Current location - Education and Training Encyclopedia - Graduation thesis - How about cvp?
How about cvp?
? CVP has potential, but the product design also has some defects.

Since digital currency Railway Station, the price of virtual currency has continued to rise, and various digital currency have sprung up. Industry leaders and investors from all walks of life have embraced the blockchain, and the currency market has shown great vitality. However, since the Spring Festival of 20 18, the money market has been in a bear market, which makes people feel uneasy.

Virtual currency refers to unreal currency. Well-known virtual currencies, such as Baidu's Baidu Coin, Tencent's Q Coin, Q Point, Shanda's Counting Voucher, and Sina's Micro Coin, Chivalrous Ingot and Tattoo Silver, are distributed in digital currency all over the world. The legend of "Bitkin, Wright Silver, Infinite Copper and Penny Aluminum" is popular in the circle.

relevant information

The safe and stable operation of virtual currency needs the necessary computer software and hardware support. In practice, in order to obtain virtual currency, crimes against computer information systems frequently occur. 20 17, 12 In May, the bitcoin blackmail virus named Wanna Cry took advantage of the vulnerability of Windows operating system (Eternal Blue) and spread like a worm, affecting more than 150 countries, seriously affecting many industries such as finance, energy and medical care.

It is almost impossible for the victim to unlock the virus himself, unless the ransom is paid in bitcoin. In the bitcoin theft case handled by Beijing Haidian District Court on 20 18, the suspect Zhong was an operation and maintenance engineer of a technology company. He logged into the server as an administrator, entered the code, and transferred the company's 100 bitcoins to his bitcoin wallet registered on foreign websites.

The online transaction value of 100 bitcoin reached more than 2 million yuan at the time of the crime. However, in practice, it is impossible to determine the value of Bitcoin. In the end, the Haidian District Court filed a case against the suspect for the crime of illegally obtaining computer information system data. In practice, there are also many cases in which computers are attacked by viruses or hackers.

Not only the data and operating system are destroyed, but also its hardware, such as motherboard, graphics card, sound card and memory, will be damaged to varying degrees. Most of these physical damages are difficult to estimate because of the combination of relevant data and information, which further increases the difficulty of conviction and sentencing of crimes such as computer information system infringement.