Joke Collection Website - Blessing messages - Who are the five major network security "night watchmen"?
Who are the five major network security "night watchmen"?
September 17th, title: We have just found the five major network security "night watchmen"
As our wallets, cars, refrigerators, TVs, and speakers are all connected With the advent of the Internet, data security has become a 24-hour "offensive and defensive battle." Unsafe factors such as telecommunications fraud and Trojan viruses are like the "White Walkers" in the TV series "Game of Thrones", and security experts are the "night watchmen" of information. During the 2017 National Cyber ??Security Awareness Week held here, these "night watchmen" came to the stage to let us truly feel the thrill of this battle.
——"Live for a long time": Intelligent robots can also prevent fraud
A viewer stood in the Alibaba security technology experience area and gave instructions to the intelligent robot "Tmall Elf" : "Tmall Elf, help me check the number." "Please tell me the number you want to check." The audience then reported a strange phone call they had received. Tmall Elf quickly recognized and reported, "Money The Shield APP told me that this is a scam call, please do not make or answer it."
"I didn't expect it to be able to identify it. It's really interesting and practical," said an audience member at the scene. The cat spirit said after telling jokes, preventing fraud and other functions. The experience area was crowded with people queuing up, looking forward to entering the narrow glass room and having a close encounter with the intelligent anti-fraud robot.
The robot can prevent fraud by injecting the fraud interception technology of the Qiandun Anti-Fraud Platform of the State Council Office of the Inter-ministerial Joint Conference on Combating New Illegal Crimes in Telecom Networks (hereinafter referred to as the "Joint Office of the State Council") into the robot. It has a pair of "fierce eyes" that can identify fraudulent numbers and provides the latest anti-fraud reminders. Qiandun security expert Shen Jie said that in order to deal with the constantly "escalating" fraud methods, the Qiandun anti-fraud platform combines fraud interception technology with artificial intelligence for the first time to help people improve their awareness of fraud prevention.
Not only that, this robot can also understand Mandarin Chinese voice commands. Imagine that you only need to shout out the instructions to be executed to an intelligent robot at home, and it can automatically turn on the lights, turn on the TV, adjust the air conditioning temperature, and even shop at Tmall Supermarket, order takeout, send express delivery, play games and Listen to the joke, how fun would such a life be?
——“Black technology”: Quantum communication that “cannot be decrypted”
At the exhibition site, visitors can also have close contact with the “quantum secure communication network”. At the cooperation booth between China Telecom and HKUST Guodun Quantum Company, the reporter experienced a "confidential meeting" and said hello to the staff at the Beijing venue in real time. Although on the surface there is no difference from ordinary video conferencing, the encryption principles behind it are completely different.
He Wei, vice president of HKUST Guodun Quantum Technology Co., Ltd., told reporters that based on the characteristics of quantum "uncertainty" and "non-cloning", theoretically, quantum keys can be generated through equipment and then verified. Encrypted data transmission will not be stolen. This is very necessary for the transmission of various important data that require confidentiality. It will be widely used in important areas such as national defense, finance, government affairs, electricity, energy, transportation, telecommunications, and big data. industry.
According to reports, China Telecom has been tracking and promoting technological research and industrialization work related to quantum secure communications since 2014, and has worked closely with the quantum team of the University of Science and Technology of China. In April 2017, Shanghai Guodun Quantum Company and China Telecom Shanghai Company cooperated and have now built a financial quantum metropolitan area network of more than 1,000 kilometers in Shanghai.
As a powerful "infrastructure" for quantum communications, the "Beijing-Shanghai Main Line" project has made breakthroughs in high-speed quantum key distribution, high-speed and high-efficiency single photon detection, trusted relay transmission and large-scale quantum networks. Key technologies such as control and control were completed at the end of last year, and recently passed the general technical acceptance, building a more than 2,000-kilometer quantum secure communication backbone line connecting Beijing, Jinan, Hefei, and Shanghai.
——"Monster Mirror": Identify fraudulent phone phishing websites with one click
Always worried about your parents being scammed by phone calls? Are you still worried about the pervasiveness of phishing websites? The days of fear are coming to an end.
In this Cyber ??Security Week, as a "forethought" in combating telecom network fraud, Qiandun Anti-Fraud Platform has added a "golden bell and iron shirt" to solve rampant telecom fraud.
The reporter’s on-site experience found that as long as the mobile phone has the software installed and makes or receives a suspected fraud call, the mobile phone will remind “the Criminal Investigation Bureau of the Ministry of Public Security to alert the fraud call.” According to reports, since the system's number database can be compared in real time with the black and gray numbers of the Criminal Investigation Bureau of the Ministry of Public Security, as soon as those confirmed fraudulent numbers appear, the software will alert people as soon as possible and intercept the scammers from their mobile phones.
Not only that, with the escalation of fraud methods, many phishing links will also be "disguised" and become the content and news we click on every day, making it difficult for ordinary people to distinguish them. After installing this system, as long as there is a problem with the link clicked, the mobile phone can intercept it immediately, as if the mobile phone has been equipped with a "demon mirror".
According to reports, the Qiandun anti-fraud platform is an “anti-fraud artifact” built by the Joint Office of the State Council and provided technical support by Alibaba.
——"Famous Detective": "Eagle Eye" "prevents being cheated" through action trajectories
On June 11 this year, Mr. Zhang, who works in Tianlin area of ??Xuhui District, received A call came from an unknown person. The caller said that there was a "problem" with the postal package that Mr. Zhang did not pick up. The caller then transferred the call to the "Pudong Public Security Bureau". Mr. Zhang was told that he was "suspected of a financial fraud case" and needed to "assist in the investigation to prove his innocence." ” and avoid everyone’s “one-line contact” the next day. The next morning, the confused Mr. Zhang followed the other party's instructions and came to a hotel, and prepared to inform the other party of his bank account number.
But at the same time, the Shanghai Anti-Telecommunications Network Fraud Center Platform used Hawkeye Smart Phone Box big data analysis and other technologies to determine that Mr. Zhang is likely to become a "high-risk group" for telecommunications fraud. According to Mr. Zhang’s movement trajectory, the platform determined that he was consistent with the characteristics of being deceived, and the command center rushed to the scene in time to prevent this telecommunications fraud from occurring.
Li Xuyang, head of Tencent's security anti-fraud laboratory, told reporters that the above-mentioned "Eagle Eye Intelligent Anti-Phone Fraud Box" is one of Tencent's anti-telecom network fraud smart brain products at the expo. This "intelligent brain" is the result of research on the black industry confrontation model based on artificial intelligence technology. It will play a role in key aspects of telecommunications fraud before and during the incident, as well as case analysis.
——"Moat": The blacklist prevents harmful information from "coming ashore"
Before the information is displayed online, system policies are used to perform high-speed machine screening. A small number of systems cannot identify or The content that makes the final judgment will be pushed to manual review. At Baidu’s booth, this harmful information filtering system was very eye-catching.
On-site staff said that in the first half of this year, Baidu’s risk word blacklist has included more than 360,000 harmful information samples. It has now formed a system of actively intercepting information before display and autonomously inspecting and cleaning existing information. Closed loop, more than 86.2% of harmful information will be intercepted before going online.
Baidu’s main display this time is the “Emergency Response Center”, which can help partners establish a complete and complete security defense system. The solution includes 14 major functions covering network security monitoring, combating telecommunications fraud, and Services are widely used in various industries such as politics, finance, and medical care.
The most distinctive one is the traceability and tracking function, which can be closely integrated with telecom operators, network security and other departments to provide effective solutions to combat network fraud and other problems. On-site staff told reporters that if a pseudo base station is on a mobile WiFi car, it is difficult to catch it; now with traceability, the IP address or device code that originally sent the signal can be traced, and the final location of the address can be provided to Regulatory authorities.
- Previous article:The most classic blessing copy on the faucet
- Next article:Congratulations to the soldiers.
- Related articles
- Hebei Unicom New Year greeting SMS
- Spring Festival WeChat Good Greetings Inventory Spring Festival WeChat Greetings
- How to cancel the short message of housing provident fund
- Touching sentences love messages
- My computer is flying, and my friend sends me a message. Why can't Fetion receive it? It's always text messages.
- What format of music ringtones does iphone support?
- Is there a star coin in Polk City?
- China Construction Bank suspended the customer channel transaction, but I only used this card to repay the mortgage. Why?
- Warm and touching mother's day greetings
- How to send a message to a friend