Clearly understanding and understanding the latest trends in the development of the Internet age is the first step in securing national cyber security. Since China's full-featured access to the Internet in 1994, the rapid development of information processing and communication technologies and its successful commercialization have given birth to a huge global network space; currently, one of the core goals of strategic competition in the global cyberspace It is the game of the parties concerned on how to effectively identify and guarantee their own sovereignty (ownership) in cyberspace; the focus of this game is to build a code of conduct that points to key data resources in cyberspace; the result will be great The degree determines the direction of evolution of the international system and the global cyberspace order that evolves from a "spontaneous" to a "self-conscious" state.
The goals of China’s cybersecurity strategy should include the following: First, build a secure cyberspace to promote China’s overall national strength; Second, narrow the gap with the United States in the field of cybersecurity; Third, actively participate in and promote global cyberspace The construction of the new order will gain freedom of movement in cyberspace and acquire, consolidate and expand the management and control of key resources in global cyberspace.
For China, when it comes to understanding and understanding the new global cyberspace strategy game, it is necessary to recognize the important changes that are taking place at the moment, namely, the advent of a “big†data era. This is the result of the continued proliferation of global cyberspace. The data in cyberspace continues to accumulate, and because of the uneven distribution of technologies and other capabilities, a key data hub/center is formed. From the source, the sources of data in the era of big data can be broadly classified into the following categories: The first category, the data entered and submitted by users themselves. The second category, collected by the collector-terminal data. The third category is the “meta†data that is formed during use. These data have already surpassed the ZB, that is, the trillion-gigabyte level. Any actor that can effectively use this data will have huge economic benefits, political influence, and security capabilities.
From a state perspective, according to studies of companies such as EMC, data in the era of big data can be divided into three categories according to the extent and status of their use: active data, that is, data that is effectively identified and used. Wakeup data, data that is identified but not used effectively. Sleep data, which is in an objective state of existence, is neither identified nor effectively used. In the "Digital Universe" report of EMC Corporation, the proportion that occupies more than 80% shows that the use of these data is still at a very early stage.
From the perspective of competition, at the company level, capacity building related to big data processing has become a new focus of competition and has also become the main source of the company’s core competitiveness. Snowden disclosed the prism system monitoring network, how to balance the company's business development and the relationship between the needs of ****, becoming the leading problem in the field of data currently in Europe and the United States companies concerned about the issue; promote portable mobile network terminal, wearable The development of hardware and software for equipment, as well as various types of acquisition, analysis, and display of results is a competition in the entire industry chain around the company's data applications. Until now, the main focus has been on the promotion of terminals and cloud mining. The next step is to directly point to the construction and improvement of the transaction-profit model of the data itself, and to form more complex data including nodes for data generation, agglomeration, storage, exchange, use, and sales of results (production— In the process, Morgan Stanley’s "breakpoint-style transition" in 2009's "Mobile Internet" report may reappear, and is once again strongly reflected in the creation and distribution of wealth.
At the national level, big data is increasingly becoming the new focus of safeguards. On the one hand, the development and improvement of governance capabilities based on big data is the key to the development of relevant cyber security strategies and policies in all countries. On the other hand, the emergence of new tasks to safeguard data resources closely related to social security and social stability coincides with the redistribution and adjustment of national forces worldwide. To a certain extent, cyberspace is the source of data resources. Control and security have become indicators of the growth and decline of the national power and have become a new arena for the politics of big countries. The hegemonic countries that are slowly losing their strength and influence in the real world are trying to transform their technological superiority in cyberspace into a hegemonic-dominated order, and by consolidating this order to ensure a new round of transitional development. China has obtained new sources of strength and eventually reversed or continued to slow down the recession in the real world. Emerging powers in the real world can't replicate the showdown between big powers in the past due to the complex economic-financial-industry-dependency relationship. It's also difficult to fully realize the curve overtaking through real economic development, but if you can effectively control the transitional patterns brought about by the Internet, Opportunities for development can also be used to backfeed the real world with the development of cyberspace. Because of this, all parties are paying attention to the same strategic objectives. They are placing strategic data resources that are crucial to political security, economic prosperity, and social stability under the effective control of their own national capabilities. And form a relatively complete national network security strategy.
Driven by the above-mentioned interaction-development trend, the data resources of the global cyberspace continue to show a trend of convergence, resource, and strategic development:
Aggregation shows that the construction of a global big data center is increasingly concentrated on a few companies and countries that have an overwhelming advantage. Las Vegas’s Switch Communications plans to invest US$1 billion to establish a 279,000-square-meter data center “SuperNapâ€; Apple, Google, Microsoft, IBM, Cisco and other industry-leading European and American companies are launching new ones worldwide. The construction of data centers in rounds has reached its climax; in this process, Apple, Google, IBM and other companies rely on their major advantages as their strong first-mover advantage in the field of network applications, as well as the users attracted to them, and the huge number of users. data flow. The market mechanism plays a huge role in it. At the same time, it also provides a strategic opportunity for the country to guarantee and realize the pros and cons of a more balanced probability.
The resource utilization of data refers to the process of value creation in the entire information industry. It increasingly revolves around and depends on data development. The value creation process of the information industry, whether it is the provision of knowledge, information, or services, is increasingly dependent on the effectiveness of data. Possession, and continued in-depth excavation. From a certain perspective, data is becoming, like oil, the basis for the survival and development of the information industry in the Internet age.
The strategicization of data means that the importance and influence of data are increasingly expanding beyond the scope of the information industry. Penetrating into various fields of strategy and strategy has become the focus, core, and key to the strategic competition of countries in the Internet age. In the Internet age, including the state actors, the focus of diversified competition in cyberspace is to first effectively control key data resources; second is to continuously strengthen and improve the ability to use data resources to dig out and use this capability directly. It has affected the growth and decline of the country’s overall strength in the era of the Internet, and has affected the state’s maintenance of its own survival—security, promotion of economic prosperity, and improvement or expansion of its position in the international system and its influence.
The major global countries have already deployed and formed a comparatively systematic cyberspace security strategy. This strategy can be roughly divided into three categories:
The first category is a hegemonic strategy represented by the cyberspace security strategy of the United States. The core task of this strategy is to ensure effective control over data resources, gain freedom of action on this basis, shape the norms of global cyberspace behavior, and effectively suppress opponents' freedom of action. In terms of data resources, this strategy requires the realization of de facto hegemony control over key data resources and retains the freedom of action to afloat against asymmetrically using force on cybersecurity-related issues.
The second category is a countermeasure strategy represented by Russia’s cyberspace security strategy. The core goal of this strategy is to counter the U.S. cyber hegemony strategy and use relatively independent strategic cognitions and concept-knowledge systems to seek freedom of cyberspace operations that are free from American hegemony constraints. The basic requirement of such a strategy for data resources is to realize the sovereign control of relevant data resources, and to balance the freedom of movement of hegemonic countries in the process of establishing global cyberspace order and behavioral norms.
The third category is a participatory strategy represented by cyberspace security strategies in Germany, France, the United Kingdom, and Singapore. The core of this strategy is to find a balanced position between the two, and to promote and secure its own network security in a way that is more in line with the overall development trend of the global cyberspace and internal special needs. This kind of strategy requires the data resources to achieve effective international condominium management, and can truly realize a multi-stakeholder governance model including state actors, while respecting and safeguarding the basic sovereign rights and interests of the relevant countries.
Judging from the above-mentioned major areas of different strategic competition and the focal points, it can generally be seen as a strategic game centered around the control of the global cyberspace data link.
The global network spatial data link is the concept of the reference value chain, and the entire process of data production, flow, exchange, and use in the era of big data is the object of observation and the cognitive concept formed. The starting point of the data link originates from the generation, perception and collection of data, and ends with the mining, analysis, use, and feedback of data. The middle of the data link is data storage, flow, exchange, and distribution. These links and processes are integrated in the relatively complete structure of network space hardware infrastructure, operating systems, applications, and communication links.
The data flowing in the data chain includes content data and metadata, including the data collected by the user or the collection terminal, including the data generated by the system during processing. One of the most recent features of the strategic game in which cyberspace develops around data resources is that the strategic value of metadata has become increasingly prominent. Based on the analysis of network situational awareness and behaviors that effectively analyzes metadata, it has become an important part of ****. A notable feature of the surveillance implemented by the US government in the prism system is that it is highly dependent on the analysis of metadata, rather than relying on interception and acquisition of content data based on cryptanalysis in the traditional sense. . This creates a new game environment, and it also gives new offensive and defensive capabilities a new strategic significance and value.
The focus of cyber security competition lies in the extent to which different types of actors implement effective control over the key nodes of the data link. The control here encompasses different aspects from perception to analysis to application. The main points of competition among different actors in cyberspace are the ability to effectively control relevant data resources at different stages, including the ability to acquire, analyze, and use data according to their own interests. The American prism system shows this ability.
In this new situation of international competition, the main challenge facing the country is the balance of technology, resources, capabilities, ideas and systems. The result of this equilibrium is that it hopes to obtain effective protection at affordable costs. , and the data resources needed to achieve national development. This objectively requires the establishment of a corresponding national cyber security strategy, shaping the corresponding capabilities and launching related actions centered on the need to effectively control the core of competitive data resources.
For China, one of the most important strategic tasks in the next three to five years is to rapidly upgrade its own cyber security capabilities and create a favorable global cyberspace environment. If we can achieve this goal, it means that China can successfully transform itself from a large network of countries into an Internet power, and contribute its own strength to the construction of a new global cyberspace order. (The author of this article is: Associate Professor Shen Yi, School of International Relations and Public Affairs, Fudan University)
Product name Zinc Phosphate
CAS No 7779-90-0
EC No 231-944-3
Chemical formula Zn3(PO4)2.2H2O
Appearance White Powder
Storage Keep the product in a tightly closed container ,Isolate form any source of heat or ignition and moisture
Packing unit 25kg Poly Propylene bag & 500kg Poly Propylene bag,
Any size customers want.
Application Material for anti-corrosion paint used in container,
Ship and steel structures .Electronic materials
Goods characteristics White Powder.
Soluble in acid or alkali solution ,insoluble in water or alcohol.
CHEMICAL ANALYSIS
★ Product grade: Zn 50.5-52%
TEST ITEM |
UNIT |
REQUIREMENT |
Whiteness |
% |
80-90 |
Zn |
wt.% |
50.5-52 |
PO4 |
wt.% |
20-30 |
Moisture |
wt.% |
Max1.0 |
Oil absorption |
ml/100g |
25-35 |
The PH Value |
- |
6-8 |
Residue on sieve (325mesh) |
wt.% |
Max0.5 |
Mean Particle Size |
μm |
44 |
50.5% Zinc Content Zinc Phosphate
50.5% Zinc Phosphate, Anticorrosive Paint 50.5% Zinc Phosphate
shijiazhuang city xinsheng chemical co.,ltd , https://www.xsphos.com