July 19, 2021

There is also this you need to k...


What do you mean by cyber security?

Cybersecurity is a key challenge related to national defense security and territorial sovereignty, the smoothness of social development, and the inheritance and promotion of folk culture, the necessity of which is becoming more and more critical along with the acceleration of the pace of informationization around the world. "The doorstep is the national border", security risks are imperative. Network security is, in essence, the security of information on the Internet. From the theoretical point of view, but all involved in the security of information on the Internet, consistency, ease of use, true and effective and partitionable planning of the relevant technical and basic theory are the research areas of network security.

What do you mean by cybersecurity bird-friendly week?

The "China Cybersecurity Bird Week" or "China Cybersecurity Bird Week" is an activity to better "create cybersecurity and share civilized behavior on the Internet", which is closely focused on Financial industry, telecommunications network, intelligent government, network technology and other key industries and areas of network security problems, for the general public concerned about the hot topics, held a series of network security feelings exhibition and other series of thematic publicity activities, to build network security from me, everyone to participate in the good environment.

What are the universal network security riskiness?

Education

01 Fraudulent website

Phishing attack means that the wrongdoers according to many push claiming to come from financial institutions or other famous organizations fraudulent spam or short messages, etc., tempting the recipient to come up with more sensitive information (such as user name, dynamic password, account ID, ATM PIN code or overdraft card detailed information), and then use this information to impersonate the victim to carry out fraudulent financial investment, and then get economic development rights.

Industrial

02 Trojan horse program

Trojan horse is a kind of hacking software based on remote operation, it generally dresses up as software packages, compressed packages, photos, videos, etc., according to the web page, e-mail and other ways to tempt the user to install and download, if the user opens such malicious code, the user's electronic computer or cell phone on and other electronic products will be manipulated by the wrongdoers who write malicious code, which in turn leads to the alteration or theft of information documents. This can lead to the alteration or theft of information files, theft of electronic accounts and other harm.

03 Social media trap

Social media trap is a telecom fraud method in which some criminals use social engineering to obtain information about users and steal their account assets based on some key information. For example, you don't have to listen to credit card salesmen who call you to increase your bank card limit.

04 Fake base stations

Fake base stations are also known as fake communication base stations, the key consists of servers and laptops, which can search for GSM cell phone information within a certain semi-period because it is the management center, and arbitrarily impersonate someone else's cell phone number to force the user's cell phone to push fraudulent, marketing products and other harassing SMS.

05 Information leakage

cyber security training hong kong

At this stage, there are many ways to leak my information, including connecting to public WiFi, rusty e-mail, sun WeChat circle of friends, etc. There are also some small and medium-sized enterprise website security defenses are poor, very vulnerable to hacking, resulting in information leakage of the application registration account. The leakage of information is very easy to lead to my information is impersonated to open a card through the cash, fake others regulations transfer and other harm.

06 Ransomware

Ransomware, a new type of computer virus, is key to the spread of e-mail, program process Trojan horse virus, web page mirror hijacking. This type of virus infection uses a variety of encryption techniques to encrypt data on documents, which is basically impossible for others to decipher except for the virus-infected developers themselves. After the data encryption is carried out, it will continue to change the wallpaper and transform into an extortion reminder document on the desktop and other prominent parts, specifically instructing the user to pay bail, and the mutation types are very fast and have immune system diseases to the basic computer antivirus software.

Network security prevention and solution

1. for the computer to run computer antivirus software, on time scanner system software, check and kill viruses; immediately upgrade the 360 virus database, upgrade the vulnerability patch.

2. Download software as far as possible to the Palace network or large software download network, disinfection before installing or opening unknown cell phone software or documents.

3. Do not open unknown website links casually, especially malicious website connections, connections passed by passers-by for themselves according to QQ, and do not scan QR codes casually.

4. often check the phone explorer, check if there is malware in the background program, and on time to apply the phone on the protection software scanner phone system.

5. solve my more sensitive information within the physics or logical area with higher security level.

6. have a person information of the paper version of the material to use shredder to destroy, waste of CD, U disk, computer on the etc. to demagnetize or completely destroyed.

Posted by: wiwili at 09:58 AM | No Comments | Add Comment
Post contains 882 words, total size 6 kb.




What colour is a green orange?




15kb generated in CPU 0.0067, elapsed 0.0313 seconds.
35 queries taking 0.0266 seconds, 57 records returned.
Powered by Minx 1.1.6c-pink.