总体国家安全观视域下的算力安全治理研究

Computing power security governance from perspective of overall national security concept
作者
        李辉(中国人民公安大学 公安管理学院 北京 100038)
        王娜(中国人民公安大学 公安管理学院 北京 100038)
        王龙*(中国人民公安大学 公安管理学院 北京 100038)
中文关键词
         总体国家安全观;算力;安全治理
英文关键词
        overall national security concept;computing power;security governance
中文摘要
        当前,在算力技术获得快速发展、算力应用不断涌现拓展的同时,各类算力安全事件也频频发生,这意味着算力安全作为一种新兴安全已然成为影响国家安全的关键场域。加强算力安全治理成为国家安全治理和治理能力现代化建设的重要内容。为明晰算力安全治理的理论内涵、风险表征及治理路径,文章以总体国家安全观为指导,以“议题识别—风险解构—治理回应”为逻辑指引,对算力安全治理的概念内涵及驱动逻辑进行解析;基于大安全理念系统考量算力形成过程的前端环节、保障环节和落地环节,剖析来自算料输入、算法嵌入、底座支撑、应用落地等方面的不确定性风险;在治理回应方面,重点是以统筹发展和安全的理念明确算力安全治理的战略布局,以前瞻性治理、精细化治理和适应性治理寻求破解算力安全难题之道。
英文摘要
        Currently, with the rapid development of computing technology and the continuous expansion of computing applications, various types of computing security incidents occur frequently. As an emerging security issue, computing security has become a key fact affecting national security. Strengthening the governance of computing power security has become an important part of the modernization of the national security governance system and governance capacity in China. To clarify the theoretical connotation, risk manifestations, and governance strategies of computing power security governance, this study takes the overall national security concept as guidance and the logical guidance of "issue identification-risk deconstruction-governance response" to analyze the conceptual connotation and driving logic of computing power security governance. Based on the concept of big security, this study systematically analyzes the front-end, guarantee, and implementation processes of computing power formation, and analyzes the uncertainty risks from data input, algorithm embedding, base support, application implementation, and other aspects. In terms of governance response, the study suggests to clarify the strategic layout of computing power security governance under the concept of coordinating security and development, and seek governance strategies for computing power security through forward-looking governance, refined governance, and adaptive governance.
DOI10.16418/j.issn.1000-3045.20241024003
微信关注公众号