First of all, the network supervision departments, such as the Network Information Office, have made a combination of boxing, issued a series of laws, regulations and policy documents, and strengthened the supervision and governance of cyberspace, thus creating a clear cyberspace, building a good network ecology, and rectifying and standardizing the communication order of the industry.
Secondly, the media industry should formulate norms of self-discipline and heteronomy, and strengthen its own supervision and governance. 20 1919, China network audio-visual program service association released the relevant specifications for short video platform management and content audit. In addition, the new media platform has strengthened supervision in many aspects. Tik Tok should call on the network police department to launch a "one-click reporting mechanism" and issue a "Notice of Punishment for Tik Tok's Illegal Use of Commodity Sharing Function Account" to the short video platform on February 65438. In March, 2020, Tik Tok established a live broadcast content review mechanism to rectify illegal live broadcast accounts and content, and issued the Tik Tok Live Broadcast Code of Conduct, which investigated, banned and removed a large number of illegal live broadcasts.
Finally, comprehensive network governance not only requires government departments to issue relevant legal documents and strengthen supervision, but also requires the industry to strengthen self-discipline and assume corresponding social responsibilities. Netizens should also improve their media literacy, and the society should also give supervision. Only with the participation of multiple subjects can we establish a perfect network comprehensive governance system.
What are the ecological control measures for clearing the Yellow River?
First, in the upstream, vigorously carry out fence protection, strengthen the protection of native forest and grass vegetation and biodiversity, and implement measures such as closing hillsides to facilitate afforestation, planting grass and forbidding grazing, stopping grazing and rotating grazing to improve water conservation capacity;
Second, in the middle reaches, it is necessary to improve the comprehensive management of soil erosion in the Yellow River basin, promote the comprehensive management of small watersheds, and effectively curb soil erosion and desertification;
Third, protect and restore wetlands such as key rivers and lakes in the lower reaches and the Yellow River Delta, ensure ecological flow, implement comprehensive management of groundwater overexploitation, and at the same time carry out comprehensive management of beach land;
Fourth, promote the comprehensive management of water erosion and wind erosion areas, create a multi-species and multi-level regional shelter forest system, scientifically and orderly promote the return of farmland to forests and grasslands, increase the control of degraded grasslands, and improve the quality and stability of forest and grassland ecosystems;
The fifth is to speed up the management of abandoned mines left over from history. The Yellow River Basin is a region rich in mineral resources in China. Satellite remote sensing monitoring data show that there are more than 6.5438+0.5 million mu of abandoned mines left over from history in various provinces and regions of the Yellow River Basin, accounting for nearly 50% of the abandoned mines left over from history in China. Therefore, comprehensive management and system repair must be carried out.
Zhou stressed that in the process of ecological protection and restoration of the Yellow River Basin, we should pay attention to two points: First, we should adhere to the concept of system, carry out overall protection, systematic restoration and comprehensive management of the ecosystem of the Yellow River Basin, overcome singleness and pay attention to disunity. Second, we should pay attention to scientific methods, base ourselves on the natural geographical pattern, pay special attention to the rigid constraint of water resources, carry out scientific restoration and pursue practical results.
What is equal flow?
Corresponding to the river flow when the water level is equal to the height of the floodplain or the edge of the beach. At present, this discharge is widely used as bed-building discharge to study river bed evolution and river regulation. Bed-making flow is water. ...
In the traditional river regulation, it is considered that the bed-making flow is equal to the flat beach flow, so the flat beach flow is regarded as the regulation flow, which is itself the flow capacity of the main channel, and the flow capacity of the main channel is the same as the regulation flow.
202 1 protect network security events?
Data leakage incident?
It is suspected that more than 200 million pieces of domestic personal information are sold in foreign dark network forums.
6543810.5, a foreign security research team, Cyble, found that several posts were selling personal data related to China citizens, which may come from social media such as Weibo and QQ. The total number of records related to China citizens in several posts discovered this time exceeds 200 million.
The first personal information protection case in China, where the Civil Code was applied, was pronounced.
65438 10/8, Hangzhou internet court publicly heard and pronounced the first case of personal information protection applying the civil code in China. Defendant Sun publicly illegally bought and sold more than 40,000 pieces of personal information on the Internet without the permission of others, and there was a long-term risk that the information of relevant personnel was infringed. He was sentenced to compensate the illegal income of 34,000 yuan and publicly apologized.
Suspected data leakage in a domestic bank16.79 million.
On October 8th, 65438/kloc-0, someone posted on a foreign forum to sell16.79 million pieces of data of a domestic bank, and released some data samples, including name, gender, card number, ID number, mobile phone number, city, contact address, work unit, postal code, work phone number, home phone number, card type, issuing bank, etc.
Online lending companies were fined 3.2 million for infringing personal information.
15 10/5, China Judgment Document Network published a judgment, and Beijing Company and Xian Moumou sold their personal information including their names, ID numbers and mobile phone numbers to several downstream companies without the consent of the victims, committing the crime of infringing citizens' personal information, and were fined 3.2 million yuan. Buying a house involves many well-known companies such as Ping An Pratt & Whitney, Paipai Loan, You and I Loan.
30 people in Danyang, Zhenjiang sold 600 million pieces of personal information and made a profit of more than 8 million yuan.
654381On October 24th, Zhenjiang Danyang police cracked a case of infringing citizens' personal information, which was supervised by the Ministry of Public Security, involving more than 10 provinces and cities, and arrested 30 suspects. The gang used overseas chat tools and blockchain virtual currency to receive and pay, * * * sold more than 600 million pieces of personal information and earned more than 8 million yuan in illegal income.
After CCTV exposed App to eavesdrop on private message voice, the recording continued.
On June 365438+1October 3 1 day, CCTV program experts made a 2-second voice by simulating the "App eavesdropping test program". When the hand was released, the recording continued, producing a sound of 120 seconds, which proved that eavesdropping was possible when the test program was placed in the foreground. In addition, after comparative experiments, it is found that the recording can still last for a period of time when the test program returns to the background or the screen of the mobile phone is locked.
Xiaoyao.com in Xishanju was attacked and its data was leaked.
On March 2, Xishanju Game announced that Xishanju products were repeatedly attacked by criminals' DDos and invaded by servers, resulting in the leakage of some user accounts and encrypted plaintext passwords. The official suggested that the short password with low security level should be modified as soon as possible.
The first case of obtaining personal information by using WeChat powder scanning software in China was pronounced.
On March 3rd, Nantong Tongzhou Public Security Bureau pronounced a verdict on the first case of illegally obtaining WeChat user information by using WeChat "Clean Powder" software in China. In order to "slim down" the WeChat address book, the victim user scanned the QR code of "Clear Powder", but his personal information was leaked. Eight defendants illegally made more than 2 million yuan by reading and selling WeChat group chat QR codes.
3 15 exposes chaos such as face information abuse and resume disclosure.
On March/KOOC-0/5, CCTV 3/KOOC-0/5 exposed three cases involving personal information security: merchants installed cameras to record customers' facial information, and many stores * * * enjoyed and comprehensively quoted prices; The resumes of platforms such as Zhaopin recruitment and hunting can be downloaded at will, and a large number of resumes flow into the black market; Many mobile phone cleaning apps developed for the elderly constantly obtain mobile phone information in the background and push content with deceptive routines.
CITIC Bank was fined 4.5 million yuan for leaking customer information.
On March 19, the ticket issued by the Consumer Protection Bureau of the China Banking Regulatory Commission showed that CITIC Bank was fined 4.5 million yuan. It is reported that the ticket is suspected that in May 2020, the talk show artist pool reported the punishment result of CITIC Bank's illegal provision of its bank flow information.
Cyber attack?
Many industries are infected with the virus.
65438+1October 13, many domestic security vendors detected a large-scale outbreak of the worm in China, involving government, medical care, education, operators and other industries, and most of the infected hosts were financial management-related application systems. The infected host shows that all non-system partition files have been deleted, causing irreparable losses to users.
Sms phishing attacks against rural credit cooperatives and city commercial banks
Since the Spring Festival, a series of security incidents have occurred in many cities across the country, in which customers are tricked into clicking on the links of phishing websites and stealing funds on the grounds that mobile banking is invalid or expired. Sky Friends found that after February 9, a large number of phishing websites were registered and put into use. The domain name of phishing websites is the customer service telephone number+letters of financial institutions such as rural credit cooperatives and city commercial banks, or the domain name similar to that of financial institutions, and most of them are registered and hosted by overseas domain name registrars.
DDoS attacks surged during the Spring Festival.
On February 22nd, CITIC Construction Investment Lab released a report on DDoS attacks during the Spring Festival. According to the report, during the Spring Festival, Chianxin satellite-orbit DDoS observation system observed 659 12 amplified DDoS attacks, involving IPs with IP57096 being attacked. Compared with the week before the Spring Festival, the number of DDoS attacks increased by about 25%, and the number of attacked IP increased by 37%.
App infringes on user rights?
Aiming at the problem that App infringes on users' privacy and safety, the Ministry of Industry and Information Technology has established a national App technology testing platform to conduct technical testing on popular apps on the shelves in China. If the App does not meet the requirements, it will require rectification first. Apps that have not passed the rectification or have not been rectified as required will be directly removed.
19 10/9, the Ministry of Industry and Information Technology removed 12 apps, including Xuebao and Red Man Live. , involving illegal collection of user information, excessive demand for user rights, deception and misleading users to download. (On June 5438+February 2, 2020, the Ministry of Industry and Information Technology notified 63 illegal apps, and 12 failed to complete the rectification as required)
65438+1On October 22nd, the Ministry of Industry and Information Technology notified the first batch of 157 apps that infringed users' rights and interests in 20021year, including Mango TV, Yonghui Life and Zanthoxylum bungeanum. , which involves illegally collecting personal information, forcing users to request permission frequently and excessively, and forcing users to use targeted push. On February 3, the Ministry of Industry and Information Technology removed 37 unreformed apps, including Yilong Hotel, Dongfeng Tourism, and an auto repair.
On February 5, the Ministry of Industry and Information Technology reported that 202 1 the second batch of 26 apps had irregularities, including QQ input method, UC browser and ink weather. , involving illegal collection of personal information, excessive request for permission, cheating and misleading users to download. On February 10, 10 apps that were not rectified were taken off the shelves, including Xiao Zhi classmate, music bar and kk keyboard.
12 In March, the Ministry of Industry and Information Technology notified the third batch of apps 136 in 20021year, which infringed on users' rights and interests, including Cheetah Cleanup Master, Yuepao Circle and Tianya Community. , involving frequent self-activation and associated activation, illegal collection and use of personal information and other issues.
On March 16, the Ministry of Industry and Information Technology severely investigated and dealt with the violation of "APP illegally collecting personal information of the elderly" at the party on March15, and asked the main application stores to give four apps, namely, memory optimization master, smart cleaning master, super cleaning master and mobile phone housekeeper pro.