Joke Collection Website - Public benefit messages - Point 5: Countermeasures against attacks. Data disclosed by the National Cyberspace Administration of China in 2014 showed that our country has always been a victim of cyber attacks. More than 10,000
Point 5: Countermeasures against attacks. Data disclosed by the National Cyberspace Administration of China in 2014 showed that our country has always been a victim of cyber attacks. More than 10,000
Point 5: Countermeasures against attacks. Data disclosed by the National Cyberspace Administration of China in 2014 showed that our country has always been a victim of cyber attacks. More than 10,000 websites are tampered with every month, and 80% of government websites have been attacked. These cyber attacks Mainly from the United States. The Cybersecurity Law stipulates that if overseas individuals or organizations engage in activities that endanger the critical information infrastructure of the People's Republic of China, such as attacking, intruding, interfering, or destroying, and causing serious consequences, they shall be held accountable in accordance with the law; the public security department of the State Council and relevant The department may also decide to freeze assets or take other necessary sanctions against the individual or organization. Zuo Xiaodong said, “Countries around the world today have taken various measures to protect their cyberspace from external intrusion, and adopted all means, including military means, to protect the security of their information infrastructure. This provision of the Cybersecurity Law is not only in line with international practice , and demonstrates our strong determination to safeguard national network sovereignty.” Point 6: “Network communication control” In real society, when major emergencies occur, relevant departments often take measures to ensure emergency response and maintain national and public safety. control and other measures. Cyberspace is no exception. In the Cybersecurity Law, a special chapter is set out to establish a cyber security monitoring, early warning and emergency response system, which clarifies the measures that relevant departments need to take when a cyber security incident occurs. Special provisions: Due to the need to maintain national security and public order and deal with major social security emergencies, temporary measures such as restrictions on network communications in specific areas may be adopted upon decision or approval of the State Council. Zuo Xiaodong believes, “For example, in violent terrorist incidents, terrorists are increasingly organizing, planning, colluding, and carrying out activities through the Internet. At this time, network communications may need to be controlled. But the impact of this control is relatively large. Therefore, the Cybersecurity Law stipulates that the implementation of temporary network control must be decided or approved by the State Council, which is very strict. "Three major focuses: 1: How to cut off the information trading interest chain? Article 42 of the law stipulates that network operators are not allowed to leak, tamper with, or damage the personal information they collect; they are not allowed to provide personal information to others without the consent of the person being collected. Article 44 stipulates that no individual or organization may steal or obtain personal information in other illegal ways, and may not illegally sell or illegally provide personal information to others. Zhou Hanhua, a researcher at the Institute of Law of the Chinese Academy of Social Sciences, said that in response to fraud cases such as the Xu Yuyu case, the draft included in the third review that no websites or communication groups should be established for the purpose of committing illegal and criminal activities such as fraud, and no websites or communication groups should be established for the purpose of committing fraud and other illegal and criminal activities, and no use of the Internet to publish information related to the commission of fraud, etc. content. Focus 2: How to remedy personal information leakage? Article 42 of the law stipulates that network operators should take technical measures and other necessary measures to ensure the security of the personal information they collect and prevent information leakage, damage, and loss. When information leakage, damage, or loss occurs or is likely to occur, remedial measures should be taken immediately, users should be promptly informed in accordance with regulations, and reported to the relevant competent authorities. All types of online fraud, especially precision fraud, originate from the leakage of personal information. In the case of Xu Yuyu, a Shandong college student who was deceived and died suddenly, the criminals attacked the Shandong College Entrance Examination online registration information system, implanted Trojan viruses, and stole a large amount of candidates' registration information. Experts such as Zhou Hanhua said that for the first time in the Cybersecurity Law, a personal information data leak notification system was clarified, so that when current personal information leaks cannot be completely eliminated, users who may be affected can be notified to enhance users' vigilance against related fraud. This will also force relevant institutions to improve their network security protection capabilities and reduce the risk of personal information leakage. Focus 3: How to trace the source of online fraud? Article 64 of the law stipulates that if a network operator or provider of network products or services infringes upon the right of personal information to be protected in accordance with the law, the relevant competent department shall order it to make corrections and may, depending on the circumstances, issue a warning or confiscate the illegal income alone or concurrently. , impose a fine of not less than one time but not more than ten times the illegal income, and if there is no illegal income, a fine of not more than one million yuan; if the circumstances are serious, the person may be ordered to suspend the relevant business, suspend business for rectification, close the website, revoke the relevant business license or revoke the business license .Liu Junhai, a professor at the Law School of Renmin University of China, said that the Cybersecurity Law regulates which online behaviors should be punished, especially emphasizing the "main responsibility" of network operators and others to maintain the security of personal information. In addition to fines, website closures and license revocations More deterrent. Ministry of Industry and Information Technology: The Ministry of Industry and Information Technology issued the "Implementation Opinions on Further Preventing and Combating Communication Information Fraud" on the 7th, proposing to establish a "blacklist" sharing mechanism for the communication industry to prevent and combat communication information fraud. Enterprises and individuals found to have violated regulations by relevant departments in the work of preventing and combating communication information fraud will be included in the blacklist, and their business licenses, legal person information, violations, etc. will be recorded in detail to achieve full sharing of information in the entire industry. The Ministry of Industry and Information Technology proposed that all basic telecommunications companies will refuse to accept blacklisted users' applications to become business agents or to use key telecommunications services such as voice dedicated lines, "400" and "business switchboards". Related reports Scammers frequently use tricks to get "year-end bonuses" to "compromise performance" Guangzhou Daily (reporter Li Dong, correspondents Zeng Yimei and Cen Baihan) Guangzhou police reported yesterday: Recently, large-scale fraud cases pretending to be law enforcement agencies in Guangzhou are still common. There have been cases, among which the new fraud method of impersonating the communications management department is the most prominent. According to statistics from the Guangzhou Anti-Telecommunications Internet Fraud Center, in the past month, there have been 435 police reports involving people pretending to be communications management departments, and people have been defrauded of more than 6 million yuan. According to the analysis of the police, this new method may be popularized by criminals in the near future to compete for year-end bonuses. Citizens must remain highly vigilant against scammers’ new methods. The police reminded that as the end of the year approaches, scammers are competing to "make big moves" and "new tricks" to boost "performance." In order to avoid "contributing" to the scammer's year-end bonus, citizens should keep in mind the following tips: 1. When answering the phone, pay attention to verify the caller number, and check the "0086", "86", "019", "020" and other fields Be vigilant about the numbers at the beginning of the number and be careful of calls that change the number on the Internet. 2. The communications management department and the China Internet Reporting Center will not notify citizens of information such as identity theft or illegal card opening via phone calls or text messages. Do not trust the "transferred" phone number. 3. There are no so-called "national security accounts" in public security organs, procuratorates, and courts!
- Previous article:Congratulations on the promotion of officialdom
- Next article:New year's late blessing message
- Related articles
- Forty-one sentences collected on WeChat to care for poor left-behind children
- What is the SMS enquiry number of China Telecom?
- How to view mobile subscription SMS?
- What happened to the SMS reminder from the National Anti-Fraud Center?
- Attractive advertising words for enrollment of winter vacation remedial classes
- In the pre-marriage examination of the Civil Affairs Bureau, if there are any problems during the examination, should you notify yourself or the other party? Do you need to notify by phone?
- How to write the notice to cancel the Mid-Autumn Festival group meeting?
- What's the matter with slow texting on red rice mobile phone?
- Those stubborn young love sentences
- Using Bluetooth to transfer files to the computer can't be transferred, and the display fails. What happened? Bluetooth pairing succeeded, but the file could not be transferred.