Source: China National Defense News
“Chinese “White Hat Hacker Corps” has become an important force in Chinese national cybersecurity”
◆ General Secretary Xi Jinping stressed that no network security is no national security, no information will be no modernization. Power network construction, China must have her own technology, excellent technology.
◆ Free security software “China model” to create a network security field, the “Chinese miracle.” The Chinese Dream…
◆ In the network security has risen to national security background, should consciously create a good development space for China’s own “white hat Legion” of hackers, while cautioning against a number of organizations or enterprises affected by outside forces controlled competition Chinese security market, and then to depth strategic goals of China’s core security.
After September 17, the US Senate Armed Services Committee issued a report called China network intrusion, causing great concern at home and abroad media.Chinese Foreign Ministry and the Defense Ministry spokesman, speaking one after another, the report noted that the United States is purely fabricated, deliberately fabricated entirely untenable. Defense Ministry spokesman Geng Yansheng solemnly pointed out that the Chinese government and armed forces have never engage in or support any network attacks and theft activities. China has always resolutely opposed and crack down on criminal activities related to network attacks. China faces a serious threat of cyber attacks is one of the world’s leading hacking victim. For network hacker attacks from abroad, we have sufficient evidence.
The United States is China’s largest Internet security threats
Geng Yansheng said that needs to be emphasized is that the “Prism” incident exposed more than a year, the United States should its foreign dignitaries, business, personal theft and network monitoring, monitoring the behavior of reflection to the Chinese side and the international community to make clear explanation . We urge the US to do more to contribute to peace and tranquility in cyberspace thing, rather than the opposite.
In fact, the attacks from the United States is China’s largest Internet security threats.
National Internet Emergency Center recently released “2013 China Internet Network Security Report” revealed that in 2013, China’s government websites frequently suffer outside hackers attacks, including national organized network attacks have increased significantly. China’s government websites, especially the local government website, is under attack “disastrous.”
According to monitoring, in 2013, our country has been tampered with the number of sites is 24,034, an increase of 46.7% compared with 2012, in which the number of government websites has been tampered with 2430, an increase of 34.9% compared with 2012; our territory to be implanted backdoors number of sites for the 76160, compared with 45.6% growth in 2012, has been tampered with and implanted in the back door of government websites, more than 90 per cent below the provincial and municipal local government Web site. Overseas hackers frequently attack government websites in China. In 2013, offshore “anonymous”, “Algerian hacker” and other hackers had attacked government websites in China. Among them, the “hacker anti-communist” organization more active, sustained launched against the territory of government agencies, universities, enterprises and institutions and well-known social organization site of the attack in 2013 on the organization of the territory of more than 120 government websites embodiment tampering. They use pre-implantation site vulnerability backdoor, then attacked the site after the implementation of control, at least the current invasion of the territory of more than 600 sites, an average of every three days publish tampering incident in their social networking sites.
In these networks from outside attacks, the national network of organized attacks increased significantly on China’s network security and information systems pose a serious threat and challenge. Since June 2013, Snowden exposure “Prism Plan” US National Security Agency and a number of network monitoring projects, the disclosure of US intelligence agencies in many countries and people in long-term implementation and monitor network penetration attacks, including multinational monitoring target politicians, diplomatic system, media networks, large enterprise networks and international organizations. Our focus on listening and belong to their targets, national security and Internet security is facing a serious threat to users’ privacy.
According to monitoring found only in 2013, there are 31,000 foreign hosts through a back door to China 61000 Website implement remote control, which ranks first in the United States hosts a total of 6215 hosts in control of our 15,349 sites. Phishing attacks against China in terms of attack from the United States the same primacy. Trojan zombie network connection, our country hosts more than 1090 are outside the control server control, which is located in the United States control server control our country hosts 448.5 million, accounting for 41.1% of the total, ranking the first place ……
Original mandarin Chinese:
Who will guard China’s network security?
China ushered in the Internet age is the tide of reform and opening up.Chinese Internet users surf the initial means of the Internet, whether hardware or software, mostly imported from overseas to domestic.
This “borrowed boat” mode, while promoting the development of China’s high-speed network, but also to China’s network security left a great security risk. We use the Internet browser is someone else’s, you’ve seen what page, others see that; our search engine to find the problem is someone else’s, for what you are interested in something, it will be automatically recorded in a database outside in ……
We use the operating system as others in the system hidden “back door” through overseas. After the United States, according to media reports, the world’s largest user coverage Microsoft “Windows” operating system, found loopholes in the system, it will first notify the US intelligence agencies, will then inform the user, provide patches fix vulnerabilities. This means that, in someone else’s “window”, we almost “transparent”. Even more serious is that Microsoft in order to protect its own commercial interests, has designed a mandatory upgrade marketing strategy.For example, in order to promote Win8 operating system, on April 8 to forcibly stop the official service XP system, the millions of Chinese users directly discarded in molar sucking blood before hackers. Domestic media pointed out in a review of Microsoft XP stop taking event, which is an important event once the impact of China’s Internet security. This is not only related to the large number of individual users, but also is related to the key sectors involved in the national economy. Network security system, China must rely on its own security vendors innovation and action.
Network security experts pointed out that China’s current network security system is set up in technology research and development on the basis of the United States, not to mention technology, cloud security technology in the field of key technologies such as a CPU, communications and data transmission encryption and decryption system in the field art networking technology and so on. If you play a very appropriate analogy, just as the Chinese network security gate, he stood an American security.
Network security is a core protection capability of the modern state in cyberspace, the party and state leaders highly concerned about network security issues. February 27, the central network security and information technology leading group was established. CPC Central Committee General Secretary and State President and CMC Chairman Xi Jinping himself as a centralized network security and information technology group leader, he delivered an important speech at the first meeting of the leading group, pointed out that China has become a big country network, network security and information technology is a matter of national security and national development, major strategic issues related to the broad masses of working life, starting from the domestic and international trend, the overall layout of the parties to co-ordinate, innovation and development, and strive to build China into a powerful network.
General Secretary Xi Jinping stressed that no network security is no national security, no information will be no modernization. Power network construction, have their own technology, excellent technology.
General Secretary earnest expectation, explicit requirements for China’s domestic network security vendors, it is the direction of future efforts.
Original Mandarin Chinese:
“China model” to create a “China miracle”
Rivers and lakes of the network can be divided into decent and Xiepai.Commonly known as “black hat” hackers manufactured by Trojan, the use of computers, mobile phone operating system vulnerabilities to attack, steal private data, illegally obtained personal interests. The guardian of network security “white hat” on the contrary, they take the initiative to find a computer, mobile phone operating system vulnerabilities, provide technical repair programs, research and development of security software and hardware products, build a firewall against hackers, for individuals, society and the country’s network security add a layer of protective cover, active in the first line of network security guard.
China’s domestic network security vendors are on their market growth and competition from foreign giants up security. Rely on a strong sense of social responsibility and familiarity with national conditions, China’s network security vendors gradually grow from a little foreign magnates recapture market, has won vitality. Many users still remember those familiar names: Kingsoft, Rising, Jiangmin ……
China’s network security vendors not only by virtue of their own efforts to win the market, but also creatively launched the network security field, “China model” completely rewritten the pattern of China’s network security industry.Traditional network security software are used charging mode, charge more than $ 200 a year on average. Because of the higher price threshold, resulting in many who do not want to use security software. The absence of security software, also led to the Trojan virus on the network as a scourge, such as CIH, panda, etc., hundreds of millions of infected computers, sensational news events.
Introduced in 2005, 360 free security software, once the user uses the threshold down to zero. Along with other local network security vendors follow-up, only less than 10 years, Chinese security software PC penetration rate has risen to 99%. In 2013, Microsoft released a security report, the Chinese computer malware infection index of 0.6 per thousand, the global average is only 1/10 of the world’s countries with the lowest infection rates of malware. In 2014, Microsoft re-released a report, a detailed summary of the data in the world’s more than 100 countries and regions, more than 10 million computers after malware statistics pointed out that China is the world’s lowest 4.4, far below the world average of 18.
360 free security software model, Wall Street interpreted as “Chinese model”: the core layer on the basis of free goods and services, to build browser applications open platform and two basic platforms, and refine the site navigation, buy navigation, navigation games, search, open platform and mobile open platform and other services, these services through advertising and internet value-added services realized profits. Such an innovative “China model” will not only China’s network security software penetration is significantly improved, and the R & D investment by increasing safety, security personnel and gather technical team, making China’s network security technology continues to improve and is widely used by foreign counterparts and learn from the followers of the world’s security technology security technology leader, but also created the Eastern Hemisphere strongest Chinese “white hat Legion.”
In this sense, the free security software “China model” to create a network security field, “Chinese miracle.”
Original Mandarin Chinese:
Chinese “White Hat Hacker Corps” has become an important force in Chinese national cybersecurity
June 2013, “Prism” incident broke out. Former National Security Agency employee Edward Snowden would disclose secret documents US intelligence agencies monitor the project to the media, in one fell swoop depth reflection triggered a global information security issues. April 2014, suffered more than the major global Internet exploits of attacks: Open SSL “heart bleeding loophole”, IE browser’s “zero-day vulnerabilities”, Struts vulnerability, Flash vulnerability, Linux kernel vulnerability, Synaptics Touchpad Driver Vulnerability and other important vulnerabilities have been found to be. An attacker can exploit to achieve complete control of the target computer, steal confidential information.
The current world, hacking has become the most important network security threats, and network security threats has become a major threat to social security, national security. Cyber attacks not only can disrupt the normal operation of enterprises and social institutions, but also can easily destroy a country’s operational command system and livelihood facilities, network security has become an important part of a national security defense system.
The current network security situation simmering, a turbulent, especially the “prism door” incident has exposed a series of deep-seated problems, showing security threats overseas hostile forces in the formation of China’s network security is growing. After the “Prism” incident, security products and related overseas smartphone products through the back door to steal the core data set of events repeatedly been exposed, and other international security software giant Symantec is also exposed the existence of a backdoor, domestic users lose confidence, exclusion in addition to government procurement list.
At these foreign security software lose confidence forced to withdraw from the Chinese market, the Chinese “white hat Legion” With long-term accumulation of technology and product innovation, and take up more than 600 million Internet users security guard duties. China’s domestic network security vendors have become a priority in government procurement national security products. Information security person in charge of a large state-owned enterprises, said they not only many major projects builders, but also the construction of a number of the world’s top-class large-scale projects. For such a large state-owned enterprises, each security flaw is thrilling security risks. Select the security products must be cautious, not only in respect of corporate security, national interests even more solidarity and public safety. In this context, they would prefer to secure key, handed the hands of their own people.
The rapid development of the network economy, so China’s network security is facing new challenges. The grim reality requires Chinese “white hat Corps” must quick response, China’s network security as a good “gatekeeper.”
The current domestic network ecosystem is very complex, a lot of important Internet companies have the background of foreign capital, which also makes the competitive Internet market, often there will be some market factors outside.Recently, for example, 360 to prosecute the “Daily Economic News” reported a case of alleged false in Shanghai Xuhui District People’s Court formally sentenced.Commenting on the domestic public opinion at the time of the court, and not just limited to commercial disputes, but through the appearance of the event, focusing on national cybersecurity issues. Many network security field and legal experts pointed out that, in the network security has risen to national security background, should be conscious of China’s own “white hat Corps” to create a good development space, while cautioning against a number of foreign forces in control of the organizations or enterprises for China’s security market, thus achieving further core areas of our strategic security purposes.
China’s network security depends on our own. This is not just a question of national pride, not just a confidence issue, but a matter of extreme cases, if there are areas of our security problems backdoor planted by hostile forces.Therefore, we should focus on in recent years in areas such as security, foreign hostile forces controlled by Chinese companies through the acquisition of M & I and other ways to penetrate the security field behavior.
Original Mandarin Chinese:
Original Source URL