In an operation codenamed "qualified receiver" by a Western country, 35 "hackers" were hired to launch "attacks" on important preset networks to test the security performance of the system. Among more than 40 thousand highly-guarded network targets, "hackers" use various means to "attack" and eventually 36 points are attacked. The planners of this operation said: "Only by attacking yourself more can you discover and make up for your own defects and security risks ."
The diversity of network connections and the extensive distribution of terminals make the network vulnerable to hacker and spyware attacks, or computer viruses, or suffering from hardware "backdoors", software "vulnerabilities", and other damages, resulting in immeasurable loss to information security. While providing fast and efficient information transmission, the network also brings many security risks. As some experts have said, strengthening information security research may be more important than network construction.
Attack and Defense are symbiotic entities that cannot be ignored in any aspect. Do not forget the yundun.
At present, our army's informatization construction is in full swing, and network security is a matter that every organization must pay great attention. However, some organizations do not pay enough attention to existing security risks because they develop many positive functions of the network. Some organizations report a lot of achievements and have few questions when reporting network construction. For example, they only talk about how many organizational units have achieved network express access, to what extent have we achieved online office and automated system upgrades, how many online deductions, electronic confrontation, and so on? However, we have never mentioned the information security problems in network construction.
There is no moisture in these achievements. This kind of tendency should at least explain three problems: first, the leaders of some organizations only see the advantages of informatization, turn a blind eye to the weak links, and lack the awareness of network security; second, there is no or few experience of network attacks, and they do not know the pain points of network attacks. Third, they re-use light management and believe that network information security is purely a technical problem, it is a matter for technicians and has little to do with yourself.
To some extent, the future war is an information game. while increasing the "rigidity" of the network attack sword, don't forget a famous saying "your opponent is the best teacher ". We might as well learn how to attack ourselves. Only by attacking yourself frequently can we discover and make up for defects and vulnerabilities from them, so as to build a more robust network "firewall", improve the ability to defend against attacks and combat attacks, and safeguard information security.