What are the problems in the information security management mechanism of e-government?

Information security of e-government in China

1, legal issues

Although in recent years, China has issued a series of laws and regulations related to network information security, and achieved certain results, but this

Some laws and regulations have not yet formed a system. With the development of information technology, the problem of information security has become more and more complicated, and the existing legal framework of information security has been difficult to meet the development needs of e-government informatization model. Therefore, it is a very urgent task to speed up the construction of e-government information laws and regulations.

2. Technical problems

(1) The network security planning and network structure are unreasonable.

Due to the imperfect development of information technology, China's e-government network construction often lacks forward-looking security planning, such as the lack of unified planning of IP addresses, poor controllability of broadcast traffic, poor fault isolation of subnets, lack of bandwidth management of important traffic and priority guarantee of service quality.

(2) The technical personnel of e-government informatization construction are relatively lacking, and the technical quality is not too hard.

Compared with developed countries, there is a big gap in information equipment and information technology in China's informatization construction, and the training of technicians is relatively insufficient. The core equipment of informatization relies heavily on foreign countries, and it lacks necessary information management and technical transformation for imported technologies and equipment. Especially in the research and application of system security and security protocols, there is a big gap with developed countries. (3) Unscientific network technology and network settings have caused a lot of network security risks.

The characteristics of e-government itself determine that it is easy to incur various attacks from outside or inside. At the same time, the networked government office has led to the enhancement of government work's dependence on the network, and dependence will inevitably lead to vulnerability, including technical and social vulnerability.

Fragility, the fragility of human nature and so on. Due to the immature network technology and unscientific network setup, most of the systems used in e-government at present have security weaknesses or hidden dangers, including the weaknesses of network hardware devices and operating platforms. E-government relies on the Internet to a great extent, and the global and open nature of the Internet not only provides us with great convenience, but also brings great threats to information security, which requires us to make efforts to use advanced network technology to reduce or eliminate these threats.

3. Management issues

(1) government workers have outdated concepts and weak safety awareness.

China's e-government construction has a low starting point, a short time and is still immature. For decades, government workers have been accustomed to manual work, not easy to adapt to information office, have no correct understanding of e-government, and still retain outdated management concepts. In addition, for staff, there are still many cognitive blind spots and constraints in the security of e-government information. Network is a new thing. Many people are busy using it for study, work and entertainment as soon as they come into contact with it. They have no time to care about the security of network information, their security awareness is quite weak, and they don't know enough about the fact that network information is unsafe. Although the government has taken many measures to improve the safety awareness of employees, the effect is not very satisfactory.

(2) The management system problems are prominent, the network security management is chaotic, and the standardized management system is relatively backward, resulting in many management security loopholes.

For a long time, in order to ensure information security, governments at all levels have only taken corresponding technical safeguard measures, neglected the more important management system construction, failed to implement the "soft measures" to ensure the security of e-government, failed to implement the security responsibility system from the management system, and failed to establish a complete information security management and certification mechanism. This makes the e-government system have many management security loopholes, and it is difficult to achieve unified coordination of security management. Once a safety accident occurs, the fault location is inaccurate, the source of the accident is difficult to trace, and the responsibility problem is unclear, which leads to more serious destructive consequences.