Cctv news(Reporter Gao Yuting) On the morning of May 25th, 2016 China Big Data Industry Summit and China E-commerce Innovation and Development Summit opened in Guiyang. Qi Xiangdong, President of Qihoo 360 Technology Co., Ltd. delivered a speech at the opening ceremony.
The following is the full text of Qi Xiangdong’s speech:
Good morning, leaders, ladies and gentlemen, friends! We are doing safety, and safety is stepping on the brakes, so I will mainly talk about safety today. It is a great honor to attend this conference. The theme of this conference is "Data creates value, innovation drives the future", which coincides with the theme of "Data-driven security" of the China Security Conference held last year.
Let’s talk about three points.
First, big data is also a double-edged sword, which can benefit society and people. If it is used by some people, it can also harm social and public interests. Just now, Baidu Li talked about artificial intelligence, which really makes us impulsive and yearning, like autonomous driving and unmanned aircraft. However, if autonomous driving is realized, big data needs to be continuously transmitted from the end to the cloud, and then from the cloud to the end. In this process, the data is hijacked, and the drone and self-driving car will be cracked, and its direction control will no longer be the owner’s meaning.
Smart home can also bring us a lot of convenience. On the way off work, you can remotely control the oven, soymilk machine and washing machine to work through your mobile phone. But also, if these big data in the cloud are replaced by hackers through data deception, then the hardware of these smart homes may become stupid hardware, or it may become a weapon that harms family safety. When you get home, a hacker may remotely control your washing machine to run at 90 degrees and 1200 rpm for a whole day. Some time ago, a cyber fraud case was cracked in Guangdong. A hacker obtained the names, card numbers and passwords of many bank users through cyber attacks, and organized a group of people to steal credit cards, involving 1.5 billion RMB, involving 49 banks. In February this year, the largest cyber theft case occurred in the history of the world. The head of the Bangladesh Central Bank said that if the hacker hadn’t made a spelling mistake that day, there would have been a $1 billion transaction.
General Secretary of the Supreme Leader said at the 4.19 Network Information Work Symposium that security is the premise of development, so governments and enterprises at all levels must not forget to consider security issues when developing big data. Once a big data center in the cloud has a major security breach, it may lead to the loss of customers in this center.
Second, traditional security ideas have no way to solve the problem of big data security. The traditional way to solve network security is to divide the boundaries. We separate the internal network from the external network, isolate the risks with terminal equipment, and solve the security problems with the network to hold the boundaries. However, with the emergence of mobile Internet and cloud technology, mobile terminals shuttle among 4G, WiFi and wired cables, and the network boundary has disappeared. We find more than 120 vulnerabilities in software and hardware and websites every day. Every Trojan horse and every vulnerability may attack our pre-deployed security equipment and security software.
On December 31st, last year, the network of Ukrainian electric power company was attacked, which caused the first power outage due to network attack in history. In March this year, Syrian hacker groups controlled the chemical formula of the water plant through cyber attacks, which led to the water supply of the water plant being stopped. If such an attack is not found, then the water we drink may be poisonous.
In fact, cyber attacks occur every day, and China is the biggest victim of cyber attacks. Last year, 360-Day Eye Lab detected that the hacker department of "OceanLotus" launched a sophisticated and targeted cyber attack on China for three years. These examples all show that the traditional network protection methods have failed, and it is urgent to solve the big data problem and security problem.
Third, use big data methods to solve big data problems. In his speech on 4.19, the Supreme Leader General Secretary put forward five new concepts of network security for the first time. Among them, he said that network security is dynamic, not static, and it is out of date to rely on installing several security devices and network software, which requires dynamic and comprehensive network protection software. The General Secretary requires comprehensive network security situational awareness. These arguments are summed up to solve the problem of big data security with big data methods. It is no longer a problem for hackers to access our system, but they must look for data that they think is valuable after entering the network. If they can find it in time before they find it and take it away, they can cut off the attack and find the source.
A person can disguise his voice and fingerprints, but there is no way to disguise his behavior. This is data. Therefore, data can see through everything, and it can also show that any access behavior on all networks will leave traces. A hacker’s behavior on the Internet is different from that of normal employees’ network access behavior. Using big data, we can find out whether it has been attacked, who has been attacked, what kind of data the attacker cares about us, and what measures should be taken to cut off this attack. This method is called a new security system under data-driven security thinking, which includes vulnerability mining technology, network attack technology, network sample analysis technology, network address resolution database, network access database and so on. The huge big data system and big data technology composed of all kinds of big data is the traditional big data in internet plus.
Three years ago, 360 seized the opportunity, and the user coverage rate reached 96.1%. From this, we also mastered the largest malware database in the world. With these big data and 360 powerful big data analysis capabilities, the only global network security situational awareness system in China has been developed. Last year, we discovered 29 organizations that launched APT attacks against the government of China, covering 31 provinces, controlling tens of thousands of computers in important systems in China, with the longest latency of 8 years.
In short, cyber attacks can be seen and managed with the ability of big data. This set of maps has also been brought to the Expo, and everyone has the opportunity to see it in the afternoon. This afternoon, three products for protecting smart city big data were released with the help of the Expo platform. Welcome to visit and guide.
Thank you!