Information Security

Alibabacloud.com offers a wide variety of articles about information security, easily find your information security information here online.

God code Guo for the proposal: combination of offense and defense formulate national information security strategy

Abstract: "The" "attack and defense combination, the formulation of national information security Strategy" sponsor "Guo for" review opinions "proposed to the National Security Committee, the Central Network safety and information technology Leading Group, the Ministry of Industry Research and management of" keyword "information security strategy and offensive combination of" main "offense and defense, the formulation of China's information security strategy" sponsors "Guo Wei "Review opinions" recommended to the National Security Committee, the Central Network safety and information technology Leading Group, the Ministry of Industry Research and management of "keyword" information security strategy and defense combination from ...

Information security issue heats up again in May

The issue of information security heats up again in May. Under the influence of the IT localization process, the related concept stocks are outstanding in the two-tier market.   In the last week of May, 5 trading days, the wave of information, the same technology and other stocks rose by more than 30%, however, the concept of stock prices rose at the same time, the Agency for information Security concept Unit has been divided, some agencies are speeding up the escape, many institutions have opted to buy heavily. With the Chinese government procurement to disable WIN8 events and the fermentation of information security incidents, the two-tier market has released the government for the entire IT industry's domestic active ...

[Documentation] Information security risk control and legal rules in typical cloud computing services

Information security disorientated control and Legal regulation of typical Cloud Computing Services daoli Huang, Hao Yuan, Xi Xie, Liming Cai This monitors analyzes eight (potential/p ...

Hai Kang Wei is concerned about the serious information security problem

Absrtact: There seems to be another black swan appearing in China's capital market. A few months after the Zhangzidao island scallop went, Hai Kang Wei view (002415. SZ) is concerned about the serious information security problem. Hai Kang Wei View the cause of this thing is the Public security Bureau of Jiangsu Province China's capital market seems to have a "black Swan" appeared. After a few months of Zhangzidao Island "where the scallops go", Hai Kang Wei View (002415).   SZ) is concerned about the serious information security problem. Hai Kang Wei Depending on the cause of this thing is the Public security Bureau of Jiangsu Province issued a notice, because hang ...

Research and application of information security transmission system based on IoT

Research and application of information security transmission system based on Internet of things the Northern University of Technology The system also designed a set of web-based Warehouse management demo system, used to simulate the real environment of information awareness, collection and transceiver processes. In this paper, the proposed module is analyzed theoretically, programmed and verified by the system. All the core modules are developed and implemented in the one-way physical isolation network gate, and the information security transmission system is available and correct. In the aspect of safety, the security protection measures of this system can effectively guarantee the reliability of data transmission, and also ...

Cloud computing brings information security into an alliance era

Network security has been a hot topic, especially after the internet into the era of cloud computing, whether it is information security experts, industry users or security vendors in the cloud era of network security, the pros and cons of a wide range of disputes, August 19, 2010, 2010 China Information Security Annual Meeting and the 8th session of China CSO Club security manufacturer representative-Neusoft Network Security Marketing Center deputy general manager management to "cloud computing to accelerate the security industry internal technology integration" as the topic of the issue, elaborated the "cloud" to the information security industry opportunities and challenges. Neusoft management that from the beginning of the WEB2.0 era, a large number of ...

The information security again heats up the organization to be many empty differences

Absrtact: The information security problem heats up again May. Under the influence of the IT localization process, the related concept stocks are outstanding in the two-tier market. In the last week of May, 5 trading days, the wave of information, the same technology and other shares accumulated gains of more than 30%, however, the information security issue in May. Under the influence of the IT localization process, the related concept stocks are outstanding in the two-tier market. In the last week of May, 5 trading days, the wave of information, the same technology and other stocks have risen more than 30%, however, the concept of stock prices rose at the same time, the institutional ...

China Electronic Society He Huacang: Cloud computing brings new challenges to information security

CNET Technology Information Network October 21 Beijing report (Sun Ying) RSA conference held since 1991 has been 19 years of history, in the international information security community has influence, RSA 2010 Information Security International Theory for the first time in China, is this year's domestic information security academia an important event,  China Electronic Society is the organizer of this meeting. He Huacang, Deputy Secretary-General of China Electronic Society, pointed out that the meeting has important positive significance for promoting academic exchanges in the field of information security and promoting domestic information security technology innovation and industrial development. Hope this 2010 information ...

Microsoft China issued 5 statements to talk about information security

Absrtact: Last night, Microsoft China issued 5 statements to talk about information security. Analysts say this is a formal response from a series of incidents in which Microsoft China has been banned by the government for WINOWS8 (WIN8, hereinafter referred to as the same). Microsoft China issued 5 statements last night on its official microblog, which talks about information security. Analysts say this is a formal response from a series of incidents in which Microsoft China has been banned by the government for WINOWS8 (WIN8, hereinafter referred to as the same). Microsoft China said on its official microblog that Microsoft products are not ...

McAfee announces technical partnership with EMC's Information Security division RSA

Summary: Beijing time February 16 news, according to foreign media reports, McAfee and EMC's information Security division of RSA announced a technical partnership to provide customers with integrated security solutions to ensure information security in the IT environment. Beijing Time February 16 news, according to foreign media reports, McAfee and EMC's information Security division of RSA announced a technical partnership to provide customers with integrated security solutions to ensure information security in the IT environment. McAfee President and CEO Dave Devot ...

Kaspersky Labs: Malware for Android devices has grown nearly three times times

"Science and technology News" August 20, according to foreign media reports, the internationally renowned information security leading manufacturer Kaspersky Laboratory (Kaspersky Labs) recently released data showing that in the second quarter of 2012, malicious software for Android devices grew nearly three times times. Over the past 3 months, Kaspersky said, more than 14,900 new malware programs have been targeted at the Android platform, where nearly half of the malicious files are categorized as multi-purpose trojans that steal data from smartphones and can be downloaded and installed from remote servers. There are one-fourth of malicious ...

US-Asia Cupressaceae issue price 40 Yuan 7th purchase

US-Asia Cupressaceae (300188) March 3 evening issued a notice, confirmed that the issue of the issue price of 40 yuan/share, the corresponding P/e ratio of 80 times times. The company issued 13.5 million shares, issued after the total share capital of 53.5 million shares. Among them, the network issued 2.7 million shares, accounting for the number of the issue of 20%, the number of online distribution for the total amount of this issue minus the net under the final circulation of 10.8 million shares.  The unit will implement the purchase on March 7. Company is mainly engaged in information security industry in electronic data forensics and network information security technology research and development, product sales and the overall service. Company 20 ...

Popular talent show "good voice of China" officially aired in the second quarter

July 12, the popular talent show "good voice of China," the second quarter of the official broadcast, attracted the attention of many netizens. But at the same time, from July 12 to the present, a little more than a week time, rising "cloud security" system to intercept thousands of fake "good voice second season" phishing website. China information Security Report of the first half of 2013, the latest release of the state Information Center, in the first half of this year, hit the talent show has become the focus of hackers, all such programs "out of the lottery" site are phishing scams, users once credulous, can cause thousands of ...

Lenovo Yang: Brush machine is an important channel for mobile phone malicious code implantation

Summary: CPPCC member, Lenovo Group board chairman Yang Yang, March 8 News, recently, CPPCC members, Lenovo Group board chairman Yang Yang submitted the "on the smart phone should ensure user information security proposal." Yang said that the intelligent hands of the CPPCC member, Lenovo Group board chairman Yang Yang, March 8 News, recently, the National Political Consultative Committee member, Lenovo Group board chairman Yang Yang submitted the "Smart phones should ensure user information security proposal." Yang believes that smartphones have become the preferred Internet terminals for netizens, but steal ...

Illegal actions involving information disclosure in the service of severe crackdown and delivery

Beijing Times News (reporter Liao Feng) yesterday, the state Post office in the official website, the state Post Office in conjunction with the Ministry of Industry and Information Technology, the Ministry of Public Security, the Ministry of Commerce and the State Administration of industry and Commerce and other six departments issued the "on the effective Delivery service information security supervision work notice"   Crackdown on delivery services involving information disclosure of illegal acts. The notice pointed out that in recent years, the number of delivery service information has increased dramatically, illegal disclosure, illegal trade and delivery service information cases showed a trend, and even formed a "underground industry", seriously damaging the citizens of the ...

Pepper Map Technology released "Cloud lock" cloud security No "lock" is not in

Pepper Map Technology Today (August 30) held in Beijing 2014 product launches, officially released based on the operating system kernel reinforcement technology free server, Web site security products-Yun Yu. Mr. Ni, a researcher of Chinese Academy of Sciences, academician of China Engineering Academy, Technical advisor of the National Security Bureau, director of the Information Security Technology Engineering Center of Chinese Academy of Sciences, Kinshan teacher, director of Network Security Laboratory of the Academy of Sciences, director of Zhongguancun Network Security laboratory Liu Baoxu, and well-known internet since media people Lou, Dingdao, Lou, Zhu Yi, Wang Jiwei and so on were invited and attended the hair ...

China's first godson 3B server

Absrtact: Dawning Company today officially launched the first domestic server based on Godson 3B processor, to build the national information security Great Wall provides a new cornerstone. The server is the core of the information network, the central Processing unit (CPU) is the brain of the server.   According to Shuguang Shuguang Company today officially launched the first domestic server based on Godson 3B processor, to build the national information security Great Wall provides a new cornerstone. The server is the core device of the information network, and the central Processing unit (CPU) is the "brain" of the server. According to the Dawn company vice president of Sand ...

Many people like to publish information on the Internet

Many people like to publish information online. Some information, such as inappropriate comments or photographs taken on a whim, may cause trouble to publishers in the future. An information technology expert in Germany envisions the development of a technology that allows people to set up an online retention period for information when they post information on the Internet, which automatically disappears from the Web. Method even if often to delete posted online text and pictures still difficult to eliminate traces, because the search engine will automatically "comb" the network, write down all the information published above. Department of Information Security and cryptography, Saarland University, Germany ...

Suricata 1.0.4 released network intrusion detection and protection engine

Suricatasuricata is a network intrusion detection and protection engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has built-in support for IPV6. You can load existing snort rules and signatures and support barnyard and BARNYARD2 tools. Suricata 1.0 Improved Content: 1. Increase support for tag keywords 2. Dcerpc;3 that supports UDP. Duplicate signature detection; 4. To enhance the support of CUDA, UR ...

The second RSA China Conference: Trusted Computing and cloud security as hotspots

The industry-renowned RSA Conference of information security events will be held in Beijing from November 2, 2011 to 3rd, the Second International Forum on Information Security held by RSA in China. Today, the RSA General Assembly Technical Committee officially released the theme and main topics of this meeting. RSA chief Technology Officer Bret Hartman said that the RSA 2011 Forum theme was Alice & Bob, still continuing the theme of this year's San Francisco Congress in February. Because Alice and Bob's initials were A, B, and ...

Total Pages: 4 1 2 3 4 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.