According to the Shanghai Securities News, the Ministry of Industry and Information Technology released the analysis and work summary of the network security threat situation in the second quarter of 2018 on its website on September 3. In accordance with the "Measures for Monitoring and Handling Public Internet Network Security Threats", and in accordance with the principles of timely discovery, scientific identification, and effective handling, the Ministry of Industry and Information Technology organized local communications administration bureaus, basic telecommunications companies, network security professional institutions, key Internet companies, domain name agencies, and network security companies to carry out network security threat monitoring and handling work. In the second quarter of this year, a total of about 18.41 million cybersecurity threats were monitored, of which about 16.83 million were monitored by basic telecommunications companies, about 30,000 by professional cybersecurity institutions, and about 1.55 million by key Internet companies, domain name agencies, and cybersecurity companies. The cybersecurity threat situation presents the following characteristics: First, some Internet users' mailboxes are suspected of being controlled, which seriously endangers the security of users' personal information. Second, industrial Internet platforms and smart devices have become important targets of cyber threats. Third, illegal "mining" seriously threatens Internet network security. In addition, in the second quarter, the industry handled approximately 11.44 million network security threats, of which local communications administration bureaus handled approximately 1.12 million, basic telecommunications companies handled approximately 10.15 million, professional network security institutions handled approximately 20,000, and key Internet companies, domain name agencies and network security companies handled approximately 150,000. The next work priorities include ensuring the network security of the Beijing Summit of the Forum on China-Africa Cooperation, carrying out special governance work on malicious programs, and promoting the construction of the industrial Internet security assurance system. Issue the "Guiding Opinions on Strengthening Industrial Internet Security Work", "Construction of Industrial Internet Security Standard System", "Guidelines for the Construction of Industrial Internet Security Technology Assurance Platform" as soon as possible, establish and improve relevant systems and standard systems; organize and carry out pilot demonstrations of industrial Internet security, and strengthen the promotion and application of industrial Internet security solutions and best practices. |
<<: Apple asks Coinbase to remove crypto games from its wallet app
Everyone has a different lifestyle. Some people a...
Traditional physiognomy covers a wide range, among...
Former world-famous heavyweight boxing champion M...
After receiving some attention from mainstream me...
Personality analysis of people with sword-like ey...
Not only men are noble, but women are too. Noble ...
As parents, we all hope that our children can gai...
Physiognomy is a skill that has been passed down ...
The little secret between lips 1. Cherry mouth: T...
I always hear family members or elders say that a...
Sometimes, a slight change in a person's face...
BitPay will have to pay more than $500,000 to the...
Grayscale CEO Michael Sonnenshein shared a pictur...
In recent years, there have been many popular pal...
On July 30, Gabriel Makhlouf, Governor of the Cen...