China will implement a cybersecurity review system, what do you think about this

Updated on technology 2024-03-02
5 answers
  1. Anonymous users2024-02-06

    The real-name system of train tickets is not good, and it is still done on the Internet? It's just a money-trapping behavior.

  2. Anonymous users2024-02-05

    I don't support orzzzzz and I don't think the censorship is anything, it's not interesting.

  3. Anonymous users2024-02-04

    Legal analysis: According to the laws and regulations of our country, the state implements a graded network security protection system.

    Legal basis: Article 21 of the Cybersecurity Law of the People's Republic of China The mainland of the country implements a hierarchical protection system for network security. Network operators shall perform the following security protection obligations in accordance with the requirements of the tiered network security protection system, to ensure that the network is protected from interference, destruction, or unauthorized access, and to prevent network data from being leaked, stolen, or tampered with:

    1) Formulate internal security management systems and operating procedures, designate responsible persons for network security, and implement responsibility for network security protections;

    2) Employing technical measures to prevent computer viruses, network attacks, network intrusions, and other conduct that endangers network security;

    3) Employ technical measures to monitor and record network operation status and network security incidents, and follow provisions to retain network logs for at least 6 months;

    4) Employing measures such as data classification, backup and encryption of important data;

    5) Other obligations provided for by laws and administrative regulations.

  4. Anonymous users2024-02-03

    Legal analysis: The cybersecurity law stipulates that the state implements a network security hierarchy system.

    Legal basis: Cybersecurity Law of the People's Republic of China

    Article 15: The state is to establish and improve a system of network security standards. The administrative department in charge of standardization and other relevant departments shall, in accordance with their respective responsibilities, organize the formulation and timely revision of national standards and industry standards for network security management and network products, services and operational security. The state supports enterprises, research institutions, institutions of higher learning, and network-related industry organizations in participating in the formulation of national and industry standards for network security.

    Article 17: The state is to advance the establishment of a socialized network security service system, encouraging relevant enterprises and institutions to carry out security services such as network security certifications, testing, and risk assessments.

  5. Anonymous users2024-02-02

    Legal analysis: The Cybersecurity Law stipulates that the state implements a network security system such as network security.

    Legal basis: Cybersecurity Law of the People's Republic of China Article 21 The State implements a system of hierarchical network security protection for the elderly. Network operators shall perform the following security protection obligations in accordance with the requirements of the tiered network security protection system, to ensure that the network is protected from interference, destruction, or unauthorized access, and to prevent network data from being leaked, stolen, or tampered with:

    1) Formulate internal security management systems and operating procedures, designate the person in charge of network security, and implement responsibility for network security protection; 2) Employing technical measures to prevent computer viruses, network attacks, network intrusions, and other conduct that endangers network security; (3) Employ technical measures to monitor and record network operation status and network security incidents, and retain relevant network logs for at least six months in accordance with provisions; 4) Employing measures such as data classification, backup and encryption of important data; 5) Other obligations provided for by laws and administrative regulations.

Related questions
4 answers2024-03-02

Learn what you need to know about cybersecurity:

1) Familiar with the basic knowledge of computer systems; >>>More

10 answers2024-03-02

A security certificate is a security setting, generally for online banking. >>>More

8 answers2024-03-02

Big brother, how can you see that you have this tendency? b Khan.

7 answers2024-03-02

In fact, the difficulty of network security is relative to whether it is difficult or not. Everyone is good at different skills, some people are good at digging problems, some people are good at analyzing problems, and learning network security is also related to interest, if you are interested in network security, and you are willing to spend time to learn, then it is easier to learn, and vice versa, there is a certain degree of difficulty in learning. >>>More

5 answers2024-03-02

1. Standardized managementEnterprises formulate a network security management standard system, and employees must abide by it, assign different management permissions and role requirements to different management personnel of the first platform, and strictly divide management personnel to avoid management authority being in charge by the same person, causing potential security risks. >>>More