The cyber war was called the Fifth field War by the British economist magazine.

Source: Internet
Author: User
Keywords Cyber war long ago attacked
Tags aircraft broke out client computer control control system cost development

The cyber war was called the "War of the Five Realms" by the British economist, the Land, the sea, the sky and the space. The development of network technology makes the means of cyber warfare become more and more diverse.

If you are brushing your microblog in the early hours of August 25, you will find it impossible to log in to the client. In fact, at that moment, ". CN "domain name of many sites can not log in. The China Internet Network Information Center (CNNIC) later confirmed the situation on its official microblog.

According to Cnnic's explanation, the day 0 o'clock in the morning, the state domain name resolution node was denied service attack by the center disposal, to 2 o'clock allow the server back to normal. But 4 o'clock in the morning, the national domain resolution node was the largest ever denial of service attack. Subsequently, the Ministry of work started the "Domain Name System security Transformation Contingency plan", the country's domain name resolution service gradually restored.

In fact, most computers around the world are now connected by an unprecedented network of internet, which makes the earth smaller and makes life easier. But what cannot be neglected is that the cyber war that has been born out of the concept phase is far more alarming than we think.

Low cost attack, high cost maintenance

The tentacles of cyber warfare have penetrated into our lives, but on the surface there seems to be no real impact.

In recent years, a blue logo of the wall software has swept across the north and south, users with this software can be free to "smell the flowers outside the wall." But most users do not know is that, whenever it has been on the domestic and foreign websites, keyboard typing account, password, and related information, are inadvertently automatically sent out packets.

The cost of cyber attacks, like many of the most vexing criminal devices, is low, but the defense costs of the attackers are very high. Like the walls of ancient times, guarding the city side to catch the Coolie, under the cost, time-consuming construction of defensive walls, and the siege only to conquer a breach, it may let the other party rout.

The network's "body" is relatively fragile, such as the server, database, switch, application system, even routers and so on may have loopholes, to continue to maintain, which will cost a lot of human and capital costs.

Hackers only need to find one of these vulnerabilities, it may be successful implementation of the attack, theft of user information, the implantation of Trojans and false information.

Today, the severity of the Trojan horse is not a minor stage, some Trojans can be stolen after the attack on the computer all the information, automatically start the grid processing, so that the attackers lost all information.

CNNIC is responsible for the management. CN developed our own network domain name, the biggest goal is to protect the network security. The world currently has 13 root servers, the United States has 10 units, Britain, Sweden and Japan have one.

These 13 root servers can command Web browsers and e-mail programs such as Firefox or InternetExplorer to control Internet traffic.

Once the cyber war broke out, the country with the root server could shut down the relevant servers, and the users in our country could no longer have websites with the suffix. com,. NET, etc. In addition, these countries can also control the suffix of the. com Web site, jump to their set up in advance of the page, may be the Trojan download the trigger page, it may be confusing people false information.

The description in the book is less powerful than reality.

Cyber war, the British "economist" magazine called Land, Sea, sky, space after the "five areas of war."

Richard, a former White House expert on counterterrorism and cyber security, once had a book on cyber warfare, in which he sketched a picture of cyber warfare: "After a full-blown cyber war, the military's e-mail system could be paralyzed in 15 minutes, and oil and gas pipelines would explode, Air traffic control systems will collapse, trains and urban rail traffic will be derailed, the financial system's database will be a mess, the eastern United States power grid will be completely paralyzed, space satellites will derail runaway, food supply disruption, money shortage, the whole society will be chaos. And the worst part is, you never know where the assailant is.

The description in the book is far less powerful than the reality.

According to relevant facts disclosed, as early as 1982, the Soviet Union in Siberia, a gas pipeline exploded, initially they believed that their spy from the Canadian company stolen computer control system failed. The real reason is that the CIA tampered with the software of the control system, leading to the accident.

With the development of network technology, the means of cyber warfare have been diversified. In the 2001 shock of the world, terrorists used the technology known as information hiding, through the network to achieve the covert transmission of terrorist information, the plot of information and intelligence to send pictures successfully.

This technology is to use the redundancy of the carrier information, encrypt the information need to be hidden in the ordinary information, just like the Spy War movie "Wind" in the transmission contains the secret information of the object, with strong concealment and security. Nowadays, many drug traffickers and other criminal gangs often use this technology, which is very dangerous.

Who's Building the "Matrix"?

In late January this year, the American Cyber Command, known as the "cyber-attack against hostile nations and hackers", was expanded from about 900 people to 4900.

It is noteworthy that the expansion plan led to the command's 3 units, which are "national Mission forces", in charge of critical power grids, power plants and other infrastructure systems, and "combat mission forces" to assist in directing overseas projects, performing attacks or other offensive tasks; "Network protection Forces", Protect the Defense Department's own network.

You know, Cyberspace command, a team of world-class computer experts and "hackers", was dubbed "140" by the media because the average IQ of all members was above 140 points.

In March this year, Admiral Alexander, the commander of the U.S. Cyber Space Command, announced plans to set up 40 cyber warfare forces in the United States Congress to undertake cyber attacks on a global scale. Now, the size of the US cyber Army may be growing. Data show that the U.S. military now has more than 100,000 network forces, and is a combination of soldiers and civilians.

Such a huge modern network of troops, once the focus of "firepower" to launch attacks, no country can afford. Therefore, also some netizens jokingly, the United States Network Army has been to the "hacker Empire" development.

The army is not only the scale of the network, its modern warfare equipment has already been to the network development. The Libyan war, which took place in 2011, was representative.

At that time, the United States deployed reconnaissance aircraft EP-3, reconnaissance aircraft RC-135, as well as the so-called "compass call" electronic warfare aircraft EC-130, these combat fleets have network interference capability. They can be wirelessly used to implant a virus or other control program into a Libyan air defense system, causing its command system and fire cells to lose their usefulness. Then, when the U.S. aircraft flew over Libya, all of Libya's anti-aircraft missiles can not react.

Visible, in the network such a new combat space, the United States is under great efforts to strive for advantage. Data show that the U.S. network has developed more than 2000 kinds of computer virus weapons. The reason is that in the United States, whether it is social or military, the network is highly dependent.

In addition, once the network war broke out, Trojan programs, computer viruses, logic bombs, etc. are the United States Cyber Army's most important means of attack. Military viruses, Trojans compared to ordinary similar procedures, in the destructive power and the difficulty of prevention have increased a lot, and transmission means more diverse. The use of special tool software logic bombs, in a short period of time to send a lot of junk information to the target to cause its system crashes or denial of service.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.