"New infrastructure" redefines big data security

 Abstract : In the era of digital information economy development, big data has gradually become the latest and most important factor of production. The country strongly supports the advancement of the "new infrastructure" development strategy, and the resulting big data security challenges are becoming more and more severe. "New infrastructure" redefines big data security. In the face of endless network security incidents, it is necessary to build a proactive security defense system.

Keywords: new infrastructure big data big data security security audit active security defense

0 Preface

Since 2020, new infrastructure construction represented by new technologies such as 5G, big data, industrial Internet, and artificial intelligence (referred to as "new infrastructure") has been highlighted. "New infrastructure" can be understood as a new economic form based on digitalization. It is not only my country's national strategy, but also a strategic highland that countries around the world are striving to seize.

The "new infrastructure" economy can be said to be connected to social productivity at one end, and the upgrade of social consumption at the other end. It is not only beneficial to alleviate the rapid economic downturn caused by the outbreak of the hedge fund epidemic, but also can effectively promote the transformation of the entire organization to a digital economy and enter the next new high-growth economic era. A data survey report shows that by 2025, the cumulative investment scale of my country's 5G network infrastructure projects will reach 1.2 trillion yuan for the first time; from 2020 to 2025, the national economic aggregate and output directly driven by 5G commercial use will cumulatively reach 10.6 trillion yuan. Yuan.

As the country vigorously implements the "new infrastructure" development strategy, the construction of new information infrastructure and communication facilities closely related to the national big data center infrastructure, such as 5G infrastructure, large-scale data center infrastructure, industrial mobile Internet, and artificial intelligence, is accelerating and deepening. advance. In such a development environment, the continuous acceleration of the construction of information systems in various industries has ushered in a new climax in the development of my country's network security industry, but there is no doubt that the resulting big data security challenges are becoming more and more severe.

1 Big data becomes the next blue ocean

IDC predicts that China's overall investment rate of return will continue to maintain long-term rapid growth this year. The average annual and compound annual rate of return during the forecast period of 2019-2023 will be about 23.5%, which is much higher than the global market average last year. . By 2023, the market sales scale will increase significantly to 22.49 billion US dollars.

By 2024, driven by the rapid growth of market demand for new technologies such as automotive artificial intelligence and automotive automation, Internet of Things and smart mobility, and smart home wearable devices, the volume of industry statistics will exceed 30ZB; 20% of the industry will use Big data technology is used to directly realize real-time data tracking analysis and prediction results.

Especially with the continuous technological innovation in cloud computing, mobile Internet, big data, Internet of Things, artificial intelligence and other application fields, all walks of life in industry, agriculture and commerce will use big data to cooperate more closely with these new data technology application fields, so that the organization's The acquisition and capacity of basic data analysis of big data is larger, the storage is more convenient, the analysis is more intelligent, and the value is more obvious. [1] Driven by the two-wheel integration of "new infrastructure" national policy and information technology, the competition in the big data industry market is expected to gradually become the next blue ocean for the industry's development, and new-generation technologies such as "cloud shifting, big thing intelligence" will continue to help the industry realize The transformation of digital structure and the continuous innovation of business development model.

2 New infrastructure redefines big data security

In the era of digital economy, big data has become the latest and most important factor of production. According to IDC's forecast, by 2025, the amount of data captured globally will reach 175ZB. According to the latest research by IDC, the total investment scale of "new infrastructure" will reach 11 trillion yuan in 2020, and it is estimated that the ICT business opportunities directly driven by "new infrastructure" will also exceed 1 trillion yuan.

Such a huge amount of investment in node data centers will directly drive the integration and application of large-scale new data centers in my country, industrial big data, and artificial intelligence, and continue to accelerate and deepen. The new generation of data center applications that can be foreseen in the long term will grow rapidly from thousands or tens of thousands to millions per year, and the number of active users of network nodes and data center nodes will gradually increase from tens of millions to one billion to ten billion per year Level or even hundreds of billions, which may directly bring about not only the rapid growth of the data volume of traditional network nodes, but also a blowout growth trend.

Undoubtedly, these changes in the new era of huge data volume and huge data flow are completely reshaping the entire cloud infrastructure, and the new solution implementation of "cloud pipe end" will drive the continuous innovation of the entire infrastructure. In the future, multi-party integration technology services for enterprises will surely develop into an industry trend. More technical service methods will be provided through the ubiquitous "data intelligence platform" to meet the technical needs of users, subvert the traditional infrastructure and integrate technology infrastructure with multiple parties. transformation.

However, we must clearly and correctly realize that with the wide application and evolution of next-generation technologies such as 5G wireless communications, big data, industrial Internet, and artificial intelligence, various types of cyber attacks have become more normal, and the scope of impact will also increase. more profound. In the face of various types of network security threats that emerge in an endless stream, it is necessary to accelerate the construction of an active security threat defense guarantee system [ 2 ] .

3Database security audit has become a must

By monitoring the multiple states and communication content of the database, the database security audit system can accurately assess the security threats and risks faced by the database, and retain evidence for subsequent investigation. Its main features are remarkable:

One is to monitor " external hacker " attacks in real time. The system can monitor hackers using Web vulnerabilities to carry out SQL injection attacks; or use the Web application server as a springboard to exploit the database's own vulnerabilities to attack and intrude;

The second is to monitor " internal high-risk " operations in real time. The system can monitor the timeliness of high-risk data operations such as user databases, system maintenance and management personnel, outsourcing management personnel, and developers in real time and give alarms to avoid large amounts of small-scale data loss;

The third is to monitor the leakage of " sensitive data " in real time . The system can monitor in real time whether external hackers, developers and other technicians download sensitive user data locally through monitoring tools, monitor the abnormal operation of internal system maintenance personnel to download and export sensitive data in batches remotely or locally, and at the same time remotely query and batch download the number of sensitive data users , Sensitive user data and information such as the initial user, location and deadline to be accessed are remotely monitored and reported to the police in a timely manner;

The fourth is real-time auditing of " tracking illegal " behavior. The system can provide real-time records of all customer data risk access management behaviors, timely alarm all data risk management behavior data, and provide post-event risk tracking data analysis.

Database security audit system deployment diagram

The database security audit management system can especially be used to help enterprise users quickly meet the requirements of corporate data security governance compliance, quickly pass the security evaluation of the data supervision department, and realize real-time visualization, controllability and real-time monitoring of the access operation status of the core enterprise database. Real-time intelligent audit report is provided to realize the tracking and monitoring of safe access operation behavior of the core database, warning of dangerous access operation behavior, and tracking and auditing of suspicious access behavior.

4 Epilogue

In the era of big data, data security has become the lifeblood of governments, enterprises and institutions. With the maturity, application and promotion of big data technology, organizations with important data assets increasingly recognize big data: big data has become a core value asset.

Faced with the huge strategic opportunities for industrial development brought about by "new infrastructure" technology, more and more security industries regard "data" technology as the core technical resources and assets of enterprises, and actively formulate big data security development strategies in order to strive to seize digital The commanding heights of the economic development of the era. The integration of emerging information technologies such as big data, the Internet of Things, artificial intelligence, and marginalized cloud computing will help organizations discover the huge value that may be hidden in the use of big data to achieve agile business technology innovation, so as to effectively promote organizational digitalization. Transformation [ 3 ] .

But one thing that cannot be ignored is that the security of big data is also a core of the entire era of big data security. A large amount of sensitive data involving government affairs, commercial security secrets, personal privacy, and even key infrastructure information facilities of national organizations is very important. Once these sensitive data are maliciously tampered with or leaked maliciously, it will have a negative impact on the normal operation of important businesses of the organization. In severe cases, it may even directly and seriously affect national stability and social security.

References :

[1] Fu Changjun, Qiao Hongzhang. Research on the Development Status of Big Data Industry [J]. Radio Communication Technology, 2016, 42 (4): 01-04, 28.  

[2] Qi Xiangdong. A new generation of network security framework for "new infrastructure" [J]. China Information Security, 2020, (5): 55-56.

[3] Huang Song. Research on Network Security Countermeasures Based on New Infrastructure [J]. Information and Computer, 2020,32(20):195-197.

(Author: Men Jiaping, the original article was published in "Security Technology" magazine, Issue 36, 2023)

Guess you like

Origin blog.csdn.net/MJ0705/article/details/132268860