China's Practice in Cybersecurity Governance Provides a Demonstration Sample for the World | Cyberspace | Global

Release time:Apr 16, 2024 00:08 AM

In recent years, while digitization has brought various conveniences, it has also increased the risk of information leakage. Cybersecurity concerns the lives and property interests of the people, and is an important component of national security. How to effectively ensure network and information security is an important issue in the digital age.

From August 27th to 29th, at the first Cyberspace Security Summit Forum hosted by the Tianjin Municipal People's Government, organized by the National Computer Virus Emergency Response Center and the Tianjin Public Security Bureau, and co organized by the Cybersecurity Bureau of the Ministry of Public Security and the Binhai New Area Government, nearly 800 domestic and foreign guests faced this important topic, discussed cybersecurity countermeasures, and explored the practical path of comprehensive cybersecurity governance in China.

On August 28th, the first Cyberspace Security Summit Forum opened. Photo by Cui Xinyao, a journalist from People's Daily Online

Tamping the foundation and planting thick soil for Tianjin's network security

"Security companies need to help the country truly solve problems, not just sell goods." The speech by Zhou Hongyi, founder of 360 Group, received applause.

Speaking from the bottom of my heart, because Zhou Hongyi has returned home. At present, 360 has built the first national information and innovation security center in Tianjin, and plans to build an enterprise digital security service center this year. With the concept of "security as a service", 360 will provide security custody and operation services for tens of thousands of large and medium-sized enterprises in Tianjin, including enterprises that were previously "unaffordable or not well used" in the scope of protection, and improve the overall urban security level of Tianjin.

Not only 360, many companies have found a sense of "home" in Tianjin.

In recent years, the Tianjin Municipal Party Committee and Government have attached great importance to cybersecurity work and have successfully held four consecutive international anti virus conferences. They have gathered a group of leading cybersecurity enterprises such as Kirin Software, Feiteng, and Shuguang, as well as a number of cutting-edge research institutes such as the National Supercomputing Tianjin Center and the National Computer Virus Emergency Response Center. They have continuously promoted the construction of digital economy, digital society, digital ecology, and digital civilization, and are fully committed to building an information and innovation industry system and a national level cybersecurity industry base.

At the same time, Tianjin took the opportunity to hold the National Cybersecurity Awareness Week, focusing on hot issues such as personal information protection and telecommunications fraud prevention, and effectively mobilizing the participation of the whole population through a combination of online and offline efforts. Every year, thousands of themed activities are organized to popularize network security knowledge, enhance network security awareness and protection skills, and create a strong atmosphere for the whole society to jointly build a network security defense line in a form that is popular among the public.

The cyberspace is not a lawless place. Tianjin is the first city in China to establish a network data security law enforcement team and improve the network data security law enforcement system. The Implementation Plan for Accelerating the Establishment of a Comprehensive Network Governance System in Tianjin City has been issued, adhering to the principles of unified governance, legal governance, technological strengthening, and collaborative governance. We will continue to increase administrative law enforcement efforts, regulate administrative law enforcement behaviors, resolutely investigate and deal with various illegal cases in accordance with the law, and continuously improve the level of network governance in accordance with the law.

The above details depict the "Tianjin background" in maintaining cybersecurity, and also cultivate a fertile soil for Tianjin to build a high standard cybersecurity system.

Continuously exploring and forming vivid practices in Chinese governance

In the era of the Internet of Things, opportunities and risks coexist.


China's Practice in Cybersecurity Governance Provides a Demonstration Sample for the World | Cyberspace | Global

"From the distribution data of the industries affected by blackmail in the first half of 2023 monitored by the Alibaba Cloud Security Center, the Internet infrastructure, retail industry and manufacturing industry are still the hardest hit areas for blackmail threats on the cloud. In this regard, a malware interception sample library should be established to continuously monitor historically active blackmail families, automatically generate sample detection rules for variants, automatically collect behavior characteristics and attack methods of blackmail families, and effectively intercept unknown variants of known families." Lei Tao, the general head of office security of Alibaba Cloud Intelligent Group, shared the data and put forward suggestions.

Without cybersecurity, there would be no national security, and the interests of the general public would be difficult to safeguard.

Since the 18th National Congress of the Communist Party of China, the development of China's cybersecurity work has entered a fast lane, and various work has made positive progress, forming a series of vivid practices and valuable experiences.

In recent years, China has accelerated the top-level design in the field of cybersecurity, formulated and improved strategic plans, laws and regulations, and standard specifications related to cybersecurity, and established the "four pillars and eight pillars" of cybersecurity; Effectively connecting with the National Cybersecurity Emergency Plan, industries such as finance, energy, communication, and transportation have successively formulated and revised their own cybersecurity emergency plans, continuously improving their security protection systems and enhancing their emergency response and disposal capabilities; Since 2019, China has completed the detection of 3.22 million mobile Internet applications, and reported and removed nearly 3000 illegal mobile Internet applications

In recent years, China has always actively explored governance paths to protect the lives and property of the people in terms of rectifying the network ecological chaos and strengthening the management of Internet services.

Taking Multiple Measures to Build a Global Co governance Demonstration Sample

The Internet is the common home of mankind. It is the common responsibility of the international community to make this home more beautiful, cleaner, and safer.

"In the field of anti virus, communication and cooperation among cross-border cybersecurity experts are becoming increasingly important, especially information exchange among anti virus software experts, which is crucial for improving the knowledge and skills of professionals and promoting global anti virus work." said Alan Dell, President of the Asian Association of Anti Virus Researchers.

In recent years, China has continuously expanded its circle of friends in the field of cybersecurity, contributing Chinese wisdom, solutions, and paths to building a peaceful, secure, open, and cooperative cyberspace. At the same time, we will comprehensively promote international cooperation in cutting-edge fields such as digital economy and artificial intelligence, and gather consensus on global cyberspace governance.

In addition, China has constantly strengthened international exchanges and cooperation on Internet governance and cybersecurity, and promoted the establishment of a multilateral, democratic and transparent international Internet governance system. In particular, the "four principles", "five propositions", "four commons" and other Chinese wisdom on global Internet development and governance have been widely recognized by the international community, and important concepts such as a community of shared future in cyberspace have been deeply rooted in the hearts of the people.

The network is boundless, and security is bounded. We have reason to believe that, standing at a new historical starting point, China will comprehensively strengthen its network security guarantee system and capacity building, and will inevitably create a new pattern of network security work.

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【