When we are inspired and have a new view of our study and work life, we can usually write down our experiences, so that we can formulate a good summary method. So what should I write about my experience? The following is my carefully compiled experience on network security and confidentiality, for reference only, and I hope it will help everyone.
Nowadays, information networking makes the relationship between information and security more and more close, and computers and the Internet have become indispensable media tools in daily work and life. Ordinary browsing pages, an inexplicable email, a small mobile storage medium, as long as Trojan virus is implanted, as long as secret-related computers are connected directly or indirectly, it will cause the loss and disclosure of secrets. As the saying goes, "details determine success or failure", we should deeply understand the importance of secrecy in the new situation and always maintain a high degree of political acumen. Firmly establish the concept of "the hidden danger of leaking secrets is around, and the confidentiality work starts from me", and pay attention to small things, details and small things; Be vigilant in words and deeds, keep a string in your mind and a lock on your tongue, don't say what you shouldn't say, don't look at what you shouldn't see, don't do what you shouldn't do, start with details, small things and things around you, strictly observe discipline and keep secrets; Really understand the secrecy law in the study, attach importance to the study of secrecy knowledge, deeply understand the essence of secrecy work, pay attention to developing good work habits and do a good job in secrecy propaganda.
Secrecy means keeping secrets or secrets and not letting them out. The secret of the Conservative Party and the state is the obligation of every citizen, and it is also the responsibility that party member and public officials must fulfill. Safety work has always been an important task of our party and country, shouldering the heavy responsibility of ensuring safety and development.
Improving the ability and level of security work is conducive to promoting the safe development of work and the security protection of information. As a government functional department, we should strengthen the sense of confidentiality and do a good job in information security. Regularly carry out security-related work, find out the situation, enhance the sense of confidentiality, and regularly carry out security education. It is necessary to focus on improving the confidentiality awareness of leading cadres and key positions, strengthen leadership, establish and improve the confidentiality system, and seriously investigate and deal with hidden dangers of confidentiality. Regularly carry out safety self-inspection, focusing on checking whether Internet computers have classified information, whether the internal and external networks of mobile storage media are cross-used, whether personal computers and mobile storage media have handled classified information, rectifying the problems found, and eliminating all kinds of hidden dangers and loopholes.
Confidentiality and security work is going on all the time. It is necessary to tighten the string of confidentiality work, do a good job in confidentiality work, and promote the work to be carried out better.
With the rapid development of information technology and the increasing number of information dissemination channels, the connotation and extension of military security work in the new period are constantly enriched and expanded, facing unprecedented new situations and challenges. How to adapt to the complex new situation, better serve the central work of the army, and do a good job in the support of the army is a new topic that every officer and soldier needs to devote himself to thinking and seriously discussing. Information security and confidentiality is a long-term and historic political task. Today, with the progress of science and technology, security has become the top priority of all work. Therefore, we must actively formulate effective measures to do a good job in information security and confidentiality, and safeguard national security and stability.
First, strengthen education, raise awareness, build a strong ideological "firewall" and achieve "three essentials"
In view of the fact that some officers and men are mentally paralyzed in practical work, illegally surfing the Internet and using mobile storage media, the information concerning military activities in letters is not kept confidential, and violations of confidentiality regulations occur from time to time. Therefore, it is necessary to put people first, strengthen ideological education and guidance, do a good job in information security and confidentiality, constantly enhance the awareness of information security and confidentiality of officers and men, do a good job in preventing information leakage, and block the channels of information leakage from the source.
First, we should strengthen the pertinence of educational content. In terms of safety education, it is necessary to strengthen the education of safety laws and regulations, and carry out targeted studies on information security, technical security and network security, so that officers and men can understand the dangers of leaks and preventive measures. According to the needs of business work, conduct regular business knowledge confidentiality education for important positions and key personnel. Do a good job of "one point, one line": First, do a good job of confidentiality education for leading cadres. Incorporate confidentiality education into the publicity and education work of this unit, and continuously strengthen the confidentiality awareness of leading cadres and improve their confidentiality skills through centralized education and case warning education; The first line is to do a good job in the confidentiality education of key positions, staff and secret-related personnel. Take the form of holding training courses, lectures, and warning film exhibitions. Strengthen the education of ideals and beliefs, the secrecy situation and the secrecy legal system, help the secret-related personnel to enhance their awareness of the enemy and the enemy, and firmly hold the national secret defense line ideologically.
Second, we must adhere to the diversity of educational forms. Will be included in the political education plan, overall arrangement, combined with the actual situation of the unit, the nature of the task, security facilities, the degree of confidentiality, personnel status, etc., to take the form of leadership class, special discussion, security analysis, watching videos and other forms of security education. According to their own situation, set up a confidential education study group headed by the main leaders and discuss it regularly. Strive to make the education curriculum lively, easy to learn and understand, easy to master, focused and comprehensive, combine centralized education with decentralized education, combine regular education with random education, combine general education with individual education, and combine professional education with ideological education to ensure that every officer and soldier is educated and well educated.
Third, we should highlight the effectiveness of educational effects. It is necessary to pay attention to the infiltration of secret education into the whole process of various tasks, and to carry out special secret education during major festivals and important military activities; Arrange special safety education when cadres change jobs, personnel transfer and soldiers leave the army; Conduct regular education for confidential personnel, confidential personnel, network command system staff and other confidential personnel. It is necessary to change the formalistic practice of focusing only on how many classes, how many people and how many documents have been learned in education, and position the effectiveness of education on the scale of how much secret knowledge the officers and men have mastered under high-tech conditions, the strength of their sense of secrecy, and whether they have leaked secrets. By stimulating and enhancing the consciousness and initiative of officers and men who are diligent in learning, good at thinking, brave in innovation and practice, their sense of security and confidentiality can be effectively improved.
Two, strengthen management, implement the system, build a strong management "firewall" and implement the "four systems"
At present, although the country has strengthened the security and secrecy work, and all levels of the military have also carried out targeted education in time and strengthened the security and secrecy measures, compared with the requirements of the new situation and new tasks, there are still some unsuitable places and many problems that need to be solved urgently. In this regard, we must strengthen military management, improve rules and regulations, strengthen measures, build a solid wall of management, and do a good job in the implementation of the "four systems."
The first is to improve the rules and regulations. The main leaders of the unit should establish the consciousness of "no small matter in confidential work" and set up an institution responsible for confidential work. The organization of security work should give full play to its role, earnestly perform its duties, regard security work as an important task, put it on the agenda, carry out special investigations, and formulate perfect and feasible rules and regulations. In view of the problems existing in the use of mobile phones and computers by officers and men in the new situation, combined with the actual situation, we will study countermeasures and formulate effective management measures, and it is strictly forbidden to use one computer for two purposes.
The second is to adhere to the office system. For secret-related personnel, it is necessary to clarify the scope of activities and prevent secret vector from taking out of the office area to talk about secrets with irrelevant personnel; The production, distribution, transmission, storage and destruction of documents and materials should be controlled in the whole process, and documents and materials with incomplete procedures should not be taken out of the office; Floppy disks, removable hard disks and USB flash drives shall be kept and encrypted by designated personnel; Statistics, classification and filing of computers shall be uniformly numbered according to the five levels of "Top Secret, Confidential, Secret, Internal and Open", uniformly labeled with classified labels, and classified management shall be implemented; The confidential computer used must provide a power-on password of not less than the specified number of digits. Computers connected to the Internet must not involve secrets. It is strictly forbidden to take the portable computer home for use and surfing the Internet without permission.
Chapter III Experience of Network Security and Secrecy The successful network security publicity held in xx this year took "network security for the people and network security depends on the people" as the theme of this year's security publicity, which reflected our party's full reliance and trust on the people when establishing network security supervision and management, and was the concrete embodiment of the party's mass line in Internet security.
Although the Internet is virtual, people who use it are in reality. In view of the increasingly severe form of network security, there must be a very effective way to deal with network security, that is, let every member of society become a participant and actively contribute their own strength.
"Food is the first priority for the people, and safety is the first priority for food". This is the essence of food safety. However, everyone can't live without the Internet, which has become an important part of life and work. Internet security is the foundation and cornerstone of network development and the premise of developing Internet industry. The two complement each other.
It is true that the development of the Internet has enriched people's lives and brought about the development of Internet-related industries. However, there are still many problems, such as insufficient data protection in network systems, software and their systems, malicious destruction, tampering and disclosure by criminals, which bring unnecessary troubles to people's lives. Seriously, this act of revealing state secrets has caused unnecessary damage to the country and people.
Therefore, the state and relevant government departments should actively respond to the network security under the new situation, strengthen the power of network supervision and law enforcement, monitor in real time, and timely encircle criminals who undermine network security. Establish the security idea that network security is more important than Mount Tai, and give hellish punishment to those who threaten network security. "Network security is for people, and network security depends on people". Maintaining network security is the common responsibility of the whole society, which requires the joint participation of the government, enterprises, social organizations and the majority of netizens to build a network security defense line.
It is everyone's responsibility to maintain network security. Network information security is related to the interests of the country and people in peacetime, so how to build a "security door" for the network? People need to devote themselves to the cause of network security and wholeheartedly pull up a "firewall" for national network security.
2 1 century, the internet has become a part of people's daily life, and many people can't even live without it. With the internet, people can have food and clothing without leaving home. I just saw the news on TV the other day that online shopping was hot at the end of the year, and the courier company was also in Spring Festival travel rush. In the past, people had to ask someone for help when looking for something, but now people can find online help when looking for something. I remember once I didn't know where the key was, and Baidu said, "I lost the key there." As a result, I really found it according to the scheme suggested by netizens.
With the explosive development of the network, the network environment has become more and more complex and open. At the same time, various security vulnerabilities are constantly exposed, malicious threats and attacks are increasing day by day, and security incidents are increasing day by day, which also threaten everyone who comes into contact with the Internet to varying degrees.
Online shopping is the most popular, convenient and fastest way to shop now. With the increasing demand for online shopping, online shopping websites are gradually increasing, and more and more items are sold. However, people know little about online shopping and have little awareness of network security. This happened right next to me. A colleague's family bought a pair of pants online. After a series of operations are completed, the network prompts that the transaction is successful. But not long after, they received a phone call claiming to be a Taobao seller, telling colleagues that the pants you ordered were out of stock and needed to be returned. You should follow the following steps to get a refund. Colleagues believed it and filled in the details of various personal information according to what the people on the phone said. After filling it out, they thought it was successful. As a result, they soon received a short message informing them that you had completed the transaction, and the balance was 0 after deducting xx yuan in cash. After realizing that I was cheated, I called again and the result was empty. I want to investigate, but it's like looking for a needle in a haystack. After listening to my colleague's account, I suddenly remembered the small video of safety education I had seen. Now most children are addicted to online games, including their own children. As long as they have time, they will find opportunities to log on to online games with their mobile phones or computers. Maybe it's a day of fun. Faced with this situation, we will begin to care about the emergence of various problems. What we should care about is not only whether children will be bewitched by all kinds of false information in the network, but also the healthy development of children's body and mind. This kind of safety education should be constantly emphasized, not only understood in this way, but also deeply rooted in people's hearts and formed a sense of safety.
I usually like to watch some legal programs at home. I have also seen many network security problems on TV, such as online cheating and illegal websites. Through various online tools and channels, people are confused, some deceived people's property is threatened, and some even their personal safety is threatened. This shows the importance of safety education and the importance of understanding safety knowledge.
Network security involves everyone who uses the network. For individuals, to ensure their online safety, everyone should develop good online habits. I think it should include the following points:
1) The computer should be equipped with firewall and antivirus software, and upgraded in time. If the computer is online, it will be set to automatically upgrade. And develop a regular security scanning computer;
2) Update windows patches in time;
3) Don't believe some advertisements and news on the Internet at will;
4) Don't use QQ to click and execute websites and programs sent by netizens.
5) Don't browse unsafe web pages;
6) Don't disclose your personal information easily on the Internet;
7) Don't browse unfamiliar emails;
8) Open the USB flash drive after antivirus;
9) It is best not to log in to your bank account, Alipay, QQ, etc. On someone else's computer;
For each of us, improving the awareness and knowledge of network security is the basic requirement for us in the network age.
According to the relevant requirements of the Education Committee of Hebei Provincial Party Committee and the Education Department of Hebei Province, in order to further enhance students' awareness of network security, improve students' network protection skills and create a healthy and civilized network environment, on September 23, our hospital launched a network security publicity campaign on 5 15. Present at the meeting were Miao Shiliang, vice president of the School of Management, Yuan Kunrui, secretary of the Communist Youth League General Branch, Kun Li, chairman of the Student Union, Pang Shuo, deputy secretary of the Communist Youth League General Branch, and other student cadres.
With the rapid development of information technology characterized by digitalization, networking and intelligence, we should do a good job in network security. Network security is a relative and dynamic concept, involving a wide range. Almost all fields in the real world can access the Internet, which determines the arduousness, complexity and long-term nature of maintaining network security. When politics, economy, culture and military are all in the open cyberspace, although the influence is multiplied, the risk coefficient is also increased in direct proportion. Protecting network security is no longer a specific field, and its comprehensiveness, complexity and variability can not be ignored. The network is not safe once and for all. Protect network security and make the network clear.
In this network security publicity activity, the leaders of our hospital first popularized the common sense of network security for us, and then taught us how to be alert to network fraud by analyzing various cases. The leaders of our hospital emphasized in the activity: "The development trend of Internet technology tells us that technological innovation can benefit the country and the people, and it can also harm the world. The justice and evil, security and danger of the network are constantly struggling, and the object of network harm is nothing more than people. In the final analysis, the foothold of guarding network security is still in us. " I believe that under the careful propaganda and guidance of the leaders of our college and the active cooperation of the students, our classmates will realize the importance of network security more deeply.
This network security publicity activity has improved students' safety awareness and made network security and network civilization deeply rooted in people's hearts. I believe that in the future, while safeguarding their own interests, students will also strive to become propagandists and practitioners of network security and contribute to creating a healthy and civilized network environment for * * *!
The experience of network security and secrecy Chapter VI: By studying computer and network information security, I have a deeper understanding of the importance of network information security. Network information security is an important condition to protect the integrity and confidentiality of personal information. Only by understanding the basic knowledge of network information security can we understand the importance of network information security in today's information age!
In today's information age, each of us needs to keep up with the pace of the times, so we don't lack the use of computer information tools, so we need to understand the benefits and risks of the network, both advantages and disadvantages. We need to minimize disadvantages and make rational use of advantages, so that we will not fall behind in the network age. Now everyone's information will be online, depending on how you protect your information. Will your personal computer be attacked? Will your registered member website reveal your information? Wait! These can be regarded as a part of network information security.
After studying, I realize the importance of network security more, because each of us is basically using computers. Has the personal computer been attacked or invaded by a virus? Everyone's personal computer will store a lot of personal information and important text files, so in order to ensure the security of these text information from being tampered with, we need to have a deeper understanding of the importance of network information security, and constantly learn and improve our network security skills, so as to protect our own network information security. For example, our personal computer may have inadvertently shared many of our important files with * * *, but you don't really want everyone to know your secret files, but you just don't know how to share them with * * *, and many of them can easily invade your personal computer, so we need to know more about the basic knowledge of network security.
In addition, there are many cybercrime cases in our daily news, all of which are the disclosure of personal information. Either the password of personal online banking is stolen, or it is a crime of personal information disclosure on the Internet, so these are all things we need to pay attention to. Nowadays, with the continuous development of third-party payment platform and online retail, we need to improve our understanding of computer network information security, especially the study of computer specialty, which puts forward new requirements. That is to say, we should have rich knowledge of network information security. We only know that the encryption of text is not enough. We need to make progress with the progress of the times, so we need to further improve our information security knowledge while understanding the basic knowledge of computer network security.
Network information security requires a simple understanding of file encryption and decryption, virus protection, personal network settings, encryption and decryption technology, personal computer security protection, network leakage in life and inadvertent personal information leakage, etc. Sometimes our personal information is leaked by ourselves, but we don't pay attention to it. Our strangers can simply get your personal information through your personal homepage and your online comments, and you will inadvertently explain your' urban community' and so on. These things happen inadvertently, so your carelessness may be used by others, so we need to pay attention to the protection of words and personal information in the network information age and raise our awareness of protection!
Each of us will encounter many problems in the information age, which also varies from person to person! Then briefly explain the problems I encountered:
1, when I first started using a computer, I didn't know how to carry out daily maintenance on the computer and how to ensure that the computer was virus-free, but I understood learning in reality, because we can share a lot of knowledge online in the information age, and now I can solve simple problems by myself.
2. When using the computer, the registry of some software was lost without knowing what happened, which made it impossible to use it normally. Now I don't know why. Ask the teacher for help.
3. The running time of system software is always very slow, but after the optimization of anti-virus system, it still has little effect. When the software starts, it will always affect the running speed of the computer, and even cause the computer to temporarily crash.
4. When opening some webpages, IE browser will fail to load, and the webpages need to be reloaded or restored.
If the computer suddenly crashes or loses power, can our data be found if it is not completely saved? How to get it back?
6. Files deleted by mistake need to be retrieved, and the recycle bin has been emptied. How do we recover the data?
The experience of network security and secrecy Chapter VII is now the era of "snaring" the world. Network, you are Prometheus, stealing the flame of Zeus, lighting the lightning, illuminating the darkness before dawn, making the wind of dawn reverberate in your ears, and the world is wonderful because of you. Internet, you fire thief, you stole the light, but also brought darkness. Give me back my privacy. This is an era of individuality, but it is also an era of lack of privacy. People are dissected and dismembered by big data bit by bit, and exposed to the public without leakage. Network, you stole the fig leaf of human beings and turned people into naked "transparent people"! The "prism incident" that broke out not long ago reflects the hidden worry of information security. High-tech stole our information invisibly, and defeated the enemy without fighting.
Not long ago, a girl named Qiqi, who was at a loss because of a Weibo, was mercilessly ridiculed by someone who dug up her personal information on the Internet, and finally committed suicide in anger. Everyone has secrets in his heart, just as every bud has worries. Forcibly peeling off the petals will definitely make the buds wither and mercilessly uncover personal privacy, which will definitely lead to human tragedy. Give me back my distance. Living in the internet age, although thousands of miles apart, we can talk face to face, so the distance between people is very close, but the distance between hearts is very far. I have recalled countless times that "after three months of war, a letter from home is worth a ton of gold". Although the war continues, and we live in different parts of the world, we can "walk along Wan Li Road". However, in this era of big data, neon lights adorn the night sky, and mobile phones are the mainstay, which has become the protagonist of the party. When "let's play with mobile phones and have dinner by the way" has become the mantra of young people, we can't help but sigh that human feelings have changed: without Zhu Ziqing's feeling of "and heaven remains our neighbourhood, how can I get it", there is the helplessness of the Canadian female writer's feeling that "the farthest distance in the world is not that you are at the ends of the earth, but that I am in front of you, but you don't know I miss you". Network, you stole the distance, where can you find the hometown of your heart? Give me back my poetic life. How can we not yearn for Yasunari Kawabata to see the flowering of begonia at 4: 30 in the morning, for Rousseau's cabin by Walden Lake, for Wilde to look up at the stars in the gutter, and for Cangyang Gyatso to walk through the snow in Xun Mei? On the other hand, there are no poems and paintings at present, and screen slaves are everywhere. When praising and brushing Weibo has become the main theme of life, where has our real life gone?
Network, when I put you in the spotlight again, I studied it carefully and finally got a glimpse of your true colors. You were just a tool in the high-tech era, and it has nothing to do with good or bad, merits or demerits. If properly used, it can make people play around the world, transmit information, spread knowledge and benefit mankind. If it is not properly controlled, it can also deprive privacy and spread rumors. Sexual violence and high-tech crimes push people into the abyss of perdition.
Advantages and disadvantages, black and white, there is no definition between the two poles, but the extremes will be reversed, depending on how you control it. The internet can send you to heaven or hell. How to make high technology benefit mankind depends entirely on human wisdom.
On July 16, 20xx, I was lucky enough to attend the network security training organized by the Education Bureau for eight days. The students participating in the training are all network management experts or network management experts of various schools, and the training teachers are either gold medal lecturers or senior technicians of a company. In such a learning environment, it not only drives me to enter the teaching profession, but also makes me feel that it is not easy to be a network administrator for the first time. Through this training, I deeply realized that I have a lot to learn, so I can only apply what I have learned in my own work, turn theoretical knowledge into practical operation, and realize my life value.
First, arm your mind with theoretical knowledge.
In this training, half the time the teacher mainly talks about the theoretical knowledge of network security, laws and regulations, network security management and network security technology. Starting with theoretical knowledge, let us have an understanding of network security knowledge. Although theoretical knowledge is a bit boring, I clearly know that this is the foundation. Through the study a few days ago, I learned that we should first pay attention to the importance of network security, fully understand the network security management problems in our school, face up to the problems, and solve and implement network security. Make the daily work of the campus go on in an orderly and normal way. Secondly, the problem of network security depends on the efforts of everyone, not just one person. The campus itself is a team and a collective. Of course, all teachers and students need to work together. First, every teacher should have a sense of network security, and second, make the network more stable through technical means. In short, the training has made me further aware of the shortcomings and future work direction, and I will learn more and think more.
Second, develop the study habit of doing more, talking more and thinking more.
In addition to learning theoretical knowledge, I also learned a lot in the training, most of which are computer operations, such as the configuration of switches and routers, because during my college years, I didn't touch switches and routers, but I just heard of them and never saw them. Through training, I not only learned about them, but also configured them. During my study, I listened carefully and discussed with the teacher some questions I didn't understand, so I learned a lot. Because I deeply feel that computers can only be understood by their own operation and groping, I have always reminded myself to learn and think in computer operation training. Thanks to my efforts, I learned the mutual access between computers and some basic security configurations. But I still want to point out my shortcomings in this training. I still don't understand the wiring system I learned. Maybe it has nothing to do with me. Besides, I don't know my campus wiring. It's hard to learn. But I learned from it.
Through this training, I believe I have made some progress, no matter in what way or how much. I just need to work hard to realize it in the future and do my little bit. In order to realize their own value.
Experience of network security and secrecy Chapter VIII There have been loopholes in the management of network civilization in China. This also constitutes a cyber crime (refers to the general term for the perpetrator to use computer technology to attack his system or information, destroy or use the network to commit other crimes). For example, in recent years, online fraud, the spread of online rumors, illegal monitoring of the network and so on. Will hurt the legitimate rights and interests of netizens. It is imperative to establish and improve laws and regulations related to network security. At the same time, it is also very important to promote and publicize the awareness of network security.
In order to actively respond to this notice about the activity of "Network Learning Security Laws and Regulations", our class held a class meeting with the theme of "Network Security" on Friday, April1May. At the class meeting, we discussed the laws and regulations related to the network and the time when the network violated the law.
Laws related to network security regulations include Criminal Law, Tort Liability Law, Several Provisions on Campus Order Management in Colleges and Universities, and so on. In addition, our country has also explained some problems about the application of law in criminal cases, such as libel, affray, extortion and illegal network operation. Whether the circumstances are serious or not, these cyber crimes have violated the Criminal Law and other laws. Another point, after reading the relevant laws and regulations on network security, I think our country needs a perfect and special cyber crime law. In some countries, the legal construction of cyber crimes is still very complete, and the crackdown on cyber security crimes is also very strong. Take Britain as an example. As early as 2000, the British government allocated huge sums of money to set up an organization owned by the government, which was responsible for tracking and cracking down on online financial fraud, hacking attacks on government and company websites, spreading computer viruses and other criminal acts. These organizations responsible for monitoring network security also exist in China, but their management is not as good as that of some developed countries.
In this regard, in the early stage, it is very important to strengthen students' awareness of network security (especially in primary school) and let them establish a sense of resolutely maintaining network order. In the process of network security education, we should not only talk about network security knowledge, but also actively participate in the study of network security-related laws and regulations as students. In this way, now that we have established the awareness of network security, I believe that related cyber crimes will also be reduced.