网络防御比赛_您可能不知道的最先进的网络防御

网络防御比赛

Every year, organisations lose billions of pounds to cybercrime – and it’s a persistent and worsening problem. Out of this has arisen a highly sophisticated cyber-defence industry that is continually searching for more effective ways to prevent hackers from accessing systems and the data they store. Here, we’ll look at some of the newest defences on the horizon.

每年,组织都会因网络犯罪而损失数十亿英镑–这是一个持续且不断恶化的问题。 随之而来的是一个高度复杂的网络防御行业,该行业正在不断寻找更有效的方法来防止黑客访问系统及其存储的数据。 在这里,我们将探讨即将出现的一些最新防御措施。

移动目标安全 (Moving target security)

Israeli company, Morphisec, has developed a new form of cyber defence which it describes as ‘moving target security’. Essentially, this method of security scrambles the names, references and locations of files in the server’s memory, as well as the application itself, in order to make it increasingly difficult for malware to infect a system.

以色列公司Morphisec开发了一种新型的网络防御,称其为“移动目标安全”。 本质上,这种安全方法对服务器内存中文件的名称,引用和位置以及应用程序本身进行加扰,以使恶意软件感染系统变得越来越困难。

As an extra layer of defence, each time the computer is booted, the file names, locations and references are re-scrambled, ensuring that the system never has the same configuration as before. This type of technology is used by a number of leading organisations to protect their systems, most notably, the London Stock Exchange.

作为额外的防御层,每次引导计算机时,文件名,位置和引用都将重新加密,以确保系统永远不会具有与以前相同的配置。 许多领先的组织都使用这种技术来保护其系统,尤其是伦敦证券交易所。

气隙 (Air gapping )

Air gapping is the technique of isolating a system from both local networks and from the internet so that the only way it could get hacked is from someone getting physical access to the server itself. This is perhaps one of the most robust solutions for storing exceptionally sensitive data which needs to be kept ultra-secure or for protecting highly critical systems, such as those used for military defence or running nuclear generators. 

空气隔离是一种将系统与本地网络和Internet隔离的技术,因此,唯一可以被黑客入侵的方法是通过物理访问服务器本身。 这可能是最可靠的解决方案之一,用于存储需要保持超安全性的异常敏感数据或保护高度关键的系统,例如用于军事防御或运行核发电机的系统。

Even here, however, there are potential security issues, as air gapped servers can be ‘pre-hacked’ prior to installation when they are being manufactured. In 2018, Bloomberg reported that Chinese special agents had compromised servers manufactured by a US hardware company by incorporating ‘spy chips’ into components that were sourced from China. In this way, the malware came pre-installed and kicked into operation once the servers were first booted. According to Bloomberg, the servers in question were sold to and used by leading US technology firms and by government agencies.

但是,即使在这里,也存在潜在的安全问题,因为气隙服务器在制造时可能会在安装之前被“预黑客攻击”。 彭博社(Bloomberg)在2018年报道说,中国特工通过将'间谍芯片'整合到源自中国的组件中,从而损害了一家美国硬件公司制造的服务器。 这样,恶意软件就可以预先安装,并在服务器首次启动后即开始运行。 据彭博社报道,有问题的服务器被美国领先的技术公司和政府机构出售和使用。

合作网络安全 (Co-operative cybersecurity)

Another new cyber defence solution is known as co-operative cyber-security. This is when multiple organisations work together to store each other’s data in a so-called data-sharing alliance. This means that in order for a hacker to steal sensitive data from any of the participants, all of the systems would need to be hacked. Without being able to do this, hackers would not be able to get their hands on any complete files.

另一种新的网络防御解决方案被称为合作网络安全。 在这种情况下,多个组织共同合作以所谓的数据共享联盟存储彼此的数据。 这意味着,为了使黑客能够从任何参与者那里窃取敏感数据,将需要对所有系统进行黑客攻击。 如果无法做到这一点,黑客将无法获得任何完整的文件。

The technique employed to make this form of security work is called crypto-splitting. Here, each piece of data is encoded into thousands of numbers which are then randomly dispersed and saved on the computers of the participating organisations.

用来进行这种形式的安全工作的技术称为加密分裂。 在这里,每条数据被编码成数千个数字,然后被随机分散并保存在参与组织的计算机中。

Given such levels of encryption and the fact that none of the organisations know what data they are holding, it makes it incredibly challenging for a hacker to access and make sense of any data they might obtain. Statistically, if the chances of successfully hacking a single system was a mere one per cent, the chances of doing this to just four systems would be 0.000001 per cent – and even then, they would need to find a way to unencrypt what they found.

考虑到如此高的加密水平以及所有组织都不知道他们拥有的数据这一事实,这使得黑客访问并理解他们可能获取的任何数据都具有极大的挑战性。 从统计上讲,如果成功入侵单个系统的机率只有百分之一,那么仅对四个系统执行此操作的机率将是0.000001%-即便如此,他们仍需要找到一种方法来解密发现的内容。

下一代防火墙 (Next-gen firewalls)

Firewalls are nothing new, however, a new breed of next-gen firewalls now exist that take server protection to the next level.  The industry leader is Fortinet, whose FortiGate next-generation firewall protects websites and web apps from virus, ransomware and malware infections while preventing intrusion from hackers and blocking distributed denial of service (DDoS) attacks.

防火墙并不是什么新鲜事物,但是,现在已经出现了新一代的下一代防火墙,它将服务器保护提升到一个新的水平。 业界领先者是Fortinet,其FortiGate下一代防火墙可以保护网站和Web应用程序免受病毒,勒索软件和恶意软件的感染,同时防止黑客入侵并阻止分布式拒绝服务(DDoS)攻击。

Offering high-performance threat protection, a next-gen firewall is designed to keep mission-critical applications secure. The FortiGate, for example, continuously updates its threat intelligence to provide robust protection from both known and unknown attacks.

提供高性能威胁防护的下一代防火墙旨在确保关键任务应用程序的安全。 例如,FortiGate不断更新其威胁情报,以提供针对已知和未知攻击的强大防护。

结论 (Conclusion)

While it is possible, according to some, to create an unhackable computer, the process of doing so would make it more or less useless in a network environment. If you need to use a network, there will always be a risk involved. This is why security companies across the globe are continually looking at new and more sophisticated ways to solve the issue of cyber-attacks. With cybercriminals now using tools like artificial intelligence and employing tactics such as hiding malicious code in encrypted files, the challenge to stay secure is even harder. Hopefully, from reading this post, you’ll see some of the latest defence techniques which are now available. If you are looking for highly secure hosting that comes with FortiGate next-gen firewall security, take a look at our dedicated server and cloud hosting solutions 

有人说,虽然有可能创建无法破解的计算机,但是这样做的过程将使其在网络环境中或多或少地变得无用。 如果您需要使用网络,总是会有风险。 这就是为什么全球安全公司不断寻求新的更复杂的方法来解决网络攻击问题的原因。 现在,随着网络犯罪分子使用诸如人工智能之类的工具以及采用诸如将恶意代码隐藏在加密文件中之类的策略,保持安全性的挑战更加艰巨。 希望通过阅读这篇文章,您会看到一些现在可用的最新防御技术。 如果您正在寻找FortiGate下一代防火墙安全性随附的高度安全的托管,请查看我们专用的服务器云托管解决方案

翻译自: https://www.eukhost.com/blog/webhosting/state-of-the-art-cyber-defences-you-might-not-know-about/

网络防御比赛

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值