| |

法中之桥

 Forgot password?
 Register 注册

QQ login

One step, quick start

Search
View: 1663|Reply: 0
Print Prev. thread Next thread

tiffany milano Wu Jiang Xing

[Copy link]

该用户从未签到

31

Threads

31

Posts

146

Credits

Member

Rank: 2

Credits
146
Jump to specified page
#1
Post time: 2014-09-10 10:14:00
| Show the author posts only Reply Awards |Descending |Read mode
there is no best way, because it is a systemic problem. If anything, the best way, I think it should be inside the field of information technology and the development of cyberspace innovative, revolutionary technology to change the rules of the game, otherwise it is difficult to have any better way,tiffany milano, a more significant change.Snowden event warned that network security is a system security"? Oriental Outlook": by Snowden.
and now our ability to maintain network security, at what level?Wu Jiang Xing: I want to emphasize that, first of all in our country, the army did not take guard and defensive national information and communication infrastructure and information security responsibilities in cyberspace, our military is not being given such responsibilities. I think this situation is the most serious. In other words, China is now basically in a defenseless state of cyberspace, so it became a network of spam, hackers at home and abroad as a wanton place.Protection against the national IT infrastructure has just begun,ray ban sunglasses for sale, compared to America's "Cyber   � torm 1", "Cyber   � torm 2", "Cyber   � torm 3" such a large scale, nationwide civil-military interaction, the people and the community unified action, Whether it is from the size,giuseppe zanotti, maturity or level, are still very different."? Oriental Outlook": specific gap?Wu Jiang Xing: specific gaps that China has not yet Cyber   � rmy.
there are many different points, I mainly emphasize different points.First, the network war is war without smoke, regardless of peacetime and wartime.Second,chaussure giuseppe, the object of the war is different,oakley sunglass outlet, it is the individual with the State, the individual with society, with national organizations, and even countries with countries. War may be non-governmental organizations subject can also be national.Thirdly, the destruction it produces first is the impact of information and communication infrastructure as well as a variety of information systems, and then transfer to the physical world to produce harassment and unrest, such as disrupting your financial systems, transportation systems, energy systems, thus affecting your ability war . That it is through an indirect way to influence the war.Fourth, modern war is a war of information technology,barbour france, precision-guided weapons, cyber warfare and combat capabilities will affect the accuracy of these weapons.Now we see a variety of network eavesdropping incident is just the tip of the iceberg of war,louboutin outlet sale, a wider range of government-level confrontation, stealth game time between countries are carrying out. Now the precise definition of the concept of cyber warfare, there are still many academics argue,nike tn requins, but listen for events that occurred Currently, we might think is a special act of war in cyberspace, if only the impact on society,toms outlet online, life, all aspects of national development Network attacks considered cyber warfare, then it quite narrow and biased the."? Oriental Outlook": cyber warfare may always have going on, it was the harm caused by cyber warfare likened to a nuclear bomb, you agree with this view?Wu Jiang Xing: I totally agree with this view. Modern society is dependent on information technology, dependent on the network,giuseppe zanotti chaussure homme, the scope of the bomb damage or partial.
cyber warfare can paralyze a country and cause global chaos. Geographical concept because it does not affect surface greater than a nuclear bomb, say, a country's communications system causing paralysis of all, the financial system disorder, which causes confusion in the national economy, social upheaval, resulting in the loss of the country's war of will . This effect is difficult to obtain a nuclear bomb.So cyberwarfare greater than the power of a nuclear bomb,tn, but this argument points, nor is sensational. From our current dependence on information systems and network systems,oakley outlet, will be able to see it. We can imagine that if suddenly no cell phone,barbour, do not get any information, we may be living in fear. If the information system paralysis, social chaos will occur, no electricity.
and gas stopped,tiffany outlet milano, the car will not start, weapons and equipment are out of order, this psychological deterrent effect is certainly much greater than the nuclear bomb, blow or shake the opponent's war will do the enemy without fighting the soldiers, this is difficult to achieve a thermonuclear war.Networking concepts imminent border"? Oriental Outlook": If a war is now under way, what specific role of network warfare units to play?Wu Jiang Xing: The first is defensive; second to implement a proactive defense, to have counter-measures, not just passive beaten.The nature of the network is usually army troops with nature is the same, there are offensive defensive, there are regulars there reservists, war system is the same,chaussures nike tn pas cher, the entire technical and security aspects of the layout and the related strategies and tactics also have corresponding support."? Oriental Outlook": From a global point of view.
the Americans said to have established a network if Warfare Command, it certainly has a network warfare units.Technical schools into Chinese hackers source very funny"? Oriental Outlook": foreign media often guesswork China now cyberwarfare capabilities,nike tn officiel, and even news that is located in Shandong, China launched a technical school is the source of cyber warfare.Wu Jiang Xing: From the perspective of a technical expert point of view, this is a malicious speculation, this argument is ridiculous, this is an external want to render the China threat theory.We all know that China is a country on the network basically undefended, hackers around the world are here to show their talents,barbour catalogue, harm Chinese interests, but also with China's platform to engage other countries. This may be insufficient understanding of the world public opinion,requin tn pas cher, in fact violations of hackers are no borders."? Oriental Outlook": In your opinion, the best way to maintain network security should be?Wu Jiang Xing: You ask a lot of questions to the current security situation.
相关的主题文章:

  
   http://9900a.cloud54-178.78host.com/bbs/forum.php?mod=viewthread&tid=40179&extra=
  
   http://www.tymjkj.com/forum.php?mod=viewthread&tid=78735&fromuid=38099
  
   http://www.mgwhw.com/home.php?mod=space&uid=330761
  
   http://www.bailufangzhou.com/forum.php?mod=viewthread&tid=398466&fromuid=81281
  
   http://bbs.158jk.com/home.php?mod=space&uid=9447
  
   http://bbs.celih.com/home.php?mod=space&uid=24670
  
   http://forum.clubwang.com/forum/forum.asp?FORUM_ID=46
  
   http://www.zjtaxplan.cn/home.php?mod=space&uid=37388
Share:  QQ Friends and GroupsQQ Friends and Groups QQ SpaceQQ Space Tencent microblogTencent microblog Tencent FriendsTencent Friends
FavoritesFavorites RelayRelay
Reply

Use magic Report

You have to log in before you can reply Login | Register 注册

Points Rules

QQ|Archive|Mobile|Dark room|预科联盟  |网站地图

2024-05-20 08:14 GMT+8 , Processed in 0.088044 sec., 21 queries .

Maintained by xzt615, Special thanks to Comsenz and Codersclub

© 1996-2024 BHSS-PFC.

Quick Reply To Top Return to the list