The reporter learned through public security, courts and other departments that every year, people commit fraud with leaked citizenship information. Some swindlers cheat citizens of their own money, and some swindlers use citizens' information to cheat others of their money. The disclosure of identity information not only brings a lot of harassment to citizens, but also causes economic losses to citizens, and even makes them almost fall into a lawsuit. During the interview, some experts said that protecting personal information from being leaked at will is not something that one person can do, and it needs to be built on a formed social system. However, a mature system needs a long time to improve, and how to reduce or even eliminate the disclosure of personal information is still a difficult problem.
The reporter learned that there are many channels for personal information disclosure. In addition to the imperfect protection system, many citizens do not pay attention to self-protection, which leads to the disclosure of personal information: the police specially remind the masses to effectively enhance their awareness of personal information protection and not to easily provide personal information to unrelated people; If it is found that personal information has been leaked and caused serious consequences, it should be reported to the local public security organ in time.
Be careful when filling out forms online.
To strengthen the protection of personal information, we must start from ourselves. For example, don't fill out forms on the internet at will, but choose a website with strong security and prevention ability to store important personal information; Be careful not to disclose your information to others casually when accepting market research on the road or filling out VIP cards in the store. In case of posing as public security, procuratorial, court and bank staff to introduce and recommend insurance business, real estate business, financial investment and peer-to-peer telecom fraud cases, we should always be vigilant to prevent being deceived. When personal information is illegally used, citizens should protect their rights through various channels and don't let their personal information leak.
Don't lose your ticket to real-name registration system at will.
The railway department said that real-name registration system tickets should not be handled at will. Before being discarded, QR codes, ID numbers and names can be blacked out or crushed.
The express receipt should be torn clean.
Many citizens will buy online, but few people will pay attention to the receipt on the courier box, which is impressively printed with your real name, address and mobile phone number. If left unchecked, your relevant information may spread through this "road".
Automatic withdrawal does not require return.
Although the bank receipt is small and simple in function, as long as it is your business content, it will be displayed on it, including deposit account number, account name, product name, amount, balance and so on. Even the most common personal demand deposit withdrawal slip has more than ten kinds of information. After receiving the receipt, criminals may steal your password through technical means and then forge a bank card to withdraw money from the account. Therefore, some banks suggest that you don't need to return the receipt when withdrawing money from ATM unless necessary, so as to avoid accidentally destroying the receipt and causing problems.
As for how to prevent computer crime, this problem is broader and a social problem. As a modern information processing tool, computer plays an irreplaceable role in economic and social life. Because of this, criminal activities using computers or aiming at computer systems are on the rise today, and computer-related criminal activities are bringing more and more harm to society. Therefore, it is imperative to prevent computer crimes.
Measures to prevent computer crimes:
1, strengthen legislation. For computer network crimes, China's current criminal law only stipulates the crime of illegally invading computer systems and the crime of destroying computer systems in Articles 285 and 286. In the face of the growing computer network crimes, these two kinds of crimes are difficult to cover, and according to the principle of a legally prescribed punishment for a specified crime, there is no explicit stipulation that it does not constitute a crime, so that many computer network crimes have escaped legal sanctions. In order to better crack down on computer illegal activities and protect network security, it is necessary to draw lessons from the methods of developed countries and formulate a special law. By enhancing its pertinence, systematization and operability, it provides the necessary legal guarantee for governing computer network illegal and criminal activities according to law. ?
2. Accelerate the construction of the network police force. Network police is a new branch of the police force. One of the goals of this new police force is to conduct online search to prevent and track the ghosts of all kinds of bad behaviors and criminal activities, which can be committed in a few seconds without leaving any trace. Therefore, it is required that the network police must have profound computer knowledge and professional skills, be able to keep up with the development of new technologies and master various computer skills skillfully.
3. Strengthen the research and development of network technology and new network products, and enhance the self-protection ability of the system. Because computer crime is a highly intelligent crime, just like the contradiction between encryption and anti-encryption, only by constantly updating technology, developing new products, enhancing the self-protection ability of the network, plugging security loopholes, providing secure communication services, and strengthening the research and improvement of key security technologies such as encryption router technology, security kernel technology, data encryption technology, network address translation technology, ID card authentication system, proxy service technology, firewall and network anti-virus technology can we not give it to any computer criminals.
4. Strengthen network security management. Constantly improve the safety management mechanism and strictly abide by the safety management regulations, even if the management loopholes are eliminated. An excellent management system can improve work efficiency by half. Similarly, a scientific and reasonable network management system can greatly enhance the security of the network. Most network managers do not strictly abide by the relevant operating rules of the network, so that many security loopholes are ignored. In fact, poor management is the main cause of most safety accidents and hidden dangers. Some surveys show that more than half of the computer network vulnerabilities are caused by human beings, and more cyber attack crimes come from employees inside the system. Therefore, it is necessary to strengthen management and prevent various security loopholes.
5, the implementation of network domain name registration in real-name registration system. In order to achieve the purpose of plugging loopholes and deterring crimes.
6. Strengthen physical defense. Secret-related units, economic, financial and other key departments should separate the secret-related content from the network and not operate and sort out relevant information on the network. Operations involving network information must be downloaded from the network and then sorted and called on isolated computers.
7. Strengthen international cooperation. With the globalization of economic development and network development, many computer crime cases are not only related to one country, but also may involve law enforcement in several countries. Therefore, we must strengthen international cooperation in preventing computer crimes. On the one hand, we should learn from foreign advanced technology and prevention experience; on the other hand, we should strengthen law enforcement cooperation and resolutely crack down on transnational crimes. When the world has become a global village, it is necessary to strengthen international cooperation to prevent computer crimes. Without international cooperation and exchanges, we can't achieve a comprehensive victory in cracking down on computer crimes. ?
8. Strengthen network moral education. A good network moral environment is the first step to prevent computer crimes. Comrade Deng Xiaoping has asked us for a long time: computers should start with dolls, which should not only teach computer knowledge, but also include the cultivation of good network morality. The age of computer network crime shows a trend of younger age, and teenage "little hackers" appear. While paying attention to the construction of "two civilizations", we must not forget that network civilization is the main component of spiritual civilization. Compared with the task of spiritual civilization construction in real space, perhaps the former is more arduous than the latter. Only by strengthening humanities education? With excellent cultural and moral concepts, guide the network society to form a reasonable and legal network moral concept that meets the requirements of the times. We must vigorously strengthen ideological and moral education and establish scientific, healthy and harmonious network morality, which is an important measure to effectively prevent computer crimes.
In short, in building a harmonious society today, we must legislate scientifically, pay attention to prevention, strictly enforce the law, strengthen cooperation, mobilize all forces that can be mobilized, "take precautions", actively carry out computer network crime prevention work, intensify the crackdown and punishment, ensure the healthy development of computer networks, and make them better serve the progress and development of mankind.
Solemnly declare: the above words are all from internet search results, for reference only!