top of page
Writer's picture秘書處

Qi'anxin Appears in the 16th National College Student Information Security Competition Innovation..

Updated: Aug 24, 2023

Qi'anxin Appears in the 16th National College Student Information Security Competition Innovation and Practice Ability Competition.


On July 24-26, the "16th National College Student Information Security Competition Innovation and Practice Ability Competition" hosted by the Teaching Steering Committee of Network Space Security Majors of Higher Education Institutions under the Ministry of Education was successfully held in Hefei. Dr. Feng Shaodong, Vice Chief Engineer of Qihoo 360, was invited to attend and delivered a keynote speech on "Analysis of the Network Space Security Situation and Response Strategies"




He first analyzed the current international network security situation: the Russia-Ukraine conflict has shaped a new paradigm of multi-domain hybrid warfare in the network, psychological, and cognitive fields. At the same time, the United States has conducted three "hunt forward" operations in Ukraine, Lithuania, and Croatia, respectively, around the Russia-Ukraine conflict, and the activities of network space confrontation have become more intense.


In December of last year, the US military issued a new version of the Network Space Operations doctrine, which clearly defined a combat style called "Expeditionary Network Space Operations," mainly aimed at carrying out operational actions on target countries' physically isolated networks. This marks a richer style of US military network space operations and means that methods of securing network security through physical isolation will face greater challenges.



The current cyberspace is facing various security threats such as supply chain attacks, ransomware attacks, and APT attacks, which have caused significant impacts on political, economic, and social stability. First, they cause damage to critical infrastructure such as urban rail transit and gas pipelines, affecting people's livelihoods and social stability. Second, they target enterprises for network extortion, causing significant economic losses. Third, they attack medical or water supply systems, threatening public safety. Fourth, they cause negative political impacts by monitoring national leaders or intervening in elections.


In the face of multiple network security risks and threats, it is necessary to use technological innovation as a driving force to carry out the construction of an endogenous security system, including: first, using artificial intelligence technology for malicious traffic detection and malicious sample analysis. Second, using big data analysis technology for network security situation awareness, advanced network threat detection, and high-risk security event analysis and judgment. Third, using zero-trust technology to achieve the construction of a cyberspace trust system, intelligent access subject trust evaluation, and so on.


Driven by new technologies, Qihoo 360 has built a complete set of network security products and services. In terms of products, they are categorized according to the sliding ruler model as infrastructure security, depth defense, active defense, threat intelligence, and other categories, covering various fields such as terminals, networks, clouds, data, and industrial control. Combined with security services such as consulting planning, security training, security testing, and emergency response, they jointly build security capabilities for endogenous security's practical operation in a "product + service + new technology" manner.

bottom of page