当前位置:网站首页>South Korea's national network is disconnected. Who launched the network "attack"?

South Korea's national network is disconnected. Who launched the network "attack"?

2022-06-24 02:41:00 Yunbaba

Yesterday morning, Beijing time 10 spot 20 branch , South Korea's nationwide sudden large-scale network outage , The duration is close to 40 minute . at that time , Korean communication operators KT( Korea Telecom ) Cable of 、 Wireless networks are unable to connect , Leading to national enterprises 、 The restaurant 、 Ordinary families and so on can not access the Internet .

At first ,KT According to the internal analysis, the server has failed , It may be said that it has been affected by a large area DDoS Distributed denial of service attacks , Cause an uproar . Many Korean netizens said ,“ Unable to access the Internet , No way to talk , I can't even pay by mobile phone , There are long lines in the shops , Even the public telephone booth is full of people ……”

Due to network service interruption , Yonhap news agency 、 The central daily news 、 The new media clients of Korean mainstream news media, including the Korean economy, are unable to access , Even the Internet service providers involved KT The official notice of the government can not be released at the first time .

Then , Yesterday afternoon KT The company officially issued a statement saying , The cause of the network disconnection accident in the morning was found to be “ Setting error ”, Instead of being attacked , But there was no specific explanation of where the setting went wrong .

A sudden network outage is like a novel coronavirus , It only takes a very short time to cause great losses to people . If the network is paralyzed for a long time, it is terrible , Prior to 10 month 4 Japan , American social giant Facebook For a long time 、 Large area network disconnection fault , Lasting up to 7 Hours , Influence about 15 Billion users .

According to the data released by the Ministry of science and technology information and communication of South Korea ,KT Founded on 1981 year , It is the largest network operator in Korea , In the Korean Internet market KT Occupancy rate 47.8%, Occupy the first place , In the mobile communication market KT The occupancy rate is 31.6%, Second place . Such a huge network operator has problems , It is easy to affect the whole country .

Is your network safe ?

The Internet is a double-edged sword , Cloud computing 、 The Internet of things 、 The rise of big data and other technologies has weakened the network security boundary , Security risks and threats are increasing day by day . According to relevant data , since 2017 Since then , The number of data records of global network leakage increases on average every year 224%. only 2021 year 5 Since the month , The record of network data leakage and network attack in the world is as high as 1 More than 100 million .

Facing the network security problems that exist all the time , Many countries have strengthened network information security protection through various technical means , Server is one of the necessary network configuration resources , Its protection is more important .

The current is a critical moment for the digital transformation of enterprises , The core business and competitiveness of the enterprise , Almost all in the form of figures and information , Exists in the server . Once there is a safety accident , The blow to the enterprise may be devastating , The security of the server is related to the security of the company's entire network and all data .

Enterprises want to do a good job of server security , First, we need to take the initiative , Second, passive protection , You can't have one without the other .

1、 Formulate data security management system

For businesses , Develop internal data leakage and other types of security risk agreements , It is necessary for server and data security , This includes assigning different departments and managing personnel accounts 、 Password and other permissions , Update the password regularly to avoid being stolen by hackers , And other feasible measures .

2、 Data backup

Data backup is the lowest cost protection method , This is also the first line of defense against data loss . Data backup in some enterprises , Even in the network administrator is always not enough attention , This is very dangerous .

When the server loses data for some reason , As long as the data has been backed up before , The security and reliability of data can be realized through the system backup and recovery scheme .

3、 Update computer patches regularly

There are two main types of computer patches , Operating system patches and application system patches , Many software and operating systems will produce error vulnerabilities from time to time , These vulnerabilities can be infected by viruses 、 Trojan horse 、 Malicious script 、 Hackers use , So as to affect the safety and smoothness of the network .

4、 Buy safety protection products

In the era of cloud computing with increasingly complex network attacks , You can access the server security protection products , Obtain a more secure and stable network operating environment .

Tencent cloud host security (CWP)

Tencent cloud host security (CWP) It is designed to provide security protection and other services for servers , Based on the massive threat data accumulated by Tencent , Using machine learning to provide users with Trojan files to check and kill 、 Hacker intrusion detection 、 Vulnerability risk warning 、 Safety baseline compliance check 、 Business asset component inventory, etc .

1、 Trojan file killing

Based on Tencent's 10 billion malicious sample resources , Since the research AI Cloud kill 、Webshell and TAV engine , It has obtained the evaluation and certification of international authoritative anti-virus organizations , High efficiency against mining 、 Blackmail and other Trojan viruses .

2、 Hacker intrusion detection

Hacker intrusion detection function based on host security , Including login audit 、 Password cracking 、 Malicious request 、 High risk order 、 Local rights 、 rebound Shell Multi dimensional intrusion detection , It can quickly discover the penetration scanning behavior of hackers on enterprise servers , Timely warning .

3、 Security vulnerability emergency response

Vulnerability detection function based on host security , Host security (CWP) It can help enterprises monitor the impact of new vulnerabilities on enterprises at the first time , At the same time, provide effective repair solutions and safety technical support , Help enterprises solve the problem of vulnerability risk .

4、 Business asset component inventory

Provide automated asset inventory , Unified management host list 、 process 、 port 、 account number 、 Component and other asset fingerprint information , Help visualize enterprise assets .

5、 Compliance check of safety baseline

Provide a variety of baseline standard templates , Including international standards 、 Waiting for the second level of insurance 、 The default baseline strategy of Tencent cloud, such as level III warranty, etc , Enterprises can set their own baseline , Support one click detection , Provide treatment suggestions according to the test results , Meet the regulatory needs of different industries and different scenarios .

原网站

版权声明
本文为[Yunbaba]所创,转载请带上原文链接,感谢
https://yzsam.com/2021/10/20211026185654982D.html