University of Electronic Science and Technology: The core of "mining" governance lies in people
Author:China Education Network Time:2022.07.13
At present, the "mining" behavior has been repeatedly banned and distributed in many fields such as finance, communications, and education. Regarding the "mining" prevention and governance in the field of education, Liu Renting, an engineer of the Information Center of the University of Electronic Science and Technology, said that the priority is to enhance the "mining" prevention awareness and personal disposal ability of teachers and students. Through management methods and technical means, ideas and practice are grasped, and the hands of the user can be effectively controlled.
Management: standardize the governance system, open the green channel
During the rectification of the "mining" activity, in addition to conventional issues such as difficulty in controlling, positioning, and blocking difficulties, Liu Renting emphasized that the key to the rectification of the "mining" activity is "people". To this end, the University of Electronic Science and Technology has done the following work:
First of all, leaders attach great importance to setting up work classes.
The development of the "mining" rectification requires close cooperation within the staff, otherwise it will not be able to promote the improvement process quickly and effectively. According to Liu Renting, in order to facilitate the internal communication of the staff and effectively promote the improvement of the improvement, the university of Electronic Science and Technology is led by the school leaders to establish a special class to achieve multi -group collaboration and jointly start the "mining" governance battle.
Secondly, a number of notifications are issued to clarify the rectification requirements of "mining".
The "mining" rectification work requires the integration of colleges and universities to promote it. In order to facilitate the promotion of self -examination and rectification work, the University of Electronic Science and Technology has issued multiple rectification notices. For example, the "Notice on Carrying and Rectification and Rectification" issued on March 3, 2022, based on the "Notice on Carrying out the" Mining "self -inspection of virtual currencies" in January this year After verification and punishment, the terminal that emphasizes that the rectification is not completed in time after the notification, and the punishment measures for disconnection or accounts will be adopted in subsequent reports.
On March 29, 2022, the school issued the "Notice on Further Strengthening the" Mining "behavior", conduct a comprehensive investigation of the units in the school, and once again increase the disposal. The Internet account is banned. While helping users clarify the requirements of "mining" rectification, multiple notification documents also sounded the alarm for users who had "mining" behavior, effectively enhancing the awareness of "mining" prevention of teachers and students.
Finally, on -site inspections to implement rectification requirements.
The release of the "mining" rectification notice and user execution often require a certain period of time, so how to quickly and effectively implement the rectification requirements into the only way for major universities. According to Liu Renting, the University of Electronic Science and Technology first inspected the "mining" rectification, and found more than a hundred terminals through threat intelligence. Due to the huge volume, the school allows all units to investigate by themselves by themselves, but "mining" activities will still occur.
In order to reduce the number of "mining" activities, the staff spent more than a month and conducted on -site inspections on all departments of the two campuses (see Table 1) to fully implement the special rectification of "mining". For example, the staff conducted a comprehensive inspection of the experimental computer room, requiring the experimental computer room equipment to install anti -virus software, and it must be updated to the latest virus library, and the "mining" virus was cut to invade the equipment through the "one -click restore card".
Table 1 Special inspection content of "mining"
Technical: Multiple measures to achieve dynamic clearing zero
The rectification work of "mining" needs to be stepped forward, continuous, and cannot be done overnight. In order to achieve the "mining" activity "dynamic clearing" as soon as possible, the University of Electronic Science and Technology actively communicates with brother universities. In addition to conventional technical means, the following measures are also taken:
First, we can enhance personal disposal capabilities through the self -help cleaning manual.
Liu Renting introduced that the relevant staff of the "mining" rectification of the University of Electronic Science and Technology chose the way of conducting on -site inspection science to help users solve problems such as weak passwords. At the same time, remind users not to download pirated software, do not install remote control software or FRP internal network penetration applications, emphasizing that investigation methods and processing methods need to be investigated and cleaned in accordance with the "Mining" Trojan Self -service Manual. The manual gives the "mining" Trojan horse horse emergency processing method and detailed steps. The graphic is also available, which can more intuitively assist teachers and students to handle the "mining" Trojan horse and enhance the teacher -student "mining" Trojan horses.
Second, cancel the router agent online and implement the real name system.
The use of routers, while facilitating user needs, also makes it difficult to position the "mining" host. According to Liu Renting, the University of Electronic Science and Technology has transformed the road to the Internet into a switch mode, and at the same time, all equipment of the individual terminal is required to implement the real name system. However, the promotion of this special work is not smooth. For example, some laboratory users have their own local area network network needs. If the router is canceled, the shared server will be exposed to the campus network, and new problems will be derived. In addition, if the router agent access the Internet, users will obtain the only independent IP address on the campus network, and this IP will involve the need for authentication and independent dialing of dumb terminals such as printers. Therefore, when the workload has doubled, the staff will also face certain challenges.
Third, clear the order of implementation and completely clear the "mining" Trojan.
In terms of "mining" Trojan cleanup, most people may have this experience, clearly clean up the process, delete the Trojan document, but not long, the CPU occupation rate has begun to rise or access the cycle of the "mining" domain name. DNS request action. In fact, the reason is that it is not thorough or orderly. If you only clean up the "mining" process and corresponding files, but do not clean up the plan task and the guardian process, the "mining" program will still be resurrected. In this regard, Liu Renting suggested that when cleaning up the "mining" Trojan, you can give priority to clearing the plan tasks, startup items, and guardianship process, and then clear the "mining" process and other malicious processes. At the same time, you can also try a variety of different anti -virus software. From the release of various notifications to the self -inspection and publicity session, and then to the on -site inspection in the later period, the University of Electronic Science and Technology has always started from users. While enhancing the user's "mining" awareness, it is not forgotten to improve its personal disposal ability. Essence In addition, Liu Renting said that after a series of remediation, most of the "mining" activities of the University of Electronic Science and Technology have been disposed of.
It can be seen that the two hands of ideas and practice can more effectively control the hands of users to cross the border. Moreover, the current "mining" activity has not stopped, and the rectification operations are still on the road. All colleges and universities need to work together to carry out the "mining" governance to the end, and jointly depict a green and safe campus network new blueprint.
Reporter: Chen Yongjie
Submit or cooperate, please contact: [email protected]
- END -
Beijing University of Aeronautics and Astronautics releases the 70th anniversary of school celebration signs
The seventy -year -old empty heaven is reported to the country, and the new era is...
The residual plan of the secondary vocational documented plan is that the hot and cold unevenness exceeds 630 points to fill the popular professional or relatively stable
Yangcheng Evening News all -media reporter Cui Wencan intern Cao YaoOn July 20, the Office of the Guangzhou Admissions Examination Committee issued the Notice on the announcement of the 2022 Guangzho