Network Security and Information Technology Leading Group was established in early 2014, after the convening of three meetings, one higher than the standard one. Why network security and information work so important?

First, the national security
network security and information related to national security first. We look at a few cases.
Earlier this year, the US government has repeatedly citing security concerns, the United States does not allow mobile operators to sell Huawei phones. This is known as a "free market" countries, government intervention in the market was quick to rule, why? Fear Huawei's upcoming 5G network will threaten their data security.
Facebook founder Zuckerberg during this time is very depressed, because his company may face heavy fines, because that is data leakage. The company is said, Facebook's user data is a company called "Cambridge analysis" using unfair means to get, and for the analysis of user preferences, use the company's words, "may develop psychological characteristics of consumers and voters, and then use this secret weapon to affect the willingness of consumers and voters, which is more effective than traditional advertising. "the company Trump successful campaign for the US to assist the President in 2016, also participated in the British exit from the euro referendum and other activities.
Recently, the US comprehensive sanctions on China's ZTE Corporation, issued a ban on sales of chips, so that billions of market value company suddenly "shock", 80,000 laid-off workers may at any time. This is the power of information technology.
By more than a few cases of recent onset, we will be able to understand the meaning of information and network security lies. Indeed, Trump is well versed in the road there is a world of masters: he is not using the data of Internet users in the analysis of the election campaign, after the president took office even called "tweets rule" and very good at using the Internet to spread their advocates, while better tomorrow, a day or even micro-Bo can reach an amazing 50. He also foreign communications companies to enter the United States, or the acquisition of local high-tech enterprises abnormal vigilance, many prohibit the sale, acquisition ban are his direct command issued.
As early as in previous years, the Internet has become a recruiting members of terrorist organizations and "money laundering" channels, Europe witnessed a number of terrorist incidents last year were carried out by a network of liaison organization. At the same time, the European Civil Liberties Committee last year passed a new bill to allow Europol to hunt down terrorists through the network, the fight against crime.

Second, the impact of economic and social stability
of network security also affect the stability of the economy and society, not handled properly could lead to social unrest.
In 2011, after the earthquake in Japan generated a tsunami caused Fukushima nuclear power plant nuclear leak. From the beginning of March that year, the water was contaminated with nuclear radiation rumors began to ferment online, Zhejiang, Guangdong, Shanghai, Shandong, Jiangsu, Hubei, Sichuan and other parts of the country there has been a wave of panic buying of salt, on most supermarket shelves salt was sold out, causing people to panic. Even in Salt Corporation launched the emergency response mechanism to ensure salt supply. The incident, the reason is that some merchants use people's herd and panic, publishing false information on the Internet, manufacture salt illusion of being snapped up, the result became the illusion of truth.
Some networks devoted to the dissemination of information for the identification of insufficient capacity of young people, such as ××× information, violent images, some bad games ...... specious, play the message "academic" veil, but in reality nothing historical propaganda, slander national hero, despise traditional culture, have a negative impact on young people values.
A few years ago, appeared on the network martyrs negative phenomena, such as the familiar Lei Feng, Langya Five Heroes, Qiu Shaoyun, Huang Jiguang, it has been Joking and ridicule, and some say these poor martyrs heroes character, or that their false stories, can not be explained by common sense. Later that actually is one of several public relations firms to hype a network platform made up of these topics. But today's young people have not experienced the war years, not even experienced the suffering, the business is likely to become ridicule the fact that their impression. The lack of a sense of history and respect for the hero, the future of these young people is likely to peoples and nations do not agree.
During this time, a short video industry experienced focused rectification. The reason, curiosity, values errors dictates. In the webcast deft, actually had a "14-year-old mother early pregnancy" This kind of net red, teenage pregnancies in quick worker, became an honor. ? Imagine such sites are not rectify, if a large number of children fell in love with such a network platform, is not it will be difficult to restore the social impact of

three people invade people's interests ×××
network is a double-edged sword: in the hands of ordinary people, easy access to and dissemination of information; and to the hands of people with ulterior motives, it becomes a tool ××× people invade people's interests.
*** network is a class of people with ulterior motives. Last year, called "blackmail virus" computer virus via e-mail, the program ***, in the form of web pages linked to the horse spread in the whole network. Once infected user files, is locked, you must get the private key to decrypt it be possible to crack. The method is to pay to get the private key to unlock the equivalent of "blackmail." The virus of mobile phone users and property safety are a serious threat.
There are some people weak legal awareness, coupled with low cost of the law, resulting in a lot of personal information wantonly spread on the Internet, a serious invasion of privacy, and some even lead to murder. 2016, Shandong female student Xu Yuyu telephone fraud cheated because they were college tuition 9900 yuan, heartbroken, and ultimately cardiac arrest and death. The police investigation found that the original criminals from the online purchase of more than 50,000 pieces of information about the college entrance examination in 2016 in Shandong Province, which is the root cause of Xu Yuyu cheated.
It was also through the Internet under the Financial cloth "strip bare" trap. In June 2016, was to provide "bare strip loan" through a network of acquaintances between lending platform, that is when the loan to the borrower handheld ××× naked pictures of alternative IOU. When the non-payment of default occurs, lenders to disclose nude photos and a means to contact the borrower's parents as blackmail to force borrowers to repay. The female students alleged that some borrowers encountered such trouble.
There are some low-life rumors have an impact on healthy living of the elderly. For example, "a packet of instant noodles, liver detoxification need a month", "Diabetes no longer have to take medicine and injections," "severe chest pain immediately nitroglycerin and aspirin" ...... so some of the scientific information dissemination in the micro-channel group in the elderly, If someone's convinced that the consequences will be very serious, causing light delay disease, severe cases may be life-threatening.
In short, network security and information technology work arduous and complex. China is currently in the field of big data, artificial intelligence, 5G networks have formed a global advantage, economic and social development is also moving towards a post-industrial information from big step. Network security and information technology for us to achieve "two hundred years," the goal, and the great rejuvenation of the Chinese nation, "China Dream" is of great significance.

Fourth, network security and how to achieve
network security, mainly majority of Internet users have websites, and visit the website of the composition. Secondly, there is the enterprise security and an integral part.
Personal, good PC security protection, rational use of anti-virus software, we recommend using domestic personal security software, such as 360, Kingsoft, Ty2y anti-virus, and so on.
Website, website security protection installed, also recommended domestic product. Such as the Green League, blind, ShareWAF, sharp number and so on.
Enterprise, the establishment of security services, or the head of security. Management of internal security issues.