Hackers in various countries to uncover technical means of various difficult to prevent

Source: Internet
Author: User
Tags firewall

For some time, Western tabloid newspapers have been bad at the so-called Chinese hackers, but their own hacker forces are not talking about. In fact, for the western countries that rely heavily on informatization and networked equipment, most of them have a very professional "hacker force". Not only that, some countries that are considered extremely backward also have their own "cyber army", these hackers advanced technology, means diverse, people can not help.

There are hacker forces in the west.

To say "hacker force" is the largest, the first to establish the United States. 2005, the U.S. military has formed a special responsibility for network warfare "Network warfare joint function of the command", and the United States and land and sea Air Force and Strategic Command have "network Army", network forces as a new type of force, has been formally incorporated into the U.S. military combat sequence. America's "little brother" in Europe is also actively emulating the UK. According to reports, British military six in 2001 secretly formed a hundreds of computer elite of the hacker force. The army's selection criteria are eclectic, and even some of the civil hackers have been a criminal record has been incorporated. In addition to Europe and the United States, the information technology is very advanced Japan also attaches great importance to the construction of hacker forces. Japan's defense province has now formed a military computer experts of about 5000 of the network Warfare Force, specializing in network system attack and defense. The force's main task is to conduct anti-hacking, anti-virus attacks, while developing the development of other countries can destroy the network system of transnational "cyber weapons", if necessary, to the enemy important network implementation of "paralysis."

In addition to the active construction of network forces in developed countries, some developing countries are flocking to try to gain "asymmetric" advantages in a new round of competition. At present, the Indian Army formed a joint computer emergency unit, and some folk "hackers" and programming master "amnesty". In addition, the Indian Army has established cyber security units at its army headquarters in New Delhi and will establish cyber-security divisions in all military regions and the headquarters of key military units. In addition, Russia, Israel and other countries also attaches great importance to the "hacker force", but for more countries, the role of hackers is a number of so-called responsible for network security professionals, because they are familiar with the "hacker" skills, understand the life of network security where the door.

Technical advanced means and diverse

Hackers often use network vulnerabilities to implement attacks, their usual means of attack mainly include "backdoor program", "Bomb attack", "Zombie network" and so on. When a well-trained programmer designs a software with more complex functions, it is used to dividing the whole software into several modules, then designing and debugging the modules separately, and the backdoor is the secret entrance of a module. After the software was developed, some of the back doors were still not "turned off", so the backdoor could be discovered and exploited by hackers using special software and tools. Through the back door, hackers can hack into the computer without the other person's awareness and steal valuable information. The basic principle of "bomb attack" is to use special tool software to send a large amount of information or rubbish information which exceeds the receiving range of the system in a short time, the aim is to make the other target machine overload, network jam and so on, which causes the system crash of the target and the denial of service. and "botnet" refers to hackers through the Trojan Horse and other viruses to control a group of computers, used to other networks, servers or computers to launch large-scale network attacks, while hackers control the information stored in these computers can also be hackers arbitrarily "access."

In addition, some hackers often use a "wide net" tactic to deal with military networks and computers that are physically separated from the Internet. They spread some Trojan virus to a specific network, if the enemy's mobile storage equipment unfortunately poisoned, then once the storage device is connected to the military computer or network, Trojan virus began to wildly replicate, download secret information, and hide it in mobile storage devices. Once the mobile memory is again connected to the Internet-linked computer, the confidential information is automatically forwarded to the hacker force via the Internet. It is said that in the previous period of the Japanese "Zeus Shield" data leakage incident, the storage "Aegis" confidential information of the hard disk link to the Internet, is the first time the Japanese network monitors found clues.

Defensive hackers and carrot and stick

To prevent hackers from causing losses to their own networks and computers, the military has been defending both hardware and software against hacker attacks. Hardware firewalls are essential. A firewall is a combination of components set up between different networks. By monitoring, restricting, and changing information across firewalls, as much as possible, externally screened information within the network, selectively accepting external access, and a barrier between protected and external networks to prevent unpredictable and destructive intrusions.

In addition to the hardware firewall, some defense, monitoring software is also essential, these software in addition to resisting part of the attack, but also to monitor the network anomalies. Of course, the best defense is offensive, most countries "hacker forces" body dual tasks, paralyzed each other's attack network, blocking the other side of the attack path is the best choice. However, no army can package its own network will not be invaded, so the vast majority of national forces are required high-grade confidential information should not be stored on the Internet computer.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.