The website of the Ministry of Industry and Information Technology released on September 3rd a summary of the analysis and work of the network security threat situation in the second quarter of 2018. According to the “Measures for Monitoring and Disposal of Public Internet Cyber Security Threats”, the Ministry of Industry and Information Technology organizes local communications administrations, basic telecommunications companies, network security professional organizations, key Internet companies, and domain names in accordance with the principles of timely discovery, scientific identification, and effective disposal. Institutions and network security companies conduct network security threat monitoring and disposal.
In the second quarter of this year, a total of 18.41 million cybersecurity threats were monitored, of which approximately 16.83 million were monitored by basic telecommunications companies, 30,000 were monitored by network security professional organizations, and approximately 1.55 million were monitored by key Internet companies, domain name institutions, and network security enterprises. The network security threat situation presents the following characteristics: First, some Internet users’ mailboxes are suspected of being charged, seriously jeopardizing the security of users’ personal information. Second, industrial Internet platforms and smart devices are important targets for cyber threats. Third, illegal “ mining ” seriously threatens the security of the Internet.
In addition, in the second quarter, the industry handled a total of 11.44 million network security threats, of which 1.12 million were handled by local communications administrations, 10.15 million were disposed of by basic telecommunications companies, and about 20,000 were handled by network security professional organizations. Enterprises, domain name agencies, and network security companies disposed of about 150,000.
The next steps include the network security of the Beijing Summit of the China-Africa Cooperation Forum, the special governance of malicious programs, and the promotion of the construction of an industrial Internet security system.
[su_quote]This article is writing on 04 September 2018 based on information available online & news portal. If you feel it’s outdated or incorrect, please write here to update it. Mail us: [email protected] Or Whatsapp Us- +13098896258[/su_quote]
The Information Presented Here Does Not Constitute Investment Advice Or An Offer To Invest. The Statements, Views, And Opinions Expressed In This Article Are Solely Those Of The Author/company And Do Not Represent Those Of Coinworldstory. We Strongly Advise Our Readers To Do Your Own Research (DYOR) Before Investing In Any Cryptocurrency, Blockchain Project, Or Ico, Particularly Those That Guarantee Profits. Furthermore, Coinworldstory Does Not Guarantee Or Imply That The Cryptocurrencies Or Projects Published Are Legal In Any Specific Reader’s Location. It Is The Reader’s Responsibility To Know The Laws Regarding Cryptocurrencies And Icos In His Or Her Country. Please Respect Your Country Law & Take Advice From Your Advisor .