In recent years, the Internet in China has developed rapidly, and the number of netizens ranks first in the world. Many people take it for granted that China's Internet development has reached the advanced level in the world. Actually, it is not. Although China is a network power in the world, it is not yet a network power, and the independent innovation ability of the Internet is not strong. Compared with developed countries, there is a big gap in broadband penetration rate, and the bottleneck of Internet development is still outstanding. Comrade pointed out: "Without network security, there will be no national security, and without informationization, there will be no modernization." Maintaining cyberspace security has become a new strategic commanding height for safeguarding national security. To maintain the security of cyberspace, we must speed up the cultivation and expansion of high-quality talents. It can be said that how to cultivate reliable, capable and successful cyber security professionals is a major issue to safeguard China's national security and development interests. Therefore, it is necessary to deepen the education reform and focus on cultivating professional network security talents who are proficient in information system security knowledge, network infrastructure security knowledge and information countermeasures knowledge, and have strong practical ability and innovation ability. In order to achieve this goal, we should coordinate and promote educational reform in discipline construction, personnel training and practical training. At present, we can explore and promote it from the following five aspects.
Strengthen the construction of disciplines and specialties. The important way to strengthen the training of network security talents is to strengthen the discipline and specialty construction. To this end, the Academic Degrees Committee of the State Council and the Ministry of Education jointly issued the Notice on Adding the First-level Discipline of Cyberspace Security, aiming at comprehensively improving the construction level of the discipline of Cyberspace Security. To strengthen the construction of disciplines and specialties, it is necessary to make overall plans for specialty settings, expand the enrollment scale, and train more professionals to meet the needs of society. To strengthen the construction of disciplines and specialties, we should also strengthen the support of supporting scientific research projects, establish authoritative and influential academic journals in the field of network security, and hold academic conferences in the field of disciplines and specialties regularly.
Reform the talent training mode. To cultivate network security talents, undergraduate, postgraduate and doctoral education can be implemented according to the characteristics of disciplines and specialties, and the academic system can be shortened reasonably. For example, Southwest Jiaotong University adopts "4+X" and "3+X" talent training modes, which breaks the boundaries of undergraduate, master and doctoral training, effectively improves teaching efficiency and achieves good results. In practice, we can also try to implement the plan of "experimental class" and "talent training base", boldly reform teaching methods, and build a new trinity model of talent training, scientific research and discipline construction.
Strengthen the construction of teachers. An important reason for the lagging training of network security talents is the shortage of teachers. In view of the shortage of network security teachers in some colleges and universities, "advanced classes" and "advanced classes" can be set up, and teacher training plans can be made in stages and groups, so that a large number of non-professional teachers can change their subject direction, consolidate their subject foundation and effectively undertake the task of network security teaching. At the same time, outstanding teachers at home and abroad can be openly recruited, and authoritative experts in the industry can be hired at high salaries to create a high-quality network security teacher team that combines "full-time and part-time" and "complements old and new".
Improve the compilation of teaching materials. Textbooks are the basis of teaching. It is necessary to formulate a scientific and reasonable plan for the compilation of network security textbooks, invite high-level scholars to join the textbook editorial Committee, clarify the division of labor, check at all levels, and do a good job in the compilation, evaluation and distribution of textbooks. Video teaching resources can be developed to promote the transformation and upgrading of traditional book teaching materials to multimedia interactive teaching materials. Strengthen the compilation and publication of introductory and popular training materials and related popular science books, and strive to enhance the public's awareness and ability to maintain network security.
According to the relevant requirements of the Education Committee of Hebei Provincial Party Committee and the Education Department of Hebei Province, in order to further enhance students' awareness of network security, improve students' network protection skills and create a healthy and civilized network environment, on September 23, our hospital launched a network security publicity campaign on 5 15. Present at the meeting were Miao Shiliang, vice president of the School of Management, Yuan Kunrui, secretary of the Communist Youth League General Branch, Kun Li, chairman of the Student Union, Pang Shuo, deputy secretary of the Communist Youth League General Branch, and other student cadres.
With the rapid development of information technology characterized by digitalization, networking and intelligence, we should do a good job in network security. Network security is a relative and dynamic concept, involving a wide range. Almost all fields in the real world can access the Internet, which determines the arduousness, complexity and long-term nature of maintaining network security. When politics, economy, culture and military are all in the open cyberspace, although the influence is multiplied, the risk coefficient is also increased in direct proportion. Protecting network security is no longer a specific field, and its comprehensiveness, complexity and variability can not be ignored. The network is not safe once and for all. Protect network security and make the network clear.
In this network security publicity activity, the leaders of our hospital first popularized the common sense of network security for us, and then taught us how to be alert to network fraud by analyzing various cases. The leaders of our hospital emphasized in the activity: "The development trend of Internet technology tells us that technological innovation can benefit the country and the people, and it can also harm the world. The justice and evil, security and danger of the network are constantly struggling, and the object of network harm is nothing more than people. In the final analysis, the foothold of guarding network security is still in us. " I believe that under the careful propaganda and guidance of the leaders of our college and the active cooperation of the students, our classmates will realize the importance of network security more deeply.
This network security publicity activity has improved students' safety awareness and made network security and network civilization deeply rooted in people's hearts. I believe that in the future, while safeguarding their own interests, students will also strive to become propagandists and practitioners of network security and contribute to creating a healthy and civilized network environment for * * *!
Experience of the model essay content of network security education (6 encyclopedia articles) Three networks, a mysterious and attractive candy wrapped in colored paper. For us now, this is nothing new. It is our teacher, a communicator between people, a good helper for our study and the key to our knowledge treasure house. From the Internet, we can not only quickly learn about information and events around the world, but also learn a lot of knowledge, broaden our "horizons" and make us know more and more knowledge.
Internet is a double-edged sword, which has both advantages and disadvantages for the healthy growth of our teenagers. We must make use of its good side and let it help us learn and succeed.
So we must attach importance to network security education:
1, online dating has become an important form of adolescent communication, so it is necessary to be cautious in educating students to make friends online.
2. In the network environment, some students' personality conflicts have obvious T scores. They are good students in real life and may play the role of "destroyer" in the network society. Therefore, educating students in the network environment should also have personal dignity.
3. The network values are vague. Moral qualities such as honesty and trustworthiness in traditional moral norms are severely challenged in the online world. Some students think it's normal to cheat in places like the Internet. Therefore, educating students should still abide by the traditional moral norms of the online world.
4. Free words and deeds on the Internet. Students often use foul language in online communication, especially in some chat rooms and forums, where you can often see words of mutual abuse and personal attacks. Therefore, it is necessary to educate students to use civilized language on the Internet.
Paying attention to safety is the obligation of each of us and the responsibility of each of us. Let's join hands to pay attention to safety, which is a flower of civilization for each of us. Let's stay away from pain and cherish each other's lives. We should sow the seeds of peace in our hearts, let it sprout and blossom in the hearts of children and grow into towering trees. We will certainly reap more peace, tranquility and happiness.
Four networks have become very common in modern society. We can see people using the internet everywhere. The emergence of the Internet, such as watching movies, trading stocks, browsing the news, working and so on, has brought people a brand-new look! With the network, people are more efficient and environmentally friendly, reducing the use of paper. Just in line with our current environmental protection theme-low carbon, energy saving and emission reduction. Moreover, many colleges and universities have set up computer majors to train high-end talents in this field, but perhaps they have neglected their ideological and political education when cultivating professional skills. When they can enter the society, they use their professional advantages to illegally conquer other people's websites and embark on a road that will never return!
Indeed, the network is different from our real life, it is virtual, fuzzy, visible but intangible, and our real life gives people a real feeling. In our real life, our activities have certain rules and regulations. In the network world, although it is virtual, it also has its own system, laws and regulations:
Violating the security level protection system of computer information system and endangering the security of computer information system.
(2) Violating the international networking filing system of computer information systems.
(3) Failing to report the cases in the computer information system within the specified time.
(four) after being notified by the public security organ, refusing to improve the public security situation within the time limit.
(five) other acts that endanger the security of computer information systems.
Until xx, the Ministry of Public Security once again improved China's network security laws and regulations, clearly stipulating that those who violate laws and administrative regulations will be given a warning by the public security organs. If there is illegal income, the illegal income shall be confiscated, and a fine of less than 5,000 yuan may be imposed on the individual and a fine of less than15,000 yuan on the unit. If the circumstances are serious, it may be punished to stop networking and suspend business for rectification within six months. If necessary, it may suggest that the original license issuing and examination and approval authority revoke its business license or cancel its networking qualification. Violation of public security administration shall be punished in accordance with the regulations on administrative penalties for public security. If a crime is constituted, criminal responsibility shall be investigated according to law.
Therefore, in the online world, people who break the law will be held accountable. This is the same as our real life, not as we imagined, because the online world is virtual, so we can talk nonsense. If communication is not conducive to social stability, it will be punished. For those who use their superb technical means to invade other people's computer systems for profit, it is definitely illegal. We often see such cases in real life. It should be said that these cases have taught us a bloody lesson. Therefore, when using the network, we must abide by laws and regulations, do not engage in sabotage, conduct normal and healthy communication on the network, make full use of network resources, and improve learning efficiency and knowledge!
The content of network security education is experience. Fraud, with the development of the times, is becoming more and more presumptuous and almost ubiquitous. You can pay attention to the internet, chat tools and telecommunications.
I remember once, my mother and I went to the market to buy food and bought a lot. We walked along the road and saw a beggar. The beggar said piteously, "I haven't eaten for five days." Give me some money! " Mother felt sorry for him and gave him five yuan. When we got home, something unfortunate happened: we ran out of gasoline. My mother took me to a restaurant for dinner, and a very annoying thing happened. I saw in the restaurant that the beggar who asked my mother and me for money was eating with relish. He also said a disgusting sentence to his companion: "Some fools gave me a lot of money today. It would be nice if this were the case in the future. " Say that finish, I laughed loudly. Hearing this, I really want to go up and scold him. I could see so many people, so I held my breath and asked my mother to change restaurants.
Another time, I saw a news on the computer: Ms. Wang, who lives in Shenzhen, bought Apple 4 online, and the merchant asked for her bank account number and password, saying that there was still 1000 yuan for her. Ms. Wang actually gave the merchant a bank account number and password in such a muddle. The businessman took 10 thousand yuan from the bank and ran away. However, he was later arrested by the police.
Fraud exists in every corner of the world. Let's learn some methods to prevent fraud.
First, in the face of anything related to property, we should use our brains to think clearly whether it is fraud.
Second, don't give your bank account number and password to people online, because it's 100% fake.
Third, don't covet a little money, because in the end it will only be a small loss, which is an uneconomical choice.
To prevent fraud, start with me and start with everyone.
In recent years, some criminals frequently use mobile phones, telephones and the Internet to commit telecommunication fraud, which seriously endangers social order and causes great losses to people's property. In order to make our children more alert, the school showed us the video CD of "Preventing Telephone Fraud".
This CD tells the stories of several real telephone fraud cases and exposes several common criminal methods.
1, pretending to be the court and relevant law enforcement departments, calling on the public to appear in court. It means that the client has an enforcement case in the court and is suspected of economic crimes, and the account will be frozen as a reason for intimidation. Finally, on the grounds of providing a "corporate account", the customer is required to transfer the deposit in his own name to the fraudulent account provided by him.
2. Pretending to be the staff of the Telecommunications Bureau and the Public Security Bureau. A staff member who claimed to be the Public Security Bureau answered the phone, claiming that the telephone and bank accounts registered in the name of the parties were suspected of money laundering, fraud and other criminal activities. In order to ensure that the deposit is not lost, I must transfer my account to a "safe account" and frequently urge the parties to transfer money by phone or nearby, otherwise the loss will be even greater.
3, posing as tax, finance, vehicle management personnel. It is said that "the state has lowered the tax rate of deed tax and additional tax on car purchase, which should be refunded", so that the parties can provide the bank card number and directly transfer the tax through the bank ATM machine.
4. Pretend to be friends or acquaintances. Fabricate a lie about one's family or one's own car accident injury, and ask the parties to remit money to the designated account.
Fraud means emerge in an endless stream. The film also introduces how to deal with loan fraud, matchmaking, recruitment fraud, low-priced shopping fraud, blackmail letter fraud, phishing website fraud, heavy money to buy children and so on.
After watching this video, I feel that this frightening and incredible thing is happening around us, right in front of our eyes. If we relax our vigilance a little, it will give the criminal suspect another chance to engage in criminal activities, and finally achieve the purpose of defrauding money through bank transfer and bank card transfer. Therefore, no matter how rhetoric or threats the criminals make, we just need to remember "don't listen, don't believe, don't transfer money, don't send money", don't believe that pies will fall from the sky, don't make hasty decisions when encountering things that you don't understand, contact your family first, and call 1 10 for consultation or alarm in time to ensure your property safety.
I hope everyone will be vigilant, keep their eyes open and distinguish between right and wrong. I hope our criminals can turn over a new leaf, stand on their own feet, and give people and society a stable living environment.
The sixth chapter is the era of "snaring" the world. Network, you are Prometheus, stealing the flame of Zeus, lighting the lightning, illuminating the darkness before dawn, making the wind of dawn reverberate in your ears, and the world is wonderful because of you. Internet, you fire thief, you stole the light, but also brought darkness. Give me back my privacy. This is an era of individuality, but it is also an era of lack of privacy. People are dissected and dismembered by big data bit by bit, and exposed to the public without leakage. Network, you stole the fig leaf of human beings and turned people into naked "transparent people"! The "prism incident" that broke out not long ago reflects the hidden worry of information security. High-tech stole our information invisibly, and defeated the enemy without fighting.
Not long ago, a girl named Qiqi, who was at a loss because of a Weibo, was mercilessly ridiculed by someone who dug up her personal information on the Internet, and finally committed suicide in anger. Everyone has secrets in his heart, just as every bud has worries. Forcibly peeling off the petals will definitely make the buds wither and mercilessly uncover personal privacy, which will definitely lead to human tragedy. Give me back my distance. Living in the internet age, although thousands of miles apart, we can talk face to face, so the distance between people is very close, but the distance between hearts is very far. I have recalled countless times that "after three months of war, a letter from home is worth a ton of gold". Although the war continues, and we live in different parts of the world, we can "walk along Wan Li Road". However, in this era of big data, neon lights adorn the night sky, brightly lit, and mobile phones are the mainstay, which has become the protagonist of the party. When "let's play with mobile phones and have dinner by the way" has become the mantra of young people, we can't help but sigh that human feelings have changed: without Zhu Ziqing's feeling of "and heaven remains our neighbourhood, how can I get it", there is the helplessness of the Canadian female writer's feeling that "the farthest distance in the world is not that you are at the ends of the earth, but that I am in front of you, but you don't know I miss you". Network, you stole the distance, where can you find the hometown of your heart? Give me back my poetic life. How can we not yearn for Yasunari Kawabata to see the flowering of begonia at 4: 30 in the morning, for Rousseau's cabin by Walden Lake, for Wilde to look up at the stars in the gutter, and for Cangyang Gyatso to walk through the snow in Xun Mei? On the other hand, there are no poems and paintings at present, and screen slaves are everywhere. When praising and brushing Weibo has become the main theme of life, where has our real life gone?
Network, when I put you in the spotlight again, I studied it carefully and finally got a glimpse of your true colors. You were just a tool in the high-tech era, and it has nothing to do with good or bad, merits or demerits. If properly used, it can make people play around the world, transmit information, spread knowledge and benefit mankind. If it is not properly controlled, it can also deprive privacy and spread rumors. Sexual violence and high-tech crimes push people into the abyss of perdition.
Advantages and disadvantages, black and white, there is no definition between the two poles, but the extremes will be reversed, depending on how you control it. The internet can send you to heaven or hell. How to make high technology benefit mankind depends entirely on human wisdom.
On July 16, 20xx, I was lucky enough to attend the network security training organized by the Education Bureau for eight days. The students participating in the training are all network management experts or network management experts of various schools, and the training teachers are either gold medal lecturers or senior technicians of a company. In such a learning environment, it not only drives me to enter the teaching profession, but also makes me feel that it is not easy to be a network administrator for the first time. Through this training, I deeply realized that I have a lot to learn, so I can only apply what I have learned in my own work, turn theoretical knowledge into practical operation, and realize my life value.
First, arm your mind with theoretical knowledge.
In this training, half the time the teacher mainly talks about the theoretical knowledge of network security, laws and regulations, network security management and network security technology. Starting with theoretical knowledge, let us have an understanding of network security knowledge. Although theoretical knowledge is a bit boring, I clearly know that this is the foundation. Through the study a few days ago, I learned that we should first pay attention to the importance of network security, fully understand the network security management problems in our school, face up to the problems, and solve and implement network security. Make the daily work of the campus go on in an orderly and normal way. Secondly, the problem of network security depends on the efforts of everyone, not just one person. The campus itself is a team and a collective. Of course, all teachers and students need to work together. First, every teacher should have a sense of network security, and second, make the network more stable through technical means. In short, the training has made me further aware of the shortcomings and future work direction, and I will learn more and think more.
Second, develop the study habit of doing more, talking more and thinking more.
In addition to learning theoretical knowledge, I also learned a lot in the training, most of which are computer operations, such as the configuration of switches and routers, because during my college years, I didn't touch switches and routers, but I just heard of them and never saw them. Through training, I not only learned about them, but also configured them. During my study, I listened carefully and discussed with the teacher some questions I didn't understand, so I learned a lot. Because I deeply feel that computers can only be understood by their own operation and groping, I have always reminded myself to learn and think in computer operation training. Thanks to my efforts, I learned the mutual access between computers and some basic security configurations. But I still want to point out my shortcomings in this training. I still don't understand the wiring system I learned. Maybe it has nothing to do with me. Besides, I don't know my campus wiring. It's hard to learn. But I learned from it.
Through this training, I believe I have made some progress, no matter in what way or how much. I just need to work hard to realize it in the future and do my little bit. In order to realize their own value.