in the big data and cloud computing era, the Internet is to reconstruct the whole operating system of manufacturing and service industries, and docking of the buyer and the seller is dependent on big data, rather than a physical store, intermediary. The role of the database is more and more important, but it is difficult to protect the security. The investigation of this topic is trying to show the chain of Internet data breaches in the central ring, while the analysis of the case is trying to show the difficulty of personal rights of citizens, which depends on the promotion of the rule of law.

day a little bright bird (a pseudonym) after a night mission, he used cold water to wash a face, get up, go to work.

in the daytime, he is a Internet Co programmer. In the evening, he is active on the Internet Forum "white hat".

"white hat" is the industry known as positive hackers, they used a security vulnerability identification computer system or network system, a vulnerability warning, to remind the enterprises or other units in the former was hacked into patching vulnerabilities.

due to work during the day time is not allowed, can only use the night time bird "white hat" work. This makes him very tired, if entered into active state, big bird may have a long period of time spent in a highly nervous state of mind.

In addition to the

in the forum to get peer recognition of the pleasure, many times, they are facing a group of people who disdain the loopholes. Because after each vulnerability has been discovered, the first reaction of many enterprises is "rumor", rather than face the problem.

in the big data and cloud computing era, the Internet is to reconstruct the whole operating system of manufacturing and service industries, and docking of the buyer and the seller is dependent on big data, rather than a physical store, intermediary. The role of the database is more and more important, but it is difficult to protect the security.

perhaps because of the enterprise’s attitude towards the loophole, some technical staff will warn the enterprise – since you disdain, I’ll do a single show you. Some technicians with loopholes to blackmail the enterprise, in return for compensation, involving a huge interest, some people even a very short time to complete the original capital accumulation. White hat is judged by its behavior, but it is also possible to become a real hacker at some point in time.

in the country, has gradually formed a number of loopholes in the reporting platform, such as cloud network, 360 have established a mechanism to report vulnerabilities, different methods. National Internet Emergency Center has also established a vulnerability sharing platform, weekly release of information security vulnerabilities weekly.

some enterprise’s attitude has become enlightened, as of January 14th, the official order is white hat platform Tesla found loopholes, the original price of 300 thousand yuan Book gold, white hat in the background can be modified for a yuan of money. The atlas that moved quickly to repair the vulnerability, and that the order is effective, but also from the headquarters sent official souvenirs for white hat.

twenty-first Century economic news reporter through the investigation of half a month, close to a number of white hat, some of them do not want to

wkvwgsbh