Reviewer observation | Copy network threats, good calculations can win
Author:Guangzhou Daily Time:2022.09.02
Strange viruses, malware, online fishing attacks ... Science and technology headlines are full of stories of various cyber threats every day. At the same time, there are more and more new tricks, some boldness, and some of them. Economic has a significant impact. ("Science and Technology Daily" on September 1)
At present, the new generation of information technology has injecting a strong motivation for economic and social development. At the same time, the development of Internet technology has also brought many new challenges to the security and development of countries around the world. For example, in 2021, data ransom, as a type of Trojan virus, has become the protagonist of global cyber attacks, bringing a major harm such as confidential data leakage and social system paralysis to many countries. It disguised as ordinary application software, program updates, or email with files and links, and was implanted into the computer system by hackers. The victim's data assets or computing resources cannot be used, and hackers take this opportunity to extort the ransom from the victim. According to media analysis, in the past ten years, the threat of ransomware has increased significantly, and it will continue to show a rise in 2022.
"Sun Tzu's Art of War" has a cloud, and it is unpredictable. The so -called "calculation", one finger calculation, two fingers calculation and preparation. Especially in the information age, in order to fully cope with network threats, it is necessary to systematically calculate and look forward to. However, the asymmetric of cyber attacks and defense makes the situation of the game between the offensive and defensive parties changing rapidly, and "knowing the confidant" becomes more difficult. Therefore, the soldiers are not constant, and the water is not constant -we must be good at changing the situation of offense and defense, form a dynamic security defense system, and create conditions for winning the victory. For example, we must strengthen the perception of network security, rely on big data technology to accurately identify the exceptions of network activities, comprehensively evaluate, early warning network security situation, and give targeted measures.
Internet attacks often choose the weakest breakthrough. Therefore, on the one hand, preparations should be strengthened to cope with the threat of the network. As the so -called "army without the death of the army" is not fully understood by the complexity of the threat of the defense network, it is impossible to coordinate the relationship between reality preparation and long -term construction, focusing on preparation and comprehensive development. On the other hand, it is necessary to strengthen the collaboration between cross -departments, cross -regions, across industries, and enterprises, and make full preparations in terms of system improvement of the basic, completeness, and balance of defense.
In addition, response to network threats urgently need to strengthen cooperation. At present, network security is facing global challenges. No one can be alone, and it is urgent to strengthen emergency response collaboration. For example, strengthen the sharing and utilization of network security threat information, build a security defense line for key information infrastructure, and jointly maintain a secure and clear network space.
Text/Guangzhou Daily commentator Yang Bo
Figure/Guangzhou Daily · Xinhua City reporter Mo Weiyan
Guangzhou Daily · Xinhua City editor Hu Jun
- END -
Pu Xian's eight grandfather, Yangye ... What kind of animals?
Putian dialect Twelve animals called the reason for writing methodsPutian people h...
Can you get out of the homogeneous strange circle by relying on a explosion? SKG
Health, massage, two words that seem to be unrelated to young people, but because ...