How to protect the network security when the server is compromised

Source: Internet
Author: User
Keywords Hackers Sony servers security

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

People often use "science fiction movies too much!" To describe a man who is full of strange ideas. So when someone says, "Watch a lot of hacker movies!" , we know that this person certainly does not believe that there are so many hackers. Movies are often built on real life, and hackers do exist around you and me as they are depicted in movies.

July 16, Toshiba, a well-known semiconductor and electronics manufacturer, announced that its servers in a U.S. subsidiary were hacked, and the company's Web site registered 7,520 customers ' personal information, including 681 customers whose mailboxes and passwords were compromised, and there were no customer credit card information on the server. The irony is that Toshiba was informed that information was leaked when customer information was publicly available on the hacker's website.

In recent years, the news of hacker intrusion is not uncommon. At the beginning of July, the hacker organization "Anonymous" (Anonymous) to "purely entertainment" for the purpose of mercilessly fooled the apple. The most embarrassing thing about being attacked by hackers is Sony, from April to June, Sony suffered a large and small number of hacker attacks 10 times, Sony's web sites such as Sony film, Sony Europe, Sony Greece BMG web site, sony Thailand, Sony Japan Music, Sony Ericsson Canada and so on have become the target of the hacker hit. Industry insiders analyzed the attacks as a retaliation against Sony for prosecuting hacker George Hotz, and some think the hacker community is showing off its ability to invade the servers. Regardless of the hacker's purpose, Sony suffered a succession of cyber attacks because of the lack of stability and security of Sony's system, the ability to protect the poor will be able to take advantage of.

In addition, Tencent earlier this year also encountered hackers, the hacker penetrated the Tencent server through Linux vulnerabilities, saying he just wanted to "evaluate the security of your company, never engage in any malicious intrusion and malicious destruction", and "goodwill" to remind, if the vulnerability is malicious use of others will be a threat to users. Coincidentally, in almost the same period, NetEase also encountered a hacker invasion, the hacker calls itself "Chinese network Red Army", and arrogant left contact. In addition, Baidu last year also encountered an Iranian hacker illegally tampered with domain name resolution, resulting in the user within a few hours of access.

This shows that China's network security situation is not optimistic. The hacker problem is only one of the cyber threats.

Industry insiders point out that internet hackers can be blamed for two reasons: one is external factors. Now hackers are increasingly sophisticated, even if many organizations have strengthened the management of the site, but hackers like termites, as long as there is a place in the wood paint not coated, they can attack through this loophole.

second, internal factors. The server system has many human negligence loophole, lets the hacker have the opportunity. As an e-commerce expert in China Connaught Network nuo.cn that not only is the server will be vulnerable, including corporate Web site code, space, domain name, etc. are hackers attack the target. However, human negligence is sometimes difficult to avoid, and we cannot ensure that every operation is correct and safe. Therefore, as an enterprise, we should find and fix the vulnerabilities in time, update the virus database and update the attacking program in time, adopt the intrusion detection system and establish the network security detection system to strengthen the defensive ability of the website, so as to avoid the data loss, the permission being changed and the data being tampered. In addition, in the information construction, should be from the professional, stability, scalability, security, high configuration and other aspects to choose a service provider.

Network has become the mainstream of this era, with the development of technology, the network is also constantly developing, the application is more and more extensive. Even if the network information security still has many hidden dangers, but we inevitably need to use frequently, therefore only then unceasingly enhances and strengthens the network security Defense measure, can effectively protect the personal and the enterprise privacy information not to be stolen.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.