Vol 3 Chapter 712: Israel as stable as Mount Tai...


In Tokyo, Japan, the network security department of Mitsubishi Group faces the huge amount of network data that has burst in, making the entire network department as lively as a vegetable market.
With the influx of a large number of data streams, almost all the websites of the Mitsubishi Group could not be logged in within a few minutes.
The huge servers in the Mitsubishi Group are making unpleasant loud noises. The temperature of the computer room is still rising rapidly under a large number of radiators.
Although a large number of engineers under the Mitsubishi Group are trying to modify the server settings to prevent these malicious access requests, the high-intensity server can hardly be opened even in the background.
The entire network department is completely paralyzed just one step away.
In the end, the Mitsubishi Group really had no choice but to turn off the entire network server.
Turning off the server is the last resort, proving that Mitsubishi Group has encountered an unstoppable network disaster.
Otherwise, how could it be possible to shut down such a server? The dignified Mitsubishi Group was forced to shut down the server.
Such news is definitely not a glorious thing.
When the Japanese were eager to buy the Empire State Building and Van Gogh paintings, the Atari bubble (in 1983, atari, the video game giant, did not manage the games developed by third parties strictly, causing consumers to lose confidence and reluctant to buy games and consoles. The U.S. video game industry was hit hard, and the center of the global game industry began to shift to Japan.) Suddenly hit. When the entire United States is feeling uneasy when Japanese capital is attacking everywhere, I am afraid that not many people will think that this once-looking giant would collapse in just 20 or 30 years.
At that time, the Sony Group, which was once invincible, has now completely failed to keep up with the pace of the times.
Not to mention that the Mitsubishi Group is an enterprise that focuses on the military industry. The Internet is not a field that the Japanese are good at.
The decline of Sony is more like the tip of the iceberg, reflecting not only the decline of the Japanese economy, but also the endgame of the declining Internet era in Japan.
At a time when the Internet age has become the mainstream of the global society, Japan has not yet had a larger Internet platform.
The biggest weakness of Japanese technology companies is their indifference and indifference to the Internet trend. Until today, it is difficult to see any attempted and effective actions in this regard in Japan. Even in the face of the impact of Apple, Google, and Twitter, they remembered to build. Its own Internet ecosystem, unfortunately, even if Sony is in this Internet age, it can't keep up with it a step late.
Internet technology is not bad in Japan, but it is still very weak compared to the world's top Internet culture.
This also directly brings a large number of Japanese companies, all of which are very weak in this regard.
Mitsubishi Group is almost the same. There is almost no strong platform as a position. In the face of such a cyber impact, the defensive ability displayed can almost be described as Lian Po Lao.
Of course, it does not mean that there is no defense at all, but the attack reached an intensity that the Mitsubishi Group network could not bear in an instant.
Under such attack intensity, it is difficult for any Internet company that has the ability to hold on to it.
This is completely different from the situation in Israel. Israel is the safest country in the global network environment.
Almost all of the world's mainstream hacking methods were invented by Israel, and even many of the methods used in the United States for Internet use were learned from Israel.
In this regard, even the United States has to admit that Israel is definitely not inferior to the United States in terms of cyber security technology.
The same is true in the face of a strong data flow. The means shown by Israel can be described as zero-delay response efficiency.
When a large amount of data traffic appeared, the Israeli national network immediately activated the emergency mechanism, intercepting the firewall that is the first line of defense in the country as a whole, and intercepted a large amount of information at the first time.
And when the information was intercepted, the information was analyzed immediately, other similar information was quickly locked, and this information was uploaded to the Israeli national security information database.
Then the nationwide network firewalls in Israel were operating almost at the same time, and a large number of data streams that had just entered Israel were all blocked.
Although this kind of defense is far behind the direct and complete interception effect of the base, for any country in the world, such an efficient interception capability is definitely second to none.
But if you think about the environment of Israel, you won’t be surprised. Israel was the first country to use cyber warfare in warfare, much earlier than when the United States paralyzed Yugoslavia.
Israel has carried out cyber attacks on the Middle East countries very early~EbookFREE.me~ At the time, this kind of attack was still very primitive. It was also in this environment that a large number of outstanding cyber warfare masters emerged in Israel, and a world at that time was born. The first hacker.
So far, Israel has never stopped competing with Middle Eastern countries on the Internet. This kind of offense and defense occurs almost every day.
In particular, the cyber attack on Iran has been uninterrupted for a day, and Iran is not easy to bully. In this regard, it often competes with Israel, and it also has a strong cyber warfare capability.
After all, fighting against masters can always get the most valuable experience, and Iran has used these experiences to cultivate a very powerful cyber force.
This cyber troop also frequently invades Israel on the Internet. The two sides can be said to be the longest competing parties in the current cyber world.
Although Iran has used the experience of fighting with Israeli networks to cultivate its own cyber forces, Israel has been maintaining steady technological advancement in the cyber competition with the entire Middle East.
For Israel, a massive data stream attack like this is not difficult at all to defend.
If the network is easily breached in this way, the Israeli national network has long been breached by the Iranians and the entire Middle East world.
There are not many things in Israel, Japan is the tragedy, and Europe and the United States have also been affected a bit.
But this kind of spread is only aimed at targeting those hackers, and countering these hackers' attacks is also very concentrated, and there is no scattered data stream overflowing into the network environment.
I didn't use it to attack those specific targets, but hackers in these countries were unlucky. Almost every hacker and computer was paralyzed.
Latest chapter of Ebook The Red Alert Begins in the Wasteland Click here