Current location - Loan Platform Complete Network - Big data management - What are the top five cybersecurity "night watchmen"?
What are the top five cybersecurity "night watchmen"?

Sept. 17 (Xinhua) -- Title: Just now, we found the top five cybersecurity "night watchmen"

With our wallets, cars, refrigerators, televisions and speakers all connected to the Internet, data security has become a 24-hour non-stop "war of attack and defense ". Telecom fraud, Trojan viruses and other insecurity factors like the TV series "Game of Thrones" in the "ghosts", and security experts are the "night watchman" of the information. In the 2017 National Cybersecurity Awareness Week here, these "night watchmen" came to the front of the stage, so that we can truly perceive the thrill of the battle.

--"Live long time to see": intelligent robots can also block fraud

A viewer stood in the Ali security technology experience area, to the intelligent robot "Tmall Elf" issued a command. "issued a command:" Tmall Elf, help me check a number." "Please state the number you want to check." The viewer then reported an unfamiliar phone call he had received, which the Tmall Elf quickly recognized and reported, "The Money Shield App tells me that this is a fraudulent call, so please don't make or receive it."

"I didn't expect it to recognize it, it's really interesting and practical." A spectator at the scene said after experiencing the Tmall Elf's functions of speaking paragraphs and preventing fraud. The experience area was crowded with people queuing up in anticipation of entering the narrow glass room to have a close encounter with the intelligent anti-fraud robot.

The robot can prevent fraud, is the State Council Office of the Inter-Ministerial Joint Conference on Combating New Types of Illegal Crimes in Telecommunications Networks (hereinafter referred to as "the State Council Joint Office") money shield anti-fraud platform fraud interception technology into the robot, so that it has a pair of fraudulent numbers can be recognized as a pair of "eyes of fire", and provide the latest anti-fraud reminders. Money Shield security expert Shen Jie said that in order to cope with the constantly "upgraded" means of fraud, Money Shield anti-fraud platform for the first time fraud interception technology and artificial intelligence combined together to help the people to improve the awareness of fraud prevention.

Not only that, this robot can understand Chinese Mandarin voice commands. Imagine how much fun it would be to turn on the lights, turn on the TV, adjust the temperature of the air conditioner, and even shop at the Tmall supermarket, order takeout, send an express delivery, play games, and listen to jokes by simply shouting out commands to an intelligent robot at home.

--"Black technology": quantum communication that "won't be decrypted"

At the exhibition site, the audience can also interact with the "Quantum Secure Communication Network". Quantum confidential communication network" close contact. In the cooperation booth of China Telecom and KDDI quantum company, the reporter experienced a "confidential meeting", and greeted the staff at the Beijing venue in real time. Although on the surface and ordinary video conferencing is not any difference, but behind the encryption principle is completely different.

He Wei, vice president of KDDI Quantum Technology Co., Ltd. told the reporter that according to the characteristics of quantum, such as "inability to measure" and "unclonable", theoretically, the quantum key generated through the device, and then encrypted transmission of data will not be stolen, which is very useful for various kinds of video conferencing. Stolen, which has a variety of confidentiality needs of important data transmission is very necessary, will be widely used in national defense, finance, government, power, energy, transportation, telecommunications, big data and other important industries.

According to reports, China Telecom has been tracking and promoting the research and industrialization of quantum-secret communication-related technologies since 2014, and has worked closely with the quantum team of the University of Science and Technology of China.In April 2017, Shanghai Guodun Quantum and China Telecom Shanghai launched cooperation, and has now built a financial quantum metropolitan network of more than 1,000 kilometers long in Shanghai.

As a powerful "infrastructure" for quantum communication, the "Beijing-Shanghai Trunk Line" project has broken through key technologies such as high-speed quantum key distribution, high-speed and high-efficiency single-photon detection, trusted relay transmission and large-scale quantum network control, and completed the full line of communication at the end of last year. At the end of last year, the whole line was completed, and recently passed the total technical acceptance, building a quantum secret communication backbone line of more than 2,000 kilometers long connecting Beijing, Jinan, Hefei and Shanghai.

--"Demon mirror": a key to identify fraudulent phone phishing sites

Always worried about mom and dad by phone fraud? You're also worried about the pervasiveness of phishing sites? The days of fear and trepidation are coming to an end. In this network security week, as the governance of telecommunications network fraud "beforehand Zhu Geliang", the money shield anti-fraud platform to solve the rampant telecommunications fraud plus a "golden bell shroud, iron cloth shirt".

The reporter found on-site experience, as long as the phone installed software, dial or access to suspected fraudulent phone calls, the phone will remind the "Ministry of Public Security Criminal Investigation Bureau to remind the fraudulent phone calls. According to reports, due to the system's number library and the Ministry of Public Security Criminal Investigation Bureau of the black and gray number can be compared in real time, those who are sure that the fraudulent number as long as the first appearance, the software will be the first time to remind the people, will be fraudsters blocked outside the phone.

Not only that, with the upgrading of fraudulent means, a lot of phishing links will also be "disguised", into the content we click on every day, the news, the people are difficult to distinguish. The installation of this system, as long as the click on the link has a problem, the phone can be the first time to intercept, as if the phone installed a "demon-spotting mirror".

According to the introduction, the money shield anti-fraud platform is built by the State Council Joint Office, Alibaba to provide technical support for the "anti-fraud artifacts".

--"Famous detective": "eagle eye" through the track of action "anti-fraud"

June 11 this year, in Xuhui District, Tianlin area to work Mr. Zhang received an unfamiliar call, the caller said Mr. Zhang did not pick up the postal parcels there is a "problem", and then the caller will be transferred to the "Pudong Public Security Bureau," Mr. Zhang was told that Mr. Zhang was told that he was "suspected of a financial fraud" and needed to "assist in the investigation to prove his innocence" and avoided all "single-line contact" the next day. The next morning, a confused Mr. Zhang followed the instructions of the other side to a hotel, and is ready to tell the other side of his bank account number.

But at the same time, the Shanghai Anti-Telecommunications Network Fraud Center platform through the Eagle Eye intelligent phone box big data analysis and other technologies, determining that Mr. Zhang is likely to become a telecom fraud "high-risk groups. According to Mr. Zhang's trajectory, the platform judged to be in line with the characteristics of the fraud, the command center rushed to the scene in a timely manner to prevent the occurrence of this telecom fraud.

Tencent security anti-fraud lab head Li Xuyang told reporters that the above "eagle eye intelligent anti-phone fraud box" is the exposition on the Tencent anti-telecom network fraud smart brain products. This "intelligent brain", is based on artificial intelligence technology for blackmail confrontation mode of research results, will play a role in telecommunications fraud before, during, and in the analysis of the case and other key aspects.

--"Moat": blacklist so that harmful information can not be "ashore"

Before the information is displayed on the line, the use of the system strategy to high-speed machine The system will use the system strategy to carry out high-speed machine screening, and for a small amount of content that the system can not identify or make a final judgment, it will be pushed to the manual review. This harmful information screening system was prominent at Baidu's booth.

The site staff introduced that in the first half of this year, Baidu's risky vocabulary blacklist has included more than 360,000 samples of harmful information, and has now formed a closed loop of active interception before the display of information, and autonomous inspection and cleanup of existing information, with more than 86.2 percent of the harmful information intercepted before it is put online.

Baidu's main display this time is the "Emergency Response Center", which can help partners to establish a complete security defense system, the solution includes 14 major functions and services covering network security monitoring, anti-telescope fraud, and is widely used in various industries such as politics, finance and health care.

One of the most distinctive features is the traceability and tracking function, which can be closely integrated with telecom operators, network security and other departments to provide an effective means of solving problems such as combating network fraud. Site staff told reporters that a pseudo base station if the mobile WiFi car, it is very difficult to capture; now with the traceability, can be traced back to the initial sending signal ip address or device code, and ultimately locate the address location, provided to the regulatory authorities.