当前位置:网站首页>South Korea's national network is disconnected. Who launched the network "attack"?
South Korea's national network is disconnected. Who launched the network "attack"?
2022-06-24 02:41:00 【Yunbaba】
Yesterday morning, Beijing time 10 spot 20 branch , South Korea's nationwide sudden large-scale network outage , The duration is close to 40 minute . at that time , Korean communication operators KT( Korea Telecom ) Cable of 、 Wireless networks are unable to connect , Leading to national enterprises 、 The restaurant 、 Ordinary families and so on can not access the Internet .
At first ,KT According to the internal analysis, the server has failed , It may be said that it has been affected by a large area DDoS Distributed denial of service attacks , Cause an uproar . Many Korean netizens said ,“ Unable to access the Internet , No way to talk , I can't even pay by mobile phone , There are long lines in the shops , Even the public telephone booth is full of people ……”
Due to network service interruption , Yonhap news agency 、 The central daily news 、 The new media clients of Korean mainstream news media, including the Korean economy, are unable to access , Even the Internet service providers involved KT The official notice of the government can not be released at the first time .
Then , Yesterday afternoon KT The company officially issued a statement saying , The cause of the network disconnection accident in the morning was found to be “ Setting error ”, Instead of being attacked , But there was no specific explanation of where the setting went wrong .
A sudden network outage is like a novel coronavirus , It only takes a very short time to cause great losses to people . If the network is paralyzed for a long time, it is terrible , Prior to 10 month 4 Japan , American social giant Facebook For a long time 、 Large area network disconnection fault , Lasting up to 7 Hours , Influence about 15 Billion users .
According to the data released by the Ministry of science and technology information and communication of South Korea ,KT Founded on 1981 year , It is the largest network operator in Korea , In the Korean Internet market KT Occupancy rate 47.8%, Occupy the first place , In the mobile communication market KT The occupancy rate is 31.6%, Second place . Such a huge network operator has problems , It is easy to affect the whole country .
Is your network safe ?
The Internet is a double-edged sword , Cloud computing 、 The Internet of things 、 The rise of big data and other technologies has weakened the network security boundary , Security risks and threats are increasing day by day . According to relevant data , since 2017 Since then , The number of data records of global network leakage increases on average every year 224%. only 2021 year 5 Since the month , The record of network data leakage and network attack in the world is as high as 1 More than 100 million .
Facing the network security problems that exist all the time , Many countries have strengthened network information security protection through various technical means , Server is one of the necessary network configuration resources , Its protection is more important .
The current is a critical moment for the digital transformation of enterprises , The core business and competitiveness of the enterprise , Almost all in the form of figures and information , Exists in the server . Once there is a safety accident , The blow to the enterprise may be devastating , The security of the server is related to the security of the company's entire network and all data .
Enterprises want to do a good job of server security , First, we need to take the initiative , Second, passive protection , You can't have one without the other .
1、 Formulate data security management system
For businesses , Develop internal data leakage and other types of security risk agreements , It is necessary for server and data security , This includes assigning different departments and managing personnel accounts 、 Password and other permissions , Update the password regularly to avoid being stolen by hackers , And other feasible measures .
2、 Data backup
Data backup is the lowest cost protection method , This is also the first line of defense against data loss . Data backup in some enterprises , Even in the network administrator is always not enough attention , This is very dangerous .
When the server loses data for some reason , As long as the data has been backed up before , The security and reliability of data can be realized through the system backup and recovery scheme .
3、 Update computer patches regularly
There are two main types of computer patches , Operating system patches and application system patches , Many software and operating systems will produce error vulnerabilities from time to time , These vulnerabilities can be infected by viruses 、 Trojan horse 、 Malicious script 、 Hackers use , So as to affect the safety and smoothness of the network .
4、 Buy safety protection products
In the era of cloud computing with increasingly complex network attacks , You can access the server security protection products , Obtain a more secure and stable network operating environment .
Tencent cloud host security (CWP)
Tencent cloud host security (CWP) It is designed to provide security protection and other services for servers , Based on the massive threat data accumulated by Tencent , Using machine learning to provide users with Trojan files to check and kill 、 Hacker intrusion detection 、 Vulnerability risk warning 、 Safety baseline compliance check 、 Business asset component inventory, etc .
1、 Trojan file killing
Based on Tencent's 10 billion malicious sample resources , Since the research AI Cloud kill 、Webshell and TAV engine , It has obtained the evaluation and certification of international authoritative anti-virus organizations , High efficiency against mining 、 Blackmail and other Trojan viruses .
2、 Hacker intrusion detection
Hacker intrusion detection function based on host security , Including login audit 、 Password cracking 、 Malicious request 、 High risk order 、 Local rights 、 rebound Shell Multi dimensional intrusion detection , It can quickly discover the penetration scanning behavior of hackers on enterprise servers , Timely warning .
3、 Security vulnerability emergency response
Vulnerability detection function based on host security , Host security (CWP) It can help enterprises monitor the impact of new vulnerabilities on enterprises at the first time , At the same time, provide effective repair solutions and safety technical support , Help enterprises solve the problem of vulnerability risk .
4、 Business asset component inventory
Provide automated asset inventory , Unified management host list 、 process 、 port 、 account number 、 Component and other asset fingerprint information , Help visualize enterprise assets .
5、 Compliance check of safety baseline
Provide a variety of baseline standard templates , Including international standards 、 Waiting for the second level of insurance 、 The default baseline strategy of Tencent cloud, such as level III warranty, etc , Enterprises can set their own baseline , Support one click detection , Provide treatment suggestions according to the test results , Meet the regulatory needs of different industries and different scenarios .
边栏推荐
- Offline store + online mall, why do you want to be an online mall
- SAP retail characteristic profile I
- Official spoilers! Figure 1 understand Tencent security @2021 Tencent digital ecology Conference
- What is the large bandwidth of IDC machine room?
- The most comprehensive arrangement of safe operation solutions from various manufacturers
- Case of data recovery by misoperation under NTFS file system
- Simple use of notification
- Visual AI, first!
- C common regular expression collation
- Mutual conversion between qstring and qdatetime
猜你喜欢
随机推荐
Some tips for using uitextview
Opengl: how to use shader to convert RGBA to nv21 image format? (open source for the first time in the whole network)
Case of data recovery by misoperation under NTFS file system
How many graphics cards are required for cloud game servers? What should be paid attention to when purchasing servers
VNC enters the password and goes around for a long time before entering the desktop. Use procmon to locate the reason
Simple use of notification
How to protect your code - ollvm (1)
What is data matrix code
Precautions for VPN client on Tencent cloud
How to change the cloud desktop domain server password if you forget it?
What is the large bandwidth of IDC machine room?
[Tencent cloud load balancing CLB] cross region binding 2.0 (new version) idc-ip best practices!
IPhone sending SMS implementation
C common regular expression collation
Gin framework: add API logging Middleware
Where is the domain name filed? What materials are required for domain name filing?
Mysql Find_ IN_ Set function
Buddha's foot before examination: the first bullet of leetcode
Grpc: adjust data transfer size limit
Gartner released the magic quadrant of enterprise low code platform in 2021. Low code integrated platform becomes a trend!

