In 2013, information security incidents, cybercrime, and organized criminal attacks made the protection of personal information and financial information almost impossible. The report also details various large-scale privacy violations and security attacks, including: online banking intrusions, mobile device threats, infrastructure construction attacks, etc., pointing out that the digital information of people or institutions has become the best money-making tool for criminals. According to statistics, nearly 1.4 million malicious and high-risk Android programs have been discovered in 2013. Apple's App Store may also distribute malicious programs. The high-risk and malicious programs of mobile devices are estimated to reach 300 at the end of 2014. Ten thousand!
Today's "continuous improvement of network capabilities" and "smart" technology behind the hidden loopholes. It is unfortunate that the latest technology we embrace has also brought more opportunities for the gangsters to develop new cyber attacks, threaten enterprises (such as online banking and online stores), and further access the average family through mobile technology. And personal. The past year has been full of major security incidents, more malicious programs and more mobile device threats, affecting all walks of life around the world. Now, consumers and businesses need to be more aware of their information security vulnerabilities than ever before, and think about how to better protect personal information and defend personal privacy.
Xi Jinping, General Secretary of the CPC Central Committee, President of the State, Chairman of the Central Military Commission, and leader of the Central Cyber ​​Security and Informatization Leading Group, hosted the first meeting of the Central Cyber ​​Security and Informatization Leading Group on the afternoon of February 27 and delivered an important speech. He emphasized that cybersecurity and informatization are major strategic issues concerning national security and national development and related to the working life of the broad masses of the people. It is necessary to proceed from the international and domestic general trend, overall layout, co-ordinate all parties, innovate and develop, and strive to build China. Become a network power. The conference will have a major impact on information security, IT localization and the entire information-related industries.
Background Interpretation: Information Security Has No Retreat
Since the Internet, the questioning about information security has never stopped. Whether it is the security of personal information and privacy, or the security of information in the country, it has long been the topic that countless people have repeatedly talked about.
At this time, why do we have to do a big report on this?
Because the issue of improving China's cybersecurity is unprecedentedly important and urgent.
In the Spring Festival of 2014, an article discussing the possible security vulnerabilities of Alipay after the theft of mobile phones was madly spread on the Internet. Although it was finally proved that many of the "vulnerabilities" mentioned in the article are not true, its spread has shown that more and more people are concerned about their information security.
A similar situation exists in more fields. Our ID card, mobile phone number, address, email address, WeChat, bank card number, game account number, password... These information in the form of 0 and 1 on the bit network have become an indispensable element in our life and work.
And if you are at the industry or even the national level, network information security has a bearing on life and death.
In the past, information was only information. Today, from communication networks, the Internet, the broadcasting network, the power grid, the transportation network to the Internet of Things, from command, design, production, transactions to statistics, information security has become a way to ensure that the entire social system remains normal. Essential essential elements of operation.
On February 2, 2014, at the 50th Munich Security Conference, European and American politicians including Michael Rogers, Chairman of the US House Intelligence Committee, former German Defense Minister and current Interior Minister Thomas De Mezier, once again on this topic. Formed a fierce debate and collision of viewpoints - In the complicated international situation, in addition to the basic consensus that "cyber security and personal freedom cannot be mutually exclusive," cybersecurity has become a new battlefield for politics and military in various countries.
In this field, if it lags behind, it will inevitably be beaten. We do not advocate hegemony, but at least we must have the power of self-protection.
The well-known "prism door" incident is precisely the Zhao Zhao Ming card.
However, due to the weak foundation, the gap in historical accumulation, and even the lack of attention in the past, China's cybersecurity is still extremely fragile today. From the top-level design of the national strategic level, the industrial layout to the attention of the whole society, it is urgent to strengthen .
During the interviews with government officials, academics and business leaders, we constantly felt an urgent mentality. On such an important issue concerning life and death, China has no room for retreat, and there is no waiting for Yu Yu. Must fight.
If it is helpful to all parties to understand and improve their security capabilities, it is worthwhile to pay more attention.
Xi Jinping: Strive to build China into a network power
The first meeting of the Central Network Security and Informatization Leading Group reviewed and approved the Working Rules of the Central Cyber ​​Security and Informatization Leading Group, the Working Rules of the Central Cyber ​​Security and Informatization Leading Group Office, and the Central Network Security and Informatization Leadership. The group focused on work in 2014 and studied recent work.
In his speech, Xi Jinping pointed out that in today's world, the information technology revolution is changing with each passing day, which has had a profound impact on the development of international politics, economy, culture, society and military. Informatization and economic globalization have promoted each other, and the Internet has been integrated into all aspects of social life, profoundly changing people's production and lifestyle. China is in the midst of this tide and is getting more and more affected. China's Internet and informatization work has achieved remarkable development achievements. The network has entered thousands of households, and the number of Internet users is the highest in the world. China has become a big network country. At the same time, we must also see that we are still relatively backward in terms of independent innovation. The regional and urban-rural differences are more obvious. In particular, the gap between per capita bandwidth and international advanced level is large, and the bottleneck of domestic Internet development is still prominent.
Xi Jinping emphasized that cybersecurity and informatization are all about the whole world of a country. We must recognize the situation and tasks we are facing, fully understand the importance and urgency of doing a good job, and seek for the situation. Take the momentum and follow the trend. Network security and informatization are two wings and two wheels of integration. They must be unified planning, unified deployment, unified promotion, and unified implementation. To do a good job in network security and informatization, we must handle the relationship between security and development, be coordinated, go hand in hand, promote security with development, promote security with development, and strive to build a long-term security and growth and governance industry.
First, Wireless Router
So what is a wireless router?
Wireless router, according to the definition of Baidu Encyclopedia: Wireless router is used for users to access the Internet, with wireless coverage of the router.
A wireless router can be thought of as a repeater that forwards the broadband network signal from the wall of your home through an antenna to nearby wireless network devices (laptops, Wifi-enabled phones, tablets, and all Wifi-enabled devices).
The popular wireless routers in the market generally support four access methods: dedicated xdsl/cable, dynamic xdsl, pptp, and generally can only support 15 to 20 devices online at the same time. It also has some other network management functions, such as dhcp service, nat firewall, mac address filtering, dynamic domain name and so on. The signal range of the general wireless router is 50 meters radius, and the signal range of some wireless routers has reached 300 meters radius.
The name of wireless router can be separated out of two keywords: wireless and routing.
Understand the technical principle behind these two words, you understand the wireless router.
Wireless is also what we often call Wi-Fi. Wireless routers can convert home broadband from wired to wireless signals, and all devices can happily surf the Internet as long as they connect to their own Wi-Fi. In addition, these devices also form a wireless local area network, where local data is exchanged at high speed and is not limited by the bandwidth of home broadband.
For example, many people have smart speakers in their homes that can be used to control various smart appliances. When you say small X small X, turn on the TV, the speaker actually finds the TV through the LAN and sends instructions, and does not need to connect to the Internet; And if you let it broadcast news, you have to get data through the Internet.
The Local Area Network we talked about earlier, also known as the Intranet, is represented by the Local Area Network (LAN) on the router, so the Wi-Fi signal is also called WLAN(Wireless LAN); The Internet we want to access, also known as the extranet, is represented on the router by the WAN(Wide Area Network).
On the Intranet, the IP address of each device is different, which is called a private address. All devices on the Internet share the same public address, which is assigned by broadband operators such as China Telecom Unicom.
The router is the bridge between the Intranet and the external network. The above mentioned IP address translation, packet forwarding, is the router routing function. In other words, the router is the hub of the home network, and the data of all the devices must be forwarded through it to access each other or reach the external network, which means that one husband is the key and ten thousand men are not open, so the comprehensive router is also called "home gateway".
Second, the demand for wireless routers
I do not know if there is a sudden WIFI break when you play games at home, and a stable router is crucial at this time. However, it is important to note that your WIFI frequently dropped may not be a problem with the router, it may also be a problem with the carrier network. (Router means I don't back this pot)
In fact, for most people, there are two basic requirements for wireless routers
Stable and do not drop
Fast Internet and easy setup
Some people will have some advanced needs:
There are some features, USB interface, can be external U disk or hard disk, can achieve simple nas functions, QOS, etc., to advertising and so on
Mesh networking, when the house area is large, multiple routers can be used for Mesh networking
How to choose a wireless router
The wireless router market is in the transition stage from WiFi 5 to WiFi 6, if you want to buy the first choice is definitely WiFi 6 wireless router, which is the future trend.
The speed of WiFi 6 is nearly 40% higher than the previous generation 802.11ac, and the highest connection speed can even reach 9.6Gbps, while the highest speed of 802.11ac is only 6.93Gbp. More importantly, unlike 802.11ac, which only covers the 5GHz band, WiFi 6 covers 2.4GHz and 5GHz. Although the 5GHz band has less interference, it has weak wall penetration ability, and the 2.4GHz band has strong wall penetration ability, which takes into account each other.
So why choose a WIFI6 router?
Compared with the previous generation of 802.11ac WiFi 5, the maximum transmission rate of WiFi 6 in the 5Ghz band has been increased from 3.5Gbps to 9.6Gbps, and the theoretical speed has been increased by nearly 3 times. WiFi 6's 5Ghz single-stream 80Mhz bandwidth can reach theoretical speeds of up to 1201Mbps and 160Mhz bandwidth of up to 2402Mbps.
The band supports 2.4Ghz and 5Ghz.
In terms of modulation mode, WiFi6 supports 1024-QAM, which is higher than the 256-QAM of WiFi 5, and the data capacity is higher. Some high-end WiFi 6 routers support 4096-QAM.
WiFi6 supports MU-MIMO (multi-user multiple-input multiple-output) technology, and supports both upstream and downstream MU-MIMO, with a maximum support of 8T×8R MU-MIMO. The speed is greatly improved. High concurrency, WiFi6 5GHz band, terminal connections up to 128! 5 times that of WiFi5. Effectively solve the Internet needs of multi-person networking and smart home;
WiFi6 adopts OFDMA (orthogonal frequency division multiple access) technology. After using OFDM to parent the channel, the transmission technology of transmitting data is loaded on the subcarrier, allowing different users to share the same channel, allowing more devices to access, with shorter response time and lower delay.
Low latency, WiFi6 time delay can be as low as 10ms, compared to WiFi5 30ms delay, only 1/3. This performance refresh is extremely friendly to game lovers;
If WiFi6 (wireless router) devices need to be certified by the WiFi Alliance, they must use the WPA 3 security protocol, which is more secure.
The WiFi6 wireless router is backward compatible with WiFi5 and WiFi4 terminals.
Fourth, the misunderstanding of purchasing routers
Is the through-wall router really through-wall?
Mistake; The country has strict limits on the transmission power of the wireless router antenna, if you have a lot of rooms in your home, and there are many walls between them, even if you buy an expensive wireless router, you can not do one to cover all the room signals. If the signal is not good, you can consider multiple wireless router Mesh networking.
Does a wireless router have a stronger signal with more antennas?
More antennas just to match the X*X MIMO mode, the more antennas, the more channels, can only ensure that the network is more stable, the impact on the signal is little, the strength of the signal is only related to the wireless transmission power. The wireless transmission power of the country has a standard.
Wifi 5 Wireless Router,5Gz Wifi Router,Wi-Fi Routers For The Home,Lte Modem Router
Shenzhen MovingComm Technology Co., Ltd. , https://www.szmovingcomm.com