Workflow
网络安全
icon
Search documents
智能时代如何守护个人数字安全?这份指南请收好
Xin Lang Ji Jin· 2025-09-16 10:16
专题:2025金融教育宣传周:保障金融权益 助力美好生活 基金行业在行动 随着AI人工智能的发展,网络空间也滋生出更隐蔽的安全隐患,对个人的财产安全和隐私安全构成了 严重威胁。网络安全与我们每个人都息息相关,接下来,一起来了解网络安全相关的知识吧! 网络安全是什么?① 网络安全,是指通过采取必要措施,防范对网络的攻击、侵入、干扰、破坏和非法使用以及意外事故, 使网络处于稳定可靠运行的状态,以及保障网络数据的完整性、保密性、可用性的能力。 对普通网民而言,网络安全就是如何在虚拟的互联网当中保证自己的信息或财产不受到非法侵害。 互联网常见的安全隐患 1、钓鱼邮件陷阱② 诈骗者会发送伪装成知名金融机构、投资顾问的钓鱼邮件,邮件内容常以 "限时投资机会""账户异常需 验证" 等话术,诱导投资者点击链接,进而窃取其账户密码、银行卡信息等,甚至造成财产损失。 2、恶意软件陷阱③ 部分不法分子将恶意软件伪装成热门投资应用,上传至非官方应用商店或通过网页弹窗等渠道传播。用 户下载安装后,这些软件可能在后台偷偷收集用户的通讯录、地理位置等隐私信息,甚至通过恶意代码 控制设备,进行自动转账等操作。 3、网络诈骗陷阱④ 不法分子会 ...
2025年国家网络安全宣传周——网络安全知识科普,建议学习+收藏!
Sou Hu Cai Jing· 2025-09-16 10:07
2025年9月15日至21日 是国家网络安全宣传周,今年活动主题为 "网络安全为人民、网络安全靠人民" ——以高水平安全守护高质量发展 2025网络安全宣传周 9月8日,2025年国家网络安全宣传周新闻发布会在京举行。今年网安周将深入学习宣传贯彻习近平总书记关于网络强国的重要思想,认真落实习近平总书 记对网络安全工作"四个坚持"的重要指示精神,积极做好《网络安全法》《数据安全法》《个人信息保护法》《关键信息基础设施安全保护条例》《网络 数据安全管理条例》《互联网政务应用安全管理规定》等法律法规和政策文件宣贯工作,积极展现党的十八大以来网络安全领域的发展成就和重要成果, 向全社会普及网络安全知识和技能。 电信诈骗、信息泄露、 网络谣言、恶意软件...... 今天,一起来学习 网络安全知识 ↓↓↓ 大家在享受如今互联网 带来便利的同时 也要时刻注意 互联网背后存在的 巨大隐患 网络安全知识宣传手册 SSESS 网络安全法律法规体系 8 D 《中华人民共和国网络安全法》 2016年11月7日,第十二届全国人民代表大会常务委员会第二十 四次会议通过,自2017年6月1日起施行。 是我国第一部全面规范网络空间安全管理方 ...
【网络安全宣传周】网络安全知识科普
Sou Hu Cai Jing· 2025-09-16 09:15
2025年9月15日至21日 是国家网络安全宣传周,今年活动主题为 "网络安全为人民、网络安全靠人民" ——以高水平安全守护高质量发展 2025网络安全宣传周 9月8日,2025年国家网络安全宣传周新闻发布会在京举行。今年网安周将深入学习宣传贯彻习近平总书记关于网络强国的重要思想,认真落实习近平总书 记对网络安全工作"四个坚持"的重要指示精神,积极做好《中华人民共和国网络安全法》《中华人民共和国数据安全法》《中华人民共和国个人信息保护 法》《关键信息基础设施安全保护条例》《网络数据安全管理条例》《互联网政务应用安全管理规定》等法律法规和政策文件宣贯工作,积极展现党的十 八大以来网络安全领域的发展成就和重要成果,向全社会普及网络安全知识和技能。 大家在享受如今互联网 带来便利的同时 也要时刻注意 互联网背后存在的 巨大隐患 电信诈骗、信息泄露、 网络谣言、恶意软件...... 今天,一起来学习 网络安全知识 ↓↓↓ 网络安全知识宣传手册 t - 16 tata D- 1 D 网络安全法律法规体系 10 CC 《中华人民共和国网络安全法》 2016年11月7日,第十二届全国人民代表大会常务委员会第二十 四次会议通 ...
联通数科网络安全大模型入选北京首台(套)重大技术装备目录
Xin Hua Wang· 2025-09-16 08:30
Core Insights - China Unicom's cybersecurity model has been recognized as a significant technological equipment, showcasing its leading position in the cybersecurity industry [1][2] - The model leverages AI to enhance security capabilities, addressing critical operational pain points and improving efficiency [1] Group 1: Recognition and Impact - China Unicom's self-developed cybersecurity model has been included in Beijing's 2025 second batch of major technological equipment, highlighting its technological strength and innovation in the cybersecurity field [1] - This recognition emphasizes China Unicom's role as a "national cybersecurity team" amid escalating global cybersecurity threats [1] Group 2: Technological Advancements - The cybersecurity model integrates four core capabilities: large models, intelligent agents, knowledge bases, and plugin tools, creating a dynamic defense paradigm that can self-learn and evolve [1] - The model has achieved significant breakthroughs in operational scenarios, including a noise reduction rate exceeding 99% and an intelligent judgment accuracy of over 95%, with judgment time reduced to under 30 seconds [1] Group 3: Operational Efficiency - The model enhances report generation efficiency by 80%, allowing security operation teams to focus 90% of their efforts on high-value threat handling, thus significantly improving operational effectiveness [1]
2025年广东省网络安全宣传周开幕 共筑网安防线 助力产业发展
Group 1 - The 2025 Guangdong Cybersecurity Awareness Week commenced on September 15, with the theme "Cybersecurity for the People, Cybersecurity Relies on the People" [1] - The event includes various activities such as project promotion, talent recruitment, and a cybersecurity competition, aiming to enhance industry development through favorable policies [1][3] - Zhuhai has introduced a series of incentives for the "Cybersecurity Industry Overseas Gathering Zone" and "Artificial Intelligence Large Model Ecosystem Construction Gathering Zone," with rewards up to 2 million yuan [1] Group 2 - Representatives from Guangdong, Hong Kong, and Macau emphasized collaboration to build a cybersecurity "firewall" during the opening ceremony [2] - Suggestions were made to establish a universal security model to manage systemic risks associated with large models, reducing overall social costs [2] - A memorandum was signed to promote cooperation in cybersecurity among the three regions, leading to fruitful outcomes [2] Group 3 - 21 companies presented projects related to cybersecurity technology, AI, and cross-border data flow during the event [3] - A proposal was made to create a cross-border data space to lower costs and enhance data security through AI and infrastructure collaboration [3] - Innovative cybersecurity solutions were showcased, including a drone detection system capable of real-time monitoring within a 5-kilometer radius [3] Group 4 - The "Million Talents Gather in South Guangdong" recruitment event offered 8,318 quality job positions from 94 participating companies [4] - Companies are seeking talent in AI security, blockchain, and data governance, reflecting the industry's growing demand for skilled professionals [4] - The "Bay Area Cup" cybersecurity competition attracted over 10,000 initial registrants, with 150 teams advancing to the finals, focusing on various cutting-edge security fields [5]
【安全】2025年金融网络安全宣传手册
招商银行App· 2025-09-16 07:05
Core Viewpoint - The article emphasizes the importance of cybersecurity and the need for public awareness and education regarding online safety, particularly in the context of financial information protection and the prevention of various types of online fraud [10][22]. Group 1: Cybersecurity Principles - Xi Jinping's important thoughts on building a cyber power are outlined, emphasizing the integration of cybersecurity and information technology development [2][4]. - The "Four Persistences" in cybersecurity work are highlighted, focusing on the need for cybersecurity to serve the people and the importance of education and technology integration [10][11]. Group 2: Legal Framework - The "Cybersecurity Law of the People's Republic of China" is introduced as the foundational legal framework for managing cybersecurity, effective since June 1, 2017 [13]. - The "Data Security Law" and the "Personal Information Protection Law" are also discussed, establishing guidelines for data handling and personal information protection, effective from September 1, 2021, and November 1, 2021, respectively [17][18]. Group 3: Financial Information Security - Personal financial information is defined, including identity, asset, account, credit, and transaction information [22]. - Recommendations for protecting personal financial information include not sharing sensitive information and being cautious with online transactions [23][25]. Group 4: Fraud Prevention - Various types of online fraud are detailed, including investment scams, loan fraud, and impersonation scams, with specific case studies illustrating how these scams operate [27][31][36]. - Safety tips are provided to help individuals recognize and avoid scams, emphasizing the importance of skepticism towards unsolicited offers and requests for personal information [30][33][38]. Group 5: Anti-Fraud Tools - The article lists several anti-fraud tools and resources, such as the National Anti-Fraud Center APP and various reporting hotlines, aimed at enhancing public awareness and response to potential fraud [43][44][45].
国家网络安全宣传周山东省活动在菏泽启动
Da Zhong Ri Bao· 2025-09-16 06:36
2025年国家网络安全宣传周山东省活动于9月15日至21日在全省范围内统一开展。活动期间将组织 数据安全政策宣讲、"泰山杯"网络安全大赛决赛、网络安全主题日、网络安全进基层等系列活动,提升 全社会网络安全意识和防护技能,筑牢网络安全屏障,共享清朗数字家园。 活动现场举行了网络安全主题展览,公布了2025年山东省网络安全微视频大赛获奖名单、第三批优 质网络安全宣传教育阵地名单和山东省个人信息保护优秀案例,奇安信集团董事长齐向东作大会演讲。 9月15日上午,2025年国家网络安全宣传周山东省活动在菏泽启动。山东省活动以"网络安全为人民 网络安全靠人民——以高水平安全守护高质量发展"为主题,由省委宣传部、省委网信办等部门联合主 办。 ...
奢侈品行业频遭网安威胁!LV、卡地亚、迪奥今年均曝泄露
Jing Ji Guan Cha Wang· 2025-09-16 05:44
Core Insights - Kering Group has confirmed a cyber attack that resulted in the leakage of customer data from its brands, including Gucci, Balenciaga, and Yves Saint Laurent, involving names, phone numbers, addresses, and total spending amounts, while financial information such as credit card details was not compromised [1] Industry Summary - The luxury goods sector has experienced a surge in cybersecurity incidents this year, with notable breaches including the leakage of information from nearly 420,000 customers of Louis Vuitton in July, which included passport numbers and shopping records [1] - In June, Richemont's Cartier brand faced a system intrusion that led to customer data exposure, and in May, Dior also reported incidents involving the leakage of customer names, phone numbers, and spending preferences [1]
院长对话!为了一个AI问题,大家从改试卷聊到十五运会
Nan Fang Du Shi Bao· 2025-09-16 05:28
9月15日在"2025年广州市网络安全宣传周启动仪式"上,来自中山大学、华南理工大学、暨南大学、广 州大学、广东外语外贸大学的5所高校网络安全领域或者人工智能产业研究专家,围绕"AI+"发展创新 与安全治理热门话题,上演了一场高端的"院长对话"。在专家看来,AI应用边界持续拓展,安全防线的 构建也迫在眉睫。 "AI智能体已走入千家万户,可能过一段时间会比手机离大家更近。随着AI融入人们生活,人工智能安 全必将成为一个极其重要的研究方向。"中山大学网络空间安全学院院长操晓春教授指出,当前AI领域 需重点关注三类风险:一是AI智能体输出正确性与价值观问题,关系到用户认知与社会稳定,必须推 进全生命周期的安全评估与治理;二是智能无人系统与物理领域安全问题。AI已从数字空间延伸至物 理世界,其决策透明性与可解释性成为关键。不仅要关注"结果正确",更要追求"原因正确"。三是AI生 成内容的安全隐忧,需加强审核、溯源、风险预警等。 医疗领域作为AI应用的重要场景之一,琶洲实验室智慧医疗与AI病理联合研发中心执行副主任、华南 理工大学计算机科学与工程学院副院长张通教授表示,"大模型在医疗产品中的应用面临与传统研究领 域不同 ...
“湾区杯”网安大赛落幕:角逐前沿攻防,培育本土“红客”
在人工智能赛道,选手们需要应对大模型安全相关挑战,解决AI训练数据被投毒、模型被恶意攻击等 潜在问题;车联网赛道中,参赛者要针对车辆通信安全、自动驾驶系统防护等关键环节展开攻防演练, 这些赛题设置均紧密贴合现实应用场景,对未来网络安全防护具有重要的实践指导意义。 (原标题:"湾区杯"网安大赛落幕:角逐前沿攻防,培育本土"红客") 南方财经记者彭敏静 珠海报道 9月15日,在2025年广东省网络安全宣传周(简称:宣传周)的浓厚氛围中,2025年"湾区杯"网络安全 大赛决赛在珠海举行。 大赛秉持"智慧之成?安全之诚?未来之城"的主题,创新性地构建了多维度竞技体系。除传统网络安全攻 防实战环节外,特别增设低空经济、人工智能、移动互联网、车联网、工业互联网、区块链安全等六大 前沿赛道,紧密围绕未来城市安全保障需求,全面考察选手在新兴科技领域的实战能力与创新思维。 据悉,初赛线上报名人数超过1万人,人员涵盖全国各地的网络安全从业人员、技术爱好者、院校学 生、青少年等。经过初赛阶段的激烈角逐,共遴选出150支队伍、450人参加决赛,总奖金超百万元。 最终,大赛在激烈角逐后确定奖项归属,不仅评选出象征综合实力的金湾杯、银湾 ...