Joke Collection Website - Bulletin headlines - Experience of network security
Experience of network security
Experience of network security (7 general articles)
After we have some inspiration, we might as well write it as an experience to keep in mind, so that we can develop a good summary method. So what is a good experience? The following is the experience of network security that I have compiled for you (7 general articles). You are welcome to learn from and refer to it. I hope it will help you.
Experience of network security 1
The network is a double-edged sword. It can not only benefit people, but also facilitate people to consult all kinds of information and materials; It can also bring a lot of trouble and harm to people. Therefore, we must be careful when using the network. Next, I will talk about my own network security experience.
We try to install authoritative anti-virus software on the computer to kill Trojans and fix loopholes. And learn to upgrade anti-virus software in time, clear and kill malicious programs regularly, so as to reduce the risks faced by computers.
when shopping online, we try to choose a regular shopping mall, so as to avoid personal information falling into the wrong hands. You can use the keypad on the screen when entering account information. When using QQ, Fetion, WeChat and other chat tools, try not to expose your ID card information and bank card information. There have been many frauds in the past that stole other people's QQ and borrowed money from other people's netizens. After all, the current network fraud technology is becoming more and more advanced, and many victims realize the importance of network security only after being fooled.
when it comes to the experience of network security, the talented students in the computer department are quite touched. Nowadays, many illegal organizations cheat through the Internet. Sometimes, when using computers, a webpage pops up suddenly. There are usually attractive words or pictures on the webpage, which makes people fall into the trap of fraud groups unconsciously ... Therefore, abiding by laws and ethics is also one of the ways to maintain network security.
It is very important to learn the knowledge of network security maintenance to protect our personal privacy and even corporate secrets. Experience of network security 2
A comprehensive equipment maintainer pays attention to quick response and strong support. For network security maintenance, the first thing is to enhance the awareness of network security. Be strict with yourself and constantly improve personal safety awareness and maintenance quality.
according to the big business concept of "maintenance is operation" advocated by the department, the whole maintenance work is closely centered on efficiency, and the support for customers and the market is strengthened, and the backstage support work is fully done.
The account of circuit data of gold and silver brand key customers has been established step by step, and the emergency plans for customer circuits have been made respectively according to the actual situation of gold medal customers using data circuits. In order to realize the classification of large customers, our center arranges to identify the circuits of large customers with plugs of different colors; In order to reflect the differentiated service for major client units, our team regularly conducts patrol inspection for major clients with gold medals, and makes monthly network operation reports for major client units.
don't engage in individualism in daily maintenance, the team strength is infinite. Pay attention to cooperation and efficiency. It is necessary to strengthen the comprehensive inspection of network equipment security and standardize and accurately handle faults. This requires individuals to have strong business ability and maintenance quality. Therefore, individuals should strengthen their study and constantly improve their professional level and maintenance ability. Experience of network security 3
The network has become very common in modern society. We can see people who use the network everywhere. The emergence of the network for watching movies, trading stocks, browsing news, working and so on has brought people a brand-new look! With the network, people are more efficient and environmentally friendly, reducing the use of paper.
it is in line with our current environmental protection theme ── low carbon, energy saving and emission reduction.
Moreover, many colleges and universities have set up computer majors to train high-end talents in this field, but perhaps they neglected their ideological and political education when they cultivated their professional skills. When they were able to enter the society, they used their professional advantages to illegally conquer other people's websites and became a road that they could never return!
Yes, the network is different from our real life. It is virtual, vague, visible but intangible, and our real life gives people a real feeling.
In our real life, our activities have certain rules and regulations. In the online world, although it is virtual, it also has its own systems, laws and regulations.
Here, I briefly list some laws and regulations on the Internet: As early as 1991, the State Council issued the Regulations on the Protection of Computer Software, in which Article 3 (5) modifies, translates and annotates its software works without the consent of the software copyright owner or its legal transferee; (6) Copying or partially copying a software work without the consent of the software copyright owner or his legal transferee; In 1994, a series of laws, regulations and rules were issued one after another: (1) Violating the security level protection system of computer information systems and endangering the security of computer information systems; (2) Violating the international networking filing system of computer information systems'; (3) Failing to report the cases occurring in the computer information system within the prescribed time; (4) Refusing to improve the security situation within the time limit after receiving the notice from the public security organ; (five) other acts that endanger the security of computer information systems.
Until 1997, the Ministry of Public Security once again improved China's laws and regulations on network security, clearly stipulating that those who violate laws and administrative regulations will be given a warning by the public security organs. If there is illegal income, the illegal income will be confiscated, and individuals can be fined less than 5, yuan and units can be fined less than 15, yuan. If the circumstances are serious, it may be punished to stop networking and stop for rectification within six months, and if necessary, it may suggest that the original license issuing and examination and approval authority revoke its business license or cancel its networking qualification; If it constitutes a violation of public security administration, it shall be punished in accordance with the regulations on administrative penalties for public security; If a crime is constituted, criminal responsibility shall be investigated according to law.
So in the online world, anyone who breaks the law will be held accountable.
This is the same as our real life, and it's not what we think, because the online world is virtual, so we can talk nonsense and mess up on it.
If spreading pornography is not conducive to social stability, it will certainly be punished. For those who use their superb technical means to break into other people's computer systems for profit, it is definitely illegal. We often see such cases in real life. It should be said that these cases have taught us bloody lessons. Therefore, when using the Internet, we must abide by laws and regulations, do not engage in sabotage, conduct normal and healthy communication on the Internet, and make full use of network resources to improve our learning efficiency. Experience of network security 4
Recently, did you receive a WeChat message that "the mother who robbed the child at the south gate of Liantang was stabbed"? Are you imagining things?
as you can imagine, the picture at that time was so bloody! How horrible! Criminals pretend to dress up and lurk at the intersection of the south gate of Liantang, quietly waiting for the child to take the bait. Suddenly, the target appeared. A young mother was playing in the street with a young child. Just when the mother was not paying attention, the child was suddenly pulled by a pair of rough big hands. That was the criminal! At this time, my mother found the figure of criminals and rushed forward, trying to fight the gangsters with meager strength! Who knows, the gangster took a sharp knife out of his pocket and stabbed his mother! Blood has become a river, and people's hearts are aching ...
However, this is just a false message! According to the investigation by Nan 'an Public Security Bureau, no such cases have occurred in Ximei Street, Nan 'an City. This information is purely a rumor!
With the rapid development of science and technology, people can't live without the omnipotent and practical Internet everywhere. However, the network is like a new type of xxx. If it is used improperly, it is very likely to fall into the abyss and is difficult to recover. Therefore, network security cannot be ignored!
When you are happily sending messages to your friends on your mobile phone, have you received the winning message from strangers? The prize is a high-tech product with priceless value, and the bonus amount is as high as 1 million! You must never smile. If you didn't buy lottery tickets or participate in any prize-winning activities, where did these prizes and bonuses come from? Obviously, it is a scam designed by swindlers using people's subtle psychology! It's obviously a clumsy scam, but why is someone cheated? Believe in the good things that fall from the sky? Nothing in the end? Either such people are too kind and believe in the internet; Either such people are too stupid and have no awareness of internet safety!
friends, the network containing bad information has seriously affected people's lives, but we must not fall into it! Always remind yourself that network security cannot be ignored! Experience of network security 5
On the afternoon of December 21st, I had the honor to participate in the electromechanical training organized by the Monitoring Command Center with the topic of Network Security. This training was divided into two parts: Technical Lecture on Network Security Status Analysis and Technical Lecture on Internet of Things and Big Data Security Solutions, and Mr. Wang, a rising network security engineer, was invited to give a lecture. The training mainly includes the following parts: the current situation and existing problems of the network security industry are analyzed in detail, with emphasis on explaining why 2xx is the most historic year in the network security industry, explaining the technical development trends and hot events in the most concise language, and how to defend the privacy of data in the new era of Internet of Things and big data. Through Mr. Wang's careful explanation, I feel that there is a long way to go to ensure the safe operation of the toll station network. At the same time, I felt the rapid development of the Internet of Things, and I also deeply realized the upgrading of computer technology. I have a better understanding of the safety awareness that electromechanical personnel should have.
Although the training lasted only two hours, we not only learned valuable experience and skills in protecting network security, but also felt the ardent expectations of leaders for our electrical engineers. We should not only master the mechanical and electrical equipment of this station, but also think more, and be good at discovering the potential safety hazards in our work and draw inferences from the failures.
this training has benefited me a lot. During the training, engineers abandoned the indoctrination of technical terms, and took the recent "network security" hotspots as an example, interspersed with their own experience in maintaining network security, and used humorous and witty language to gradually penetrate into the minds of us mechanical and electrical personnel such as "Internet of Things security", "cloud computing and big data security", "artificial intelligence and" data security protection architecture V2 ".
Because most of our mechanical and electrical engineers have just been admitted, they have some shortcomings in some aspects. Therefore, we must comprehensively improve our own quality and practice excellent skills. First, we should study hard, deeply understand the laws and regulations of the Network Security Law, improve our awareness of network security, and fully infiltrate the awareness of network security into our work. Second, make a good backup and take precautions. Important data files should be backed up in time to minimize the losses caused by possible virus damage in the future. Third, we must do a good job in prevention. Do not insert other pluggable media such as USB flash drive into the charging electromechanical equipment at will. Use the latest anti-virus software and update the virus database in time, otherwise the anti-virus software will be useless. In addition, we should correctly set up various functions of anti-virus software and give full play to its efficacy.
Through this training, I not only broadened my thinking, let me further understand the importance of network security, but also let me feel the attention of leaders at all levels to our station electromechanical staff. In my future work, I will definitely keep in mind my responsibilities as an electromechanical member, play my due role as an electromechanical member in an ordinary post, and strive to contribute to the healthy development of Shi 'an Expressway. Experience of network security 6
2xx From April 8 to 14, I attended the campus network security training meeting held in Sichuan Normal University. This training meeting was specially held to improve the information literacy and professional skills of campus network administrators and information technology teachers in primary and secondary schools in Panzhihua City, and to better apply information technology to education and teaching. The training lasted for seven days, mainly including network basic knowledge, equipment management foundation, layer 2 switch, layer 3 switch, vlan, dhcp, arp, deception, router configuration, integrated wiring, information security, database recovery, and network attack and defense learning. After a week of training and experimental operation, I learned a lot of new ideas that I had not been exposed to before, and completely solved some thorny problems in the current campus network. Here are some main experiences of this training.
First, I learned how to build a campus website.
I also gained a lot in website construction. I learned how to set up WEB and FTP sites, and I also learned that in the same intranet, multiple domain name sites can use 8 ports at the same time as long as they set the host header. Hands-on set up the site in ASP.net. I also learned how to manage remotely through the remote desktop, which brings great convenience to the management of the machine.
Second, I learned how to solve arp problems by using routes and switches.
Setting up routers can optimize the management of routers to the greatest extent. After learning the configuration of routers, I better divided the IP address of each teacher, made the name correspond to the machine name, bound the MAC address, put an end to the spread of ARP virus, and made the management to a higher level.
Third, I have learned the latest knowledge of network security.
I have gained a lot from the security aspects of the website. There are many loopholes in the management of the website: using the same user name and password, the permissions of the website folder are too large, the database files of the website are not fortified, etc. These threats to the website, even the whole network and server are great, and in serious cases, they may become "broilers" for hacker to operate at will.
Fourth, I learned the common commands of routers and other devices
Router configuration experiment. First, complete the physical connection of router, computer and switch, then log in to the router with super terminal and set it up. Other students in the group log in with Telnet command and use various commands. Finally, connect the four routers into a small Internet through Ethernet interface.
5. In addition, I learned some little knowledge
The setting of routers and switches, the division of VLAN, etc. In addition, the PC is cloned in the virtual software, the virtual machine is configured, and the domain name is resolved.
When configuring a switch, divide the Vlan. The key point is that after the configuration is written to the switch, it must be powered off and restarted before the new configuration can take effect (the same is true for routers).
in the process of subnetting, 1 is mistakenly taken as the initial unit, which makes many theoretically unusable addresses become regular addresses, actually ~ 255.
Finally, I sincerely thank Panzhihua Education Bureau and Audio-visual Education Center for giving me this learning opportunity, and thank all the teachers of Sichuan Normal University for their guidance. I will definitely bring the things and ideas I have learned this time to the school network security work and make due contributions to the campus network security and campus information construction in Panzhihua. Experience of network security 7
On July 16th, XXXX, I was lucky enough to attend the network security training organized by the Education Bureau, which lasted for eight days. Attended the training
- Previous article:How to write fire safety training content records?
- Next article:What kind of behavior does the epidemic card rush belong to?
- Related articles
- Happy Ice and Snow Helps Winter Olympics Calligraphy Works
- Banner slogan of kindergarten school
- Don't be a shopkeeper. What are the adverse effects of early education opportunities on children?
- Wenzhou tourist attractions promotional slogans
- Diecui Mountain slogan
- How to create a brand
- Emergency plan for school closure due to epidemic situation
- The largest Lego city in history
- What should I do if the lid of yogurt is swollen?
- Cross-criticism of four-character couplets