Joke Collection Website - Blessing messages - 5 Selected 2020 Thoughts from the Same Network Security Class

5 Selected 2020 Thoughts from the Same Network Security Class

The Internet is like a big auditorium. You must be polite at all times, and you must not use foul language to insult others or make fun of others. You must also be consistent in your words and deeds, and you must not go back on your words! Let’s take a look at the same online security class 5 selected reflections after observing the class in 2020, welcome to check it out!

Same as the reflection after observing the same network security class 1

Daming often interacts with business people Contact the unit via QQ. Recently, Daming was very troubled. His QQ number was stolen, and even the QQ name was changed. The person who stole it reposted unhealthy content in the space. How the QQ number was stolen is still unclear to Daming. He only knows that his computer was infected with a virus once, and then the QQ number was stolen.

QQ number is just one aspect of personal network information security. QQ number being stolen adds trouble to us, but the loss is not very big. If a person's bank card information is stolen, the loss will be huge.

With the development of the economy, we have entered the information age. Not only is personal network information security important, but actually the information security of the unit is even more important. A drawing, a plan, and an invention are all condensed. If network security is poor and this important information is leaked or stolen, criminals will be able to take advantage of it, and individuals and organizations will suffer unnecessary losses.

The acquisition of China’s Huawei and ZTE Group in the United States was not successful because of the United States’ discrimination against Chinese companies and the United States’ considerations for its own information security. Many countries now regard information security as part of national security, and some countries have also established information security forces, which illustrates the importance of information security.

Today, when everything is networked, we should protect the network information security of individuals, organizations, and countries.

Thoughts after watching the same online security class 2

As technology becomes more and more developed, the Internet has now become an indispensable tool in life. It has become a way for us to learn knowledge and make friends. , an important platform for obtaining information, exchanging ideas, and enjoying leisure and entertainment. Some criminals use the Internet to defraud personal information and use the Internet to commit fraud. We must be vigilant and guard against being deceived.

On Friday, the teacher organized us to watch a short video on "Network Security Knowledge", and we learned a lot of knowledge. For example: In the first video, there is a sister. She saw her classmate asking her to enter her space. The sister said: "How could this stingy guy let me enter his space? Click to watch. Let's take a moment." I felt that since this sister had doubts at this time, she should call her classmate first to confirm, but she did not do so. After opening it and reading it, this sister said: "This is not his space!" Then there was a small box below, prompting: "Your QQ has been offline." This sister said: "How could my QQ be offline by itself? I'm offline. Let me log in again and try." When she logged into QQ again, she found that her QQ account had been stolen. She looked sad. This little story tells us, do not accept files from strangers at will to prevent your QQ number from being stolen due to Trojan viruses; do not disclose personal, family and friends information to strangers, and if you find that your QQ number has been stolen, you must retrieve your password as soon as possible and change it. If you cannot retrieve your password, you should promptly inform your friends on QQ.

There is also a video about a short story about a scammer using the Internet to create an ICBC account to commit fraud. The content of illegal text messages is becoming more and more tempting, making people irresistible. Some even pretend to be banks and public security agencies, pretend to be financial departments, and use people's trust in banks and public security agencies to commit fraud. deceptive. Scammers are very cunning, and we must be vigilant to avoid being deceived. First: Do not tell anyone your ID number, bank card number, or bank card password at any time, anywhere, or to anyone at the same time. Note: Never publish three numbers at the same time! Second: When you cannot distinguish the authenticity of a text message, you must call the bank’s inquiry hotline as soon as possible. Note: Do not dial the phone number left in the text message first! Third: Do not use your mobile phone to call back. It is best to call back from a landline. Fourth: For some unfamiliar text messages that cannot be identified at all, the best way is to ignore them.

Fifth: If you have been fooled, please report it immediately. Sixth: Don’t talk to strange text messages. Don’t believe, don’t be greedy, and don’t reply. This is a trick to deal with fraudulent text messages.

My friends, while we are enjoying high technology, we must also beware of scammers who use high technology to deceive us!

Thoughts after watching the same network security class 3

p>

On November 7, the 24th meeting of the Standing Committee of the 12th National People's Congress voted to pass the "Cybersecurity Law of the People's Republic of China" (hereinafter referred to as the "Cybersecurity Law"). The "Cybersecurity Law" has seven chapters and 79 articles. It is very rich in content and has six outstanding highlights. First, it clarifies the principle of cyberspace sovereignty; second, it clarifies the security obligations of network product and service providers; third, it clarifies the security obligations of network operators; fourth, it further improves personal information protection rules; fifth, it establishes key Information infrastructure security protection system; sixth, the rules for the cross-border transmission of important data of critical information infrastructure have been established.

In response to the current trend of frequent communications and information fraud, especially new Internet crimes, the "Cybersecurity Law" has added provisions for punishing Internet fraud and other new Internet crimes, that is, no individual or organization is allowed to establish a Websites and communication groups that commit fraud, teach criminal methods, produce or sell prohibited items, controlled items and other illegal and criminal activities shall not use the Internet to publish information related to committing fraud, making or selling prohibited items, controlled items and other illegal and criminal activities , and add corresponding legal responsibilities.

At present, the network security of our country’s citizens is facing an increasingly severe situation. In particular, criminals are using modern communication and information technology to commit new cyber crimes at a high rate. The crime chain is long, the gangs are well organized, and the criminal methods are gradually evolving. The upgrade has become more hidden, and the victim groups have covered all walks of life and all ages, causing huge property losses to the people. It has become a social hazard that infringes on the vital interests of the people, and has seriously affected the harmony and stability of society. The typical feature of this new type of cyber crime is that criminals use communications, Internet and other technologies and tools to trick (steal) victims into transferring (depositing) funds into their controlled accounts by sending text messages, making phone calls, implanting Trojans and other means. Bank accounts and other activities.

In order to ensure the orderly and free flow of network information in accordance with the law, protect the security of citizens’ personal information, and prevent citizens’ personal information from being stolen, leaked and illegally used, Chapter 4 (Network Information Security) of the "Network Security Law" is adopted nationwide. On the basis of the "Decision on Strengthening the Protection of Network Information" of the Standing Committee of the National People's Congress, a larger chapter stipulates the basic legal system for the protection of citizens' personal information. There are four major highlights that are eye-catching: First, network operators must collect and use personal information in compliance with the principles of legality, legitimacy, and necessity. The second is the principle of clear purpose and informed consent for network operators to collect and use citizens’ personal information. The third is the system of citizens’ right to delete and correct their personal information, that is, if an individual discovers that a network operator has collected or used his or her personal information in violation of laws, administrative regulations, or the agreement between the two parties, he or she has the right to request the network operator to delete his or her personal information; If the personal information collected and stored by the network operator is incorrect, the network operator has the right to require the network operator to correct it. Network operators should take measures to delete or correct it. The fourth is the confidentiality system for cyber security supervision and management agencies and their staff to protect citizens’ personal information, privacy and business secrets.

The "Cybersecurity Law" aims at the prominent problems existing in network security in practice. In order to cope with the severe situation faced by network security and protect the legitimate rights and interests of citizens in cyberspace from being infringed upon, in establishing a basic system for ensuring network security, On the basis of ensuring the orderly and free flow of network information in accordance with the law and promoting the sustainable and healthy development of network technology innovation and informatization, it fully embodies the legislative principles of protecting the legitimate rights of various network subjects, especially the protection of citizens' legitimate rights and interests in cyberspace from infringement. As the basis for cybersecurity legislation.

In view of the frequent occurrence of new network crimes such as communication and information network fraud, Chapter 4 of the "Cybersecurity Law" sets two prohibitive provisions: First, no establishment shall be used to commit fraud or teach criminal methods. , Websites and communication groups that produce or sell prohibited items, controlled items and other illegal and criminal activities; second, the Internet must not be used to publish information related to committing fraud, making or selling prohibited items, controlled items, and other illegal and criminal activities.

Currently, new cyber crimes are becoming more and more precise and professional, and their accuracy and success rate are constantly improving. The crux of the matter is that the line of defense for personal information security protection continues to fall. In the era of the Internet and big data, infringing on personal information and committing communication information network fraud are two major new types of network crimes. Among them, "websites and communication groups for illegal and criminal activities" and "using the Internet to publish and commit fraud" are the two above-mentioned types. Two "terminals" of great crime. The "Cybersecurity Law" specifically stipulates: No individual or organization may set up websites or communication groups for committing fraud, teaching criminal methods, producing or selling prohibited items, controlled items and other illegal and criminal activities, and shall not use the Internet to publish information related to Conduct fraud, produce or sell information related to prohibited items, controlled items and other illegal and criminal activities. These two provisions are very necessary and urgent to protect the legitimate rights and interests of citizens in cyberspace and maintain the tranquility of cyberspace. They fully reflect the core concept of "people-oriented and legislation for the people" in my country's cyber security legislation and are in line with the current cyber security work. The actual situation and needs have also laid a solid legal foundation for the future formulation of the "Personal Information Protection Law".

Thoughts after observing the same network security class 4

Network security should have the following five characteristics:

Confidentiality: information is not disclosed to the public Unauthorized users, entities, or processes, or features exploited by them.

Integrity: The characteristic that data cannot be changed without authorization. That is, the information remains unmodified, destroyed and lost during storage or transmission.

Availability: Features that can be accessed by authorized entities and used on demand. That is, whether the required information can be accessed when needed. For example, denial of service in a network environment, destruction of the normal operation of the network and related information, etc. are all attacks on availability;

Controllability: the ability to control the dissemination and content of information.

Auditability: Provide basis and means when security issues arise.

From the perspective of network operations and managers, they hope that access to local network information, reading and writing, and other operations can be protected and controlled to avoid "trapdoors", viruses, denial of service, and heavy occupation of network resources. and extremely control threats to stop and defend against attacks by network hackers. For the security and confidentiality departments, they hope to filter and prevent information that is extremely, harmful, or involving state secrets, to avoid the leakage of confidential information, avoid harm to society, and cause huge losses to the country. From a social, educational and ideological perspective, unhealthy content on the Internet will hinder social stability and human development, and must be controlled.

With the rapid development of computer technology, the business processed on the computer has also developed from mathematical operations and file processing based on a single machine, internal business processing based on simple connected internal networks, office automation, etc. to complex based on Enterprise-level computer processing of the intranet, extranet, and global Internet and information sharing and business processing worldwide. While processing power is improving, connection capabilities are also improving. However, while the connection capacity, information and circulation capacity are improving, security issues based on network connections are becoming increasingly prominent. The overall network security is mainly reflected in the following aspects: network physical security, network topology security, network security, application security and Network management security, etc.

Therefore, computer security issues should be taken as preventive measures as every household's fire and theft prevention issues. Before you even think that you will become a target, the threat has already appeared. Once it occurs, you are often caught off guard and cause great losses.

Thoughts after observing the same network security class 5

On Friday, the teacher gave us an assignment to watch a video on network security. Opening the video, I saw a lot of Internet knowledge, which was very rewarding to me. Now I will talk about my feelings:

The first video is: After a little girl finished writing her diary, she found Yueyue gave her more space to look at, and when she clicked on it, she found that her QQ had been stolen. An An told us: "What she encountered was a typical account phishing attack. Phishing account access is a fake QQ space link. When you enter your own QQ password, it is equivalent to telling others your QQ password."

The second video is: A brother who is a sophomore in high school told us how to prevent fraud, and a policeman told us that more than 5,000 teachers and students have been cheated. Usually when we go to the mall, we will There is free wifi for everyone to use, but some criminals will use these malicious programs to implant into your mobile phone port to steal your account number, password, address book and other private information.

The third video. Yes: There was a little boy who saw his friend sending him a file when he was on QQ. He clicked on it and found that he was offline. When he logged in again, he didn't know that his QQ had been stolen and the content and pictures he had posted had been leaked. . An An told us: "If you click on the QQ Trojan, your QQ will be offline and stolen. Therefore, we need to enable network security software and regularly update the software to regularly anti-virus on the computer."

The fourth video is: There was a boy who couldn't watch Iron Man because he had to write mock test questions, so he watched it online and bought the test answers online, only to find that he had been cheated.

The fifth video is: There are two people who want to defraud money online, so they pretend to be ICBC staff and send messages to defraud. Someone receives the text message and replies to the text message, and the scammer gets the money. Found out I had been deceived.

These videos tell us that in life and work, we must learn more knowledge, culture, laws and regulations, improve our legal awareness, strengthen our legal concepts, and do not trust online information and win prizes online. Don't be greedy for petty gains when things happen.

5 latest selected 2020 related articles on the reflections after observing the same network security class:

★ 5 newly selected 5 articles on the reflections after observing the same network security class in 2020

★ The latest 5 articles on the reflections after observing the same network security class in 2020

★ The 5 selected articles on the thoughts and experiences after observing the same network security class in 2020

★ 2020 Same as above 5 latest selections of reflections and reflections after observing a national security education class

★ 5 reflections and reflections after observing a national security education class "Same as above" 2020

★ 2020 Same as the previous class 5 selected essays on the reflections after observing the national security education class

★ 5 selected essays on the reflections on the same national security education class in 2020

★ The composition on the reflections on the same cybersecurity education class Selected 5 articles

★ 5 articles with reflections after observing the same national security education class in 2020

★ 5 selected articles with 800 words in 800 words and reflections on the same national security education class in 2020