Home > Common Problem > body text

What are the basic principles of network security review?

青灯夜游
Release: 2022-08-12 11:10:09
Original
10054 people have browsed it

Basic principles: 1. "Real-name principle". When operators sign an agreement with users or confirm the provision of services, they require users to provide real identity information. 2. "Interconnection Principle", realizing interconnection is not only the need for the development of my country's Internet industry, but also the need to safeguard the interests of consumers. 3. "Principles of Critical Data Assessment and Management"; 4. "Principles of Protecting Personal Privacy"; 5. "Firewall Principles". Operators should strengthen the management of information released by users. If any illegal information is found, they should immediately stop transmitting the information and take measures to Eliminate and other disposal measures to prevent the spread of information.

What are the basic principles of network security review?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

Network security is of great concern to everyone. Network security involves many people. For this reason, the country has also introduced a network security law to ensure the safety of everyone’s network information. Cybersecurity must also adhere to the basic principles of review in the Cybersecurity Law to ensure that the information and interests of individuals and businesses in the cyberspace are not infringed upon.

Basic principles of network security review

1. Principle of real-name system

Network operators are When users handle network access, domain name registration services, handle fixed-line, mobile phone and other network access procedures, or provide users with information release services, they should require users to provide their true identity information when signing an agreement with the user or confirming the provision of services. If users do not provide their true identity information, network operators are not allowed to provide relevant services.

2. Principle of interconnection

“The state supports the research and development of safe and convenient electronic identity authentication technology, and promotes mutual recognition and universal use of different electronic identity authentication technologies. ".

In the field of Internet information technology in my country, beggar-thy-neighbor and unfair competition phenomena occur from time to time. On the one hand, this shows that my country's Internet field is a relatively competitive field. On the other hand, it also shows that some Internet operators use their own technical advantages to engage in unfair practices by blocking or deleting other Internet operators' information or software. compete.

Achieving interconnection is not only a need for the development of my country's Internet industry, but also a need for safeguarding the interests of consumers. Because of this, it is necessary to clearly stipulate in the form of law that Internet operators must consider interconnection issues in the process of developing software and providing Internet information services and take all measures to achieve seamless network connections.

3. Principles of critical data assessment and management

Operators of critical information infrastructure should store citizens’ personal information collected and generated during operations within the territory of the People’s Republic of China and other important data; if it is indeed necessary to store overseas or provide it to overseas organizations or individuals due to business needs, a security assessment shall be conducted in accordance with the methods formulated by the national network information department in conjunction with relevant departments of the State Council.

Operators of critical information infrastructure should conduct inspections and assessments of the security and possible risks of their networks on their own or by entrusting professional institutions to do so at least once a year, and propose network security monitoring and assessment status and improvement measures. Report and submit it to the relevant departments responsible for the security protection of critical information infrastructure.

4. Principles of protecting personal privacy

The draft law further strengthens the basic principles of Internet information protection on the basis of summarizing the implementation of the decision on the protection of personal information online. The principle clearly requires that "departments that are legally responsible for the supervision and management of Internet network security must strictly keep citizens' personal information, privacy and business secrets that they learn in the performance of their duties strictly confidential, and must not leak, sell or illegally provide them to others."

5. Firewall Principle

"Network operators should strengthen the management of information released by users. If they find that laws or administrative regulations prohibit the release or transmission of information, they should immediately Stop transmitting the information, take disposal measures such as elimination, prevent the spread of the information, save relevant records, and report to the relevant competent authorities."

"Electronic information sent by electronic information publishers and application software provided by application software providers must not be equipped with malicious programs, and must not contain information that is prohibited from being published or transmitted by laws and administrative regulations."

What impact will the coming of the Cybersecurity Law have on individuals and businesses

1. The protection of personal information will be more clear

According to the "38th Statistical Report on China's Internet Development" by the China Internet Network Information Center, as of the end of June 2016, the number of Internet users in China reached 710 million, and the Internet penetration rate reached 51.7%, of which mobile Internet users Reaching 656 million, network security issues cannot be taken lightly.

The Cybersecurity Law has clear provisions on the protection of personal information, such as “network operators shall not leak, tamper with, or damage the personal information they collect” and “any individual or organization shall not steal or obtain personal information in other illegal ways” , shall not illegally sell or illegally provide personal information to others”, etc.

Zuo Xiaodong, deputy director of the China Information Security Research Institute, pointed out that protecting personal information is an important aspect of current network work. Although relevant departments have previously had some policies and regulations, they are generally scattered and unsystematic. Such a system is needed. Superior method.

Li Yi, deputy director of the "Internet" Research and Consultation Center of the Internet Society of China, said that in the future, online chat records and email exchanges can be retained as evidence for evidence collection, making it easier to trace network disputes and security issues. This has greatly improved the confidence of netizens in online consumption life. He gave an analogy. If an individual user downloads and uses an APP on a mobile phone, resulting in the leakage of personal information, in the past, he could not complain to the application provider that provided the service, but the cybersecurity law provides a clear legal basis, "This means that in the future Lawsuits involving the Internet field may become increasingly difficult to fight.”

On the other hand, the Cybersecurity Law proposes that “network operators handle network access and domain name registration services for users, handle fixed-line telephone calls, mobile phone calls, etc. For Internet access procedures such as telephone calls, or to provide users with information release, instant messaging and other services, users should be required to provide their true identity information." The "Internet real-name system" has also been clarified in legal form. This provides a legal basis for curbing today's chaos such as the wanton spread of online rumors and the proliferation of online violence.

Zuo Xiaodong believes that from the perspective of combating crime and safeguarding national security, the online real-name system proposed this time has a wider scope than the previous telephone real-name system, and its principle of "anonymity in the front office and real name in the backend" is also sufficient Protect personal privacy. For example, individuals can be anonymous when posting online, but when law enforcement is involved, the background can track and investigate individuals.

2. Increased entry threshold and security capability requirements for enterprises

In the opinion of industry experts, the development of the Internet at this stage requires setting thresholds and no longer " "Growing wildly"; this threshold is security, and the Cybersecurity Law is the "gate to security".

Zhu Wei, deputy director of the Communication Law Research Center of China University of Political Science and Law, pointed out that the cybersecurity law has specific provisions on the security qualifications, internal technology, systems, etc. of enterprises, which will serve as a measure of the development of Internet companies.

At the same time, the Cybersecurity Law also puts forward higher requirements for Internet companies. In particular, large Internet companies are now regarded as basic information platforms, such as Alibaba, Baidu, Tencent, etc., with hundreds of millions of users, and these companies should assume corresponding obligations. Li Yi believes that Internet companies must have technical capabilities that match their basic information platforms, such as responding to hacker attacks and avoiding user losses. At the same time, there must also be relevant legal provisions to regulate the "overlord clauses" of large companies.

In general, the Cybersecurity Law will raise the market access threshold for Internet companies and put forward higher requirements for development and operation. Small and medium-sized enterprises that do not have security technology capabilities may be more likely to be eliminated in the future.

It is urgent to strengthen network security. To maintain network security, we need to implement the basic principles of the Network Security Law, increase network management and control, screen out some bad information, and ensure the purity of the network environment. However, in general, to ensure network security, it is not enough to adhere to the law. It is more important to consider every network participant. Actively maintaining network security is also a more important guarantee for everyone's interests.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What are the basic principles of network security review?. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template
About us Disclaimer Sitemap
php.cn:Public welfare online PHP training,Help PHP learners grow quickly!