Level of protection assessment level of protection ddos

The big 2021 protection cybersecurity event?

Data breach?

Suspected that more than 200 million domestic personal information is being peddled on foreign darknet forums

On January 5, foreign security research team Cyble found multiple posts are selling personal data related to Chinese citizens, which were analyzed as possibly coming from microblogging, QQ, and other social media, and the total number of records related to Chinese citizens in the several posts found this time is more than 200 million.

Nation's first personal information protection case applying civil code pronounced

On January 8, the Hangzhou Internet Court publicly heard and pronounced judgment on the nation's first personal information protection case applying civil code. The defendant Sun, who openly and illegally traded and provided more than 40,000 pieces of personal information on the Internet without the permission of others, resulting in a long-term risk of infringement of the information of the people concerned, was sentenced to pay compensation for the illegal income of 34,000 yuan, and publicly apologized.

A domestic bank is suspected of data leakage of up to 16.79 million

January 8, someone posted in a foreign forum to sell a domestic bank 16.79 million pieces of data, and put out some of the data samples, data, including name, gender, card number, ID card number, cell phone number, the city, contact address, work unit, zip code, work phone, residential phone, card type , card-issuing bank and so on.

Net lending companies violating personal information was fined 3.2 million

January 15, China's referee network published a judgment, Beijing Zhi borrowing company, Xian Moumou, etc. in the case of not obtaining the victim's consent to downstream a number of companies to sell personal information containing names, ID card numbers, cell phone numbers, etc., for the crime of violating the personal information of the citizens, was sentenced to a fine of 3.2 million yuan. The purchase involved a number of well-known companies such as Ping An Puhui, Pai Pai Loan and You & Me Loan.

Zhenjiang Danyang 30 people trafficked 600 million pieces of personal information profit of more than 8 million

January 24, Zhenjiang Danyang police detected a Ministry of Public Security supervised infringement of citizens' personal information case, involving more than 10 provinces and cities, arrested 30 suspects. The gang used offshore chat tools and blockchain virtual currency receipt and payment,*** trafficking in personal information of more than 600 million, the illegal income of more than 8 million yuan.

CCTV exposure App eavesdropping privacy voice sent after the recording continues

January 31, CCTV program experts with a simulated "App eavesdropping test program" to send a 2-second voice, when the hand is released, the recording continues, and generate a 120-second voice, confirming that when the test program is placed in the foreground to run, eavesdropping is the most common form of illegal activity in the world. When the test program is placed in the foreground, eavesdropping can be realized. In addition, when the test program is in the background or on the phone's lock screen, the recording can still be continued for a period of time.

Xishanju's Easy.com was attacked and data leaked

On March 2, Xishanju Game released a bulletin stating that Xishanju's products have been repeatedly attacked by DDos attacks and server invasions by unruly elements, which has led to the leakage of information such as part of the user's account and encrypted passwords in non-explicit text, and that the official recommendation is to change the passwords of the short bits with a low level of security in the first time.

Nation's first case of using WeChat's powder-clearing software to obtain personal information

On March 3, the Nantong Tongzhou Public Security Bureau sentenced the nation's first case of using WeChat's "powder-clearing" software to illegally obtain WeChat users' information. The victimized users scanned the QR code of the software in order to "slim down" their WeChat address book, but their personal information was leaked. The eight defendants made more than 2 million yuan in illegal profits by brushing readers and selling QR codes for WeChat group chats.

315 exposure face information abuse, resume leakage and other chaotic phenomena

March 15, CCTV 315 exposure of three cases involving personal information security: merchants to install cameras to capture records of customer face information, multi-store **** enjoy and comprehensive offer; Wisdom Union recruitment, hunting and hiring platform resume can be downloaded at will for money, a large number of resumes flow into the black market; many mobile phone cleaning apps developed for the elderly behind the scenes. The cell phone cleaning App developed for the elderly constantly obtains cell phone information behind the scenes and pushes out content with deceptive routines.

CITIC Bank was fined 4.5 million yuan for leaking customer information

On March 19, the Consumer Protection Bureau of the CBRC released a fine ticket showing that CITIC Bank was fined 4.5 million yuan. Sources said the fine is suspected to be the result of the penalty for the incident in May 2020, when talk show artist Ji Zi reported that CITIC Bank had violated the law by privately providing its bank flow information to the public.

Cyberattacks

Multiple industries infected with incaseformat virus

On Jan. 13, several domestic security vendors detected a widespread outbreak of the worm incaseformat in the country, which involves multiple industries such as the government, healthcare, education and carriers, and the infected hosts are mostly financial management-related application systems. The infected hosts show that all non-system partition files are deleted, causing irreparable damage to the user.

SMS Phishing Attacks on Farmers' Credit Unions and City Banks

Since the Spring Festival, many cities across China have been experiencing a series of security incidents in which customers were lured into clicking on phishing links to steal funds by sending mass SMS messages on the grounds that their cell phone banking was invalidated or had expired. AU detects a large number of phishing websites were registered and put into use after February 9. The domain names of the phishing websites are the customer service phone numbers of financial institutions such as Farmers' Credit Cooperative and City Commercial Banks + letters, or similar domain names with the websites of financial institutions, and most of them are registered and hosted by foreign domain name registrars.

Surge in DDoS attacks during the Spring Festival

February 22, QIANSHENXIXI Labs released a report on DDoS attacks during the Spring Festival, which showed that during the Spring Festival, QIANSHENXI's Star Trace DDoS Observation System cumulatively observed a reflection of the amplification of the DDoS attack events 65,912, which involves 57,096 IPs being attacked. Compared with the week before the Spring Festival, the number of DDoS attack events increased by about 25%, and the number of attacked IPs increased by 37%.

App infringement of user rights and interests of special rectification action?

In response to the problem of Apps infringing on users' privacy and security, the MIIT has set up a national App technical inspection platform to conduct technical inspections of popular Apps on domestic shelves. If the App does not comply with the regulations, it will first ask it to rectify. Apps that still fail after rectification or fail to rectify as required will be directly processed off the shelves.

On January 19, the Ministry of Industry and Information Technology (MIIT) took down 12 Apps, including Xuebao and Reddit Live, which were involved in the illegal collection of user information, excessive solicitation of user permissions, and deceiving and misleading users to download. (On December 21, 2020, the Ministry of Industry and Information Technology notified 63 offending Apps, this 12 did not complete the rectification in accordance with the requirements)

On January 22, the Ministry of Industry and Information Technology notified the first batch of 157 APPs in 2021 that infringed on the rights and interests of the users, including Mango TV, Yonghui Life and Pepper, etc., which involves the illegal collection of personal information, mandatory and frequent excessive request for permissions, and forcing the users to use the directional On February 3, the Ministry of Industry and Information Technology (MIIT) took down 37 apps of which rectification had not been completed, including Yilong Hotel, Dongfeng Travel and Yiqishou.

On February 5, MIIT notified the second batch of 26 apps in 2021 of violations, including QQ Input Method, UC Browser, InkWeather, etc., which involved the illegal collection of personal information, excessive request for permissions, and deceiving and misleading users to download, etc. On February 10, 10 apps that failed to complete the rectification were taken off the shelves, including Xiaozhi Classmates, Sound Bar, and kk Keyboard.

On March 12, the Ministry of Industry and Information Technology (MIIT) notified the third batch of 136 apps that infringed on users' rights and interests in 2021, including Cheetah Cleaning Master, Yue Run Circle, and Tianya Community, which involved frequent self-startups and associated startups, and unlawful collection and use of personal information, among other issues.

On March 16, the Ministry of Industry and Information Technology (MIIT) severely investigated and dealt with the 315 evening party exposure of "APP illegal collection of personal information of the elderly" violations, and asked the main application stores to take down the Memory Optimization Master, Smart Cleanup Master, Ultra Cleanup Master, Mobile Phone Manager pro four Apps.

dddddos What does ddos mean?

DDOS is Distributed Denial of Service, commonly known as a flood attack. A lot of DOS attack sources together to attack a server is composed of DDOS attacks, DDOS can be traced back to 1996 initially, in China in 2002 began to appear frequently, in 2003 has taken shape.

--The above quote is from Interactive Wikipedia

DDoS attacks are a class of attacks based on traditional DoS attacks. A single DoS attack is generally used in a one-to-one manner, when the target of the attack is low CPU speed, small memory or network bandwidth and other performance indicators are not high its effect is obvious.

With the development of computer and network technology, the computer's processing power grows rapidly, the memory is greatly increased, but also the emergence of gigabit-level network, which makes the degree of difficulty of the DoS attack increased - the target of the malicious packet of attacks on the "digestive capacity" to strengthen a lot.

For example, your attack software can send 3,000 packets per second, but my host and network bandwidth can handle 10,000 packets per second, which makes the attack ineffective.

This is where distributed denial-of-service (DDoS) attacks come into play. DoS attacks are simple if you understand them.

If the processing power of computers and networks has increased by a factor of 10, and an attack with one attacker no longer works, what about an attacker using 10 attackers at the same time? What about using 100?DDoS is all about using more puppet machines to launch an attack, attacking victims on a larger scale than ever before.

How to defend a board game from a DDOS attack?

1, regular scanning: to regularly scan the existing network master node, inventory of possible security holes, the emerging vulnerabilities in a timely manner to clean up.

2, the backbone node of the computer because it has a high bandwidth, is the best location for hackers to take advantage of, so these hosts themselves to strengthen the host security is very important. And the ones connected to the network's backbone nodes are server-level computers, so regular scanning for vulnerabilities becomes even more important.

3, in the backbone node configuration of professional anti-denial-of-service equipment, anti-denial-of-service equipment for the current widespread DOS, DDOS and other attacks and design, for your Web site, information platforms, Internet-based services, etc., to provide complete protection from ulterior motives of the attack, damage.

What is esc resource?

It is a cloud server product launched by Aliyun.

Cloud Server ECS (ElasticComputeService) is an elastic and scalable cloud computing service that helps you reduce IT costs, improve operation and maintenance efficiency, and enable you to focus more on core business innovation.

Single instance availability up to 99.975%, multi-availability zone multi-instance availability up to 99.995%, cloud disk reliability up to 99.999999999%, can realize automatic downtime migration, snapshot backup.

Support for the creation of 1000 instances at the minute level, a variety of flexible payment options more in line with the current state of the business, while bringing elasticity to the expansion capabilities, instances and bandwidth can be up and down at any time to match the cloud disk can be expanded.

Free DDoS protection, Trojan horse detection and killing, anti-violent cracking and other services, through multiple international security certification, ECS cloud disk support data encryption.

Single instance up to 128vCPU optional, memory 1TB, single instance performance up to 24 million PPS network first packet, 80Gbps bandwidth.

Rich operating system and application software, through the mirror can be a simple one-click deployment, the same mirror can be quickly replicated in multiple ECS environment, easy to expand.

ECS can be seamlessly integrated with a variety of rich cloud products from AliCloud, which can continue to provide complete computing, storage, security and other solutions for business development.

What product forms does cloud server ecs support?

A: The products supported by cloud server ecs are the cloud server products launched by Aliyun. Cloud Server ECS (ElasticComputeService) is an elastic and scalable cloud computing service that helps you reduce IT costs, improve operation and maintenance efficiency, and enable you to focus more on core business innovation.

Single instance availability up to 99.975%, multi-availability zone multi-instance availability up to 99.995%, cloud disk reliability up to 99.999999999%, can realize automatic downtime migration, snapshot backup.

Support for the creation of 1000 instances at the minute level, a variety of flexible payment options more in line with the current state of the business, while bringing elasticity to the expansion capabilities, instances and bandwidth can be up and down at any time to allocate, the cloud disk can be expanded.

Free DDoS protection, Trojan horse detection and killing, anti-violent cracking and other services, through multiple international security certifications, ECS cloud disk support data encryption.