Cybersecurity Takeaways (General 7)
After we have some inspiration, we might as well write it down as a takeaway to keep in mind so that we can develop a good way of summarizing it. So what does a good takeaway look like? The following is my help to organize the network security experience (general 7), welcome to learn and reference, I hope to help you.
Network security experience 1
The network, is a double-edged sword. It can both benefit people and facilitate access to a variety of information and data; it can also bring people a lot of trouble and harm. Therefore, when we use the network, we must be careful to prevent. Next I talk about my own network security experience.
We try to install more authoritative antivirus software on the computer, used to check and kill the Trojan horse, repair vulnerabilities. And to learn to upgrade the antivirus software, regularly remove and kill malicious programs, so you can reduce the risks faced by the computer.
When we shop online, we try to choose a regular shopping center so that we can avoid having our personal information fall into the wrong hands. You can use the on-screen keyboard when entering account information. When using QQ, FMS, WeChat and other chat tools, try not to expose your ID information and bank card information. There have been many incidents of fraud occurring in the past by stealing other people's QQ and borrowing money through online friends with other people. After all, nowadays the network fraud technology is also more and more advanced, many victims are also fooled before realizing the importance of network security.
Talking about the experience of network security, the computer science department of the senior students are quite touching. Nowadays, there are a lot of unscrupulous organizations that commit fraud through the Internet. Sometimes, when using a computer, a web page suddenly pops up, which usually has attractive words or images, so that people unknowingly fall into the traps of the fraud group. ...... Therefore, abiding by the law and morality is also one of the ways to maintain cybersecurity.
Learning about the maintenance of cybersecurity is important to protect our personal privacy and even corporate secrets.
Network security experience 2
A comprehensive equipment maintainer, is about rapid response, strong support. For network security maintenance first is to enhance network security awareness. Strict requirements for themselves, and constantly improve their personal security awareness and maintenance quality.
According to the department has always advocated the "maintenance is management" of the big business concept, the entire maintenance work closely around the benefits of the center, to strengthen the customer, the market support efforts, and make every effort to do a good job in the background support work.
Gradually established a gold and silver medal big customer circuit information account, and combined with the gold medal big customer using the actual situation of the data circuit were made for the customer circuit emergency plan. In order to achieve the large customer hierarchy I center arrangements for large customer circuits with different colors of plugs to identify; in order to reflect the differentiated services to large customer units, my team regularly inspect the gold medal large customers, and monthly production of large customer units of network operation report.
Do not engage in individualism in the daily maintenance, team power is infinite. Speaking of cooperation, efficient. To strengthen the comprehensive review of network equipment security, for troubleshooting should be standardized and accurate. This requires individuals to have strong business skills and maintenance quality. Therefore, individuals should strengthen learning to continuously improve their business level and maintenance capabilities.
Network security experience 3Network, in modern society has become very common, we can see everywhere the use of the network, the elderly, small children, middle-aged people use the network to watch movies, speculation, browse the news, office and so on the emergence of the network has brought a new face! With the network, people office more efficient, more environmentally friendly, reducing the use of paper.
Just in line with our current environmental theme - low-carbon, energy saving, emission reduction.
And, now there are many colleges and universities have opened a computer program, specializing in the training of high-end talent in this area, but perhaps, in the cultivation of professional skills when ignored their ideological and political education, in their ability to enter the community when they take advantage of the profession illegally attacked someone else's Web site into a road that can never be returned to the head!
Indeed, the network is different from our real life, it is virtual, vague, visible but not touchable, and our real life, give people a sense of reality.
In our real life, our activities have certain regulations, rules and regulations, in the network world, although it is virtual, but it also has its system, laws and regulations.
Here, I simply list some of the laws and regulations on the network: As early as 1991, the State Council issued the "Regulations for the Protection of Computer Software", which Article 30 (e) without the consent of the software copyright holder or its legal assignee to modify, translate, annotate its software works; (f) without the consent of the software copyright holder or its legal assignee to copy or partially copy its software works. software works; in 94 and then came out a series of laws and regulations regulations (a) violation of the computer information system security level protection system, endangering the security of computer information systems; (b) violation of the international networking of computer information systems filing system '; (c) not in accordance with the prescribed time to report the cases occurring in the computer information system; (d) received the public security organs required to improve the security status of the notification, in the deadline for refusal to improve; (e) have jeopardized the security of the computer information system of other acts.
Until '97, the Ministry of Public Security once again improved China's laws and regulations on network security, clearly stipulating that in violation of laws and administrative regulations, the public security organs will give a warning, and if there is any illegal income, the illegal income will be confiscated, and individuals can be punished with fines of less than 5,000 yuan, and units with fines of less than 15,000 yuan; if the circumstances are serious, the public security organs can be given six months or less to stop the network, downtime The seriousness of the case, can be given within six months to stop the network, downtime and rectification of the penalties, if necessary, can be recommended to the original issuer, the approval body to revoke the operating license or cancel the network qualification; constitutes a violation of public security management, in accordance with the provisions of the Regulations on Public Security Management Penalties; constitutes a crime, shall be investigated for criminal responsibility.
So in the online world, you will definitely be held accountable for breaking the law.
This is the same as our real life, not like we think, because the network world is virtual, so you can talk nonsense, on which the whole.
The dissemination of pornography, not conducive to social stability words, but also be sure to be punished, for those who use their own superior technical means for the sake of the interests of breaking into other people's computer systems, which is certainly illegal, we often see such cases in real life, it should be said that these instances give us a bloody lesson, so we must comply with the laws and regulations in the use of the network, do not So, we must abide by the laws and regulations when using the network, not to do damage, to carry out normal and healthy exchanges on the network, and to make full use of network resources to improve our learning efficiency and knowledge!
Network security experience 4Recently, did you receive a "Liantang South Gate intersection robbed the child mother was stabbed a knife" WeChat information? You'll be able to get a good idea of what you're looking for, and what you're looking for.
You can imagine the picture, how bloody! How horrible! The criminals pretended to dress up and lurked in the south gate intersection of Liantang, quietly waiting for the child to take the bait. Suddenly, the target appeared. A young mother with a young child playing in the street, just when the mother was not paying attention, the child was a pair of large rough hands suddenly pulled, that is the criminals! At that moment, the mother spotted the criminal and rushed forward, trying to fight the criminals with her meager strength! Who knows, the criminals pulled out a sharp knife from his pocket and stabbed at the mother as soon as he could! Blood accumulated into a river, people's hearts ache ......
However, this is just a piece of false information! Nanan City Public Security Bureau to verify, Nanan City, Ximei street did not occur such cases, the information is purely a rumor!
With the rapid development of science and technology, people have been everywhere away from the almighty and practical Internet. However, the network is like a new type of xxx, a little improper use, it is very likely to fall into the abyss, difficult to recover, so, network security can not be ignored!
When you are in the cheerful cell phone to send messages to friends, you have received a stranger to send the winning information? The prize is a high-tech product of great value, and the amount of prize money is as high as ten million dollars! You must not smile with a raised eyebrow, if you are not buying a lottery ticket nor participating in any prize-winning activities, then where do these prizes and bonuses come from? Obviously, it's a scam designed by scammers to take advantage of people's subtle psychology! Why do people fall for such a poorly thought out scam? Why do people believe in pie in the sky? And end up with nothing? Either these people are too kind, to the network convinced; or these people are too stupid, no online safety precautions!
Friends, the network contains bad information has seriously affected people's lives, but we must not fall into! To always remind themselves: network security can not be ignored!
Network security experience 5December 21 afternoon, had the honor to participate in the monitoring command center organized by the "network security" as the topic of electromechanical training, this training is divided into the "network security status quo analysis of the technical lecture" and "Internet of Things and big data security solutions technical lecture" two parts, invited Rising Star network security engineers, Mr. Wang, the main speaker. The training mainly includes the following parts: a detailed analysis of the current situation of the network security industry and the problems that exist, focusing on explaining why 20xx is the most historically significant year in the network security industry, with the most concise language to the development trend of technology and hot events to solve the problem, as well as the Internet of Things and big data in the new era, how to defend the right to privacy of data? Through Mr. Wang's careful explanation, I feel that it is a heavy responsibility to ensure the safe operation of toll station network. At the same time, I felt the rapid development of the Internet of Things, and also y appreciated the renewal of computer technology. So that I better understand the electromechanical staff should have a sense of security.
Although the training is only a short two hours, but we not only learned the valuable protection of network security experience and skills, but also feel the leaders of our electromechanical staff's high expectations. We not only need to grasp the situation of the site's mechanical and electrical equipment, but also need to think more, to be good at discovering the work of the existence of safety hazards, from the failure to learn from one to three.
This training is a great benefit to myself. In the training, the engineers abandoned the terminology of the instillation, and borrowed the recent "network security" hot spot as an example, interspersed with their own experience in the maintenance of network security, the use of humor, funny language language, the "Internet of Things security"
As most of our electromechanical staff are just admitted, resulting in its in some aspects of this or that shortcomings, so we must comprehensively improve their own qualities, practicing hard skills. First, we must seriously study and y understand the laws and regulations of the Network Security Law, improve our network security awareness, and fully penetrate the network security awareness into the work. Second, do a good job of backing up, preventive measures. Important data files should be backed up in a timely manner to minimize the loss caused by possible damage to future viruses. Three to do a good job of prevention. Not U disk and other pluggable media, arbitrarily inserted into the charge electromechanical equipment. To use the latest antivirus software, and timely update the virus database, or antivirus software will be virtually useless. In addition to the correct set of antivirus software features, to give full play to its efficacy.
Through this training, not only has it broadened my thinking and allowed me to further understand the importance of network security, but it has also allowed me to feel the importance of leadership at all levels to our station electromechanical staff. In the future work I will certainly bear in mind as an electromechanical staff should be responsible for, in the ordinary position to play an electromechanical staff should play a role, and strive for the healthy development of Shi'an Expressway to contribute their own strength.
Network security experience 6April 8 to 14, 20xx, I participated in the campus network security training held in Sichuan Normal University, this training will be in order to improve the Panzhihua primary and secondary school campus network administrators and information technology teachers of the information literacy and professional skills, and better application of information technology to education and teaching, the network management of the professional training held specially. The training time for seven days, mainly network basics, equipment management basics, layer 2 switches, layer 3 switches, vlan, dhcp, arp, spoofing, router configuration, integrated cabling, information security, database recovery, network attack and defense of the learning content, after a week of training and experimental operations, learning a lot of new concepts that have not been contacted before the knowledge to completely solve the campus network at present some thorny issues. The following is a brief description of some of the main points of the training experience.
First, I learned to build a campus website
Site site setup is also a great harvest, know how to set up the WEB and FTP sites, but also know that in the same intranet, multiple domain name site as long as you set up the host header can be used at the same time on Port 80. Hands-on set up the ASP.net site. I also learned how to remotely manage the machine through Remote Desktop, which is very convenient for machine management.
Second, learned to use routing and switching to solve the problem of arp
Setting up the router to make the router management to the maximum extent possible to optimize the router, after learning the configuration of the router, a better division of each teacher's IP address, so that the name and the machine name corresponds to the MAC address, binding the MAC address, to put an end to the propagation of the ARP virus!
Three, to understand the latest network security knowledge
The security of the site is more let me gain a lot. The management of the site found that they also have a lot of loopholes: the use of the same user name and password, site folder permissions are too large, the site database file is not set up to prevent and so on, these on the site, and even the entire network and the server threat is very large, serious, it is possible to become a hacker arbitrarily operation of the "broiler".
Four, learned the router and other equipment commonly used commands
Router configuration experiment. First complete the physical connection of routers, computers, switches, and then use Hyperterminal to log on to the router and set up, the other students in the group logged on with Telnet commands, using a variety of commands, and finally connect the four routers into a small Internet through the Ethernet interface.
V. Also learned a few tidbits
Router and switch setup, VLAN segmentation, and so on. In addition to cloning PCs in virtual software, configure virtual machines, and perform domain name resolution.
In the configuration of the switch is to divide the Vlan, the main point is that after the configuration is written to the switch, you must power off and restart in order to make the new configuration take effect (the same with the router).
The subnetting process mistakenly takes 1 as the starting unit, making many theoretically unusable addresses become regular addresses, which are actually 0 to 255.
Finally, I would like to express my sincere gratitude to the Panzhihua Municipal Bureau of Education, the e-learning center for giving me this opportunity to learn, and to the Sichuan Normal University for the guidance of all the teachers, and I will definitely bring what I have learned and the concepts I have learned to the school. I will certainly bring what I have learned and ideas to the school network security work, for the Panzhihua City campus network security, campus information technology construction to make its due contribution.
Network security experience 7xxxx July 16, I had the honor to participate in the network security training organized by the Education Bureau, the training lasted eight days. The students who participated in the training were all network administrators or network administrators from various schools, and the teachers of the training were either gold-medal lecturers or senior technicians from a certain company. In such a learning environment, not only drive a just stepped into the teaching profession, but also let me feel for the first time as a network administrator is not easy, through this training I y appreciate that I should learn a lot of things, so only in their own work more use of the knowledge learned, so that the theoretical knowledge into the practice of the operation to realize their own value of life.
Arming oneself with theoretical knowledge.
In this training, half of the time the teacher is mainly talking about theoretical knowledge, the laws and regulations of network security, network security management and network security technology. First from the theoretical knowledge to start, so that we have a network security knowledge understanding, although the theoretical knowledge is a bit boring, but I clearly know that this is the foundation, through the beginning of a few days of study I learned that the first still need to pay attention to the importance of network security, and our school should be fully aware of the campus network security management issues, to face up to the problem, to solve the implementation of network security. Make the daily work of the campus organized and normal. Secondly, network security issues rely on the efforts of all, can not rely on a person, the campus itself is a team, a collective, of course, the need for all teachers and students of the *** with the efforts, first of all, each teacher should have network security awareness, followed by technical means to make the network more stable. In short, the training has made me more aware of the shortcomings and the future direction of the work, but also more learning and thinking.
Second, to develop more hands, more mouth, more brain learning habits.
In addition to learning theoretical knowledge in addition to my training also learned a lot of knowledge, most of which is the operation of the computer, such as the configuration of the switch, the configuration of the router, etc., because in the period of time I went to college, I have never touched the switch, the router and some other things, just listen to see, see has not seen through the training I not only recognize them but also will be on it to configure, I listened carefully during the study, and I will be able to learn more about the future direction of the work. Configuration, in the study I listened carefully, but also discuss with the teacher do not understand the problem, can say that learned a lot, because I y feel that the computer only their own to operate, to feel to figure out, so in the operation of the computer training, I always remind myself, hands to study, to think, because of my efforts I learned the computer and computer access to each other, as well as some of the basic security configurations. But I still want to put forward my shortcomings in this training, for the study of the wiring system I still do not understand, perhaps in itself this has nothing to do with me, plus the campus where I am wiring also do not understand the study is very difficult. But I learned to learn from it.
Through this training I believe I have made some progress, no matter in which area, and no matter how much progress. I only work hard to achieve in the future, more than one of their own modest efforts. In order to realize their own value.