In 1988, hackers have found in military nets the United States after the kingdom of cut off military nets and the physical connection between the Internet.
Almost from birth the Internet started, it has become a very convenient targets.
In the United States government’s “security virtual space national strategy” in the draft, the security announcement is divided into the following five level:
The first, home users and small business;
The second, large-scale enterprise;
The third level, the key areas, including federal, state and local government, high education, such as private area;
The satety of the Internet-a safety problems
The first level 4, the establishment of a national Apple A1045 battery advantage; ,
The first category five, global.
In this announcement, fully embodies the American government’s understanding and the strategy.
(2) the Internet safety
Because of the inherent characteristics, in the Internet security problems especially serious: due to the Internet openness and no center control agencies, hackers for the important topic into the Internet, its impact almost everywhere. The Internet, the size of the increase of the computer, more and more access for all kinds of purpose of hackers providing rich soil. Hacker intrusion into the computer on the network system, the theft of information, damage to or paralysis system, number to get resources control.
The Internet using TCP/IP lack of the effective information protection mechanism. The letter to the whole system can’t provide enough protection. Communication Early research focuses on the communication can rely on sex and ignore the communication security.
Support the Internet communications business operating system is mainly Unix, Windows and Liunx, in addition, the other service system such as database, the Web server and storage in some holes, and these holes more and more transparent. A large number of hackers or folk of so-called security organization to open these holes as to show off technical means (the loophole public has certain positive >.
The digital information, information dissemination of information network, the Dell 1526 battery lack of necessary protection and confirm mechanism. The network system of information in the bottom lack of enough resisted the mechanism. At the same time TCP/IP to information source also did not provide the necessary follow-up audit mechanism.
Electronic mail, FTP download documents, such as new web page code was the harmful way. And the way to a broader impact, speed is faster.
We can to the Internet may be against object to do a simple classification:
(1) the army
This is national intelligence agencies hackers and most interested in place. In the 1988 us open military nets and broken connected to the Internet, the Internet positioning in the formal civil field. But is due to the Internet’s resources, the inevitable in countries in the military is a big suction gravity. The Internet is the military intelligence analysis and obtain the important resources for the army, at the same time in the individual part also had a strong allure.
When a local area network internal any computer access the Sony BPL2 battery Internet, in fact, the whole network has and Internet connection up.
The military network and the Internet is the most countries, disconnect the army generally adopted method, but due to bad management and technology, the defects of the possibility of the existence of loopholes is very big.