
The National Natural Science Foundation of China (hereinafter referred to as the Natural Science Foundation of China) is responsible for effectively utilizing the National Natural Science Foundation of China, supporting basic research, adhering to free exploration, playing a guiding role, and discovering and cultivating science and technology in accordance with the national guidelines, policies and plans for the promotion of scientific and technological progress and coordinated economic and social development.With the continuous development of new productive forces represented by information technology, the Natural Science Foundation of China has been committed to promoting the informatization and intelligence of fund management.With the increasing complexity of business types, various types of network attacks, such as information leakage attacks, are encountered in the construction of informatization and make network security face severe challenges.The network security construction of the Natural Science Foundation of China was took as the main line and the network security construction of the existing platform was introduced.At present, a network security system structure with the science fund project management as the core has been established to ensure the safe and stable operation of the network system.The main information systems of the Natural Science Foundation of China (Natural Science Foundation Shared Service Network, business department website, email system) and its main threats were analyzed and introduced.Then the thoughts and suggestions in the follow-up informatization and network security construction were given.The Natural Science Foundation of China will start the construction of a new generation of secure network.Under the premise of fully considering the characteristics of science fund review, management, and open sharing, it will achieve the overall goal of “smarter, safer, and better” and carry out network security system construction for relevant units.
natural science fund, big data, information construction, Electronic computers. Computer science, network security, QA75.5-76.95
natural science fund, big data, information construction, Electronic computers. Computer science, network security, QA75.5-76.95
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
