Current location - Music Encyclopedia - Dating - Personal network security work summary report
Personal network security work summary report
Article 1:

2 1 century, the internet has become a part of people's daily life, and many people can't even live without it. With the internet, people can have food and clothing without leaving home. I just saw the news on TV the other day that online shopping was hot at the end of the year, and the courier company was also in Spring Festival travel rush. In the past, people had to ask someone for help when looking for something, but now people can find online help when looking for something. I remember once I didn't know where the key was, and Baidu said, "I lost the key there." As a result, I really found it according to the scheme suggested by netizens.

With the explosive development of the network, the network environment has become more and more complex and open. At the same time, various security vulnerabilities are constantly exposed, malicious threats and attacks are increasing day by day, and security incidents are increasing day by day, which also threaten everyone who comes into contact with the Internet to varying degrees. Here, I will talk about my own experience on various network security problems I have encountered in my life and work:

1. It is very important to be aware of network security.

When it comes to network security, what makes us very helpless is that many people think that this is a matter for computer network professionals. In fact, everyone should have a sense of network security, which is particularly important for the staff of secret-related units. Some time ago, I watched the TV series "Secret War", and most of the ways of leaking secrets were caused by the weak safety awareness of the relevant personnel: the unit required that the confidentiality work be completed in the office, that is, someone brought it home to work overtime privately, resulting in leaking secrets; Important departments require outsiders not to enter, and some people bring idle people in to cause leaks; Private network computers are not allowed to connect to the Internet. Someone.

Playing games on the external network leads to leaks; Even the secret-related personnel made careless friends and fell in love with spies, causing leaks. Although this is only a TV series, it is also a warning to the secret units. When I watched this TV series, I thought that I should show it to the security department as a safety education film.

Not only secret-related units, but also individuals, network security awareness is particularly important. The endless camera leaks and "doors" and "doors" on the network are all caused by weak personal safety awareness. As the teacher said, "What you see is not necessarily true!" .

I have some software and systems that I usually make on my own computer. Although it is nothing important, it is also the result of my own efforts. So I have been very careful when using the computer, for fear of any Trojan horses, viruses and the like. The small column of "360 Traffic Monitoring" has been in the lower right corner of my "desktop". As long as there is upload traffic, I must go and see what process is uploaded.

Usually, when maintaining the system for others, you will often encounter the situation that the anti-virus software has not been upgraded for a long time, and the owner also plausibly said that he installed anti-virus software. In their view, anti-virus software is enough, and the rest is unnecessary. I often say to them, "You have to feed the dog every day!" "

2. Equipment safety-Many technologies exceeded our expectations.

Network equipment is the hardware foundation of network operation, and equipment security is an essential link of the network.

I've heard of electric leakage before, but I've never seen it. Recently, a colleague of the company brought two "power cats" (power line Ethernet signal transmission adapters), one plugged into the power supply, and the other connected to the computer within 30 meters through the interface network cable. This reminds me that as long as someone connects the confidential network cable to the power cord, it is easy to leak. Of course, this national security department must have relevant preventive measures.

Search in a search engine, such as Intitle: "Live View/-Axis 206W", and you can find the webcam. In the TV series "Secret War", the monitoring system of a secret department is networked, and spies use the monitoring system to steal the screen information and key information of staff. By installing a transmitter based on mobile network on the copier in a government confidential room, all confidential documents scanned on another receiver can be reused.

1985, at an international computer security conference held in France, van eyck, a young Dutchman, disclosed his technology of stealing microcomputer information in front of representatives of various countries. He transformed the ordinary TV set with equipment worth only a few hundred dollars and then installed it in the car. In this way, he received the information of computer electromagnetic waves lying on the eighth floor from the street downstairs, and displayed the images displayed on the computer screen.

His demonstration gave the delegates a great shock. I first learned about electromagnetic leakage when I was developing software for an army unit in 20xx. I installed * in many places in the army to prevent electromagnetic leakage.

Hard disk data does not exist unless deleted, and can be recovered by recovery software such as EasyRecovery. It seems that only by melting the confidential hard disk in the steelmaking furnace can it be foolproof.

3. Beware of Trojans

I first learned about Trojans when I was in college. At that time, I saw a screen delivery software called "Big Eyes" on the Internet. I was curious and gave it a try. Only commonly used software is installed on the computer in the university computer room, and other software, such as QQ, is stored on the server. I installed it myself when I used it. When the student computer is restarted with the protection card, it will be restored and must be reinstalled.

So I put the "big eyes" client on the server and took a very attractive name. As a result, many students' screens were monitored by us. Some students laughed and said, "It's just a Trojan horse!" After searching, I found that a program named "Trojan Horse" used the same method to steal privacy. Later, I also made up a fake QQ program to steal other people's QQ, but I gave it to others. Who knew that 7-digit and 8-digit QQ numbers could be so popular now?

In the past, computers were protected against viruses such as CIH and worms, but now they are more protected against Trojan viruses, mainly because personal computers can steal passwords such as Alipay, QQ account and online banking. When you open unsafe web pages, malicious emails sent by others, when you install unsafe software, and when you use a USB flash drive, you may be infected with Trojan virus.

Some time ago, in the "dispute between 360 and QQ", there were many unsafe software in our computer, which might reveal our privacy.

4. Web page security

In the unit, I am responsible for the website maintenance of several departments, mainly the production of web pages. At the beginning of programming, I didn't expect to be attacked. Later, the website I made was often attacked, only to know the attack methods such as SQL injection and Ewebeditor vulnerability, so I will pay attention to the security of these aspects when programming. For example, my background database is generally "x.asp#xxxxxx.mdb". Prevent the database from being downloaded.

I remember writing a message board program for a department again. Results 1 day, there were more than 3000 malicious messages in English, which was quite a headache. Finally, the verification code is set, and the user verification will not work until the webpage code for detecting the source of the message is used. It turned out that people attacked with tools.

5. Develop good online habits

Network security involves everyone who uses the network. For individuals, to ensure their online safety, everyone should develop good online habits. I think it should include the following points:

1) The computer should be equipped with firewall and antivirus software, and upgraded in time. If the computer is connected to the Internet, it will automatically upgrade. And develop a regular security scanning computer;

2) Update windows patches in time;

3) Under the condition of ensuring the security of the system, do a good job of GHOST backup to prevent the system from recovering in time when it encounters stubborn viruses;

4) Don't use QQ to click and execute websites and programs sent by netizens.

5) Don't browse unsafe web pages;

6)*** files should be closed in time, and the working group computer in the unit often sees things enjoyed by others;

7) Don't browse unfamiliar emails;

8) Open the USB flash drive after antivirus;

9) Don't log in to your bank account, Alipay, QQ, etc. On someone else's computer; For each of us, improving the awareness of network security and learning the knowledge of network security are the basic requirements for us in the network era.

Article 2:

The healthy growth of teenagers is related to social stability, national prosperity and the future of the country. Therefore, it is of great significance to educate and protect the next generation. Middle school is an important period for a person to grow up. The success or failure of middle school education, especially the safety education for middle school students, is directly related to whether a person can become a success in the future.

With the advent of the information age, various Internet cafes have sprung up in various towns. Some of them are officially listed Internet cafes, but most of them are unlicensed underground black Internet cafes. The market targeted by these black Internet cafes is young students. Some students are addicted to online games, cheating their parents and teachers, trying to raise funds and using all available time to surf the Internet.

There are many students who used to be excellent. I am addicted to the fantasy world all day because I have strayed into the black internet bar, and my studies are neglected, and my health is getting worse and worse. Black Internet cafes not only have games that students can't play day and night, but also unhealthy web pages that are not suitable for middle school students.

It is an outstanding task for us to do a good job in the network security education and management of middle school students, to ensure the personal and property safety of middle school students and to promote their physical and mental health development.

In view of this situation, first, cooperate with parents to manage our students well; Second, we should report to the relevant law enforcement departments and destroy these black internet cafes; Third, strengthen the publicity and education of network laws and regulations, improve middle school students' awareness of network security, and ideologically form a "firewall" that can resist external reactions and erosion. Fourthly, organizing students to actively participate in school safety management and letting middle school students participate in school safety management is an effective way to improve middle school students' safety awareness. Finally, strive for the cooperation of relevant departments, rectify the surrounding environment of the campus and optimize the education environment.

While increasing the investment in campus security forces, improving the quality of security personnel and the level of school safety education, schools should actively seek the support of local governments and public security organs, severely crack down on illegal acts that endanger the safety of schools and middle school students, effectively improve the security situation around the campus, and optimize the educational environment. Some street stalls at the school gate, some black internet cafes near the campus, all problems that have potential safety hazards for middle school students, which should be banned and cracked down, should be solved as soon as possible.

Public security incidents or safety accidents in schools shall be dealt with according to law and notified in time. Students who violate safety regulations should be criticized and educated, and even necessary disciplinary action should be taken. Effective preventive measures should be taken in time for the hidden dangers found, so as to create a safe and civilized educational environment and make new contributions to improving the quality of education and teaching and the development of education in China.

To sum up, middle school students' safety education is a systematic project, which needs the close cooperation of society, schools and families. Internally, it is necessary for all departments of the school to work together, pay close attention to management, and organize students to actively participate in order to achieve the goal of safety education for middle school students.