What is the nature and function of the China Cyber Security Center?

Updated on technology 2024-03-09
5 answers
  1. Anonymous users2024-02-06

    1. In accordance with the provisions of the "Cybersecurity Education Law of the People's Republic of China" and relevant laws and administrative regulations, the competent departments of telecommunications, public security departments and other relevant organs shall be responsible for network security protection and supervision and management within the scope of their respective duties. The network security protection and oversight and management duties of the relevant departments of local people's ** at the county level or above are to be determined in accordance with relevant state provisions;

    2. All individuals and organizations have the right to report acts that endanger network security to the departments of internet information, telecommunications, public security, and so forth. The department receiving the report shall promptly handle it in accordance with law; and where it is not the department's duties, it shall be promptly transferred to the department that has the authority to handle it. The relevant departments shall keep the informant's relevant information confidential and protect the informant's lawful rights and interests;

    3. All levels of people** and their relevant departments shall organize and carry out regular network security publicity and education, and guide and urge relevant units to do a good job of network security publicity and education, and the mass media shall conduct targeted network security publicity and education for the public.

    Legal basis

    Cybersecurity Law of the People's Republic of China

    Article 39: The State Internet Information Department shall coordinate the following measures for the security protection of critical information infrastructure by coordinating relevant departments:

    1) Conduct spot checks and testing of critical information infrastructure security risks, propose improvement measures, and when necessary, may retain network security service establishments to conduct testing and assessment of network security risks;

    2) Periodically organize critical information infrastructure operators to conduct network security emergency drills, increasing the level of response to network security incidents and their ability to coordinate and cooperate;

    3) Promote the sharing of network security information between relevant departments, critical information infrastructure operators, relevant research institutions, network security service bodies, and so forth;

    4) Provide technical support and assistance for emergency response to network security incidents and restoration of network functions. Article 23: Critical network equipment and special network security products shall be sold or provided only after a qualified body has passed security certification or met security testing requirements in accordance with the mandatory requirements of relevant national standards. The State Internet Information Department, in conjunction with relevant departments, is to draft and publish a catalog of key network equipment and special network security products, and promote mutual recognition of security certifications and security testing results, to avoid duplicate certifications and testing.

  2. Anonymous users2024-02-05

    The state internet information department is responsible for the overall planning and coordination of network security efforts and related oversight and management efforts. All individuals and organizations have the right to report conduct endangering network security to departments such as for internet information, telecommunications, and public security. The department receiving the report shall promptly handle it in accordance with law; and where it is not the department's duties, it shall be promptly transferred to the department that has the authority to handle it.

    Legal basisArticle 8 of the Cybersecurity Law of the People's Republic of China.

    The state internet information department is responsible for the overall planning and coordination of network security efforts and related oversight and management efforts. In accordance with the provisions of this Law and relevant laws and administrative regulations, the competent departments for telecommunications, public security departments, and other relevant organs are responsible for network security protection, oversight, and management efforts within the scope of their respective duties.

    The network security protection and oversight and management duties of the relevant departments of local people's ** at the county level or above are to be determined in accordance with relevant state provisions;

  3. Anonymous users2024-02-04

    Hello, I am happy to answer for you: The National Computer Network and Information Security Management Center is a state-owned enterprise of the National Computer Network and Information Security Management Center. At present, it has formed the layout of the national Zhongyun Gaoyuxin (Beijing headquarters) and 31 provincial sub-centers and 22 key city emergency support centers, which is the core force of the national network and information security technology support and guarantee.

    The National Computer Network and Information Security Management Center's function is to maintain the security and stability of the national network information. The National Computer Network and Information Security Management Center aims to provide technical support for ensuring national cyberspace security; Provide technical support for preventing and combating cybercrime and maintaining the security of network sideroll; improve the ability to supervise the security of important information systems; Promote the development of the antivirus industry.

  4. Anonymous users2024-02-03

    Hello, dear. The company's cyber security governance body, referred to as cyber security, is a security management organization. The full name is Security Management Organization.

    In order to ensure the normal operation of the network, a set of top-down security organizations, management agencies, and technical institutions should be established and gradually improved. "The governance body of network security refers to the office of the Cyber Security and Information Commission of the Communist Party of China, which is an office under the Cyber Security and Information Commission. In March 2018, according to the "Plan for Deepening the Reform of Party and State Institutions" issued by the Communist Party of China, the Office of the Cyber Security and Informatization Committee was established.

    Dear, <>

    The above is the answer I summarized for you, Fool is very happy to serve you, please give me a thumbs up, thank you very much for <>

    I hope mine is helpful to you, and then I hope you are happy every day, have a good life<> and good luck always accompany you<>

  5. Anonymous users2024-02-02

    The China Cyber Security Review Technology and Recognition Center (CCRC, formerly known as China Information Security Certification Center) is a specialized institution responsible for the implementation of cyber security review and certification in accordance with the national Cyber Security Infiltration Law and relevant national compulsory product certification and network security management regulations.

    The China Cybersecurity Review Technology and Certification Center is a public institution directly under the State Administration for Market Regulation and is a third-party impartial institution and legal entity.

    Its functions are: to undertake research on cybersecurity review techniques and methods; Carry out research on network security certification evaluation and related standard technologies and methods; Undertake technical training for network security review personnel and network security certification personnel; Carry out certification work within the approved scope of work in accordance with the basic specifications and rules of certification; Accept certification commissions, implement evaluations, make certification decisions, and issue certification certificates; Responsible for the follow-up inspection after certification and the supervision of the use of the corresponding certification mark; Accept relevant certification complaints and appeals; Suspend, cancel and revoke the certification certificate in accordance with the law; Conduct training on certification standards, procedures and related requirements for certification and certification-related testing, inspection and evaluation personnel; Conduct qualification registration and training for institutions and personnel providing information security services; Participate in relevant international organizations to carry out international cooperation in the field of information security in accordance with national laws, regulations and authorizations; Engage in relevant certification work in accordance with laws, regulations and authorizations. In terms of business, it accepts the guidance of the Office of the Cyber Security and Information Commission of the Communist Party of China.

Related questions
4 answers2024-03-09

Learn what you need to know about cybersecurity:

1) Familiar with the basic knowledge of computer systems; >>>More

10 answers2024-03-09

A security certificate is a security setting, generally for online banking. >>>More

8 answers2024-03-09

Big brother, how can you see that you have this tendency? b Khan.

7 answers2024-03-09

In fact, the difficulty of network security is relative to whether it is difficult or not. Everyone is good at different skills, some people are good at digging problems, some people are good at analyzing problems, and learning network security is also related to interest, if you are interested in network security, and you are willing to spend time to learn, then it is easier to learn, and vice versa, there is a certain degree of difficulty in learning. >>>More

5 answers2024-03-09

1. Standardized managementEnterprises formulate a network security management standard system, and employees must abide by it, assign different management permissions and role requirements to different management personnel of the first platform, and strictly divide management personnel to avoid management authority being in charge by the same person, causing potential security risks. >>>More