The State Council promulgated policies to pilot e-commerce personal information protection

According to the news, on the 17th, the State Council issued the "State Council's Several Opinions on Vigorously Promoting the Development of Informatization and Effectively Protecting Information Security" (hereinafter referred to as the "Opinions"), proposing more vigorous policies and measures to vigorously promote the development of informatization and effectively safeguarding information security. . The "Opinions" made it clear that by the end of the "Twelfth Five-Year Plan", the national e-government network was basically completed, and information sharing and business coordination frameworks were basically established; the nation's e-commerce transaction volume exceeded 18 trillion yuan. Some information security experts said that at present, e-commerce has become a way of life. The government has introduced relevant measures. Netizens are expected to put on “iron blouses” for online shopping and ensure online transaction security.

The "Opinions" made it clear that by the end of the "Twelfth Five-Year Plan", the nation's e-commerce transaction volume exceeded 18 trillion yuan, and the proportion of online retail sales to the total retail sales of social consumer goods exceeded 9%.

At the end of last year, China's largest programmer Web site, CSDN, was exposed by 6 million users of database information was hacked, followed by a number of Web site users database leaked news. The China Electronic Commerce Association’s Trusted E-Commerce Promotion Center has recently released the “2012 China Website Trusted Verification Industry Development Report” (hereinafter referred to as the “Report”). As of the end of June 2012, 31.8% of Internet users experienced online shopping. Netizens once encountered a phishing website or a fraud website during the online shopping process. The number of netizens scam netizens reached 61.69 million. The "Report" conservatively estimates that the losses caused to netizens by phishing websites or fraud websites are not less than 30.8 billion yuan each year.

Related sectors have a real positive effect

As for the reason for the disclosure of personal information, Dr. Zou Shihong, a cell phone security expert, said that criminals generally obtain private information such as the user’s account number and password through scanning and monitoring of the user's computer and mobile phone. Currently, there are a few softwares with such functions. less. In addition, the user's Internet behavior is not careful, or the password is too simple, easy to crack, etc., is also the cause of information leakage.

At the end of last year, relevant departments issued the “12th Five-Year Development Plan for Information Security”. This year, the “Twelfth Five-Year Plan for Software and Information Technology Services” and “The Further Encouragement of the Development of Enterprise Income Tax Policies for Software Industry and Integrated Circuit Industry” have been issued. announcement of". Some securities analysts believe that the introduction of policies intensively will directly benefit domestic related industries.

Expert advice

For ordinary users how to prevent personal information leakage, Dr. Zou Shihong suggested that in mobile phones can be installed in real-time protection of mobile phone security software, try to choose the regular download channels and software application store to download; do not feel free to open strange links in the SMS address, not easily downloaded And install unknown source software, delete garbled text messages, MMS, carefully choose Flash ROM. In addition, Dr. Zou Shihong suggested that mobile phone users should set separate, high-security passwords for their mobile phones when they purchase online mobile phones. During the operation of mobile phones, they are not free to click on unknown links and install unknown files. It is advisable to install a professional mobile phone security. Software to ensure the transaction security of the mobile phone when accessing the payment page.

Industry control printed circuit boards (PCB)

1. For industrial control, special or general-purpose circuit board, the bottom circuit is completed, and IO is reserved. After buying the industrial control circuit board, the input and output ports reserved on the circuit board are connected to the user's own device, such as motor, solenoid valves, sensors, thus completing the function want to accomplish.
2. The special circuit board is a board specially designed for a certain function, such as the temperature control circuit board. After buying it, the input port is connected to the thermocouple, and the output port is connected with a heating contactor or a solid state relay to control the heating device to complete the temperature control. There are flow control boards, motion control boards, etc.
3. The universal control board, most of which can be programmed, after the user's own secondary development, completes a specific function, and has a wide range of uses. For example, plc is a general industrial control board. After the user writes the program and compiles the input, various functions can be completed. Digital input, analog input port, high-speed counter port, digital output port, analog output port, and some also have communication function.

Industry Control Circuit Board

Industry Control Pcb,Electronic Control Board,Industrial Controller Circuit Board,Industrial Control Printed Circuit Board

Chuangying Electronics Co.,Ltd ,

Posted on