Attack others to attack themselves first: Talking about War Information Security

Source: Internet
Author: User

In an operation codenamed "qualified receiver" by a Western country, 35 "hackers" were hired to launch "attacks" on important preset networks to test the security performance of the system. Among more than 40 thousand highly-guarded network targets, "hackers" use various means to "attack" and eventually 36 points are attacked. The planners of this operation said: "Only by attacking yourself more can you discover and make up for your own defects and security risks ."
The diversity of network connections and the extensive distribution of terminals make the network vulnerable to hacker and spyware attacks, or computer viruses, or suffering from hardware "backdoors", software "vulnerabilities", and other damages, resulting in immeasurable loss to information security. While providing fast and efficient information transmission, the network also brings many security risks. As some experts have said, strengthening information security research may be more important than network construction.
Attack and Defense are symbiotic entities that cannot be ignored in any aspect. Do not forget the yundun.
At present, our army's informatization construction is in full swing, and network security is a matter that every organization must pay great attention. However, some organizations do not pay enough attention to existing security risks because they develop many positive functions of the network. Some organizations report a lot of achievements and have few questions when reporting network construction. For example, they only talk about how many organizational units have achieved network express access, to what extent have we achieved online office and automated system upgrades, how many online deductions, electronic confrontation, and so on? However, we have never mentioned the information security problems in network construction.
There is no moisture in these achievements. This kind of tendency should at least explain three problems: first, the leaders of some organizations only see the advantages of informatization, turn a blind eye to the weak links, and lack the awareness of network security; second, there is no or few experience of network attacks, and they do not know the pain points of network attacks. Third, they re-use light management and believe that network information security is purely a technical problem, it is a matter for technicians and has little to do with yourself.
To some extent, the future war is an information game. while increasing the "rigidity" of the network attack sword, don't forget a famous saying "your opponent is the best teacher ". We might as well learn how to attack ourselves. Only by attacking yourself frequently can we discover and make up for defects and vulnerabilities from them, so as to build a more robust network "firewall", improve the ability to defend against attacks and combat attacks, and safeguard information security.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.