期刊文献+

网络安全前沿技术演进机理与发展策略

Evolution mechanisms and development strategies of cutting-edge cybersecurity technologies
下载PDF
导出
摘要 根据信息技术和安全技术的“中介性”“调节性”本质,通过归纳总结指出网络安全前沿技术具备战略性、窗口性、交织性、颠覆性、对抗性等特征。围绕网络安全紧前威胁和中长期风险在运动发展中形成的对立统一关系,从技术演进的动因、逻辑和路径考察技术生长和存续机理。针对攻防双方在对抗场景中的优势争夺,通过4个“是否有利于”归纳网络安全技术演进的内在逻辑,给出网络安全前沿技术发展策略,以应对后疫情时期逆全球化、单边主义、保护主义思潮暗流涌动世界环境下网络空间安全技术的突围挑战。 Based on the intermediary and regulatory nature of information and security technologies,the characteristics of current cutting-edge cybersecurity technologies are summarized.These technologies are strategic,windowed,intertwined,disruptive,and confrontational.The unity of opposites of technological developments owing to immediate threats and medium-and long-term cybersecurity in the movement are discussed.In addition,based on the motives,logic,and pathways of technological evolution,the growth and development mechanisms of the technologies are examined.With a focus on the competition for dominance between offending and defending parties in confrontation scenarios,a development strategy of cutting-edge cybersecurity technologies is proposed using four“favorability”questions to clarify the inherent logic of the evolution of these technologies.The proposed strategy can be adopted to cope with challenges and achieve breakthroughs in cybersecurity technologies in the post-pandemic era marked by anti-globalization,unilateralism,and protectionism.
作者 胡春卉 陈剑锋 HU Chunhui;CHEN Jianfeng(National Laboratory of Zhongguancun,Beijing 102629,China;No.30 Research Institute of China Electronics Technology Group Corporation,Chengdu 610041,China)
出处 《国防科技》 2024年第1期87-93,共7页 National Defense Technology
基金 中国工程院咨询项目(2022-JB-04)。
关键词 网络安全 技术博弈 演进机理 cybersecurity technology game evolution mechanism
  • 相关文献

参考文献8

二级参考文献51

  • 1杨登才,刘畅,朱相宇.中国高校科技成果转化效率及影响因素研究[J].科技促进发展,2019,15(9):943-955. 被引量:23
  • 2于汝波.中国历史上军事科技进步与军事理论发展之关系[J].军事历史研究,2005,19(3):150-154. 被引量:2
  • 3青木吕彦,奥野正宽.经济体制的比较制度分析[M].北京:中国发展出版社,1999.
  • 4David P A. Clio and the economics of QWERTY [J]. American Economic Review, 1985,75 : 332 - 337.
  • 5David P A. Some new standards for the economics of standardization in the information age [C]//Economic Policy and Technological Performance. Cambridge: Cambridge University Press, 1987.
  • 6Arthur W B. Compcting technologies, increasing returns and lock-in by historical events[J]. The Economic Journal. 1989,99 : 116 - 131.
  • 7Arthur W B. Increasing returns and path dependence in the economy [M]. Ann Arbor: University of Michigan Press. 1994.
  • 8Leibowitz S, Margolis S. The fable of the keys [J]. Journal of Law & Economics, 1990,22: 1-26.
  • 9Leibowitz S, Margolis S. Network externality: An uncommon tragedy [J]. Journal of Economic Perspectives. 1994,8 : 133-150.
  • 10Young H P. The evolution of conventions [J]. Econometrica,1993,61:57-84.

共引文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部