Chapter 712: Israel as Steady as Mount Tai
In Tokyo, Japan, the network security department of the Mitsubishi Group has become as lively as a vegetable market in the face of the huge network data that has burst in.
With the influx of a large amount of data streams, almost in just a few minutes, all the websites of the Mitsubishi Group could not be logged in.
The huge servers in the Mitsubishi Group are making unpleasant noises, and the temperature in the computer room is still rising rapidly under a large number of radiators.
Although a large number of engineers under the Mitsubishi Group are trying to modify the server settings to block these malicious access requests, the server is running so hard that it is almost impossible to open the background settings.
The entire network department is one step away from being completely paralyzed.
In the end, the Mitsubishi Group, which really had no choice, could only shut down the servers of the entire network.
Shutting down the server is a last resort, proving that Mitsubishi Group has encountered an unstoppable cyber disaster.
Otherwise, how could it be possible to shut down such a server, the dignified Japanese Mitsubishi Group was forced to shut down the server.
It is definitely not a glorious thing for such news to get out.
When the Japanese bought the Empire State Building and Van Gogh paintings in high spirits, the Atari bubble (in 1983, the video game giant Atari was lax in managing games developed by third parties, causing consumers to lose confidence and be reluctant to buy games and consoles. The U.S. video game industry has been hit hard, and the center of gravity of the global game industry has begun to shift to Japan. Suddenly. When the whole of the United States is worried about the attack of Japanese capital, I am afraid that not many people will think of the work of only twenty or thirty years. This once-seemingly invincible giant collapsed with a bang.
At that time, Japan, the once invincible Sony Group, is now completely unable to keep up with the pace of the times.
Not to mention companies like Mitsubishi Group, which focus on the military industry. The Internet is not an area that Japanese people are good at.
Sony's decline is more like the tip of the iceberg, reflecting not only the stagnation of the Japanese economy, but also the endgame of the entire Japanese Internet era.
At a time when the Internet has become the mainstream of global society, Japan still does not have a large online platform.
The biggest weakness of Japanese technology companies is their indifference and indifference to the Internet ideology, and until today, it is difficult to see any attempted and effective actions in Japan in this regard, even in the face of the impact of Apple, Google, and Twitter. It's a pity that even if Sony is one step late in this Internet era, it will never be able to catch up.
Network technology, the Japanese side is not bad. However, it is still very weak compared to the world's top Internet culture.
This has led to a large number of Japanese companies, all of which are very weak in this area.
The Mitsubishi Group is almost the same, with hardly a strong platform as a position. In the face of such a cyber shock. The defensive ability shown can almost be described as Lian Po Lao.
Of course, this is not to say that there is no defense at all, but the attack instantly reached an intensity that the Mitsubishi Group network could not bear.
With such an attack intensity, it is difficult for any network company with a certain ability to hold its ground.
This is completely different from the situation of Israel, which has one of the most secure cyber environments in the world.
The world's mainstream hacking methods. Almost all of them were invented by Israel, and even many of the methods used by the United States on the Internet. They were all taught by Israel.
Even the United States has to admit that Israel is absolutely not inferior to the United States in cyber security technology.
In the face of a strong data stream, the Israeli side has shown a means that can be described as a zero-delay response efficiency.
When a large amount of data traffic appeared, Israel's national network immediately activated the emergency mechanism, intercepting the firewall that is the first line of defense of the country as a whole, and intercepting a large amount of information at the first time.
And when intercepting information, the information is immediately analyzed, and other similar information is quickly locked, and this information is uploaded to the Israeli national security information database.
Then the Great Firewall of the entire Israeli network was running almost simultaneously, and the large amount of data that had just entered Israel was intercepted.
Although this kind of defense is a big step behind the direct and complete interception effect of the base, for any country in the world, such an efficient interception capability is absolutely second to none.
But it is not surprising to consider the environment of Israel, which was the first country to use cyber warfare in warfare, even before the United States paralyzed Yugoslavia.
Israel carried out cyber attacks on Middle Eastern countries very early, and this kind of attack was still very primitive at that time, and it was also in this environment that a large number of excellent cyber war masters emerged in Israel, and a hacker who was the first in the world at that time was born.
So far, Israel has never stopped competing with Middle Eastern countries on the Internet, and this kind of attack and defense takes place almost every day.
In particular, the cyber attacks on Iran have not been interrupted for a day, and Iran is not easy to bully, and it often competes with Israel in this regard, and also has a very strong cyber combat capability.
After all, fighting against masters always gives you the most valuable experience, and Iran has used this experience to cultivate a very powerful cyber force.
This cyber force also often invades Israel on the Internet, and the two sides can be said to be the two sides that have been fighting for the longest time in the cyber world.
While Iran has built up its cyber forces with the experience of cyber warfare with Israel, Israel has maintained steady technological progress in its cyber contest with the entire Middle East.
And such a huge data flow attack, for Israel, it is not difficult to defend against it at all.
If this is how easily the network is breached, then the Israeli state network has long been broken by the Iranians and the entire Middle East world.
There is not much to do in Israel, and it is Japan that is still the tragedy, while Europe and the United States have also been affected a little.
However, such a wave is only aimed at those hackers, and the attacks against these hackers are all very concentrated, and there is no scattered data flow spilling into the network environment.
They didn't use this to attack specific targets, but hackers in these countries were unlucky, and almost every hacker's mobile phone and computer was paralyzed.
(To be continued.) )