2020 is the year of accelerating the construction of China’s 5g network, and China has become one of the countries with the fastest progress of 5g deployment in the world. However, Zhou Hongyi, chairman and CEO of 360 group, China’s largest network security company, said in an exclusive interview with reporters on the 6th that in the era of Internet of all things, new network security threats are also impending. With the wide use of Internet of things, big data and cloud computing technology, China is gradually entering the digital era. Zhou Hongyi said that the industrial Internet and smart city, which are vigorously promoted at present, involve hundreds of industries. They build the whole city, manufacturing industry and even the country on the Internet and software, thus changing the world. But it must be admitted that there are loopholes in any software, and if there are loopholes, there must be possibility of being attacked. Especially with the development of Internet of things devices, the equipment threatened by network attack will not only be limited to one billion computers or one billion mobile phones, but may be tens of billions or hundreds of billions of intelligent devices. As for the city, “if every building, every light pole, every garbage can and every manhole cover in the city are intelligent, the strength of network attack will be completely different from before.” In this case, how many firewalls and anti-virus software can be installed to the large-scale city intelligent system by conventional methods? Zhou Hongyi believes that with the application of new technologies such as 5g, industrial Internet of things and Internet of vehicles, cyber warfare launched by hackers with national background has become the top security threat facing China. He believes that the threat of such cyber warfare is even greater than that of nuclear war. As we all know, nuclear war’s super lethality and destructiveness are feared by all countries, so all countries will not use it easily. Moreover, countries with nuclear weapons have formed a “terrorist balance” based on nuclear deterrence. This balance means that China has a reliable nuclear counterattack capability, which makes other countries dare not launch a nuclear attack on China easily. However, there is no such “balance of terror” in the field of cyber warfare. A big country has the ability to launch cyber attacks on other countries at will by virtue of its first mover advantage. It also takes advantage of the advantages of maintaining one-way strength and one-way transparency in the field of cyber warfare to launch cyber warfare without any hesitation. According to Zhou Hongyi, cyber warfare has become the first choice in the digital age, and its first feature is undeclared warfare. “Cyber warfare happens every day, and there is no need to wait for the two countries to declare war. If other countries announce a cyber attack on China one day, the relevant work of lurking and infiltrating has already been completed before. ” Secondly, the new network warfare has the ability of entity attack. Because of the existence of the Internet of things, many industrial enterprises and infrastructure such as hydropower, energy, finance and transportation hub are connected to the network. Compared with the previous network attacks to steal secrets, today’s network attacks have turned to destroy industry and infrastructure. In recent years, the cyber attacks between Israel and Iran show this feature in particular, that is, cyber attacks have the actual damage of turning the traditional virtual world attack into the physical world, and the attack effect is no less than that of airplane dropping bombs, but the cost, dynamic and static and controllability are much better. < / P > < p > the third feature of the new type of cyber warfare is its secrecy. “No matter how powerful the intercontinental missiles are, they will still be detected in advance by satellites and radars when they are launched. At least we can know who launched the attack. And the intercontinental strike will take at least 30 minutes to fly, and there will be opportunities for interception. ” When a new type of cyber warfare is launched, it is likely to take advantage of loopholes not yet discovered by other countries to launch attacks, and the adversary may not be aware of it. Moreover, as long as the penetration work is completed in advance, the time required to launch a cyber war is in seconds, so the defense is very difficult. < / P > < p > how to deal with such a new network war threat? Zhou Hongyi suggested that first of all, big data is the foundation of network warfare and apt, so we must pay attention to the construction of network big data. Second, the current security software and hardware are not interconnected with each other, so it is necessary to set up the intelligence standards for detecting loopholes and patching, as well as the intelligence standards for offensive and defensive threats, so that all security manufacturers can exchange information through the data link. Third, the essence of cyber warfare is the confrontation between people. We should not be superstitious about buying a certain security product to solve the security problem once and for all. We should strengthen the training of security experts who have the ability of real network confrontation. Fourth, we must pay attention to the accumulation of network attack and defense knowledge. Because the attack tactics of the opponent are too clever now, we may not be able to prevent it when we are attacked for the first time. However, we should at least study its attack tactics and know how to prevent it if we are subjected to similar attacks. In Zhou Hongyi’s opinion, the traditional network security defense idea is still “treating the head with headache and treating the foot with pain”. In any link, the problem can be solved. It is just a vassal of the informatization project. But this is just like the decoration of a new house. If you only install an anti-theft door after the decoration, the security problem is not included in the overall design, and it is unable to resist the new attack mode constantly upgrading. Therefore, he called on the state to have a top-level design and overall plan for cyber security and cyber warfare defense. ▲Continue Readinggather and watch! Huawei P40 Pro evaluation: excellent mobile phone photography elegant design, do you like it?