According to the Shanghai Securities News, the Ministry of Industry and Information Technology released the analysis and work summary of the network security threat situation in the second quarter of 2018 on its website on September 3. In accordance with the "Measures for Monitoring and Handling Public Internet Network Security Threats", and in accordance with the principles of timely discovery, scientific identification, and effective handling, the Ministry of Industry and Information Technology organized local communications administration bureaus, basic telecommunications companies, network security professional institutions, key Internet companies, domain name agencies, and network security companies to carry out network security threat monitoring and handling work. In the second quarter of this year, a total of about 18.41 million cybersecurity threats were monitored, of which about 16.83 million were monitored by basic telecommunications companies, about 30,000 by professional cybersecurity institutions, and about 1.55 million by key Internet companies, domain name agencies, and cybersecurity companies. The cybersecurity threat situation presents the following characteristics: First, some Internet users' mailboxes are suspected of being controlled, which seriously endangers the security of users' personal information. Second, industrial Internet platforms and smart devices have become important targets of cyber threats. Third, illegal "mining" seriously threatens Internet network security. In addition, in the second quarter, the industry handled approximately 11.44 million network security threats, of which local communications administration bureaus handled approximately 1.12 million, basic telecommunications companies handled approximately 10.15 million, professional network security institutions handled approximately 20,000, and key Internet companies, domain name agencies and network security companies handled approximately 150,000. The next work priorities include ensuring the network security of the Beijing Summit of the Forum on China-Africa Cooperation, carrying out special governance work on malicious programs, and promoting the construction of the industrial Internet security assurance system. Issue the "Guiding Opinions on Strengthening Industrial Internet Security Work", "Construction of Industrial Internet Security Standard System", "Guidelines for the Construction of Industrial Internet Security Technology Assurance Platform" as soon as possible, establish and improve relevant systems and standard systems; organize and carry out pilot demonstrations of industrial Internet security, and strengthen the promotion and application of industrial Internet security solutions and best practices. |
<<: Apple asks Coinbase to remove crypto games from its wallet app
Different people have different facial features, w...
1. Eyebrows are sparse and the tail of the eyebro...
GamblersPick reported on August 20 that it survey...
Want to hang out with friends on the weekend? Did...
A Handshake to Find Out About Your Health and Cha...
Five years ago, when we founded the Blockchain As...
Palmistry shows who is most likely to get divorce...
Five Elements Physiognomy Analysis of Women's...
What kind of women should not be underestimated 1...
As the saying goes, appearance reflects the heart...
Many friends think that the mole of misery sounds...
There is a type of people whose facial features r...
[Case] In early February 2023, the defendants C...
What does a mole near the eye on the right foot m...
The World Economic Forum recently released a repo...