Volume 3 Towards Mid-Level Authority Chapter 712: Israel As Stable
In Tokyo, Japan, in the network security department of the Mitsubishi Group, facing the intrusion of huge network data, the entire network department became as lively as a vegetable market.
The influx of a large number of data streams, almost within a few minutes, all the websites of the Mitsubishi Group were unable to log in.
The huge servers in the Mitsubishi Group are making loud and unpleasant noises, and the temperature in the computer room is still rising rapidly under the presence of a large number of radiators.
Although a large number of engineers under the Mitsubishi Group are trying to modify the server settings to prevent these malicious access requests, the high-intensity running servers can hardly even open the background settings.
The entire network department is just one step away from being completely paralyzed.
In the end, the Mitsubishi Group really had no choice but to turn off the servers of the entire network.
Turning off the server is the last resort, proving that the Mitsubishi Group has encountered an unstoppable network disaster.
Otherwise, how could it be possible to shut down such a server? The majestic Mitsubishi Group was forced to shut down the server.
It is definitely not a glorious thing to spread such news.
When the Japanese bought the Empire State Building and Van Gogh paintings in high spirits, the Atari bubble (in 1983, the video game giant atari's lax management of games developed by third parties caused consumers to lose confidence and were unwilling to buy games and consoles. The U.S. video game industry has been hit hard, and the center of gravity of the global game industry has begun to shift to Japan.) Suddenly hit. When the whole of the United States felt uneasy about Japanese capital attacking everywhere, I am afraid that not many people would have thought that this giant that once seemed invincible would collapse in just two to three decades.
In Japan at that time, the once mighty Sony Group has completely failed to keep up with the times.
Not to mention the Mitsubishi Group, which focuses on the military industry. The Internet is not an area that the Japanese are good at.
The decline of Sony is more like the tip of the iceberg, reflecting not only the stagnation of the Japanese economy, but also the endgame of the entire Japanese Internet era.
At a time when the Internet age has become the mainstream of the global society, Japan has not yet had a larger Internet platform.
The biggest weakness of Japanese technology companies is their indifference and indifference to Internet trends. Until today, it is difficult to see any intentional and effective actions in Japan in this regard, even in the face of the impact of Apple, Google, and Twitter. It is a pity that even if Sony is in this Internet era, it is one step too late to catch up with its own Internet ecosystem.
Network technology, Japan is not bad, but compared with the world's top Internet culture, it is still very weak.
This also directly brings a large number of Japanese companies, all of which are very weak in this regard.
The same is true for Mitsubishi Group. It hardly has a strong platform as a position. In the face of such a network attack, its defensive capabilities can almost be described as Lian Po old.
Of course, it doesn't mean that there is no defense at all, but that the attack has reached an intensity that the Mitsubishi Group's network can't bear in an instant.
Under such an attack intensity, even any Internet company with a certain ability to hold its ground would find it difficult to persevere.
This is completely different from the situation in Israel. Israel is the most secure country in the global network environment, not one of them.
Almost all the world's mainstream hacking methods were invented by Israel, and even many Internet usage methods in the United States were learned from Israel.
Even the United States has to admit that Israel is definitely not inferior to the United States in terms of network security technology.
In the face of the same powerful data flow, the methods shown by Israel can be described as zero-delay response efficiency.
When a large amount of data traffic appeared, Israel's national network immediately activated an emergency mechanism to intercept the firewall that was the first line of defense in the country as a whole, and immediately intercepted a large amount of information.
And when intercepting the information, it immediately analyzed the information, quickly locked other similar information, and uploaded this information to the Israeli national security information database.
Then, the network firewalls throughout Israel started operating almost simultaneously, and all the massive data flows that had just entered Israel were intercepted.
Although this kind of defense is a lot worse than the direct and complete interception effect of the base, for any country in the world, such an efficient interception capability is definitely second to none.
However, if you think about the environment of Israel, you won’t be surprised. Israel was the first country to use cyber warfare in war, even earlier than when the United States paralyzed Yugoslavia.
Israel has carried out cyber attacks on Middle Eastern countries very early. At that time, this kind of attack was still very primitive. It was also in this environment that Israel emerged a large number of excellent cyber war masters, and also gave birth to a hacker who was the world's number one at that time.
So far, Israel has never stopped competing with Middle Eastern countries on the Internet. This kind of offense and defense occurs almost every day.
Especially the cyber attacks on Iran have never stopped for a day, and Iran is not easy to bully. In this regard, it often competes with Israel and has extremely strong cyber combat capabilities.
After all, fighting with experts can always gain the most valuable experience. Iran has used these experiences to cultivate a very powerful cyber force.
This cyber force also frequently invades Israel on the Internet. The two sides can be said to be the longest contested parties in the current online world.
Although Iran has cultivated its own cyber forces with the help of its experience in cyber combat with Israel, Israel has always maintained a steady advancement in technology in its cyber contests with the entire Middle East.
For Israel, such a huge data flow attack is not difficult at all to defend.
If the network is easily breached in this way, then the Israeli national network has long been breached by the Iranians and the entire Middle East world.
There are not many things in Israel. The tragedy is still Japan, and Europe and the United States have also been affected a little bit.
But such spread is only aimed at those hackers, and the attacks against these hackers are all very concentrated, and there is no scattered data flow overflowing into the network environment.
They didn't use this to attack those specific targets, but the hackers in these countries were out of luck. Almost every hacker's phone and computer were paralyzed.