Breaking‼️
美東時間1月5日傍晚,川普以國家安全為由,用行政命令方式禁止阿里支付寶、微信支付、QQ錢包在內的8款中國應用程式(App)。
行政命令發佈後45天,禁止任何人與實體與這8款中國應用程式(App)進行交易。
按照日程,美國下任政府將在15天後,1月20日上任。
—
美國商務部長在同一時間發聲明表示,已指示商務部按行政命令執行禁令,「支持川普總統保護美國人民隱私與安全,免於受到中國共產黨的威脅。」
—
▫️8款App:
支付寶(Alipay)、掃描全能王(CamScanner)、QQ錢包(QQ Wallet)、茄子快傳(SHAREit)、騰訊QQ(Tencent QQ)、阿里巴巴旗下海外短視頻應用VMate、微信支付(WeChat Pay)和辦公型App WPS Office。
圖三:美國商務部聲明
圖四:美國國安顧問聲明
—
▫️白宮行政命令全文:
The White House
Office of the Press Secretary
FOR IMMEDIATE RELEASE
January 5, 2021
EXECUTIVE ORDER
- - - - - - -
ADDRESSING THE THREAT POSED BY APPLICATIONS AND OTHER SOFTWARE DEVELOPED OR CONTROLLED BY CHINESE COMPANIES
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that additional steps must be taken to deal with the national emergency with respect to the information and communications technology and services supply chain declared in Executive Order 13873 of May 15, 2019 (Securing the Information and Communications Technology and Services Supply Chain). Specifically, the pace and pervasiveness of the spread in the United States of certain connected mobile and desktop applications and other software developed or controlled by persons in the People's Republic of China, to include Hong Kong and Macau (China), continue to threaten the national security, foreign policy, and economy of the United States. At this time, action must be taken to address the threat posed by these Chinese connected software applications.
By accessing personal electronic devices such as smartphones, tablets, and computers, Chinese connected software applications can access and capture vast swaths of information from users, including sensitive personally identifiable information and private information. This data collection threatens to provide the Government of the People's Republic of China (PRC) and the Chinese Communist Party (CCP) with access to Americans' personal and proprietary information -- which would permit China to track the locations of Federal employees and contractors, and build dossiers of personal information.
The continuing activity of the PRC and the CCP to steal or otherwise obtain United States persons' data makes clear that there is an intent to use bulk data collection to advance China's economic and national security agenda. For example, the 2014 cyber intrusions of the Office of Personnel Management of security clearance records of more than 21 million people were orchestrated by Chinese agents. In 2015, a Chinese hacking group breached the United States health insurance company Anthem, affecting more than 78 million Americans. And the Department of Justice indicted members of the Chinese military for the 2017 Equifax cyber intrusion that compromised the personal information of almost half of all Americans.
In light of these risks, many executive departments and agencies (agencies) have prohibited the use of Chinese connected software applications and other dangerous software on Federal Government computers and mobile phones. These prohibitions, however, are not enough given the nature of the threat from Chinese connected software applications. In fact, the Government of India has banned the use of more than 200 Chinese connected software applications throughout the country; in a statement, India's Ministry of Electronics and Information Technology asserted that the applications were "stealing and surreptitiously transmitting users' data in an unauthorized manner to servers which have locations outside India."
The United States has assessed that a number of Chinese connected software applications automatically capture vast swaths of information from millions of users in the United States, including sensitive personally identifiable information and private information, which would allow the PRC and CCP access to Americans' personal and proprietary information.
The United States must take aggressive action against those who develop or control Chinese connected software applications to protect our national security.
Accordingly, I hereby order:
Section 1. (a) The following actions shall be prohibited beginning 45 days after the date of this order, to the extent permitted under applicable law: any transaction by any person, or with respect to any property, subject to the jurisdiction of the United States, with persons that develop or control the following Chinese connected software applications, or with their subsidiaries, as those transactions and persons are identified by the Secretary of Commerce (Secretary) under subsection (e) of this section: Alipay, CamScanner, QQ Wallet, SHAREit, Tencent QQ, VMate, WeChat Pay, and WPS Office.
(b) The Secretary is directed to continue to evaluate Chinese connected software applications that may pose an unacceptable risk to the national security, foreign policy, or economy of the United States, and to take appropriate action in accordance with Executive Order 13873.
(c) Not later than 45 days after the date of this order, the Secretary, in consultation with the Attorney General and the Director of National Intelligence, shall provide a report to the Assistant to the President for National Security Affairs with recommendations to prevent the sale or transfer of United States user data to, or access of such data by, foreign adversaries, including through the establishment of regulations and policies to identify, control, and license the export of such data.
(d) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted before the date of this order.
(e) Not earlier than 45 days after the date of this order, the Secretary shall identify the transactions and persons that develop or control the Chinese connected software applications subject to subsection (a) of this section.
Sec. 2. (a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate the prohibition set forth in this order is prohibited.
(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.
Sec. 3. For the purposes of this order:
(a) the term "connected software application" means software, a software program, or group of software programs, designed to be used by an end user on an end-point computing device and designed to collect, process, or transmit data via the Internet as an integral part of its functionality.
(b) the term "entity" means a government or instrumentality of such government, partnership, association, trust, joint venture, corporation, group, subgroup, or other organization, including an international organization;
(c) the term "person" means an individual or entity;
(d) the term "personally identifiable information" (PII) is information that, when used alone or with other relevant data, can identify an individual. PII may contain direct identifiers (e.g., passport information) that can identify a person uniquely, or quasi-identifiers (e.g., race) that can be combined with other quasi-identifiers (e.g., date of birth) to successfully recognize an individual.
(e) the term "United States person" means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec. 4. (a) The Secretary, in consultation with the Secretary of the Treasury and the Attorney General, is hereby authorized to take such actions, including adopting rules and regulations, and to employ all powers granted to me by IEEPA, as may be necessary to implement this order. All agencies shall take all appropriate measures within their authority to implement this order.
(b) The heads of agencies shall provide, in their discretion and to the extent permitted by law, such resources, information, and assistance to the Department of Commerce as required to implement this order, including the assignment of staff to the Department of Commerce to perform the duties described in this order.
Sec. 5. Severability. If any provision of this order, or the application of any provision to any person or circumstance, is held to be invalid, the remainder of this order and the application of its other provisions to any other persons or circumstances shall not be affected thereby.
Sec. 6. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:
(i) the authority granted by law to an executive department, agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
DONALD J. TRUMP
THE WHITE HOUSE,
January 5, 2021.
同時也有2部Youtube影片,追蹤數超過25萬的網紅iT24Hrs,也在其Youtube影片中提到,www.it24hrs.com สัมภาษณ์พิเศษ Prof.Edward Humphreys กูรูระดับโลกด้านความมั่นคงปลอดภัยข้อมูลสารสนเทศ (Information Security) และบิดาแห่งมาตรฐาน ISMS เรื...
「cyber security risk」的推薦目錄:
- 關於cyber security risk 在 唐家婕 - Jane Tang Facebook 的最佳解答
- 關於cyber security risk 在 英語島雜誌 English Island Facebook 的精選貼文
- 關於cyber security risk 在 說說能源 Talk That Energy Facebook 的最佳解答
- 關於cyber security risk 在 iT24Hrs Youtube 的最佳貼文
- 關於cyber security risk 在 iT24Hrs Youtube 的最佳解答
- 關於cyber security risk 在 Top 7 cyber security risks [ And how to overcome them ] 的評價
cyber security risk 在 英語島雜誌 English Island Facebook 的精選貼文
【忘記密碼?】
國外網站統計,38% 的人每隔幾個月重設密碼就又忘了。
另外,根據資安驗證網 Have I Been Pwned(HIBP)和英國資安中心 National Cyber Security Centre (NCSC) 公布的「全球最危險密碼清單」(Global Passwords Risk List)。
至今「123456」依舊蟬聯全球最常被當做密碼的數字串。
《英語島本週精選》
你也用菜市場名當密碼嗎?
https://bit.ly/2UQgL34
我的密碼要如何增強?
https://bit.ly/2ULEhOI
明天愚人節,怎麼可以少了meme
https://bit.ly/2wFJFLt
泰國人「吵架也要笑」?
https://bit.ly/2WXvNqG
除了thank you和please,英文還可以怎樣有禮貌?
https://bit.ly/2WRLf7D
英語島 2020 4月號 issue77
《看不到=/=不重要:密碼》
熱賣中 https://www.eisland.com.tw/P1.php?stat=Header
cyber security risk 在 說說能源 Talk That Energy Facebook 的最佳解答
#新加坡辣妹更嗆辣
新加坡總理夫人,何晶於上周發表新加坡應該發展核電的言論,她非常了解新加坡在減緩溫室氣體上的不足,以及新加坡在發展核電上的潛力,畢竟新加坡的主要能源為天然氣,且未來冷凍空調需求會持續成長。而她也同時知道福島事故的發生原因,認為要從檢討實務面以科技來改善缺陷...不過從她的學術以及實務背景來看(新加坡工程名譽院士),好像也不會太意外有這樣的言論出現,根本新加坡辣妹一個。
當然新加坡短期內可能還沒有核電廠建置的計畫,2012年的評估結果為不適合,但是相關的研究仍在進行中,2014年起投入了相當多的研究能量於核電技術研發。
▌何晶小檔案
新加坡國立大學 電機工程學碩士
美國史丹佛大學電子科學碩士
新加坡工程學會(Institution of Engineers, Singapore)名譽院士
2007《富比士》世界百名權威女性排行榜中,列位第三,連續三年前10名
SG decided in the early days, no more coal fired power plants bcos of the pollution they bring.
And we switched to gas as soon as it was available, bcos it is less pollutive.
In terms of carbon dioxide emission, coal, oil and gas would be similar.
But in terms of air pollution and various particulates from the fuel composition, gas is the cleanest.
We also considered nuclear.
Pioneers like Dr Tay Eng Soon were attached to the UK Atomic Energy Agency for training.
But singov then decided it was too risky since we have just this one small SG island. And so the team was disbanded.
Dr Tay Eng Soon went on to teach in the university, and later founded the Defence Science Organisation for Mindef, before ending as a politician who transformed vocational training for SG.
But the current generation of nuclear power generation is much safer than the 1st generation of nuclear power plants like the Fukushima plant.
Fukushima relies on active power source to maintain the cooling - lose that power source and there will be a serious meltdown risk.
Current generation designs are based on a fail safe approach. When power fails, the system remains safe.
This is similar to another concept called fail soft approach. In a fail soft approach, the system continues to be operational in a degraded mode, which gives time for corrective action.
With almost all Asean countries wanting to have nuclear power plants at some foreseeable future, it is important that Asean begins to do research especially on safety and security aspects well beforehand to build up professional and scientific capability and capacity to handle nuclear plants well.
An example of emerging security risks would be the cyber risks of an external agency taking over and messing a power plant via software and remote entry.
Newer nuclear options are on the horizon, not eminent, but within decades.
Overall, for a greener earth and to reduce carbon emissions, we must master and adopt nuclear energy as a key solution.
For now, it is better than developed and more capable nations step up their nuclear power capacity.
This will reduce the demand for fossil fuels, and lower the overall carbon emissions.
At the same time, developing economies can do their part to switch away from coal to cleaner gas or greener renewables.
cyber security risk 在 iT24Hrs Youtube 的最佳貼文
www.it24hrs.com
สัมภาษณ์พิเศษ Prof.Edward Humphreys กูรูระดับโลกด้านความมั่นคงปลอดภัยข้อมูลสารสนเทศ (Information Security) และบิดาแห่งมาตรฐาน ISMS
เรื่องการใช้ mobile phone, smartphone, tablet อย่างไรให้ปลอดภัย, แนวโน้มของความมั่นคงปลอดภัยข้อมูลสารสนเทศ และภัยต่างๆบนโลก cyber
cyber security risk 在 iT24Hrs Youtube 的最佳解答
www.it24hrs.com
สัมภาษณ์พิเศษ Prof.Edward Humphreys กูรูระดับโลกด้านความมั่นคงปลอดภัยข้อมูลสารสนเทศ (Information Security) และบิดาแห่งมาตรฐาน ISMS
เรื่องความสำคัญของความมั่นคงปลอดภัยข้อมูลสารสนเทศ และภัยต่างๆบนโลก cyber , มาตรฐาน ISO/IEC 27001 (ISMS)
cyber security risk 在 Top 7 cyber security risks [ And how to overcome them ] 的美食出口停車場
Watch this webinar to learn about cyber security risks and how to prepare and protect your organisation. It covers: • The top seven cyber ... ... <看更多>