The information transmission in the network can often ignore the geographical restrictions and realize the interactive transmission of different spatial information. This way not only enhances convenience, but also leads to doubts about the authenticity of information because the two subjects do not meet in real life. This means that the party receiving the information subject cannot judge whether the information is true or false based on the accurate judgment of the sender or the immediate verification of the content contained in the information. For example, in the current common online shopping behavior, buyers only place orders by browsing product pictures and descriptive reading of product attributes, and the provider of product pictures and attributes is the seller. In addition, there are many false purchases in the evaluation column of online shopping goods, in order to realize the inflated sales of goods and attract more customers. Buyers often lack true and accurate judgments on their online shopping goods. Once false information appears, the information receiver is likely to lose property because of being misled.
Therefore, it is very important to control network information security in network security training. Obtain information through regular websites as much as possible, and reduce the possible risk problems of these information through multi-channel verification, so as to obtain relatively real information, products and services.
Second, the common personal information leakage in network information security
In the process of network use, users need to provide their own personal information in order to obtain relevant qualifications such as browsing information. This means that network operators will have a lot of personal information of natural persons, such as real name and ID number required for Weibo authentication, movement track left by using bicycles, personal bank card information bound in online shopping, etc. And this information is often inseparable from the personal and property safety of network users.
In network operation, many people use malicious software or links to obtain personal information of network users through improper means, and make profits through resale. The disclosure of personal information not only infringes on citizens' privacy rights, but also causes potential hidden dangers to citizens' personal safety and property safety. Therefore, the Cyber Security Law explicitly prohibits the above acts.
In the training of network security, in order to solve the problem of personal information leakage in network information security, it is necessary to emphasize that network operators abide by the agreement reached with network users, and at the same time remind network users to be alert to malicious software and input personal information on the basis of accurately judging the reliability of links. At the same time, network users should also pay full attention to the disclosure of their personal information and report problems to the public security department and the network information department in time to avoid further losses.
In network security training, we must be alert to the common problems of network information security. This problem requires the full cooperation of all parties in network security, including network users, network operators and network supervision departments, accurately grasp the problems and potential risks in the process of network operation from multiple angles, and kill all kinds of common problems in network information security in the cradle through various ways such as prevention in advance, handling in the process and reflection afterwards.