Vista Posteos
CSDN will strengthen its security strategy
Core tip:in January 12th, from the Beijing Municipal Public Security Bureau understanding arrives, CSDN ( China Software Alliance ) .Two suspects have been detained .Create a great sensation to the user information leakage incident finally has to pay “ ,michael kors outlet;” ;.
On January 12th, a reporter from the Beijing Municipal Public Security Bureau understanding arrives, CSDN China Software Alliance ) .Two suspects have been detained .One for the Beijing Book hackers ,another name for the field of hackers .
“ ;the two suspects are stolen base suspects ,police caught ,we on its possession of the user base is compared .” ;CSDN founder and President Jiang Tao also told reporters that .
Including the 2 people ,up to now ,public security organs to investigate invasion ,stealing ,illegal data a case 9 cases ,fabricated and hype information leakage 3 cases, criminal detention of 4 people ,8 people to public security punishment .
After 10 days ,the national Internet information states ,CSDN ,Tianya site information such as leakage ,the public security organs are traceability .The Jingdong Mall is indeed invasion ,but the data does not leak ;YY voice chat site leakage data of the company staff from internal databases to steal ;industrial and commercial banks and other financial institutions has been no invasion .
Sina micro-blog ,happy ) ,dangdang.com ,Renren ,where such sites have not been invaded ,the account number password system using public library part to crack and .Locus of control failure the steal CSDN user database employees may be suspected of ‘ ;the illegal invasion of computer system for sin ’ ;.
” IT ,abercrombie france;well-known lawyer Zhao Zhanling told reporters ,“ ;Article 285th of the criminal law ,illegal invasion of computer system ,or take other technical means to acquire data in a computer system ,complex severe cases will be sentenced to 3 years imprisonment ,if the circumstances are especially serious person sentenced to 3 years to 7 years .
” ;and ,providing the user data ,user information ,the sale of personal information dissemination practices such as breaking the law ,“ ,moncler;illegal sale ,to provide personal information ,sentenced to 3 years imprisonment .
” ;in fact ,the learned that, due to the awareness of the law ,and hold the playful attitude ,many in the Internet Co engaged in safety technical staff ,as well as safe manufacturer technical staff are more or less to steal ,communication user information database .
In hacker circles, the hacker often think to steal user information is not much harm ,michael kors outlet,as long as the instinctive feel only need to sell ,fishing and other obvious profit behavior ,then it is not illegal .
“ ,jordan pas cher;everyone will think .As previously, the Internet ,no one because the user information leak problem was arrested .Gen CEO and Ma Jie said of Hoshi Oon ” .According to Ma Jie ,the security firms and their employees ,Internet Co and security systems employees to sign the relevant agreement, agreement will go written clearly on the service does not allow to endanger public security .
“ ;but the ban is ineffective ,because in the end do not harm public security work ,but also my staff .” ;Ma Jie tells a reporter ,security personnel are generally work for the same company, is no close relationship between .
Hacking the industry is not industry unspoken rule “ ;” ;to regulate the conduct of the hacker .“ ;daytime safety engineer ,night hacker ” ;“ ;CSDN sensitive information is not sensitive ,lack of safety awareness .
” ;Jiang Tao admitted ,abercrombie,including CSDN domestic large site safety consciousness are weak .According to Jiang Tao ,at present, the entire Internet security situation is not optimistic :more than 70% of the encryption algorithm code library can break through high frequency collision ,more than 80% of the Internet Co are flawed, and more than 60% security strategy also exist loopholes ,underground data library display ,hollister pas cher,site exposed the problem even more .
These holes ,also is the hacker base .Many hackers lurking in the IT Internet Co .In the leak in the gate event ,YY voice chat information leakage is its staff to leak ,and steal the CSDN user data and technical personnel do Internet Co .
“ ;this is the enterprise staff ,and enterprise and it doesn .But it also shows that the security industry identity multiplicity .” ;a hacker tells a reporter ,these people may day is an enterprise of safety engineer ,night is a hacker .
“ ;” two suspects detained divulge a secret door ;: during the day, according to a senior engineer at the hacker hacker ,these user database is already a hacker ring open secret ;but this time the entire Internet industry user information was leaked ,may have some business organizations to promote .
“ ,air jordan;at home ,the hacker circles although small ,but most are personal ,loosely organized ,and also ,industry self-discipline .It generally does not produce such a large explosion library act .
This hacker called ” .In general ,the user base is in the hacking community spread ,but once you get into the public view, can have no control ,because there are many channels can be transmitted .
For example ,the thunder ( micro-blog ) ,hacking group FTP download ,forum .According to the Beijing Municipal Public Security Bureau offices related to reveal ,abercrombie france,CSDN and the end of the two sites have before 2009 was invaded ,data leak occurs also in recent two years ago ,hollister,the two sites are not under attack .
“ ;this time ,the hacker is well-meaning, detonation is out of the old library .” ;an anonymous security industry engineer is disclosed ,in fact ,they have the latest library ,but out of the industry environmental considerations ,not the base explodes .
Divulge a secret door had a warning in the password leakage incident, called a dark hole platform (Wooyun.org) never known what jumped into the public view of professional platform .Dark clouds to attract a large number of hackers ,they found in the corporate loopholes ,will these patch and vulnerability to these sites .
However ,this platform has been unaffected by enterprise with .Jiang Tao also admitted that ,before the incident, the loophole platform to most of the bugs made warning ,telling the associated enterprises, but the enterprises did not cause enough take seriously ,not in time to remind users to change their passwords ,michael kors,led a get out of hand .
Why enterprises to ignore warning so ?Because of hacker and between enterprises in the formation of the subtle relationship .These enterprises to the hacker is often angry .In front of the hacker ,enterprises like a student .
Hacker teacher every day students pick faults ,initially may think it is a positive incentive ,the time is long, natural to the hacker did not look good .Some companies that have extreme ,hacker ,corporate loopholes to some extent does not exist ,“ ;even if there are ,doesn .
As long as no exposure ,can to pay no heed ” ,hollister france;.However ,the enterprise can not ignore the “ ;” ;hacker .Because of so ,hackers will give “ gentle sword ” ;.
Some of the big Internet companies even offer direct “ ;” ;hacker ,under .Some small websites every month to hacker hand in 10000 yuan to 20000 yuan protection fee of ” “ ;.
“ ;in fact ,the hacker need affirmation .” ;the security industry engineers told reporters ,the cloud platform, enterprises will give submit loophole hacker with integral ,as encouragement .
Hackers also willing to submit bug found selfless ,thus form a benign cycle .Countermeasures of “ ;future ,each site should and similar cloud loophole platform of cooperation .” ;the Jiang Tao initiative, future ,domestic security industry and technology sector should not be isolated .
CSDN began all-around mend .In January 11th, CSDN and Ali cloud launched the website security strategic cooperation .According to Jiang Tao ,CSDN will use the cloud mailbox ,the mailbox and with other mailbox isolation ,avoid a mailbox leakage ,“ ;the town is losing the ” .
And ,also will accept the cloud provides other services .“ ;we should do well the safety of enterprise cooperation .” ;Jiang Tao said ,in addition to Baidu ,Ali ,Tencent and other big companies, as well as some game companies ,many domestic Internet Co ,including CSDN ,and not much strength to set up a special security team of engineers .
Jiang Tao tells a reporter ,CSDN will strengthen its security strategy ,the website of core data and core data isolation ,reducing the valuable data interface ;and to the security department for information system information security grading protection ,accept supervision department of the relevant management .
Related articles: 6 pairs of eleven promotional cited the EMS express Wars: price into the Bureau: not only is the express delivery industry, suppliers, business platform, incentive mechanism, the electronic commerce industry in every step has started for the “ season ” competition; electricity;.
On January 12th, a reporter from the Beijing Municipal Public Security Bureau understanding arrives, CSDN China Software Alliance ) .Two suspects have been detained .One for the Beijing Book hackers ,another name for the field of hackers .
“ ;the two suspects are stolen base suspects ,police caught ,we on its possession of the user base is compared .” ;CSDN founder and President Jiang Tao also told reporters that .
Including the 2 people ,up to now ,public security organs to investigate invasion ,stealing ,illegal data a case 9 cases ,fabricated and hype information leakage 3 cases, criminal detention of 4 people ,8 people to public security punishment .
After 10 days ,the national Internet information states ,CSDN ,Tianya site information such as leakage ,the public security organs are traceability .The Jingdong Mall is indeed invasion ,but the data does not leak ;YY voice chat site leakage data of the company staff from internal databases to steal ;industrial and commercial banks and other financial institutions has been no invasion .
Sina micro-blog ,happy ) ,dangdang.com ,Renren ,where such sites have not been invaded ,the account number password system using public library part to crack and .Locus of control failure the steal CSDN user database employees may be suspected of ‘ ;the illegal invasion of computer system for sin ’ ;.
” IT ,abercrombie france;well-known lawyer Zhao Zhanling told reporters ,“ ;Article 285th of the criminal law ,illegal invasion of computer system ,or take other technical means to acquire data in a computer system ,complex severe cases will be sentenced to 3 years imprisonment ,if the circumstances are especially serious person sentenced to 3 years to 7 years .
” ;and ,providing the user data ,user information ,the sale of personal information dissemination practices such as breaking the law ,“ ,moncler;illegal sale ,to provide personal information ,sentenced to 3 years imprisonment .
” ;in fact ,the learned that, due to the awareness of the law ,and hold the playful attitude ,many in the Internet Co engaged in safety technical staff ,as well as safe manufacturer technical staff are more or less to steal ,communication user information database .
In hacker circles, the hacker often think to steal user information is not much harm ,michael kors outlet,as long as the instinctive feel only need to sell ,fishing and other obvious profit behavior ,then it is not illegal .
“ ,jordan pas cher;everyone will think .As previously, the Internet ,no one because the user information leak problem was arrested .Gen CEO and Ma Jie said of Hoshi Oon ” .According to Ma Jie ,the security firms and their employees ,Internet Co and security systems employees to sign the relevant agreement, agreement will go written clearly on the service does not allow to endanger public security .
“ ;but the ban is ineffective ,because in the end do not harm public security work ,but also my staff .” ;Ma Jie tells a reporter ,security personnel are generally work for the same company, is no close relationship between .
Hacking the industry is not industry unspoken rule “ ;” ;to regulate the conduct of the hacker .“ ;daytime safety engineer ,night hacker ” ;“ ;CSDN sensitive information is not sensitive ,lack of safety awareness .
” ;Jiang Tao admitted ,abercrombie,including CSDN domestic large site safety consciousness are weak .According to Jiang Tao ,at present, the entire Internet security situation is not optimistic :more than 70% of the encryption algorithm code library can break through high frequency collision ,more than 80% of the Internet Co are flawed, and more than 60% security strategy also exist loopholes ,underground data library display ,hollister pas cher,site exposed the problem even more .
These holes ,also is the hacker base .Many hackers lurking in the IT Internet Co .In the leak in the gate event ,YY voice chat information leakage is its staff to leak ,and steal the CSDN user data and technical personnel do Internet Co .
“ ;this is the enterprise staff ,and enterprise and it doesn .But it also shows that the security industry identity multiplicity .” ;a hacker tells a reporter ,these people may day is an enterprise of safety engineer ,night is a hacker .
“ ;” two suspects detained divulge a secret door ;: during the day, according to a senior engineer at the hacker hacker ,these user database is already a hacker ring open secret ;but this time the entire Internet industry user information was leaked ,may have some business organizations to promote .
“ ,air jordan;at home ,the hacker circles although small ,but most are personal ,loosely organized ,and also ,industry self-discipline .It generally does not produce such a large explosion library act .
This hacker called ” .In general ,the user base is in the hacking community spread ,but once you get into the public view, can have no control ,because there are many channels can be transmitted .
For example ,the thunder ( micro-blog ) ,hacking group FTP download ,forum .According to the Beijing Municipal Public Security Bureau offices related to reveal ,abercrombie france,CSDN and the end of the two sites have before 2009 was invaded ,data leak occurs also in recent two years ago ,hollister,the two sites are not under attack .
“ ;this time ,the hacker is well-meaning, detonation is out of the old library .” ;an anonymous security industry engineer is disclosed ,in fact ,they have the latest library ,but out of the industry environmental considerations ,not the base explodes .
Divulge a secret door had a warning in the password leakage incident, called a dark hole platform (Wooyun.org) never known what jumped into the public view of professional platform .Dark clouds to attract a large number of hackers ,they found in the corporate loopholes ,will these patch and vulnerability to these sites .
However ,this platform has been unaffected by enterprise with .Jiang Tao also admitted that ,before the incident, the loophole platform to most of the bugs made warning ,telling the associated enterprises, but the enterprises did not cause enough take seriously ,not in time to remind users to change their passwords ,michael kors,led a get out of hand .
Why enterprises to ignore warning so ?Because of hacker and between enterprises in the formation of the subtle relationship .These enterprises to the hacker is often angry .In front of the hacker ,enterprises like a student .
Hacker teacher every day students pick faults ,initially may think it is a positive incentive ,the time is long, natural to the hacker did not look good .Some companies that have extreme ,hacker ,corporate loopholes to some extent does not exist ,“ ;even if there are ,doesn .
As long as no exposure ,can to pay no heed ” ,hollister france;.However ,the enterprise can not ignore the “ ;” ;hacker .Because of so ,hackers will give “ gentle sword ” ;.
Some of the big Internet companies even offer direct “ ;” ;hacker ,under .Some small websites every month to hacker hand in 10000 yuan to 20000 yuan protection fee of ” “ ;.
“ ;in fact ,the hacker need affirmation .” ;the security industry engineers told reporters ,the cloud platform, enterprises will give submit loophole hacker with integral ,as encouragement .
Hackers also willing to submit bug found selfless ,thus form a benign cycle .Countermeasures of “ ;future ,each site should and similar cloud loophole platform of cooperation .” ;the Jiang Tao initiative, future ,domestic security industry and technology sector should not be isolated .
CSDN began all-around mend .In January 11th, CSDN and Ali cloud launched the website security strategic cooperation .According to Jiang Tao ,CSDN will use the cloud mailbox ,the mailbox and with other mailbox isolation ,avoid a mailbox leakage ,“ ;the town is losing the ” .
And ,also will accept the cloud provides other services .“ ;we should do well the safety of enterprise cooperation .” ;Jiang Tao said ,in addition to Baidu ,Ali ,Tencent and other big companies, as well as some game companies ,many domestic Internet Co ,including CSDN ,and not much strength to set up a special security team of engineers .
Jiang Tao tells a reporter ,CSDN will strengthen its security strategy ,the website of core data and core data isolation ,reducing the valuable data interface ;and to the security department for information system information security grading protection ,accept supervision department of the relevant management .
Related articles: 6 pairs of eleven promotional cited the EMS express Wars: price into the Bureau: not only is the express delivery industry, suppliers, business platform, incentive mechanism, the electronic commerce industry in every step has started for the “ season ” competition; electricity;.
Publicidad
Bloque HTML
Información de Entrada
Publicidad
Calificar
Recomendar
Categorías