First, the content interpretation
(1) "Legislation is not difficult, but law enforcement is difficult." Clean and tidy cyberspace is the common expectation of the people. Since April this year, the national authorities have effectively purified the cyberspace ecology through a series of "combination boxing" such as interviews, rectification and removal, in response to illegal issues such as online short video chaos and online live broadcasts involving pornography.
(2) "Grasp the timeliness and effectiveness, build concentric circles online and offline, better condense social knowledge, and consolidate the ideological foundation of the United struggle of the whole party and the people throughout the country." To build this "concentric circle", we should take the leadership of the party as the radius and fully condense the centripetal force; It is necessary to clean up network pollutants with laws and regulations as the radius; We should use all kinds of media as the radius and use innovative means to spread positive energy; It is also necessary to build a new platform for online public opinion with the mass line as the radius.
(3) hand in hand * * * braving the wind and waves. In the journey of building a network power, network security has an impact on national security. Therefore, we must guide the construction of network security with the overall concept of national security and build a barrier to national security in the new era.
Second, the case materials
1. Xu Yuyu was cheated by telecom.
(1) 2016 On August 2 1 day, Xu Yuyu, a candidate from Linyi, Shandong Province, was heartbroken and depressed, which eventually led to cardiac arrest. After being rescued by the hospital, he died unfortunately.
(2) The cyber security law can prevent the Xu Yuyu tragedy from happening again. First of all, the root of precision fraud lies in the disclosure of citizens' personal information. The Cyber Security Law clarifies the responsibilities of the holders, collectors and users of citizens' personal information, and especially emphasizes citizens' "control" and "right to know" about their own information, thus avoiding the recurrence of precision fraud in Xu Yuyu to the maximum extent. Secondly, the online real-name registration system needs to be strictly implemented.
(3) The two fraudulent phone calls in Xu Yuyu case proved to be real-name authentication afterwards, but the personal information of real-name authentication did not match the user's identity. The Network Security Law reaffirms and clarifies the network real-name registration system again, and network service providers must require users to provide real identity information, which blocks the loopholes in the network real-name registration system from the source.
(4) Finally, the governance of telecom fraud requires concerted efforts. The cyber security law gives everyone the right to report telecom fraud and information data infringement. Each of us has the right and obligation to report telecom fraud information to the relevant departments and work together to crack down on telecom fraudsters to the maximum extent.
2. The biggest outbreak of ransomware
(1) Hack a user's computer, encrypt computer data, delete files, and do not extort ransom; The computer is infected, requiring users to pay the ransom within 3 days, and as long as "Bitcoin" ... 2065438+May 2007 12 night, "WannaCry" madly attacked the networks of hundreds of countries around the world, and countless data were encrypted and locked by viruses, which also greatly affected the networks of basic industries in China, involving education, oil, transportation, public security system and so on.
(2) Behind the rampant ransomware is a serious threat to national network sovereignty and data and information security. The "blackmail virus" reminds us once again that development without network security is water without a source and a tree without a root. The higher the degree of informatization, the greater the possible harm.
(3) On the one hand, efforts should be made to develop the Internet and new technologies to get rid of the situation that technology is controlled by people; On the other hand, it is also necessary to enhance the important strategic position of cyber security and prepare for the situation that individual countries attempt to threaten the peaceful development of China through cyber warfare.
3. "9+1Let's celebrate the New Year together.
(1) 2016 February1day, China Internet Development Foundation and Sina Weibo jointly launched the "9+ 1 Let's celebrate the New Year together" precision poverty alleviation public welfare activity. In combination with the tradition of giving red envelopes during the Spring Festival, this activity, through the call of users in Weibo, distributed "9-plus 1" warm year red envelopes in 900 yuan to each poor household at a price of 100 yuan, helping 3,264 poor families in Guizhou, Hebei and other provinces accurately.
(2) The success of the "9+1"campaign is to "disintermediate" accurate poverty alleviation with the thinking of the Internet, so that the poverty alleviation actions of netizens can reach poor families directly with accurate and true poverty alleviation information. The contribution of netizens must be implemented in a transparent, open and efficient environment. The China Internet Development Foundation will publicize the donation implementation information through the Weibo platform one after another, and accept the supervision of netizens in an open and transparent manner.
(3) This is not only an important measure for network information security to take root, but also an in-depth exploration to ensure network fund-raising activities, and another major change to further promote precision poverty alleviation.
4. One-day turnover exceeds 100 million.
(1) In 2017 years, the global carnival turnover of "Tmall Double 1 1" reached168.2 billion yuan, covering 225 countries and regions, exceeding140,000 brands150,000.
(2) "One-day transaction exceeds 100 million yuan" is not only the embodiment of quality consumption, but also the result of China's economic upgrading and efficiency improvement, and it is also a commercial change promoted by Internet technology. In recent years, the transaction volume of e-commerce is rapidly leading, and mobile payment is leading the world. * * * has attracted the attention of economic circles. ...
(3) A large number of innovative Internet companies have emerged, and the international influence of a number of online information companies such as Alibaba, Tencent, Baidu and Huawei is increasing. The Internet has not only spawned new formats and new models, but also revived many traditional industries. All walks of life are playing the role of informatization in improving total factor productivity and promoting the deep integration of the Internet and the real economy.