Workflow
数据安全
icon
Search documents
【网络安全宣传周】没有网络安全,就没有国家安全!这些网络安全知识要牢记!
天天基金网· 2025-09-03 10:34
Core Viewpoint - The article emphasizes the importance of cybersecurity in the digital age, highlighting the potential risks and the need for a robust legal framework to protect against cyber threats [3][12]. Legal Framework - The "Cybersecurity Law of the People's Republic of China" was enacted on June 1, 2017, as the first comprehensive law regulating cybersecurity management in China [5]. - The "Regulations on the Security Protection of Critical Information Infrastructure" came into effect on September 1, 2021, focusing on the protection of critical information infrastructure [6]. - The "Data Security Law" was passed on June 10, 2021, and is a foundational law in the field of data security [7]. - The "Automotive Data Security Management Regulations (Trial)" were implemented on October 1, 2021, to regulate data processing in the automotive sector [8]. - The "Personal Information Protection Law" took effect on November 1, 2021, aimed at protecting personal information rights [9]. - The "Cybersecurity Review Measures" were revised and came into effect on February 15, 2022, to enhance cybersecurity and data security [10]. - The "Interim Measures for the Management of Generative Artificial Intelligence Services" were enacted on August 15, 2023, to regulate AI services [11]. Critical Information Infrastructure - Critical information infrastructure includes essential sectors such as energy, transportation, water resources, finance, and national defense, where damage could severely impact national security and public interest [15]. - The identification of critical information infrastructure is managed by relevant governmental departments, which develop rules based on industry-specific conditions [16]. Security Incidents - Notable cybersecurity incidents include the 2015 Ukraine power grid attack, the 2016 Dyn DNS attack, and the 2021 Colonial Pipeline ransomware attack, all of which highlight the vulnerabilities in critical infrastructure [19]. Security Measures - The "Regulations on the Security Protection of Critical Information Infrastructure" were published on August 17, 2021, to establish a national security protection system [20]. - The national standard for critical information infrastructure security protection was released on November 7, 2022, and implemented on May 1, 2023, providing guidance for security measures [20]. Data Security - Data is categorized into general, important, and core data levels based on the potential harm caused by unauthorized access or breaches [25]. - Organizations are encouraged to implement data security measures such as backup, encryption, and access control to protect sensitive information [26][28]. Cybercrime Prevention - The article discusses various types of cybercrimes, including phishing attacks and telecom fraud, and emphasizes the need for individuals and organizations to adopt preventive measures [21][30]. - Recommendations include protecting personal information, using official channels for transactions, and verifying requests for financial transactions [30][32]. Collective Responsibility - Cybersecurity is portrayed as a collective responsibility, urging society to work together to strengthen defenses and protect the digital environment [34].
英方软件跌2.56%,成交额6244.86万元,近3日主力净流入-1799.37万
Xin Lang Cai Jing· 2025-09-03 08:12
Core Viewpoint - The company, Yingfang Software, is experiencing a decline in stock price and trading volume, indicating potential challenges in the market despite its advancements in data replication technology and partnerships with major platforms like Huawei [1][4]. Company Overview - Yingfang Software, established on August 12, 2011, and listed on January 19, 2023, specializes in data replication software, integrated hardware-software solutions, and related services [7]. - The company's revenue composition includes 60.37% from software products, 20.57% from software-related services, 15.97% from integrated hardware-software products, and 3.09% from other sources [7]. Product and Technology - The company has developed proprietary data replication technologies, including dynamic file byte-level, database semantic-level, and volume layer block-level replication, which are compatible with various domestic and international software brands [2]. - Yingfang Software's products are primarily deployed on clients' data servers, focusing on disaster recovery and data security, making it one of the top three suppliers in the domestic data replication and protection software market [3]. Market Position and Performance - As of June 30, the company had 6,450 shareholders, a 1.90% increase from the previous period, with an average of 7,154 circulating shares per person, a decrease of 1.86% [8]. - For the first half of 2025, Yingfang Software reported a revenue of 84.35 million yuan, a year-on-year increase of 0.93%, while the net profit attributable to the parent company was -9.53 million yuan, reflecting a 55.35% year-on-year improvement [8]. Industry Context - Yingfang Software operates within the computer software development sector, specifically in horizontal general-purpose software, and is associated with concepts such as Huawei Kunpeng, small-cap stocks, data elements, information security, and the digital economy [8].
专家:部分AI知无不言,成“套话重灾区”|数博会
Core Insights - The application of AI large models has raised significant data security concerns, particularly regarding the phenomenon of "prompt leakage" [1][2] - The complexity of AI systems and their interactions increases the risk of sensitive information being inadvertently exposed during data transmission and processing [1][2] Group 1: AI Large Models and Data Security - AI large models are akin to vast databases containing sensitive information, which can be exposed through unintentional prompts during interactions [1] - Unlike traditional databases, AI models possess reasoning capabilities that make them more susceptible to "prompt leakage" [1] - The risk of "prompt leakage" necessitates a comprehensive examination of the entire interaction system to identify potential security vulnerabilities [1] Group 2: Risks and Mitigation Strategies - The risks associated with "prompt leakage" include personal privacy breaches, loss of corporate competitive advantage, and potential threats to national security [2] - Effective measures must be implemented to prevent "prompt leakage," including monitoring interaction processes and analyzing response content [2] - The emergence of new technologies like Model Context Protocol (MCP) introduces additional complexities and security risks, highlighting the critical need for data security in AI applications [2]
贵州大数据集团于数博会期间与联通、华为、360、人民网等签约
Ge Long Hui A P P· 2025-09-02 08:44
Core Insights - Guizhou Big Data Group signed seven strategic cooperation agreements during the 2025 China International Big Data Industry Expo, focusing on various sectors including cloud computing, artificial intelligence, and data security [1] Group 1: Strategic Partnerships - Guizhou Big Data Group partnered with Guizhou Mobile to collaborate on smart computing, big data, cloud services, and new infrastructure projects, aiming to create replicable benchmark demonstration projects [1] - A strategic agreement was signed with Sangfor Technologies to focus on cloud services, network and data security, and artificial intelligence, aiming to build a comprehensive big data industry ecosystem [1] - A partnership with 360 Digital Security Group was established to develop specialized technologies and products in government and enterprise network data security and artificial intelligence [1] - Guizhou Big Data Group signed a comprehensive strategic cooperation agreement with Huawei to deepen collaboration in cloud computing, big data, and artificial intelligence [1] - A strategic agreement with Guizhou Unicom was signed to promote innovation in healthcare, cloud computing, low-altitude economy, industrial internet, and IoT [1] - A memorandum of strategic cooperation was signed with People’s Daily to enhance collaboration in the big data sector [1] - A strategic cooperation agreement with Boyan Technology was established to focus on AI applications, digital transformation services, and public data utilization [1]
智研咨询—2025年中国数据安全管理平台行业市场全景调查及投资策略研究报告
Sou Hu Cai Jing· 2025-09-02 02:40
Core Insights - The article highlights the increasing importance of data security management platforms in China due to rising data security risks and costs associated with data breaches, which pose significant challenges to economic and national security [1][3][7]. Market Overview - The market size for data security management platforms in China is projected to reach 825 million yuan in 2024, reflecting a year-on-year growth of 14.8% [1][3]. - The market is characterized by high concentration, with the top five companies holding 52.2% of the market share in 2024 [1]. Key Players - Major players in the data security management platform market include Anheng Information, Qi Anxin, and Qiming Star, with Anheng Information leading the market with a 13.7% share, followed closely by Qi Anxin at 13.1% [1][3]. Development Trends - The data security management platform market is expected to continue growing, with trends indicating a shift towards integrated platform solutions and the incorporation of AI technology for proactive security measures [4][7]. Regulatory Environment - The Chinese government has accelerated the legislative process regarding data security, introducing several key regulations such as the Data Security Law and the Personal Information Protection Law, establishing a foundational legal framework for network data security [3][8].
【独家发布】2025年中国数据安全管理平台行业政策梳理及上下游产业链全景分析
Sou Hu Cai Jing· 2025-09-01 07:17
Core Viewpoint - The data security management platform is gaining significant attention in China due to increasing data security risks and the rising costs associated with data breaches, leading to a growing market for these platforms [2][4]. Group 1: Overview of Data Security Management Platforms - The data security management platform is defined by its capabilities in data classification, sensitive data discovery, data asset security management, risk assessment, and situational awareness, excluding tools for data protection [4]. - The platform aims to provide centralized management of data assets and security capabilities, enabling comprehensive identification, presentation, and monitoring of data assets [2][4]. Group 2: Market Size and Growth - The market size for data security management platforms in China is projected to reach 825 million yuan in 2024, reflecting a year-on-year growth of 14.8% [2]. - The increasing popularity of these platforms is attracting more enterprises, with the top five companies holding a combined market share of 52.2% during 2024 [2]. Group 3: Competitive Landscape - Major players in the data security management platform market include Anheng Information, Qi Anxin, and Qiming Star, with Anheng Information leading the market with a 13.7% share, followed closely by Qi Anxin at 13.1% [2][3]. - The competitive environment is characterized by strong capabilities among these firms, contributing to their dominant positions in the market [2]. Group 4: Development Background - The Chinese government is increasingly prioritizing data security, recognizing data as a critical production factor and implementing various laws and standards to enhance data security management [8][9]. - The rapid growth of data production, projected to exceed 41.06 zettabytes in 2024, underscores the importance of robust data security measures [10].
境外间谍情报机关将加密通信软件打造为“暗线通道”,拉拢腐蚀境内人员、窃取国家秘密,国安部提醒
Xin Lang Cai Jing· 2025-08-30 16:35
一些通用加密通信软件在为信息提供保护的同时,也为境外间谍不法活动提供了新的掩护。其风险如暗 流涌动,需高度警惕。 加密通信软件潜藏的"暗流" ——间谍活动的"暗线通道"。工作发现,一些境外间谍情报机关将通用加密通信软件打造为 策反渗透的"暗线通道"。他们利用加密软件的隐蔽性,传播极端思想和虚假信息、组织非法 活动、拉拢腐蚀境内人员、窃取国家秘密,妄图危害我国家安全。 安平,公众号:国家安全部别让加密通信成为安全幻觉 国家安全机关提示 维护数据安全是全社会的共同责任,相关单位和个人要提高数据安全意识,履行网络安全义 务,共筑数据安全防线。要建立健全通信工具使用规范,定期开展反窃密防泄密专项教育和 技术培训,提升安全防范能力;要慎重选用通信工具,充分认识加密通信软件的潜在安全风 险,严禁使用未经国家相关部门认证的境外加密通信工具;在日常通信交往中,坚决杜绝谈 及国家秘密、工作秘密等重要敏感内容。 安平,公众号:国家安全部别让加密通信成为安全幻觉 ——无意泄密的"隐蔽温床"。个别通用加密通信软件的用户安全意识薄弱,迷信加密通话 即"绝对安全",在沟通中"随口说、随手传"高度涉密敏感内容。然而,原数据(如通话对 象、 ...
加密软件成境外间谍新掩护 国家安全机关发布提醒
Yang Shi Xin Wen· 2025-08-30 01:59
Core Viewpoint - The use of general encryption communication software poses significant risks by providing cover for foreign espionage activities while also protecting information [1][2]. Group 1: Espionage Activities - Foreign intelligence agencies are utilizing general encryption communication software as a "dark channel" for infiltration and subversion, spreading extremist ideologies, false information, and organizing illegal activities [2]. - The software's concealment features are exploited to recruit and corrupt domestic personnel, as well as to steal state secrets, thereby threatening national security [2]. Group 2: Data Leakage Risks - Some users of general encryption communication software exhibit weak security awareness, mistakenly believing that encrypted calls are "absolutely safe," leading to the unintentional sharing of sensitive information [2]. - Original data such as call participants, duration, and frequency are often not completely hidden, increasing the risk of data leakage under the guise of security [2]. Group 3: Illegal Activities - Certain criminals are using the concealment properties of encryption communication software to facilitate illegal fund transfers, attempting to evade financial regulations [2]. - There are instances where encrypted communication is used to transmit sensitive information and trade state secrets, treating national core interests as commodities, which poses severe threats to national security [2]. Group 4: Security Recommendations - It is emphasized that maintaining data security is a collective responsibility, urging individuals and organizations to enhance their data security awareness and fulfill their cybersecurity obligations [4]. - Establishing communication tool usage norms and conducting regular anti-leakage education and technical training is recommended to improve security prevention capabilities [4]. - Caution is advised in selecting communication tools, with a strong recommendation against using unverified foreign encryption communication tools [4]. - Citizens are encouraged to report any activities that threaten national security through designated channels [4].
国安部提醒:别让加密通信成为安全幻觉
Qi Lu Wan Bao· 2025-08-30 01:22
加密通信软件潜藏的"暗流" 一些通用加密通信软件在为信息提供保护的同时,也为境外间谍不法活动提供了新的掩护。其风险如暗流涌动,需高度警惕。 ——间谍活动的"暗线通道"。工作发现,一些境外间谍情报机关将通用加密通信软件打造为策反渗透的"暗线通道"。他们利用加密软件的隐蔽性,传播极端 思想和虚假信息、组织非法活动、拉拢腐蚀境内人员、窃取国家秘密,妄图危害我国家安全。 ——无意泄密的"隐蔽温床"。个别通用加密通信软件的用户安全意识薄弱,迷信加密通话即"绝对安全",在沟通中"随口说、随手传"高度涉密敏感内容。然 而,原数据(如通话对象、时长、频率等)往往难以完全隐匿,使得泄密风险在看似安全的"隐蔽外衣"下悄然滋生。 ——违法活动的"隐身斗篷"。个别不法分子利用加密通话软件的隐匿特性,将其作为非法资金转移的"隐身斗篷",试图逃避金融监管,为洗钱、非法交易提 供便利。更有甚者,将加密通信作为传递涉密情报、交易国家秘密的渠道,将国家核心利益当作"商品"进行买卖,对我国家安全造成严重危害。 国家安全机关提示 维护数据安全是全社会的共同责任,相关单位和个人要提高数据安全意识,履行网络安全义务,共筑数据安全防线。要建立健全通信工 ...
微博COO王巍出席数博会 分享AI时代数据安全挑战与治理实践
Sou Hu Cai Jing· 2025-08-29 04:14
Core Insights - The event highlighted the dual challenges of data security and innovation in the AI era, emphasizing the need for effective governance and management practices [3][4][5] Group 1: Data Security Challenges - AI technology accelerates the use of data, leading to exponential growth in data processing, while malicious activities pose significant threats to user privacy [3] - The widespread application of AIGC technology has increased cross-domain data flow frequency, making traditional security measures inadequate [3] Group 2: Governance and Management Practices - The company has established a Data Security Management Committee and implemented a cross-departmental real-time collaboration mechanism to create a comprehensive data security protection system [3][4] - A one-stop data security governance platform has been developed, integrating AI technology with business scenarios to enhance efficiency in data security management [3][4] Group 3: Specific Governance Measures - The company has introduced a "three-line defense" strategy to address personal information protection issues, utilizing management processes, technical monitoring, and compliance audits [4] - Advanced AI technologies, such as deep learning and multi-modal recognition, have been employed to create an intelligent content identification and control system [4] Group 4: Future Directions - The company aims to continue collaborating with industry partners to innovate technology for data security and promote ecological development through open cooperation [5]