funds and give them preferential treatment 、 Guide capital to accurately support enterprise development . Launch the network security industry capital empowerment project , From the industrial and financial cooperation mechanism 、 service 、 Make a clear landing plan in terms of insurance .
Besides ,《 A plan of action 》 It also mentions “ Talent team building action ” as well as “ Industrial ecological optimization action ” common 6 An important task , Including the continuous promotion of network security school enterprise cooperation 、 Cultivate high-quality network security talents ; Guide the network security industry to gather , Actively promote Beijing 、 Hunan Changsha National Network Security Industrial Park construction , Accelerate the layout of the national network security industrial park .
The Ministry of industry and information technology issued 《 Three year action plan for high-quality development of network security industry ( Solicitation draft )》, It is to carry out the Party Central Committee in depth 、 The State Council's strategic decision and deployment on manufacturing power and network power , To implement “ the 14th Five-Year Plan ” Plan important actions related to requirements . With the implementation of this plan , I believe it will bring great changes and development to the entire security industry .
Please click to find out 《 A plan of action 》 The detailed content .
边栏推荐
- What transmission modes does the IOT data gateway support
- Enter the software test pit!!! Software testing tools commonly used by software testers software recommendations
- How to build a website after having a domain name? Can you ask others to help register the domain name
- Just now, we received a letter of thanks from Bohai University.
- The difference between ArrayList and LinkedList and the principle of using scene locality
- Double non students, self-taught programming, counter attack Baidu one year after graduation!
- Printer connection mode
- Technology is a double-edged sword, which needs to be well kept
- Why the computer can't start
- 12. Tencent cloud IOT device side learning -- NTP function and Implementation
猜你喜欢

Enter the software test pit!!! Software testing tools commonly used by software testers software recommendations
Oracle case: ohasd crash on AIX

The product layout is strengthened, the transformation of digital intelligence is accelerated, and FAW Toyota has hit 2022million annual sales

ServiceStack. Source code analysis of redis (connection and connection pool)

解读AI机器人产业发展的顶层设计

Technology is a double-edged sword, which needs to be well kept
Fault analysis | using --force to batch import data leads to partial data loss

创客教育给教师发展带来的挑战
![[fault announcement] one stored procedure brings down the entire database](/img/7c/e5adda73a077fe4b8f04b59d1e0e1e.jpg)
[fault announcement] one stored procedure brings down the entire database

Manual for automatic testing and learning of anti stepping pits, one for each tester
随机推荐
Nature Neuroscience: challenges and future directions of functional brain tissue characterization
Basic concepts of complex networks
What is the role of website domain name
Water conservancy RTU telemetry terminal
Project deployment for learning 3D visualization from scratch
Tencent cloud VPC machine, no image when installing monitoring components
How much does the domain name registration cost? Is there a time limit for the domain name purchased
How to bind the most formal domain name? What are the precautions for binding domain names?
Vscode1.58 version update record Previous + related article summary
Reasons for automatic allocation failure of crawler agent IP
How to select cloud game platforms? Just pay attention to two points
What is Druid
Web automation test (3): Selenium basic course of web function automation test
Network Overview
Another authoritative recommendation! Tencent zero trust was recognized by omdia Report
Forbid viewing source code in web page (protect source code)
Operation and maintenance dry goods | how to improve the business stability and continuity through fault recovery?
Innovating the security service mode, deeply convinced that the organization has been equipped with a "continuous online expert group"
The errorcontrol registry of the third-party service is 3, which may cause the system to cycle restart. For example, ldpkit introduced by WPS
Royal treasure: physical storage medium