Zhou Hongyi believes that cyber warfare will become the first choice for war, and must also look at cybersecurity from a combat perspective.

“Network security must be viewed from a combat perspective.”

On August 19th, at the 7th Internet Security Conference (ISC) hosted by 360, 360 Chairman Zhou Hongyi made this point. He added: Cyber ​​warfare is a sensitive word that was not mentioned in the past. I said cyber warfare, they said that I am a militant. I feel that we must face up to the reality of cyber warfare.”

Based on this background, Zhou Hongyi also announced again at this conference that 360 will enter the enterprise security market. In April of this year, 360 Company took the entire shareholding of Chi Anxin (the main body of 360 enterprise security business operations), but Zhou Hongyi did not intend to give up this market and announced 360 to return to this field.

This time, he more clearly explained the reasons and positioning for entering the security market of government and enterprises:To enter the security of enterprises is not 360 We provide security services for party and government military enterprises. We are positioned to help people build infrastructure under the national network war, helping enterprises and countries to see attacks and block the ability to attack and repair systems.” /p>

With the increasing number of cyber warfare at the national level, cyber warfare has gradually entered the public eye. At the conference, Zhou Hongyi first listed a series of cyber wars between countries.

In 2019 alone, there were many eye-catching cyber wars. In March, Venezuela’s massive power outage, the President Maduro said that this was the “electric war” launched by the United States. In June, Brazil, Chile, Uruguay, Argentina and other four South American countries suffered a large-scale blackout, according to Central 视引引 Argentine “Clarion” reported, The Argentine Energy Minister said: “Although this blackout is not a major assumption, it does not rule out this possibility.” The same month, New York The Times reported that the Russian grid was implanted in the back door. In June, the United States destroyed Iran’s missile control system through cyber attacks.

In April of this year, APT34 organization (Iranian spy organization) network weapons were exposed, and 12 institutions in China such as finance, telecommunications, energy and transportation were listed as attacked.

ISC Honorary Chairman, Academician of the Chinese Academy of Engineering, He Hezhen said: “OnlyIn the past July, we have seen that some cities in Australia, the United States and other countries have witnessed major accidents of large-scale power outages. More and more facts show that security threats have spread from cyberspace to large-scale manufacturing and power. , transportation, medical and other modern associations in the lifeline industry.

Han Qide, honorary chairman of the China Association for Science and Technology and academician of the Chinese Academy of Sciences, also pointed out: “The cyberspace as the fifth space for human activities alongside the sea, land and air has become a strategic fortress to safeguard national security.”

In this context, Zhou Hongyi put forward the above viewpoint: cyber security must be viewed from a combat perspective.

He believes that cyber warfare has many different traditional warfare features. First of all, its biggest feature is not to declare war, spends a long time attacking and lurking by means of attack, infiltrating into your infrastructure network, at the key When you are a fatal blow to you.

Secondly, as cyber warfare rises from the personal and corporate level to the national level, opponents engaged in cyber security personnel have also changed, cyber warfare The opponents are all network forces established in various countries, and more than 200 cyber warfare units have been established in more than 100 countries. The New York Times has disclosed that the NSA has scored Huawei headquarters network.

Again, the target of cyber warfare is primarily critical infrastructure. Zhou Hongyi said: “Critical infrastructure has become the battlefield of the future. All cyber warfare attacks have not only been used to steal intelligence, but now they can attack infrastructures such as transportation, energy, and finance, and can achieve better damage than traditional operations. “

In the above-mentioned cases, power facilities that affect millions and tens of millions of people are frequently targeted.

Since the cost of cyber warfare is low, the effect is good, and the intensity is controllable, Zhou Hongyi believes that cyber warfare will become the first choice for war.

For how to win cyber warfare, he puts forward the view that it is unrealistic to expect to be an unbreakable system. It is necessary to switch the hypothesis and assume that “the enemy is already with me”, that is, the enemy has already entered us.

Because every system is equal to being attacked, there is no system that can’t break. First, all software and hardware are made by people. If people do it, they will make mistakes. There will be four or six errors in every thousand lines of code. Today, many automated systems, cloud computing, big data, artificial intelligence have a lot of code, there are many vulnerabilities hidden here. Second, no matter how strict cyber securityIt is stipulated that some people in each unit will violate the cyber security regulations and will be attacked by social engineering.

In this context, to win the cyber war, the most basic thing is to see the opponent and the opponent’s tactics. Seeing is “1”, others are “0”. On the basis of seeing, others can make a difference.

If you want to see your opponent, you need cybersecurity big data support. Based on network-wide, long-term data monitoring, effective information is filtered through threat intelligence and knowledge base. In the final match, the decision-making role will be a high-level offensive and defensive expert, and the AI ​​will not be able to play a decision in the short term.

Zhou Hongjun said: “When we use big data and knowledge base to screen out suspicious intrusion signals, it is impossible to automatically find blocking by any automated software. We need high-level security experts. Experts respond quickly and quickly analyze in actual combat to be able to detect and locate attacks in order to block and trace attacks and stop losses.”

Headmap: Reporter Li Zhenliang shoots