Anti-"hacker" battles begin as the US takes tough measures and joins forces to crack down

by nuo01 on 2011-06-22 10:28:23

The internet is a mix of good and bad elements, and hacker attacks spread like viruses, continuously proliferating on the internet. The field of network security faces increasingly critical situations. For this reason, the U.S. National Security Agency has decided to join forces with internet service providers to launch a "cyber anti-terrorism" operation, staging a confrontation between good and evil.

This joint crackdown has been long in preparation by the U.S. Security Bureau, which has been planning this cyber war. Unlike conventional wars, cyber warfare knows no national boundaries, and one must always be vigilant against all opponents. A single vulnerability can give hackers an opportunity, small oversights can have significant impacts, and once hacked, it can directly lead to the loss of national funds and corporate funds, data loss, and additional maintenance costs. People are wary of hacking, and network technology has faced certain setbacks in its development and application.

Reviewing recent hacker incidents, the internet is becoming a playground for terrorists to run amok. In June, popular foreign websites such as The Escapist, online games Minecraft, EvE, and LOL were successively attacked by hackers, resulting in massive damage to user data. In May, Japan's game development company Sega's PSAA network system was hacked, leading to the theft of personal information from 1.3 million game users. In April, there was the Sony "Game Station" and Qriocity cloud music service network hack incident, the "Chinese hacker" attack on Google, and the sale of information from 70,000 college entrance exam candidates. These hacker battles occur globally every year, and many brands and companies have fallen victim to hacking. How to combat and prevent hacking continues to be a concern for governments and citizens worldwide.

As long as hackers remain unaddressed, cyberspace will continue to see conflict. The U.S., moving from individual efforts to frequent "moves," now collaborates with internet service providers for a joint crackdown, employing both hard and soft measures to achieve its goals. The "hard" approach involves bringing America's traditional military strength into the internet, treating cyberspace as a "battlefield." According to the U.S. federal government’s previously released "International Strategy for Cyberspace," cross-border cyber intrusions are categorized by severity and may be countered with traditional military force. However, there are concerns that "wildfires cannot be completely extinguished, and spring breezes bring new growth." Hackers cannot be eradicated entirely, and the turbulence in the cyber world will persist. How to successfully capture them is worth deep reflection.

The industry has never ceased its vigorous efforts to combat and resist hackers, but the threat to the network remains undeniable. According to research from RSA's Anti-Fraud Command Center, China saw a 78% increase in phishing attempts in 2010, with 99% targeting online shopping. Reports from China's National Internet Emergency Response Center (CNCERT) also revealed: in 2010, there were 740 reports of web page forgery incidents, 35,000 websites tampered with by hackers, and 233,000 IP addresses altered by zombie programs. Various indicators show that China still lacks robust security defenses in computer systems, with frequent occurrences of online data theft and the dissemination of harmful information. Hacker activities and criminal behavior are on the rise, and many institutions and enterprises lack adequate awareness of network information security issues and potential risks, leaving many vulnerabilities that lower system security. To safeguard national cyberspace security, strengthening "cyber defense" construction and accelerating the pace of "cyber power enhancement" is imperative.

However, some argue that hackers cannot be completely eliminated, and information exchange and cyberspace do not offer absolute security. If hackers didn't exist, what use would antivirus software like 360 or Rising, firewalls, and anti-hacker programs have? This is akin to a food chain, creating a cycle.

In today's rapidly developing internet age, the network is like another Earth where we survive, constantly changing. The life-and-death struggles on the internet continue endlessly, with businesses, netizens, and hackers growing continuously. A well-known domestic IDC service provider, China Nuowang at www.nuo.cn, suggests that website administrators worldwide need to prepare in advance for combating hackers, taking sufficient precautions. More importantly, they should choose professional, secure, and stable IDC service providers, including using the latest patches, and ensuring that websites and spaces are free of vulnerabilities that could serve as channels connecting to hackers.

Special promotion for China Nuowang's U.S. servers: http://usaidc.nuo.cn/

Author: (China Nuowang) Guangzhou Yinghu Network Development Co., Ltd. (Copyright belongs to Guangzhou Yinghu Network Development Co., Ltd. If you wish to reprint, do not arbitrarily alter or add advertisements; violators will be held legally responsible. Special notice.)

National unified sales hotline: 400-888-6638; National 24-hour technical support hotline: 020-34121161

Online consultation MSN: [email protected]; Online consultation QQ: 475342018

We promise to provide high-quality services and free consultations 24 hours a day. We offer excellent servers, enterprise email, domain registration, independent hosting, website construction, and other products and services. Our quality service and round-the-clock technical support will be your reliable guarantee for success!