Home > Technology peripherals > AI > Strengthen AI security capabilities to realize the maximum value release of AI applications

Strengthen AI security capabilities to realize the maximum value release of AI applications

王林
Release: 2023-09-13 21:17:01
forward
540 people have browsed it

At the NSFOCUS Technology Smart Security Conference held recently, Wu Jiangxing, an academician of the Chinese Academy of Engineering, emphasized that the in-depth application of AI has high requirements on data, algorithms, and computing power, and also poses a huge challenge to security and privacy capabilities. He pointed out that only by ensuring data security and privacy protection while improving AI capabilities and security can the application value of AI technology be truly released

Academician Tan Jianrong said at the meeting that generative artificial intelligence, metaverse digital space and anthropomorphic robots are three disruptive technologies. The cross-integration of these technologies will create a new situation in the theoretical methods and applications of information technology. However, the application of generative artificial intelligence also involves risks in terms of data compliance and data quality. These risks not only come from the application level, but also from the development level, so early warning and prevention are required

How to prevent the risks of generative artificial intelligence? When there are many unknown vulnerabilities in the field of network security, how should we effectively prevent them?

Strengthen AI security capabilities to realize the maximum value release of AI applications

Data security is related to collaborative protection at multiple levels

Guo Qiang, deputy director of the National Information Center, said that the fight for "data sovereignty" has become a new trend in the development of global data security. Countries have introduced data strategies and legislated to safeguard national data sovereignty.

"The "Opinions on Building a Data Basic System to Better Play the Role of Data Elements" puts forward the requirement of 'available and invisible' for raw data. Based on this, our team sorts out and manages data as assets and classifies the data. Classification, and further improve the accuracy and efficiency of discovering sensitive data in asset ledgers." Ye Xiaohu, chief technology officer of NSFOCUS Technology Group, said that managing data in the form of assets requires technological innovation, and then through engineering to achieve mature industry applications.

Under the guidance of relevant national methods and policies, data system construction entities at all levels have explored collaborative innovation.

Guoqiang introduced that the national-level "Digital Shield" system aims to ensure data security. Based on the security platform, it integrates existing network and data security capabilities and establishes a system that runs through the network layer, computing layer (cloud platform), Collaborative data security protection system of application layer and data layer

Ye Xiaohu said that NSFOCUS's "Wind Cloud Guard" security model is built based on massive security professional knowledge training. The system covers a variety of scenarios such as security operations, detection and response, attack and defense confrontation, knowledge question and answer, etc., and can assist decision-making in network security operations. The construction of the system is carried out from the three dimensions of "scenario traction, technology drive, and ecological collaboration". Through large models, it solves problems in actual combat situation command and dispatch, red and blue confrontation auxiliary decision-making, and safety operation efficiency improvement

Through innovative data security technology, safe and effective applications can be achieved

"The development of the digital economy cannot be separated from digital security. To accelerate the sustainable development of the digital economy, we must maintain data security and network security, and build a good security base." Wu Jiangxing pointed out that the current research and development of core digital technologies should be further accelerated. and development, build a new situation of data security and network security, and safeguard the development of the digital economy.

Ensuring data security is for effective application, and innovative technologies should promote their effective circulation and realize value on the basis of security. Guoqiang said that the National Information Center will continue to promote the pilot verification of the construction of the "Digital Shield" system to securely empower computing infrastructure such as "Eastern Digital and Western Computing" and build a national computing network security ecosystem.

“The focus of data security technology innovation should be on technical support to solve how to safely transfer data sharing and exchange.” Ye Xiaohu said that in order to ensure the confidentiality and integrity of data and applications in the storage state, running state, and transmission state It achieves data "availability and invisibility" with higher performance. NSFOCUS's data safe achieves reliable data protection, task trustworthy computing and data controllability through trusted computing environment, fully confidential data processing, dynamic permission control and other technologies. Functions such as circulation help data sharing be implemented legally, compliantly, safely and efficiently.

Strengthen AI security capabilities to realize the maximum value release of AI applications

The Computer Federation of China and NSFOCUS jointly announced the 2023 "Kunpeng" scientific research fund project at the meeting. According to reports, this year's "Kunpeng" scientific research fund will focus on three directions: data security and privacy computing, artificial intelligence empowerment and confrontation, and new network security attack and defense technologies. It aims to promote the effective transformation and implementation of national scientific research results, and through industrial The cooperation between academia and research will maximize the potential of the security industry and promote the overall domestic security market to adapt to the widespread application of artificial intelligence

The content that needs to be rewritten is: (picture provided by the conference organizer)

(Source: Science and Technology Daily)

The above is the detailed content of Strengthen AI security capabilities to realize the maximum value release of AI applications. For more information, please follow other related articles on the PHP Chinese website!

source:sohu.com
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template