Joke Collection Website - Cold jokes - What are the five cyber security "night watchman"?

What are the five cyber security "night watchman"?

September 17, Title: Just now, we discovered five network security "night watchman".

With our wallets, cars, refrigerators, televisions and speakers all connected to the Internet, data security has become a 24-hour "offensive and defensive war". Unsafe factors such as telecom fraud and Trojan horse virus are like "ghosts" in the TV series Game of Thrones, and security experts are the "night watchman" of information. During the 20 17 National Cyber Security Publicity Week, these "night watchmans" took to the stage, which made us really feel the thrilling battle.

-"Long Life": Intelligent robots can also prevent cheating.

A spectator stood in the Ali Security Technology Experience Zone and issued an instruction to the intelligent robot "Tmall Elf": "Tmall Elf, help me find a number." "Please tell me the phone number you want." Then the audience reported that they had received a strange phone call. Tmall Elf quickly identified and reported, "money shield APP told me that this is a fraudulent phone call, please don't call and answer it."

"I didn't expect to be recognized. It is really interesting and practical. " An audience at the scene said after experiencing the functions of telling jokes and preventing fraud of Tmall Elf. The experience area is crowded with people waiting in line, expecting to enter the narrow glass room and have a close contact with the intelligent anti-fraud robot.

Robots can prevent fraud, that is, the fraud interception technology of money shield anti-fraud platform of the State Council Inter-Ministerial Joint Conference Office on Combating and Governing New Crimes in Telecommunication Networks (hereinafter referred to as "the State Council Joint Office") is injected into robots, so that they can have a pair of "eyes" that can identify fraud numbers and provide the latest anti-fraud reminders. Shen Jie, a security expert in money shield, said that in order to cope with the escalating fraud means, the anti-fraud platform in money shield first combined fraud interception technology with artificial intelligence to help people raise their anti-fraud awareness.

Not only that, this robot can also understand the voice commands in Mandarin. Imagine that at home, you can automatically turn on the lights, turn on the TV, adjust the temperature of the air conditioner, and even shop, order takeout, send a courier, play games and listen to jokes in Tmall supermarket by shouting instructions to an intelligent robot. How much fun will this life be?

-"Black Technology": Quantum communication that "will not be decrypted"

At the exhibition site, the audience can also get close to the "quantum secure communication network". On the cooperative booth of China Telecom and Keda Guodun Quantum Company, the reporter experienced a "confidential meeting" and greeted the staff in Beijing in real time. Although it is no different from ordinary video conference on the surface, the encryption principle behind it is completely different.

He Wei, vice president of Keda Guodun Quantum Technology Co., Ltd. told reporters that according to the characteristics of quantum "uncertainty" and "unclonability", in theory, it will not be stolen to generate quantum keys through devices and then encrypt data. This is very necessary for the transmission of all kinds of important data with confidentiality requirements, and will be widely used in national defense, finance, government affairs, electricity, energy, transportation, telecommunications, big data and other important industries.

According to reports, China Telecom has been tracking and promoting the research and industrialization of quantum secure communication technology since 20 14, and has been working closely with the quantum team of China University of Science and Technology. 20 17 In April, Shanghai Guo Dun Quantum Company and China Telecom Shanghai Company began to cooperate, and now a financial quantum metropolitan area network with a length of 1000 km has been built in Shanghai.

As a powerful "infrastructure" of quantum communication, the "Beijing-Shanghai trunk line" project broke through key technologies such as high-speed quantum key distribution, high-speed and efficient single photon detection, trusted relay transmission, and large-scale quantum network management and control, and was completed at the end of last year. Recently, through the overall technical acceptance, a 2000-kilometer quantum secure communication backbone line connecting Beijing, Jinan, Hefei and Shanghai has been built.

-"Look in the mirror": identify fraudulent phishing websites with one click.

Always worried about parents being cheated by the phone? Still worried that phishing websites are pervasive? The days of fear are coming to an end. In this cyber security week, as a "wise man in advance" to control telecommunication network fraud, money shield anti-fraud platform added a "golden bell with iron cloth shirt" to solve rampant telecommunication fraud.

The reporter found in the live experience that as long as the software is installed on the mobile phone, it will dial or access the suspected fraudulent phone, and the mobile phone will remind the Criminal Investigation Bureau of the Ministry of Public Security to remind the fraudulent phone. According to reports, because the number database of the system can be compared with the black and gray numbers of the Criminal Investigation Bureau of the Ministry of Public Security in real time, as long as those confirmed fraud numbers appear, the software will remind the public at the first time and intercept the scammers outside the mobile phone.

Not only that, with the escalation of fraudulent means, many phishing links will also be "disguised" and become the content and news that we click on every day, which is difficult for the people to distinguish. After installing this system, as long as there is something wrong with the clicked link, the mobile phone can intercept it for the first time, as if it is equipped with a "magic mirror".

According to reports, money shield anti-fraud platform is an "anti-fraud artifact" created by the State Council Joint Office and supported by Alibaba.

-"Detective": "Hawkeye" prevents being cheated through the action track.

On June 1 1 this year, Mr. Zhang, who works in Tianlin Community of Xuhui District, received a strange phone call. The caller said that there was a "problem" with the parcel that Mr. Zhang didn't take, and then the caller transferred the call to Pudong Public Security Bureau. Mr. Zhang was told that he was "suspected of financial fraud" and needed to "assist in the investigation to prove his innocence". The next day, he avoided "single-line contact" with everyone. The next morning, Mr. Zhang, at a loss, went to a hotel according to the instructions of the other party, ready to inform the other party of his bank account number.

At the same time, the platform of Shanghai Anti-Telecom Network Fraud Center determines that Mr. Zhang is likely to become a "high-risk group" of telecom fraud through technologies such as Hawkeye smartphone box big data analysis. According to Mr. Zhang's action trajectory, the platform judged that it met the characteristics of fraud, and the command center rushed to the scene in time to prevent the occurrence of telecom fraud.

Li Xuyang, head of Tencent's security anti-fraud laboratory, told the reporter that the above-mentioned "Hawkeye Intelligent Anti-phone Fraud Box" is one of Tencent's anti-telecom network fraud intelligent brain products at the Expo. This "intelligent brain" is the research result of the confrontation mode of black goods based on artificial intelligence technology, which will play a role in key links such as telecom fraud before, during and case analysis.

-"moat": blacklist prevents harmful information from "landing"

Before the information is displayed online, the system strategy is used to screen high-speed machines, and a small amount of content that the system can't identify or make a final judgment will be pushed to manual review. On Baidu's booth, this harmful information screening system is very eye-catching.

According to the on-site staff, in the first half of this year, Baidu's blacklist of risk vocabulary has included more than 360,000 samples of harmful information. At present, a closed loop of active interception before information display and independent inspection and cleaning of existing information has been formed. More than 86.2% of harmful information will be intercepted before going online.

Baidu's main push this time is the "emergency response center", which can help partners establish a complete security defense system. The solution includes 14, which covers the main functions and services such as network security monitoring and combating telecom fraud, and is widely used in politics, finance, medical care and other industries.

One of the most distinctive features is the traceability function, which can be closely combined with telecom operators, network security and other departments to provide effective solutions to combat online fraud and other issues. The on-site staff told the reporter that if the pseudo base station is on the mobile WiFi car, it is difficult to catch it; Now with traceability, we can trace the ip address or device code that originally sent the signal, and finally locate the address and provide it to the regulatory authorities.