Joke Collection Website - Blessing messages - The closing message of educational institutions ddos of educational institutions
The closing message of educational institutions ddos of educational institutions
What are the safe words for internet tuning?
acceptableuseofcomputers defines what behavior is acceptable on an organization's computer system
accessattack The behavior of an intruder trying to gain unauthorized access to information
accountability An organization is used to take responsibility for individual activities. Or the process of assigning responsibility for the activities occurring in the information system
Address Resolution Protocol (ARP) spoofing (address resolution protocol spoofing) forges the MAC address of a certain system, Make the policy
administrativepractices to which the data packet is sent differ in policies, processes, resources, responsibilities, Behaviors within the scope of education and emergency plan
agents (subject) People or organizations that cause security threats
anomaly (abnormal) Out of normal or unexpected situations
Anti-malware system (anti-malware system) is designed to detect and remove malware
applicationlayerfirewall (application layer firewall) is replaced by application layer. Firewall for enforcing policy rules
AdvancedPersistentThreat(APT) (1) Carefully designed fixed-point attacks carried out by effectively using threat ecosystem. (2) With the support of well-organized, well-funded and motivated criminals, attackers use a large number of infection vectors and malware technologies to successfully destroy a long-term attack on a system. (3) Usually, the attacker is a hacker or hacker group with a lot of resources to attack an organization. APT may use day vulnerability to destroy the system in an attempt to manipulate and use the system for a certain period of time
audit (1) A formal check to determine whether a policy is compliant, which is usually performed by an internal auditor or an independent third party of a company or organization. (2) The function provided by the operating system provides administrators with the historical records of events and activities in the information system for future reference.
availability (availability) The availability of information when the licensor needs it. Usability can be measured by the percentage of time that an authorized website can use information. For example, a business website will strive for more than 99% availability.
backup is a copy of key information in case of system crash or disaster.
backuppolicy is a strategy to describe how the backup operation is carried out in an organization.
BalancedScorecard(BSC) uses key non-financial performance indicators to enrich the performance measurement framework of traditional financial performance indicators, providing a more balanced observation of organizational performance. Developed by Dr. RobertKaplan and Dr. DavidNorton of Harvard Business School in 199s.
bestpractices (best practices) some general suggestions to provide an appropriate level of security. The combination of these practices has proved to be the most effective
blackswanevent in many organizations, which is almost impossible to happen, so it is likely to be at the bottom of the priority list.
the process of p>bootstrapping P2P clients to join P2P networks
the abbreviation of bot (robot program) is used to represent an automatic program that can perform tasks without user intervention
a component of p>botagent that directly communicates with command and control channels
botnet (botnet) is a network composed of a large number of infected computers. It can be remotely controlled by attackers to execute malicious instructions, such as transmitting stolen information, sending spam or launching distributed denial of service (DDoS) attacks. Essentially, botnets are a group of infected machines controlled and managed by hackers, fraudsters or cyber criminals.
data leakage event?
It is suspected that more than 2 million domestic personal information is being peddled in foreign secret forums
On January 5th, foreign security research team Cyble found that several posts were selling personal data related to China citizens, which may come from Weibo, QQ and other social media after analysis. The total number of records related to China citizens in several posts found this time exceeded 2 million.
The first case of personal information protection in China was pronounced
On January 8, Hangzhou Internet Court publicly tried and pronounced the first case of personal information protection in China. Defendant Sun bought and sold more than 4, pieces of personal information openly and illegally on the Internet without the permission of others, which led to the risk of infringement of relevant personnel's information for a long time. He was sentenced to compensate the illegal income of 34, yuan and publicly apologized.
There are as many as 16.79 million suspected data leaks in a domestic bank
On January 8th, someone posted and sold 16.79 million data of a domestic bank in a foreign forum, and released some data samples, including name, gender, card number, ID number, mobile phone number, city, contact address, work unit, postal code, work phone number, home phone number, card type, card issuing bank and so on.
Online lending companies were fined 3.2 million yuan for infringing personal information
On January 15th, China Judgment Document Network published a judgment, in which Beijing Zhizhi Company and Xian Moumou sold personal information including names, ID numbers and mobile phone numbers to many downstream companies without the consent of the victims, and were fined 3.2 million yuan for committing the crime of infringing citizens' personal information. Buying a house involves many well-known companies such as Ping An Pratt & Whitney, Paipai Loan, You and I Loan.
3 people in Danyang, Zhenjiang made a profit of more than 8 million by selling 6 million pieces of personal information
On January 24th, Zhenjiang Danyang police cracked a case of infringing citizens' personal information supervised by the Ministry of Public Security, involving more than 1 provinces and cities, and arrested 3 suspects. The gang used overseas chat tools and blockchain virtual currency to collect and pay, * * * sold more than 6 million pieces of personal information, and the illegal income was more than 8 million yuan.
CCTV revealed that the recording continued after App eavesdropped on private voice
On January 31st, a CCTV program specialist simulated "App eavesdropping test program" to send a 2-second voice. When the hand was released, the recording continued and a 12-second voice was generated, which proved that eavesdropping was possible when the test program was put in the foreground. In addition, after comparative experiments, it is found that the recording can still last for a period of time when the test program is back to the background or the screen of the mobile phone is locked.
Xishanju's Xiaoyao.com was attacked, resulting in data leakage
On March 2, Xishanju Games announced that Xishanju's products were repeatedly attacked by criminals' DDos and invaded by servers, which led to the leakage of some user accounts and encrypted plaintext passwords. The official suggested that the short password with low security level should be modified as soon as possible.
Judgment on the first case of obtaining personal information by using WeChat powder cleaning software in China
On March 3, Nantong Tongzhou Public Security Bureau pronounced a judgment on the first case of illegally obtaining WeChat user information by using WeChat powder cleaning software in China. The victim user scanned the "clear powder" QR code in order to "slim down" the WeChat address book, but his personal information was leaked. Eight defendants made illegal profits of more than 2 million yuan by brushing reading and selling WeChat group chat QR codes.
315 exposes chaos such as face information abuse and resume disclosure
On March 15th, CCTV 315 exposed three cases involving personal information security: merchants installed cameras to capture and record customers' face information, and multiple stores shared it and made comprehensive quotations; The resumes of platforms such as Zhaopin recruitment and hunting can be downloaded at will, and a large number of resumes flow into the black market; Many mobile phone cleaning apps developed for the elderly constantly obtain mobile phone information in the background and push content with deceptive routines.
CITIC Bank was fined 4.5 million yuan for leaking customer information
On March 19th, the ticket issued by China Banking and Insurance Regulatory Commission Consumer Protection Bureau showed that CITIC Bank was fined 4.5 million yuan. It is reported that the ticket is suspected to be in May 22, and the talk show artist Chi reported the punishment result of CITIC Bank's illegal provision of its bank flow information.
network attack
many industries were infected with incaseformat virus
On January 13th, many domestic security vendors detected that the worm incaseformat broke out in a large scale in China, involving government, medical care, education, operators and other industries, and most of the infected hosts were financial management-related application systems. The infected host shows that all non-system partition files are deleted, causing irreparable losses to users.
SMS phishing attacks against rural credit cooperatives and city commercial banks
Since the Spring Festival, there have been a series of security incidents in many cities across the country, in which customers are tricked into clicking on the links of phishing websites and stealing funds on the grounds that mobile banking is invalid or expired. Sky Youmeng found that a large number of phishing websites were registered and put into use one after another after February 9. The domain names of phishing websites are customer service phone numbers+letters of financial institutions such as rural credit cooperatives and city commercial banks, or domain names similar to those of financial institutions, and most of them are registered and hosted by overseas domain name registrars.
DDoS attacks surged during the Spring Festival
On February 22nd, Chianxin xi he Lab released a report on DDoS attacks during the Spring Festival. The report showed that during the Spring Festival, Chianxin Star Track DDoS observation system observed a total of 65,912 reflected and amplified DDoS attacks, involving IP5796 attacked IPs. Compared with the week before the Spring Festival, the number of DDoS attacks increased by about 25%, and the number of attacked IP increased by 37%.
special rectification actions of p>App infringing on users' rights and interests?
in view of the problem that App infringes on users' privacy and safety, the Ministry of Industry and Information Technology has established a national App technology testing platform to conduct technical testing on popular apps on the shelves in China. If the App does not meet the requirements, it will be required to rectify it first. Apps that still fail to pass or fail to rectify as required after rectification will be directly removed from the shelves.
On January 19th, the Ministry of Industry and Information Technology removed 12 apps, including Xuebao and Red Live, which involved illegal collection of user information, excessive demand for user rights, deception and misleading users to download. (On December 21, 22, the Ministry of Industry and Information Technology notified 63 illegal apps, and 12 of them failed to complete the rectification as required)
On January 22, the Ministry of Industry and Information Technology notified the first batch of 157 apps infringing on users' rights and interests in 221, including Mango TV, Yonghui Life, Zanthoxylum bungeanum, etc., which involved illegal collection of personal information, forcing users to ask for permission frequently and forcing users to use directional push. On February 3, the Ministry of Industry and Information Technology removed 37 apps that had not been rectified, including Yilong Hotel, Dongfeng Travel and Yiqixiu.
On February 5th, the Ministry of Industry and Information Technology reported that the second batch of 26 apps in 221 were in violation of regulations, including QQ input method, UC browser, ink weather, etc., involving illegal collection of personal information, excessive request for permission, deception and misleading users to download, etc. On February 1th, 1 apps that were not rectified were removed from the shelves, including Xiao Zhi's classmate, sound bar and kk keyboard.
On March 12th, the Ministry of Industry and Information Technology notified the third batch of 136 apps infringing on users' rights and interests in 221, including Cheetah Cleanup Master, Yuepao Circle, Tianya Community, etc., which involved frequent self-activation and associated activation, illegal collection and use of personal information and other issues.
on March 16th, the Ministry of industry and information technology severely investigated and dealt with the violation of "APP illegally collects personal information of the elderly" exposed at the 315th party, and asked the major application stores to remove four apps, namely, memory optimization master, smart cleaning master, super cleaning master and mobile phone housekeeper pro.
- Related articles
- Is there any SMS prompt for atm transfer?
- Official entrance of Zhangjiajie vehicle violation inquiry system
- What do you mean, don't disturb me a little?
- Did you really get the text message from the co-debtor?
- Wechat has no mobile phone number. How can I see the itinerary?
- How to transfer to the glory of the king?
- How to use beautiful countryside traffic packet?
- Received a short message from Taobao about 4 packs of paper towels.
- New Year greetings to teachers
- How to cancel the third message of vaccine?