{"id":4182,"date":"2022-01-07T11:08:07","date_gmt":"2022-01-07T03:08:07","guid":{"rendered":"https:\/\/sites.gtiit.edu.cn\/it\/?page_id=4182"},"modified":"2022-01-07T11:08:08","modified_gmt":"2022-01-07T03:08:08","slug":"cryptocurrency-mining-risks-and-gtiit-policy","status":"publish","type":"page","link":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/home\/cybersecurity-and-it-policies\/cryptocurrency-mining-risks-and-gtiit-policy\/","title":{"rendered":"\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\u98ce\u9669\u4e0e\u5b66\u6821\u7ba1\u7406\u5236\u5ea6"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4182\" class=\"elementor elementor-4182\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e8befa elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e8befa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62e4419\" data-id=\"62e4419\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c26cc7 elementor-widget elementor-widget-heading\" data-id=\"5c26cc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\u98ce\u9669\u53ca\u5b66\u6821\u7ba1\u7406\u5236\u5ea6<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f26838e elementor-widget elementor-widget-text-editor\" data-id=\"f26838e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<blockquote><p>\u6839\u636e\u56fd\u5bb6\u591a\u4e2a\u90e8\u59d4\u53d1\u5e03\u7684\u76f8\u5173\u6587\u4ef6\uff0c\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\u6d3b\u52a8\u53ca\u865a\u62df\u8d27\u5e01\u76f8\u5173\u4e1a\u52a1\u6d3b\u52a8\u5747\u5c5e\u4e8e\u8fdd\u6cd5\u91d1\u878d\u884c\u4e3a\uff0c\u5305\u62ec\u4efb\u4f55\u4f7f\u7528\u5b66\u6821\u63d0\u4f9b\u7684\u6216\u79c1\u4eba\u8ba1\u7b97\u673a\u8bbe\u5907\u63a5\u5165\u5b66\u6821\u7535\u529b\u6216\u6821\u56ed\u7f51\u7edc\u8fd0\u884c\u76f8\u5173\u8ba1\u7b97\u673a\u7a0b\u5e8f\u3002<\/p><p><strong>\u4ec0\u4e48\u662f\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\uff1f<\/strong><\/p><p>\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\u662f\u4f7f\u7528\u8ba1\u7b97\u673a\u4e3a\u865a\u62df\u8d27\u5e01\u7f51\u7edc\u8fd0\u884c\u590d\u6742\u7684\u6570\u5b66\u89e3\u9898\u7a0b\u5e8f\uff0c\u4ece\u800c\u6210\u4e3a\u77ff\u5de5\u5e76\u83b7\u5f97\u865a\u62df\u8d27\u5e01\uff08\u6bd4\u7279\u5e01\u7b49\uff09\u4f5c\u4e3a\u5956\u52b1\u3002\u6b64\u8fc7\u7a0b\u6781\u5176\u8017\u8d39\u7535\u80fd\u3002<\/p><p><strong>\u56fd\u5bb6\u4e25\u683c\u7981\u6b62\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d<\/strong><\/p><p>\u6839\u636e\u8fd1\u671f\u5404\u90e8\u59d4\u53d1\u5e03\u7684\u76f8\u5173\u6587\u4ef6\u53ca\u7701\u6559\u80b2\u5385\u7684\u5de5\u4f5c\u90e8\u7f72\uff0c\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\u662f\u4e00\u4e2a\u201c\u6781\u5176\u6709\u5bb3\u201d\u7684\u884c\u4e1a\uff0c\u5371\u53ca\u6211\u56fd\u5b9e\u73b0\u78b3\u4e2d\u548c\u7684\u53d1\u5c55\u76ee\u6807\uff0c\u4e25\u683c\u7981\u6b62\u6559\u80b2\u7cfb\u7edf\u5185\u51fa\u73b0\u4f7f\u7528\u516c\u5171\u8d44\u6e90\uff08\u53f0\u5f0f\u7535\u8111\u3001\u7b14\u8bb0\u672c\u7535\u8111\u3001\u5b9e\u9a8c\u5ba4\u5de5\u4f5c\u7ad9\u3001\u79d1\u7814\u670d\u52a1\u5668\u3001\u6559\u5b66\u670d\u52a1\u5668\u3001\u6821\u56ed\u7f51\u3001\u5b66\u6821\u7535\u529b\u7b49\uff09\u8fdb\u884c\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\u7684\u884c\u4e3a\uff0c\u786e\u4fdd\u5b9e\u73b0\u6559\u80b2\u7cfb\u7edf\u201c\u6316\u77ff\u201d\u6e05\u96f6\u76ee\u6807\u3002<\/p><p><strong>\u60e9\u6cbb\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\u884c\u4e3a<\/strong><\/p><p>\u5b66\u6821\u5bf9\u4e8e\u201c\u6316\u77ff\u201d\u6d3b\u52a8\u91c7\u53d6\u96f6\u5bb9\u5fcd\uff0c\u53d1\u73b0\u4e00\u8d77\uff0c\u5904\u7406\u4e00\u8d77\u3002\u6839\u636e\u76f8\u5173\u89c4\u5b9a\u7ed9\u4ee5\u8d23\u4efb\u4eba\u7eaa\u5f8b\u5904\u5206\uff0c\u5305\u62ec\u4f46\u4e0d\u9650\u4e8e\uff1a\u53d6\u6d88\u5b66\u6821\u8d44\u6e90\uff08\u573a\u5730\u3001\u7535\u529b\u3001\u8bbe\u5907\u8bbe\u65bd\u7b49\uff09\u4f7f\u7528\u4ec5\u9650\u3001\u5904\u4ee5\u7f5a\u6b3e\u3001\u4e0e\u4e3b\u7ba1\u9886\u5bfc\u8c08\u8bdd\u3002<\/p><p><strong>\u4fdd\u62a4\u5b66\u6821\uff0c\u4fdd\u62a4\u81ea\u5df1<\/strong><\/p><p>\u5982\u679c\u60a8\u53d1\u73b0\u7591\u4f3c\u4f7f\u7528\u5b66\u6821\u8d44\u6e90\u8fdb\u884c\u865a\u62df\u8d27\u5e01\u201c\u6316\u77ff\u201d\u7684\u6d3b\u52a8\uff0c\u8bf7\u7acb\u5373\u62a5\u544a\u7591\u4f3c\u5b89\u5168\u4e8b\u4ef6\u3002<\/p><p>\u4e3a\u4fdd\u62a4\u60a8\u7684\u7535\u8111\u7cfb\u7edf\u514d\u53d7\u201c\u6316\u77ff\u201d\u75c5\u6bd2\u5165\u4fb5\uff0c\u8bf7\u53ca\u65f6\u66f4\u65b0\u8f6f\u4ef6\u548c\u7a0b\u5e8f\u7248\u672c\uff0c\u4e0d\u8981\u70b9\u51fb\u7535\u5b50\u90ae\u4ef6\u4e2d\u7684\u53ef\u7591\u94fe\u63a5\uff0c\u4e0d\u8981\u6253\u5f00\u672a\u77e5\u5171\u4eab\u6587\u6863\u6216\u9644\u4ef6\u3002<\/p><p style=\"text-align: left;\">\u66f4\u591a\u4fe1\u606f\uff0c\u8bf7\u53c2\u9605 <a href=\"https:\/\/sites.gtiit.edu.cn\/it\/zh\/home\/cybersecurity-and-it-policies\/it-policies-and-guidelines\/\">\u6559\u80b2\u4fe1\u606f\u5316\u7ba1\u7406\u5236\u5ea6\u4e0e\u76f8\u5173\u6cd5\u89c4<\/a>.<\/p><\/blockquote>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e2a936 elementor-widget elementor-widget-text-editor\" data-id=\"5e2a936\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t \t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bab93d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4bab93d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a419433\" data-id=\"a419433\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyrptocurrency mining risks and GTIIT policy According to recently published government pronouncements, cryptocurrency mining and cryptocurrency-connected business are illegal financial activities in China. This includes the use of GTIIT or personally owned systems using university electrical or campus networking resources, as well as the use of GTIIT computer equipment. What is Cryptocurrency Mining? Cryptocurrency mining [&hellip;]<\/p>","protected":false},"author":2,"featured_media":4186,"parent":549,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages\/4182"}],"collection":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/comments?post=4182"}],"version-history":[{"count":3,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages\/4182\/revisions"}],"predecessor-version":[{"id":4187,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages\/4182\/revisions\/4187"}],"up":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages\/549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/media\/4186"}],"wp:attachment":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/media?parent=4182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}