According to the Shanghai Securities News, the Ministry of Industry and Information Technology released the analysis and work summary of the network security threat situation in the second quarter of 2018 on its website on September 3. In accordance with the "Measures for Monitoring and Handling Public Internet Network Security Threats", and in accordance with the principles of timely discovery, scientific identification, and effective handling, the Ministry of Industry and Information Technology organized local communications administration bureaus, basic telecommunications companies, network security professional institutions, key Internet companies, domain name agencies, and network security companies to carry out network security threat monitoring and handling work. In the second quarter of this year, a total of about 18.41 million cybersecurity threats were monitored, of which about 16.83 million were monitored by basic telecommunications companies, about 30,000 by professional cybersecurity institutions, and about 1.55 million by key Internet companies, domain name agencies, and cybersecurity companies. The cybersecurity threat situation presents the following characteristics: First, some Internet users' mailboxes are suspected of being controlled, which seriously endangers the security of users' personal information. Second, industrial Internet platforms and smart devices have become important targets of cyber threats. Third, illegal "mining" seriously threatens Internet network security. In addition, in the second quarter, the industry handled approximately 11.44 million network security threats, of which local communications administration bureaus handled approximately 1.12 million, basic telecommunications companies handled approximately 10.15 million, professional network security institutions handled approximately 20,000, and key Internet companies, domain name agencies and network security companies handled approximately 150,000. The next work priorities include ensuring the network security of the Beijing Summit of the Forum on China-Africa Cooperation, carrying out special governance work on malicious programs, and promoting the construction of the industrial Internet security assurance system. Issue the "Guiding Opinions on Strengthening Industrial Internet Security Work", "Construction of Industrial Internet Security Standard System", "Guidelines for the Construction of Industrial Internet Security Technology Assurance Platform" as soon as possible, establish and improve relevant systems and standard systems; organize and carry out pilot demonstrations of industrial Internet security, and strengthen the promotion and application of industrial Internet security solutions and best practices. |
<<: Apple asks Coinbase to remove crypto games from its wallet app
The fate of the red birthmark What is a red birth...
There are always many moles on people's faces...
Rage Review : As China's first 'pure netw...
Men's left eye is slightly smaller than the r...
In mole physiognomy, moles in different parts of ...
Original title: With 20 million investment in Ser...
Almost every man in life dreams of getting a woma...
People born in different years have different des...
The single rate is very high, and the palm readin...
With the release of the Segregated Witness (segwi...
Palmistry shows who is born to work hard 1. If th...
The so-called sixth sense is the sixth sense of h...
Last time we learned about Xilinx's ZYNQ brou...
What does the fate of beauty mole represent? 1. W...
Speaking of fortune, it is a very interesting top...