Joke Collection Website - Blessing messages - Grade protection evaluation grade protection ddos

Grade protection evaluation grade protection ddos

221 major event to protect network security?

data leakage event?

It is suspected that more than 2 million domestic personal information is being peddled in foreign secret forums

On January 5th, foreign security research team Cyble found that several posts were selling personal data related to China citizens, which may come from Weibo, QQ and other social media after analysis. The total number of records related to China citizens in several posts found this time exceeded 2 million.

The first case of personal information protection in China was pronounced

On January 8, Hangzhou Internet Court publicly tried and pronounced the first case of personal information protection in China. Defendant Sun bought and sold more than 4, pieces of personal information openly and illegally on the Internet without the permission of others, which led to the risk of infringement of relevant personnel's information for a long time. He was sentenced to compensate the illegal income of 34, yuan and publicly apologized.

There are as many as 16.79 million suspected data leaks in a domestic bank

On January 8th, someone posted and sold 16.79 million data of a domestic bank in a foreign forum, and released some data samples, including name, gender, card number, ID number, mobile phone number, city, contact address, work unit, postal code, work phone number, home phone number, card type, card issuing bank and so on.

Online lending companies were fined 3.2 million yuan for infringing personal information

On January 15th, China Judgment Document Network published a judgment, in which Beijing Zhizhi Company and Xian Moumou sold personal information including names, ID numbers and mobile phone numbers to many downstream companies without the consent of the victims, and were fined 3.2 million yuan for committing the crime of infringing citizens' personal information. Buying a house involves many well-known companies such as Ping An Pratt & Whitney, Paipai Loan, You and I Loan.

3 people in Danyang, Zhenjiang made a profit of more than 8 million by selling 6 million pieces of personal information

On January 24th, Zhenjiang Danyang police cracked a case of infringing citizens' personal information supervised by the Ministry of Public Security, involving more than 1 provinces and cities, and arrested 3 suspects. The gang used overseas chat tools and blockchain virtual currency to collect and pay, * * * sold more than 6 million pieces of personal information, and the illegal income was more than 8 million yuan.

CCTV revealed that the recording continued after App eavesdropped on private voice

On January 31st, a CCTV program specialist simulated "App eavesdropping test program" to send a 2-second voice. When the hand was released, the recording continued and a 12-second voice was generated, which proved that eavesdropping was possible when the test program was put in the foreground. In addition, after comparative experiments, it is found that the recording can still last for a period of time when the test program is back to the background or the screen of the mobile phone is locked.

Xishanju's Xiaoyao.com was attacked, resulting in data leakage

On March 2, Xishanju Games announced that Xishanju's products were repeatedly attacked by criminals' DDos and invaded by servers, which led to the leakage of some user accounts and encrypted plaintext passwords. The official suggested that the short password with low security level should be modified as soon as possible.

Judgment on the first case of obtaining personal information by using WeChat powder cleaning software in China

On March 3, Nantong Tongzhou Public Security Bureau pronounced a judgment on the first case of illegally obtaining WeChat user information by using WeChat powder cleaning software in China. The victim user scanned the "clear powder" QR code in order to "slim down" the WeChat address book, but his personal information was leaked. Eight defendants made illegal profits of more than 2 million yuan by brushing reading and selling WeChat group chat QR codes.

315 exposes chaos such as face information abuse and resume disclosure

On March 15th, CCTV 315 exposed three cases involving personal information security: merchants installed cameras to capture and record customers' face information, and multiple stores shared it and made comprehensive quotations; The resumes of platforms such as Zhaopin recruitment and hunting can be downloaded at will, and a large number of resumes flow into the black market; Many mobile phone cleaning apps developed for the elderly constantly obtain mobile phone information in the background and push content with deceptive routines.

CITIC Bank was fined 4.5 million yuan for leaking customer information

On March 19th, the ticket issued by China Banking and Insurance Regulatory Commission Consumer Protection Bureau showed that CITIC Bank was fined 4.5 million yuan. It is reported that the ticket is suspected to be in May 22, and the talk show artist Chi reported the punishment result of CITIC Bank's illegal provision of its bank flow information.

network attack

many industries were infected with incaseformat virus

On January 13th, many domestic security vendors detected a large-scale outbreak of the worm incaseformat in China, involving many industries such as government, medical care, education and operators, and most of the infected hosts were financial management-related application systems. The infected host shows that all non-system partition files are deleted, causing irreparable losses to users.

SMS phishing attacks against rural credit cooperatives and city commercial banks

Since the Spring Festival, there have been a series of security incidents in many cities across the country, in which customers are tricked into clicking on the links of phishing websites and stealing funds on the grounds that mobile banking is invalid or expired. Sky Youmeng found that a large number of phishing websites were registered and put into use one after another after February 9. The domain names of phishing websites are customer service phone numbers+letters of financial institutions such as rural credit cooperatives and city commercial banks, or domain names similar to those of financial institutions, and most of them are registered and hosted by overseas domain name registrars.

DDoS attacks surged during the Spring Festival

On February 22nd, Chianxin xi he Lab released a report on DDoS attacks during the Spring Festival. The report showed that during the Spring Festival, Chianxin Star Track DDoS observation system observed a total of 65,912 reflected and amplified DDoS attacks, involving IP5796 attacked IPs. Compared with the week before the Spring Festival, the number of DDoS attacks increased by about 25%, and the number of attacked IP increased by 37%.

special rectification actions of p>App infringing on users' rights and interests?

in view of the problem that App infringes on users' privacy and safety, the Ministry of Industry and Information Technology has established a national App technology testing platform to conduct technical testing on popular apps on the shelves in China. If the App does not meet the requirements, it will be required to rectify it first. Apps that still fail to pass or fail to rectify as required after rectification will be directly removed from the shelves.

On January 19th, the Ministry of Industry and Information Technology removed 12 apps, including Xuebao and Red Live, which involved illegal collection of user information, excessive demand for user rights, deception and misleading users to download. (On December 21, 22, the Ministry of Industry and Information Technology notified 63 illegal apps, and 12 of them failed to complete the rectification as required)

On January 22, the Ministry of Industry and Information Technology notified the first batch of 157 apps infringing on users' rights and interests in 221, including Mango TV, Yonghui Life, Zanthoxylum bungeanum, etc., which involved illegal collection of personal information, forcing users to ask for permission frequently and forcing users to use directional push. On February 3, the Ministry of Industry and Information Technology removed 37 apps that had not been rectified, including Yilong Hotel, Dongfeng Travel and Yiqixiu.

On February 5th, the Ministry of Industry and Information Technology reported that the second batch of 26 apps in 221 were in violation of regulations, including QQ input method, UC browser, ink weather, etc., involving illegal collection of personal information, excessive request for permission, deception and misleading users to download, etc. On February 1th, 1 apps that were not rectified were removed from the shelves, including Xiao Zhi's classmate, sound bar and kk keyboard.

On March 12th, the Ministry of Industry and Information Technology notified the third batch of 136 apps infringing on users' rights and interests in 221, including Cheetah Cleanup Master, Yuepao Circle, Tianya Community, etc., which involved frequent self-activation and associated activation, illegal collection and use of personal information and other issues.

on March 16th, the Ministry of industry and information technology severely investigated and dealt with the violation of "APP illegally collects personal information of the elderly" exposed at the 315th party, and asked the major application stores to remove four apps, namely, memory optimization master, smart cleaning master, super cleaning master and mobile phone housekeeper pro.

what does p>ddos mean?

the full name of p>DDOS is DistributedDenialofservice, commonly known as flood attack. Many DOS attack sources attack a server together to form a DDOS attack. The earliest DDOS attack can be traced back to 1996, and it began to appear frequently in China in 22, and began to take shape in 23.

—— The p>DDoS attack method quoted above from the interactive encyclopedia

is a kind of attack method based on the traditional DoS attack. A single DoS attack is generally one-to-one, and its effect is obvious when the target CPU speed is low, memory is small or network bandwidth is small.

With the development of computer and network technology, the processing capacity of computers has increased rapidly, and the memory has increased greatly. At the same time, gigabit networks have appeared, which makes the difficulty of DoS attacks more difficult-the target's "digestion ability" for malicious attack packages has been strengthened a lot.

For example, your attack software can send 3, attack packets per second, but my host and network bandwidth can handle 1, attack packets per second, so the attack will have no effect.

at this time, distributed denial of service attack (DDoS) came into being. If you understand the DoS attack, its principle is very simple.

if the processing power of computers and networks has increased by 1 times, and it is no longer effective to attack with one attack plane, what if the attacker uses 1 attack planes at the same time? What about 1 sets? DDoS is to use more puppet planes to launch attacks and attack victims on a larger scale than before.

how to defend the board game against DDOS attacks?

1. regular scanning: it is necessary to scan the existing network master nodes regularly, check the possible security vulnerabilities, and clean up the new vulnerabilities in time.

2. The computers of backbone nodes are the best places for hackers to use because of their high bandwidth, so it is very important to strengthen the host security of these hosts. Moreover, all the computers connected to the main nodes of the network are server-level computers, so it is more important to scan vulnerabilities regularly.

3. Configure professional anti-denial-of-service equipment at the backbone nodes. The anti-denial-of-service equipment is designed to protect your website, information platform and Internet-based services from attacks and destruction by people with ulterior motives.

what are p>esc resources?

is a cloud server product launched by Alibaba Cloud.

ECS (elastic computing service) is a flexible and scalable cloud computing service, which can help you reduce IT costs, improve operation and maintenance efficiency, and make you more focused on core business innovation.

single instance availability reaches 99.975%, multi-instance availability reaches 99.995%, and cloud disk reliability reaches 99.9999999%, which can realize automatic downtime migration and snapshot backup.

it supports the creation of 1, instances per minute, and various flexible payment options are more suitable for the business status, and at the same time, it brings flexible capacity expansion. Instances and bandwidth can be increased and decreased at any time, and the cloud disk can be expanded.

provide services such as DDoS protection, Trojan horse killing, and anti-violence cracking free of charge. ECS cloud disk supports data encryption function through multi-party international security certification.

a single instance can choose up to 128vCPU, with 1TB of memory, up to 24 million PPS network first packet and 8Gbps bandwidth.

rich operating systems and application software can be easily deployed with one click through mirroring, and the same mirroring can quickly replicate the environment in multiple ECS and easily expand.

ECS can seamlessly connect with various cloud products in Alibaba Cloud, and provide complete computing, storage, security and other solutions for business development.

what product forms does cloud server ecs support?

a: the products supported by cloud server ecs are cloud server products launched by Alibaba Cloud. ECS (Elastic Computing Service) is a flexible and scalable cloud computing service, which can help you reduce IT costs, improve operation and maintenance efficiency, and make you more focused on core business innovation.

single instance availability reaches 99.975%, multi-instance availability reaches 99.995%, and cloud disk reliability reaches 99.9999999%, which can realize automatic downtime migration and snapshot backup.

it supports the creation of 1, instances per minute, and various flexible payment options are more suitable for the business status, and at the same time, it brings flexible capacity expansion. Instances and bandwidth can be increased and decreased at any time, and the cloud disk can be expanded.

provide services such as DDoS protection, Trojan horse killing, and anti-violence cracking free of charge. ECS cloud disk supports data encryption function through multi-party international security certification.