How to solve the security problem of public security network information

The concept of information policing is deeply rooted in people's hearts, and public security informatization has been widely used in public security work. "Online pursuit", "online attack" and "accurate positioning" have become the basic means of investigation and solving cases; All business departments have basically realized online office. The majority of police have tasted the sweetness in the application of public security informatization, and public security work relies more and more on public security network. It has formed the normal state of public security work, that is, "you must turn on the computer at work and surf the Internet at work". The more advanced the information technology, the higher the degree of informatization, the more prominent the information security problem, and the more severe the challenges faced by the public security network and information security work. In this case, once the public security network and information security have problems, the system will be interrupted and the network will be disconnected.

First, the main security issues of the current public security information network:

(A) there are loopholes in grassroots network management. Some grass-roots departments have network switch cabinets, and the switches are placed on desks or other open spaces. For various reasons, some grass-roots units do not arrange the network wiring according to the regulations, resulting in some lines being exposed in outdoor or non-public security areas, and the information security officer does not play a role. Everyone can adjust the network at will, which has great security risks, and it is easy to cause the public security network and the Internet to be connected in series, which may easily lead to serious security accidents.

(2) Some policemen have a weak sense of security responsibility. The information and communication department of the public security bureau of xx county, xx city, xx province has carried out safety education for the police in various ways, which has obviously improved the police's awareness of network security. However, there are still some problems, such as lack of a fixed sense of security and confidentiality, insufficient sense of responsibility, poor management of their own computers, turning a blind eye to the unauthorized use of computers by non-police personnel, and some police stations have not conducted post qualification training when hiring temporary personnel. At the same time, due to problems such as weak sense of responsibility and low quality. Although some grass-roots teams have signed letters of responsibility with the ICT department, they still do not go to the designated maintenance point for maintenance. Most of the "one machine with two functions" is caused by going out for maintenance. Some policemen cross-use mobile storage media on the public security network and other networks without computer virus detection, which leads to a large number of viruses infiltrating into the public security network.

(3) There are hidden dangers in the border inspection access system. Some systems use internet dial-up login system, which brings some hidden dangers to our network, and many end users lack identity authentication means. Border security management is becoming more and more difficult.

(D) Increased difficulty in safety management. With the deepening of public security informatization, security issues are becoming more and more prominent. Xx ministries and agencies, municipal bureaus and leaders at all levels pay more and more attention to the security of public security network, and the work of security management is getting wider and wider. At the same time, they put forward higher requirements for security managers and ask them to face greater challenges.

Second, some suggestions on strengthening public security network and information security:

In view of the above problems in public security network and information security, I think we should strengthen them from the following aspects:

(1) Continue to carry out safety education, publicity and training for the police, enhance the network safety awareness of the police, create a strong atmosphere of "stressing safety, learning safety and managing safety", and build the public security information network into a safe, orderly and standardized network, truly serving the public security informationization and ensuring all public security work.

(two) standardize the use and management of network equipment, standardize the identification and direction of network lines. All public security network equipment should be installed in the network cabinet, and grounding, lightning protection, fire prevention, theft prevention, cleaning and line adjustment should be done well. At present, some units have two sets of networks, public security information network and Internet, and they all use a set of integrated wiring system. It is best to install two sets of network equipment in two cabinets respectively, and stick eye-catching internal and external network signs on the two sets of equipment. In order to strictly distinguish between public security network lines and internet lines, all network lines and network ports must be marked and registered with internal and external networks, and some unused idle lines should be removed in time. When the network is adjusted, the corresponding lines and ports must be marked and archived immediately.

(three) the implementation of the safety management system, standardize the police online behavior. The ultimate determinant of network security is the human factor. The purpose of working hard on network security is to prevent the attack and destruction of human factors. With the improvement of personnel quality, the security of the network is also relatively improved. Therefore, a series of rules and regulations issued by xx ministries and agencies should also establish a set of management system that conforms to their own reality. It is necessary to formulate various safety protection systems such as network planning, construction, use, management and maintenance, and implement safety responsibilities in every link of the network and every policeman. All units should select personnel with high quality, strong sense of responsibility and familiarity with network business as information security administrators, and require timely inspection of network security and system implementation and implementation of various rules and regulations. (4) Strengthen technical force, increase investment and improve safety management level. Xx county (district) bureau is equipped with certain technical personnel to carry out daily inspection, eliminate hidden dangers in time and ensure the safe operation of public security network. However, due to the lack of technical personnel, daily inspection cannot be implemented. Therefore, it is necessary to equip ICT departments with sufficient technical personnel. Increase investment in network security, upgrade and transform in time, equip and improve equipment in time, and strive to build a public security information network security system of "three constructions", "three defenses" and "one guarantee".

In a word, the security of public security information network is a long-term and arduous task. We should continue to adhere to the principles of "dedicated private network" and "dedicated special plane", resolutely implement the principles of "who manages, who is responsible" and "who uses, who is responsible", implement the responsibility system for safety, and realize the "every day" of security and confidentiality work. Prevent illegal incidents and cases. Optimize the network operating environment to better serve the public security work.

Judicial protection of copyright under network environment

Internet has changed our way of life, especially the traditional way of obtaining and using information. The intellectual property law is undergoing necessary adjustment under the network environment, and the copyright system challenges the redefinition of "reproduction right" under the network environment. Only by acknowledging that "digitized" works do not produce new works and that temporary copying constitutes copying can we better protect the interests of copyright owners. All rights of intellectual property rights are delivered at the establishment ceremony of the branch of Radio and Television Network Co., Ltd. along with the full text reading.

Speech by Comrade Liang Jianming at the establishment ceremony of Yunyan Branch of Shiyan Radio and Television Network Co., Ltd. Leaders, distinguished guests, gentlemen and ladies: Facing the east wind of the Fourth Plenary Session of the 16th Central Committee, we are stepping on the pace of radio and television reform. Today, Yunyan Branch of Shiyan Radio and Television Network Co., Ltd. was formally established. This is a big day that all cadres and workers of Yunxian Radio and Television System have been looking forward to. On the opportunities, challenges and countermeasures of reading full-text network for moral education in colleges and universities.

Starting from the positive and negative effects of the network on moral education in colleges and universities, this paper clearly expounds a series of issues that people care about, such as the dominance of the network on moral education concepts, the dominance of moral education methods, the opportunities and challenges brought by moral education models, and puts forward corresponding countermeasures, which is of great practical significance for moral education in colleges and universities to better cope with the challenges of the network. Establishment and application of artificial neural network model for forecasting irrigation development demand.

In this paper, the theory of computer artificial neural network is introduced into the research field of irrigation macro-development strategy for the first time, and an artificial neural network model for forecasting irrigation development demand is established with the national total grain output and the set of influencing factors as training samples at the end of each five-year plan. From the time series of more than 40 years since the founding of the People's Republic of China, the corresponding parameters of 5 years are selected as test samples to test the model. According to the relationship network between China's future population growth and food reading, the legal struggle and collective action of contemporary China cities-a block rights protection movement.

Abstract: Since the mid-1990s, China's urban grass-roots governance system has changed from a vertical unit system to a community system led by grass-roots government. With this transformation and the resulting conflicts of interest, more and more civil rights protection movements against local authorities have also erupted in grassroots society. This study aims to explore the dynamic mechanism of these community movements.