Current location - Music Encyclopedia - Dating - Middle School Students' Network Security Knowledge _ Points for Attention of Middle School Students' Network Security
Middle School Students' Network Security Knowledge _ Points for Attention of Middle School Students' Network Security
As an open tool for information dissemination and communication, the Internet has entered our life. So what network security should middle school students pay attention to? The following is my knowledge about network security of middle school students. I hope you like it!

Middle school students' knowledge of network security. Middle school students should not indulge in online games.

The internet has brought convenience to everyone, but it has also sounded the alarm. Let me tell you a few cases. Case 1: Yu Bin, a senior three student in Nanchang, went to the Internet cafe with his schoolbag on his back every day while preparing for the college entrance examination, and eventually died suddenly because he was too nervous and excited when playing online games; Case 2: Tang Liang, a middle school student in shifang city, Sichuan Province, is a famous local online game master. After being killed by an opponent for 23 times in the game, you can't tell the virtual world from the real world, and finally kill your opponent in the real world; Case 3: 19-year-old Wang Jin is addicted to online games. In order to get the money for surfing the Internet, he killed his grandmother who raised him with a hammer, and even went to the Internet cafe without taking care to change his clothes and shoes after she caught her breath. After killing his grandmother, he didn't want to run away, but he still wandered around the internet cafe as if nothing had happened. Wang Jin's addiction to the Internet is unbelievable ... These are all cases where he can't extricate himself from online games and go to extremes. Male students should pay attention! You can play games, but don't be too addicted.

Second, middle school students should not meet netizens easily.

I was talking about male students just now. What about the female students? Let's look at a set of data first. When we use the keyword "seeing netizens cheated" in Baidu, we can find more than 430,000 results, among which being cheated of money, being cheated into pyramid schemes, and girls seeing netizens cheated, raped and even killed all rank first. For example, 17, 20 13 20 19, when it was still dark, Xiao Min, who had just had dinner, called a classmate's house in the west of the village and went to Little Square in the village alone to meet Miao Xiaoshuai, a QQ netizen he didn't know, only to be forcibly taken to the cornfield outside the village by six men from the neighboring village for sexual assault. On June 20 14, 15-year-old Yunnan girl Xiaocao chatted on QQ.

I met a local, believed in sweet words, followed him to Weihai to play, but was violently attacked. Xiaocao was lucky to escape and met a local male netizen in Weihai. He was beaten and scolded, and the penniless grass called the police for help. 2 1, with the help of the police, Xiao Cao returned home. There are many similar cases. Students, please open your eyes first when netizens propose to meet. The lesson of blood always rings a wake-up call for us. Of course, through the news and repeated bombing by parents and teachers, our classmates have certain antibodies and will not be easily fooled, but I still want to talk about it here and give you another shot, hoping to turn you into an iron wall.

Third, middle school students should release information carefully.

People's Republic of China (PRC) * * * and the Criminal Law Amendment (IX) add one paragraph to Article 29 1 of the current Criminal Law: "Whoever fabricates false information about dangerous situation, epidemic situation, disaster situation and early warning and spreads it on the information network or other media, or knowingly spreads it on the information network or other media, thus seriously disrupting social order, shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention or public surveillance; Those who cause serious consequences shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years. " This has restrained the reckless behavior of "Big V" from the legal source, and also sounded the alarm for our middle school students. Some of our classmates like to send Weibo and forward information, which is okay, but we must remember that you must not send or forward it without your own confirmation or official announcement, because when you send or forward it, you can't predict the possible consequences. If it leads to serious consequences, it violates the law.

Will be punished by law. On September 2, 2065438, an accidental death occurred in Zhang Chuan Town, Zhangjiachuan County, Gansu Province. 14, 15, 16-year-old junior high school student Yang repeatedly questioned the cause of death on the Internet and posted "We must March!" The next day, a large number of people marched and besieged the government. 17, Yang was criminally detained on suspicion of stirring up trouble. On May 29th, 2008, Jia, a computer major student of Anyouya University, used his computer knowledge to control the network server of the school computer room in Room 2 18 of Anyouya University and attacked the website of Shaanxi Earthquake Administration. After canceling the user name and password of the website of the Seismological Bureau of Shaanxi Province, Jia invaded the information release page of the website and released the false information entitled "A strong earthquake occurred in Shaanxi and other places at 23: 30 tonight" at 20: 53 on the same day. Within l0 minutes after the information was released, the number of hits reached 767. Subsequently, people kept calling the Seismological Bureau of Shaanxi Province to inquire about this matter, which caused serious public panic. According to Article 291-1 of the Criminal Law of People's Republic of China (PRC), the defendant Jia was convicted of fabricating and intentionally spreading false terrorist information and sentenced to one year and six months' imprisonment. Both real cases misled the public, disturbed the normal social order, brought panic to the public and caused unnecessary trouble. They are typical campus crimes in which students use network tools to publish false information.

Students may rarely commit crimes, but I still want to remind students to be cautious when posting information online, and not to upload some negative photos of their lives to WeChat. For example, a male student in a middle school uploaded photos of his classmates taking a bath to Weibo, and some students in our school took some disgraceful photos on WeChat. Fortunately, it was discovered by the school in time and did not cause serious adverse consequences. It is illegal for you to publish photos of your classmates' negative lives, on the one hand, it infringes on the privacy of others. On the other hand, it is easy to cause conflicts between classmates.

Fourth, middle school students need to beware of online fraud.

With the development of the Internet, surfing the Internet has become an indispensable part of people's lives. However, it not only brings convenience to people, but also provides an opportunity for criminals to commit "online fraud". Common online scams are: 1. Use QQ to steal numbers for fraud; The scammer uses a hacker program to unlock the user's password, and then Zhang Guan Dai Li pretends to be the victim's QQ friend or relative to borrow money. 2. Use online game transactions for fraud; 3. Use online shopping for fraud. 4. Cheating by winning online prizes. 5. Use "phishing" for fraud. 6. Use the Internet to order air tickets and train tickets for fraud; 7. For college graduates' employment, college students' part-time fraud, and so on. For example, Li Tongxue of a school said that he saw someone posting the information of substitute training in the online game World of Warcraft on June 25th of 10, so he added QQ to discuss the matter of substitute training. After talking about the price, the training said that it was no problem to open the website, so it recharged 300 yuan. After the platform said that 800 yuan needed to be added as the deposit, the negotiation failed, and he recharged 500 yuan. Customer service attitude is very good. After chatting for a while, he said that Li Tongxue's account was miscalculated, and the money could not be entered, so Li Tongxue was asked to recharge 2800 yuan. Li Tongxue found something was wrong and kept asking the customer service what was going on. The other party said that it needs to report to the superior and solve it in three days. I haven't heard from you since. After that, Li Tongxue saw many similar cases on the Internet, only to determine that he had been cheated by 800 yuan.

Mobile phones are our personal privacy, including our QQ, WeChat and even bank cards. So when we surf the Internet, don't click on links from unknown sources, don't grab unknown red envelopes, and don't reveal our personal information casually. I also hope that everyone can make good use of the network, make themselves the masters of the network, and use the network to serve themselves.

Finally, the following initiatives were issued to all teachers and students:

Abide by the convention and strive to be the norm of network morality. It is necessary to learn the network moral norms, understand the basic right and wrong, enhance the network moral consciousness, distinguish the boundaries between good and evil, beauty and ugliness on the internet, stimulate the yearning and pursuit of a better network life, and form a good network moral code of conduct.

Abide by the convention and strive to be the messenger of network civilization. We should understand the connotation of network civilization, know the truth of advocating science and pursuing true knowledge, enhance the awareness of network civilization, use the language of network civilization, advocate new civilized fashion in the infinite network world, and create a healthy network moral environment.

Abide by the convention and strive to be the guardian of network security. We should recognize the importance of network security, use network resources legally and rationally, enhance the awareness of network security, supervise and guard against unsafe hidden dangers, maintain normal network operation order and promote the healthy development of the network.

The network of security precautions for middle school students has become an indispensable part of our lives, which provides great convenience for us to obtain information and make friends. With the coming of holidays, students will spend a lot of time using the Internet. In order to strengthen students' understanding of network security, improve students' awareness of network crime prevention, use network resources reasonably and correctly, and have a happy summer vacation, the school hereby appeals to students and parents to pay attention to students' network security, and pay attention to the following aspects:

1, make friends online, pay attention to distinguish the difference between network and reality, and avoid being too addicted to the network.

2. Don't leave any personal real information (including name, age, address, school, class, etc.). ) on an untrustworthy website, or disclose this information to other netizens.

3. Be careful to guard against netizens or lawless elements who are unconscious in the network, pay attention to strengthening personal protection awareness, and avoid unnecessary harassment of personal life by undesirable elements.

4, in the network activities should abide by the law and self-discipline, identify some harmful and untrue public information spread on the network, don't be misled by bad comments and information, don't participate in the production and dissemination of harmful and useless information.

5. If you don't know each other, you should try to avoid meeting directly with netizens or participating in various networking activities, so as not to be used by criminals and endanger your own safety.

6. Online shopping or trading should be carried out with the help and guidance of parents. Verify the commodity information or trading situation in advance, do not easily pay the other party or provide the bank card password, and be alert to online fraud.

7. Parents should pay more attention to, guide and supervise students' online situation, properly control students' online time, and avoid various diseases caused by long-term online.

Rules for students to surf the Internet safely 1. Don't trust others easily on the Internet.

In order to cheat your trust, online scammers can call him a boss, an expert, a doctor, a policeman, a lawyer, a handsome guy, a beautiful woman, and even the leaders of important state organs and departments. It must be remembered that on the internet, everyone can't see each other and can't understand each other's actual situation. Probably a rogue who can only type.

Don't trust emails that attack state institutions and leaders easily. Those reactionary emails claiming to be "truth" and "small reference" fabricated a large number of false and distorted reports, disturbing people's hearts and attempting to create social unrest. Who can prove that what they said is true? Don't believe emails with cult nature and superstitious content. For example, some emails say, "If you receive this email, you will be lucky. Just forward this email to 20 people. " . Please don't hesitate to delete this kind of mail in the future.

Don't disclose your personal privacy information to anyone.

Don't disclose your name, phone number, address, any password and other important information to anyone. Otherwise, it is likely to bring you trouble. For example, Sina news website reported many cases of female college students being harassed by a large number of pornographic phone calls. Because they revealed their personal names and phone numbers to netizens, they were maliciously posted on the forums of pornographic websites by netizens.

3. Don't accept anyone's files of any kind.

It is very popular to use QQ and MSN to transfer files now. Here, we are seriously warned that it is extremely dangerous to receive other people's documents. Files in any format, such as pictures, texts, screensavers, electronic pets, etc. , may be integrated into the Trojan horse. If you open these files in case there is a Trojan horse. Your computer will be completely controlled, and all hard disk data can be viewed, modified and deleted by anyone, with any password such as QQ, email, online banking, game account, forum account, etc. It may have been stolen. Once again: Never accept any documents unless it is necessary and impossible for work. Even the files of classmates and old friends should be received with special care. It is often these people who play practical jokes. They may be harmless, but as long as you use Trojan horse to run files, other people who use Trojan horse control software can search your computer and be run by Trojan horse. Winning a Trojan horse will also slow down your computer.

4. Pay attention to QQ tail virus

As soon as you open QQ, you may receive messages from your friends, such as: 1: introducing a good xxx website to you. I found your photo on XXXX website, so I want you to have a quick look. 3: Say it's urgent. Please remit money to his friend's bank account first, and then transfer it back to you in the evening. 4: Let you dial a phone number, listen to his news and songs, and so on. Please don't believe that these are automatically sent by your friends infected with QQ virus. If you visit the prompted website, you may be infected with the same virus. Remittances and phone calls to listen to news are fraud.

5. Antivirus software is not 100% reliable.

Antivirus software can defend against most viruses and Trojans, but it is not 100% reliable. Some unpopular Trojans or modified Trojan variants cannot be killed by antivirus software. So just because your computer can't detect Trojans with antivirus software doesn't mean that your computer doesn't have Trojans. In particular, some trojans written by hackers themselves are the most dangerous because they have not been circulated, so they have not been included in the strangulation target by antivirus software.

6. Don't run attachments in emails.

Attachments in emails are likely to contain viruses and trojans. Don't open the attachment of this email unless you are sure that it was sent to you by your friend.

7. Pay attention to the safe use of the camera

Because hackers can use Trojan software to remotely turn on your camera for peeping or video recording, unplug the USB cable connecting the camera and the computer when not using the camera, or move the lens of the camera to the wall.

8. Girls should not meet strangers alone.

Girls should never meet strangers alone. If you really need to meet, bring more friends with you.

9. Stay away from online pornography and create a better life.

Internet pornography is a kind of psychoactive drug, which is very easy for people to indulge in, poisoning the pure hearts of boys and girls, and creating countless peeping tom, rapists and mental patients. For the spread of online pornography, we can only appeal to everyone here to consciously resist online pornography and make good use of the Internet to do meaningful things.

Anyone who has read "Network Security Knowledge for Middle School Students" has also seen:

1. Keynote Speech on Network Security for Middle School Students

2. Middle school students' safety knowledge handwritten newspaper content

3. You must learn the most basic knowledge of network security.

4. How do novices surf the Internet safely?

5. The middle school students' safety education handwritten newspaper pictures daquan

6. Middle school students' fire safety knowledge