Cyber security participation!Do you know these knowledge?
Author:Beijing Forestry University Time:2022.09.07
Without network security, there is no national security
There is no economic and social stability operation
The interests of the people and the masses are also difficult to guarantee
September 5th to 11th
It is 2022 National Network Security Propaganda Week
The theme of this year is
"Cyber security depends on the people's network security"
In social life
Ratch virus, telecommunications fraud, public places
WiFi trap, invincible personal information leakage
Once the harm occasionally occurs
Beijing Forestry University
Joint Information Construction and Management Office
Copy typical scenes
Teach you how to deal with common network security risks
Come and learn with the officials!
Pretend to be a hot spot
The mobile phone is a bit expensive, and the network can save traffic fees. At present, home wireless broadband routers are very popular. Due to the limitations of wireless signal transmission, commercial institutions usually use multiple access points to provide regional signal coverage. The criminals are set up by setting up counterfeit/high imitation/cottage Wi-Fi, and attract users to connect with similar names. All your upload download content is mastered by hackers!
Precautions
1. Careful and careful false: Wi-Fi provider to confirm the hotspot name and password to the Wi-Fi provider in public; Wi-Fi risk that can be accessed without passwords is high, try not to use it.
2. Avoid sensitive business: Do not use public Wi-Fi for shopping, online bank transfer and other operations to avoid logging in to account and input personal sensitive information. If the safety is required, you can use VPN service if you have conditions.
3. Close Wi-Fi automatic connection: Hackers will establish fake hotspots of the same name, and use the advantages of close signal to become the "evil twins" directly entering the point. Once the phone is connected automatically, it will cause information leakage.
4. Pay attention to security reinforcement: Set up strong passwords for Wi-Fi router and opening WPA2 is the most effective Wi-Fi security setting.
5. Run completely scanning: Install security software, carry out security scanning such as Wi-Fi environment to reduce security threats.
Personal information protection
Once personal information is leaked, illegally provided or abused, it may endanger the safety of people and property, which can easily lead to personal reputation, physical and mental health damage or discrimination treatment.
Precautions
1. Tear the courier list completely.
2. Refuse to participate in constellation and personality test.
3. Share the delivery flow confirmation is an official product or business activity, otherwise it is suspected of inducing sharing.
4. Everyone who requires input personal information is fake red envelopes.
5. Try not to expose the picture on the way to the trip.
6. Turn off the GPS when taking pictures, delete the location related information in the picture attribute, and send a screenshot of the photo.
7. The circle of friends sets access rules to limit the scope of access.
8. Pay attention to information leakage, timely adjust setting passwords, replace credit cards, etc.
Malicious QR code
The QR code is used on the plane to use several and binary numbers 0 or 1 relative graphics to represent the geometric form of data information. The three squares on the corner are used for the two -dimensional code scanning equipment for positioning. A large amount of activities such as information acquisition, advertising push, preferential promotion, anti -counterfeiting, payment and other activities.
Precautions
1. Pay attention to the source: to be vigilant for various QR codes on the street, do not scan the QR code of unknown sources, such as the payment code on the fake parking ticket.
2. Safety scanning: Use the QR code security detection software such as mobile phone housekeepers to assist in determining whether it is a malicious website and whether there are malicious software behind it.
3. Differential true and false: Some scammers unlock the QR code on the shared bicycle covering a new, transparent QR code, or printing paper on the car. When requesting or downloading software, pay attention to discern's whereabouts and software sources.
Password safety
The password is commonly known as a password, which is a string of characters that have proved their identity to computers/websites, such as 123456, 1Q2W3E, PO $ $ W0rd, etc.
Precautions
1. Avoid weak passwords
(1) Do not include the username;
(2) Try not to use words in the dictionary;
(3) Do not reuse the password that I used to use;
(4) Do not use adjacent keys on the keyboard, such as QWERTY, 123456,! @#¥%
(5) Do not use personal information, such as driver's license, telephone, etc.;
(6) Do not use the sixth and eighth positions of the ID card, and do not use common prefixes such as BJFU BJFU.
2. Set strong password
(1) At least 8 characters;
(2) Including at least uppercase and lowercase letters;
(3) Contains at least one number;
(4) Contains at least one special character;
(5) Different websites set different user names and passwords;
(6) Use software such as Keepass to help manage passwords.
Ransomware
The ransomware is a type of malware to lock the system screen or lock the user file to prevent or restrict the normal use of the user's normal use of the computer, and in order to settle the user to pay the ransom. The scary strategies of ransomware include: lock the screen, delete backup files, accelerate deletion files, increase the amount of ransom. The form of ransom includes: real currency, Bitcoin and other virtual currencies.
Precautions
1. Refusable ransom: Paying ransom will promote the attacker's anger. The attacker will also analyze user finance and data value through the ransom speed of user payment, and may be stared at.
2. Anti -virus and anti -virus: try to download software from the official website, install regular anti -virus software, and perform virus scanning before running download software. 3. Update in time: Pay attention to the security announcement of the operating system, install the security patches in time, and block the vulnerability as soon as possible.
4. Clocking port: Close the useless computer service/port, turn on the Windows firewall to reduce the "channel" of being attacked.
5. Backup: Use the disc/mobile hard disk and other media to regularly backup the documents, emails, databases, source code, pictures, compression files and other types of data assets and save them.
The above is about
How to cope with common network risks
Everyone must remember!
At the beginning of school, to effectively improve our school's 2022 freshman
Awareness of anti -fraud and safety awareness solidly promotes campus anti -fraud and anti -fraud work
Our school invites the Haidian Branch of the Beijing Public Security Bureau
Anti -Telecom Network Fraud Center Police Officer Zou Hong
It is 6321 new students
Carry out live broadcast lessons for anti -fraud and security education
Pass the webcast class
Beijing Forestry University official WeChat and WeChat video number broadcast
More than 14,000 people watch online
Improving the safety awareness of teachers and students
Further build the campus anti -fraud defense line
Police Officer Zou Hong was deceived by the teachers and students of colleges and universities, using pictures, videos, call recording with the victims, and other materials. The basic characteristics and fraud routines of logistics customer service category and other high -incidence fraud have proposed targeted precautionary suggestions to introduce and mobilize new students to download and use the "National Anti -Fraud" APP.
It is reported that our school attaches great importance to campus prevention and anti -fraud publicity and education, and has carried out activities such as anti -telecommunications fraud publicity and education into dormitory, theme class meeting, and signing a warning committee for preventing telecommunications fraud warning. Next, the school will continue to increase publicity, create a good anti -fraud campus atmosphere, and better protect the safety of teachers and students and employees.
Cyber security has nothing to do with
Please continue to follow
2022 National Network Security Propaganda Week Activity
What is National Network Security Propaganda Week
"National Network Security Propaganda Week", "China National Network Security Propaganda Week", is a theme activity carried out to "build network security and share network civilization". Cyber security issues, for the hot issues of public concern, organize a series of theme publicity activities such as network security experience exhibitions to create a good atmosphere of everyone's responsibility and participation of everyone.
The 2022 National Cyber Security Publicity Week will be held nationwide from September 5th to 11th. The theme of the event is "network security is the people, and network security depends on the people." In the meantime, through online and offline exhibitions and interactions, it will carry out activities such as cybersecurity education cloud classrooms, network security events, cybersecurity competitions, network security entry into the grassroots level, and 6 major series of theme days such as campus day, telecommunications day, and personal information protection day.
Cyber Security Knowledge Breakfast Manual
In 2022 National Network Security Propaganda Week activities
Our school adopts online activities
Organize the participation of "college teachers and students with the above network security class"
Participate in the national college student network security knowledge answer questions
Publicity network security knowledge
Improve the awareness of students' network security precautions
Course Introduction
The Ideological and Political Work Department of the Ministry of Education and the Criminal Investigation Bureau of the Ministry of Public Security instructed Chinese college students to launch the "college teachers and students with the above network security class" online, inviting public security police officers and counselor representatives to establish and personal information protection and prevent telecommunications fraud The dimension jointly builds a open class for teachers and students across the country. From September 6th to 12th, teachers and students can log in to the official website of China University of China (dxs.moe.gov.cn) or WeChat code scanning video number, fast hand, B station to watch, the event is over, the course can be seen back.
Quiz
From September 6th to 12th, the Ideological and Political Work Department of the Ministry of Education and the Criminal Investigation Bureau of the Ministry of Public Security instructed Chinese college students to organize the "Guardian Youth Network with You" national college student network security knowledge answering activity, and popularized network security knowledge through online answers. Improve the ability of college students to prevent network fraud and use the network safely. Teachers and students can participate in answering questions through the "Chinese University Student Online" WeChat public account, click on the menu bar "Guardian Youth".
Cyber security has nothing to do with
Scholars, communicators, and guardians who do network security
It is the common responsibility of the whole society
Looking forward to your active participation!
Future / Phase / Essence / Color
Straight at the scene! Beilin University 2022 freshmen reported today!
The second day of the registration day! Hello, Beijing Forestry University!
New Yan Huanhuan! Did you find the surprise in Beilin University campus?
-bjfu1952-
Beijing Forestry University New Media Alliance
Produced | Beijing Forestry University Party Committee Propaganda Department
Illustration | 2022 National Network Security Propaganda Week official website
Source | Beijing Forestry University Party Committee Security Department (Office)
Author | Mao Chengzhi, Yang Qinrun, Geng Huimin, Wang Ziyu
Review | Cai Qingjie
School pair | Li Junwei
Editor -in -law | Zhang Wei
Review | Zhu Tianlei
Submit mailbox [email protected]
Set as an astrology every day, I don't miss it every day
For excellent Beilin people
Share+like 点+light 666 "watching"
- END -
Hengyang High -tech Zone: Juggi three innovations, support the "sunny sun" of the industry
The development of the park, industry -based, innovation as the soul.This year, th...
E -sports hotel efficiency upgrade sharp weapon -Huijie Technology Digital Platform
Gaming Hotel SaaSOn May 4th, Ctrip released the 2022 May Day holiday report displa...