What Is an Internet Leak?

Personal information leakage is essentially a technical theft by some IT technicians using technical means and tools, which is different from general theft.

Personal information leaked

Right!
Personal information leakage is essentially a technical theft by some IT technicians using technical means and tools, which is different from general theft.
Chinese name
Personal information leaked
Solid
Technical theft using technical means and tools
Personal information includes the following categories:
1. Basic information. Basic personal information including name, gender, age, ID number, phone number, email address, home address, etc., and sometimes even relatively private individuals such as marriage, belief, occupation, work unit, income, medical history, and birth Basic Information.
2. Device information. Basically refers to the basic information of various computer terminal equipment (including mobile and fixed terminals) used, such as location information, Wifi list information, Mac address, CPU information, memory information, SD card information, operating system version, etc.
3. Account information. It mainly includes online banking accounts, third-party payment accounts, social accounts and important email accounts.
4. Private information. It mainly includes address book information, call history, short message history, IM application chat history, personal videos, photos, etc.
5. Social relationship information. This mainly includes friend relationships, family member information, and work unit information.
6. Network behavior information. Mainly refers to online behavior records, various activities on the network, such as personal time such as online time, online location, input records, chat and dating, website access behavior, online game behavior.
With the popularity of Internet applications and people's dependence on the Internet, Internet security issues have become increasingly prominent. Malicious programs, all kinds of phishing and fraud continue to grow at a high speed, and at the same time, hacker attacks and large-scale personal information technology theft are frequent. Accompanying the rapid growth of various cyber attacks, a large number of Internet users' personal information is technically stolen and property is lost. keep growing.
At present, the "black hole door" of information security has reached a shocking level. Website attacks and technology theft are developing in a batch and large-scale direction. User privacy and rights are infringed, especially some important data is even flowing to other countries, not only individuals and enterprises. , Information security threats have risen to the level of national security. [1]
Since the leak of the CSDN, the largest IT technology community in China, in 2011, the site was dragged and crashed. In 2014, the database collision attack reached an unprecedented peak. In 2014, a number of well-known domestic websites, including Wumi (formerly Secret), Public Comment Network, Sohu, Anzhi.com, Car House, Sogou, and Evernote, were attacked by database crashes, leading to the leakage of personal information of a large number of users. [1]
  1. Do not link WiFi in public places at will. If it is really necessary, it is better to use your phone's 3G or 4G network.
  2. Mobile phones and computers need to have security software installed. Scan Trojans at least once a day, especially before using important account passwords. Regular virus killings are performed weekly, and security software is updated in a timely manner.
  3. Do not install software from unknown sources, and do not modify the system files in the phone when using the smart phone.
  4. Set a high secret strength password. It is best to set different passwords for different websites. Payment passwords for online banking and online shopping should be changed regularly.
  5. Try not to use "remember password" mode, pay attention to personal use records after surfing the Internet.
  6. When processing courier orders, various bills, and transportation documents, it is best to erase personal information before discarding them, or to centrally destroy them at a time.
  7. When using public network tools, you must first clear the traces when you go offline. If you have a QQ number, you must change the computer settings of the login area with "Remember Password" when you log out.
  8. When commenting on a friend s Weibo, diary, and pictures online, do nt leave your friends personal information at random, and do nt deliberately publish the personal information of others.
  9. Leave a phone number on the Internet. The numbers can be separated by "-" to avoid being searched by search engines.
  10. ID cards, hukou books and other documents with personal information must be kept well.
  11. Weibo has a mobile phone sign-in function, which can show the owner's location. Many young people are keen on drying places, taking selfies, and parents like taking photos of children. This kind of mobile phone check-in may be targeted by ulterior motives. On the one hand, it exposes personal privacy, such as name, work unit, home address, etc., on the other hand, it may cause crime. When using a mobile phone to check in online, you need to be careful.
One. There is a steady stream of spam messages: This is already very common, and it is no wonder that CCTV exposed spam messages at two 3.15 parties in a row. The latest thing I heard is that using cell short messages, a base station can be used as a sending center to send short messages to mobile users in the area covered by the base station. This short message system can send 15,000 messages every ten minutes. [4]
Yan Ming, director of the Third Institute of the Ministry of Public Security, is accepting "
On October 25, 2019, the Supreme People's Court and the Supreme People's Procuratorate announced the "Interpretation of the Supreme People's Procuratorate of the Supreme People's Court on Several Issues concerning the Application of Laws in the Criminal Cases of Illegal Use of Information Networks and Helping Information Network Criminal Activities". The standards for conviction and punishment of the crime of non-compliance with information network security management obligations, the crime of illegal use of information network, and the crime of helping information network criminal activities, as well as related laws and application issues, have been comprehensively and systematically stipulated.
According to China's criminal law, network service providers who fail to fulfill their obligations on the management of information network security stipulated by laws and administrative regulations, and refuse to make corrections after being ordered to take corrective measures by the supervisory authority, leading to the leakage of user information and causing serious consequences shall be punished by imprisonment of up to three years. , Detention or control, and impose concurrent or single fines.
The judicial interpretation of the "two highs" responded to this provision, refusing to fulfill the information network security management obligations, resulting in the leakage of user information. It has "caused the leakage of more than five hundred tracks, communication content, credit information, and property information." Information, communication records, health and physiological information, transaction information, and other eight kinds of situations that may affect the safety of personal and property information should be considered as "causing serious consequences" as stipulated in the Criminal Law. [11]
On November 18, 2019, the State Administration of Market Supervision held a press conference to report the status of special enforcement actions to combat violations of consumers' personal information. Close to the end of 2019, the 2019 special law enforcement action against consumer personal information violations ended perfectly. The national market supervision authorities filed a total of 1,474 cases of consumer personal information violations, seized 3.692 million pieces of information, and fined 19.464 million yuan. 154 cases were transferred to public security organs. [12]

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?