当前位置:网站首页>Situation丨The intrusion of hackers intensifies, and the shooting range sets up a "defense shield" for network security
Situation丨The intrusion of hackers intensifies, and the shooting range sets up a "defense shield" for network security
2022-08-10 10:04:00 【Cyberpeace】
Statistics show that universities, research institutes, government and military sectors are suffering from more intensive cyberattacks in many industries.These industries store a large amount of cutting-edge research data and confidential information of emerging technologies, and criminal activities that attempt to steal technical information and national intelligence emerge one after another.Just like the situation in Russia and Ukraine, international conflicts continue to emerge, and the button for cyber warfare flashes frequently, prompting key industries to focus on cyber security management.
Global cyberattacks hit record high
In the second quarter of 2022, global cyberattacks hit a record high, with a 32% increase compared to the second quarter of 2021, according to new data released by research firm Check Point.The average number of attacks per organization in the world is up to 1,200 per week.

Check Point: Average weekly number of attacks per institution worldwide
In terms of industry, cybercriminals are primarily targeting the education/research industry, which has experienced an average of more than 2,300 attacks per institution per week globally, a 53% increase from the second quarter of 2021.It was followed by the government/military sector with an average of 1,600 attacks per week, a 44% increase compared to the same period last year.

Check Point: Global average number of attacks per institution per week by industry
Refining your defenses at the shooting range
The hacker attack is treacherous and ever-changing, and the tools are gradually upgraded. To deal with the unknown situation where the enemy is dark and the enemy is clear, only by making adequate preparations and establishing an active defense mechanism can we "keep out" uninvited guests from the source.Minimize the risk and avoid irreparable losses.The traditional network range is mostly used as a "practice field" in the military field, providing a training platform for technical fighters.
The international situation is complex and turbulent. Malicious cyberattacks against key industry units such as energy, finance, and telecommunication operations may come at any time. The cyber range, like in the military field, has entered the civilian field and established a capableA training platform that simulates real attacks to achieve active defense capability improvement and system construction.
To strengthen network security defense capabilities, personnel capabilities are the foundation. The training of talents in shooting ranges can be summarized in three aspects:
Competition - prepare for the competition
Using the built-in competition module of the shooting range platform, from different aspects such as theory, problem solving, attack and defense, operation and maintenance, penetration, etc., through a variety of competition questions to consolidate the comprehensive ability foundation of training personnel.
Teaching-Precision Training of Industry Talents
With the guidance of university and industry standards, establish a standardized teaching curriculum system and a perfect talent evaluation system. Through the hierarchical security attack and defense courses, combined with the practice of real scenes, the assessment and evaluation of personnel will form a "portrait of personnel ability".” to meet the training needs of positions in different industries.
Target - Real Scenario "Target Shooting"
Simulation targets covering various networking assets such as operating systems, application software, security equipment, network equipment, and industrial control equipment, as well as simulation scenarios for various industries such as government and enterprise, education, finance, and communications, allowing users to attack in real situations.Under the situation, "shooting and targeting" can strengthen the actual combat ability.
Secure real space with a shooting range
Saining Network Security has been involved in the network security industry for many years, and has been committed to the construction of network shooting ranges for a long time.The traditional network range is mostly used as a "practice field" in the military field, providing a training platform for technical fighters.Today, digital and intelligent thinking is rooted in various industries. Saining has built the traditional network shooting range into a digital shooting range with security management and operation capabilities to meet the needs of active defense.
Sai Ning Wangan City Level Digital Twin Shooting Range
If the traditional network shooting range shows the value of tool application, then the digital shooting range focuses on the release of management capabilities.The management method of Saining Network Security based on digital shooting range can be summarized into 4 points:
Ultra-realistic simulation "catch a net"
Ultra-realistic simulation of the entire network topology and architecture covering network nodes, structures, applications and services, protocols and trafficUniversal emulation capability for different network types.
The virtual and the real echo each other, "using the virtual to manage the real"
Lay the channel between real network equipment and virtual equipment in the shooting range, realize mutual communication, achieve virtual mapping of real network in the shooting range, run services in the virtual pool, and realize the management and operation of virtual space to real space.
Smooth "navigation" in complex network environments
Large-scale topology layered display, realizes the concurrent startup of a large number of virtual machine nodes, and ensures reliable performance and stable operation in a large concurrent environment with complex network topology and architecture.
Visual layered display, information data at a glance
The sand table presentation of real business, the presentation of changes in the network attack and defense situation, and the data display of various monitoring and statistical processes, to achieve a comprehensive assessment and presentation of the overall network situation.
The network security management and operation based on the digital shooting range is going from conception to start-up practice. At present, it needs to be combined with a large number of real application scenarios to be tested repeatedly, and it will be organically integrated with various industries such as energy, finance, industrial control, etc., to be a leader in the digital economy and society.Active fortifications.
边栏推荐
猜你喜欢
随机推荐
web项目访问引用jar内部的静态资源
跨公网环境,路由策略,进行设备的访问
Relearn bubble sort
VBA: Inputbox Function and Inputbox Method
绘制温度曲线图;QChart,
"Data Architecture": How can master data management (MDM) help my industry?
【Software Exam System Architect】System Reliability Analysis and Design ① System Reliability Analysis
【知识论概念】《理由论的进展》鲁汶大学2022最新220页博士论文
「数据架构」:主数据管理(MDM)对我的行业有什么帮助?
VBA: 遍历文件抓取指定条件的数据
CSDN21天学习挑战赛——多态(05)
ESP8266 教程1 — ESP8266硬件平台介绍
【C语言】头文件#include <conio.h>,conio是Console Input/Output(控制台输入输出)
CSDN 21 Days Learning Challenge - Polymorphism (05)
ES复杂操作搜索
「应用架构」六边型架构:三个原则和一个实现示例
【分布式】资源与事务:可观测性的基本二重性
Payment x Aggregation x Ledger Separation - The Way to Avoid Risk of "Erqing" on the Return Platform
CentOS和Ubantu的Mysql主从配置
C语言题解:倒置字符串








