Look back at the 2016 China information security situation

在工控系统、办公设备、智能芯片、计算机固件领域,人们通常会认为安全漏洞较少进而忽略掉,所以需通过加强普及性的安全意识教育,让这些系统的所有者和使用者能结合自身,认识到潜在的安全问题。

点击关注–☝☝☝–幻影卫士
Click on — – Phantom guards
Windows/Linux服务器操作系统
Windows\/Linux server operating system
Windows Server 2003的市场占比持续下降,占比达15%;Linux操作系统中Centos以绝对优势领先,市场占有率达28%,Ubuntu和RedHat表现相对良好,分别占到26%、19%。
Windows Server 2003 market share continued to decline, accounting for 15%; the Centos Linux operating system in the absolute superiority, the market share of 28%, Ubuntu and RedHat were relatively good, respectively accounted for 26%, 19%.
Web服务器市场
Web server market
2016年,Web服务器市场份额过半,Apache表现突出,占比达36%;Tomcat和WebLogic总占比为40%;IIS、Nginx也有良好表现,占比分别为11%和10%。
In 2016, more than half the market share of the Web server, Apache outstanding, accounting for 36% of the total; Tomcat and WebLogic accounted for 40%; IIS, Nginx also has a good performance, accounted for 11% and 10%.
网站服务器市场
Web server market
2016年,云主机表现抢眼,占网站服务器新增出货量的58%。云主机因其具有部署快、弹性扩展力、按需收费等特点,受到广大用户热捧;而VPS作为云主机的前代产品正在逐步被淘汰,新增市场份额持续萎缩,降至3%。
2016, cloud host eye-catching performance, accounting for 58% of the new site server shipments. Cloud hosting because of its fast deployment, elastic expansion force, charging characteristics, by the majority of users blitz; the VPS as the previous generation product cloud hosting is being phased out, the new market share continued to shrink to 3%.
服务器安全健康状况
Server security and health status

从初创到中国WAF的“小半壁江山”:RayWAF背后的故事

不健康的服务器占比66%,亚健康服务器占比26%。
Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%.
网络攻击类型多样
Various types of network attacks
国内服务器、网站安全威胁日益升级,受攻击次数连年跃升。期间网站非法扫描一直是黑客最惯用的伎俩。此外,暴力破解、CC/DDOS攻击、SQL注入攻击、XSS跨站攻击也是黑客常用的攻击手段。
Domestic server, website security threats escalating, the number of attacks in recent years jumped. Illegal scanning site has been the most popular trick hackers. In addition, brute force, CC\/DDOS attacks, SQL injection attacks, cross site attack is commonly used by hackers XSS attacks.
暴力破解
brute force
在暴力破解攻击中,远程登录暴力破解53%、FTP暴力破解24%,数据库暴力破解呈逐年递增趋势,到2016年占比已达23%。值得一提的是,暴力破解每月攻击次数都在千万次以上,属于长期大规模的攻击类型。

企业并购:IT研究公司Gartner将收购CEB,交易价值26亿美元

In the brute force attack, remote login brute force 53%, FTP brute force cracking of the database, the violence is increasing year by year in, accounting for the proportion of up to 23% in 2016. It is worth mentioning that the number of violent attacks every month in the tens of millions of times, belonging to the long-term large-scale attack type.
网络攻击升温

IT男如何避免变成”地中海”

Network attack warming up
2016年DDOS攻击中,美国成为攻击源占比最大的国家,达31.54%;其次是中国,占比达17.61%。
2016 DDOS attack, the attack source become the largest proportion of countries, reached 31.54%; followed by Chinese, accounted for 17.61%.
数据库漏洞
Database vulnerabilities
数据库信息泄露主要由人为因素、数据库自身安全漏洞和第三方恶意组件造成,三大因素共同成为威胁数据库安全的“三驾马车”。
Database information leakage is mainly caused by human factors, database security vulnerabilities and third party malicious components caused by the three factors together to become a threat to the security of the database, the carriage of the three.
最受关注的是高危漏洞
The most concern is high-risk vulnerabilities
高危漏洞集中分布在Oracle和Mysql数据库中。中危漏洞占漏洞总数的56%,低危漏洞数量最多占据了36%、高危漏洞占据8%的比例。
High risk vulnerabilities concentrated in the Oracle and Mysql database. The number of vulnerabilities accounted for 56% of the total vulnerability, the number of low-risk vulnerabilities accounted for up to a maximum of 36%, high-risk vulnerabilities accounted for the proportion of 8%.
安全漏洞类型
Security vulnerability type
安全漏洞对象,主要以应用程序为主,占到总体的47%;其次网页自身漏洞和操作系统漏洞也不容忽视,分别占到29%、11%。
Security vulnerabilities, mainly to the application based, accounting for 47% of the total; secondly, the vulnerability of the page itself and operating system vulnerabilities can not be ignored, accounting for respectively, 29%, 11%.
网站漏洞危险等级分布
Site vulnerability risk level distribution
据统计,2016年网络攻击漏洞中,高危漏洞占比为71.3%、低危漏洞占19.4%、中危漏洞占9.3%
According to statistics, in 2016 the network attack vulnerabilities, high-risk vulnerabilities accounted for 71.3%, low-risk vulnerabilities accounted for 19.4%, the risk of vulnerabilities accounted for 9.3%
Webshell
Webshell
2016年,从城市分布来看,拦截Webshell攻击最多的城市为北京市(27%),其次为上海市(19%)、广州市(14%)、天津市(7%)、深圳市(6%)。
In 2016, from the perspective of urban distribution, intercept the most Webshell attack for the city of Beijing (27%), followed by Shanghai (19%), Guangzhou (14%), Tianjin (7%), Shenzhen (6%).
最易遭受攻击的行业排名
The most vulnerable industry rankings
互联网金融及电商一直是黑客攻击的最主要行业,因其牵涉的资金量大、用户信息敏感、线上平台有待完善,被众黑客当作主要攻击对象也很正常;此外,网游、相关政府以及教育科研等行业的安全问题也不容忽视,需要引起多方面的高度重视。
Internet banking and electricity supplier has been the main industry of hackers, because it involves a large amount of funds, sensitive user information, online platform to be perfect, as the main target of attack by the hacker is normal; in addition, security problems of online games, the relevant government and education and scientific research industry can not be ignored, need to pay close attention to more the.
金融细分行业漏洞分布:金融机构漏洞最多,保险业紧随其后
Distribution of financial sector vulnerabilities: financial institutions most loopholes, followed by the insurance industry
金融机构由于包含业务种类繁多,漏洞数量最高。新兴互联网金融,由于对业务的追赶速度和要求远高于安全需求,虽然业务发展不长,但暴露的安全数量和威胁却名列前茅。截至2016年底,全国范围内近200家互联网金融平台被爆出存在漏洞。
Financial institutions due to a wide range of services, the highest number of vulnerabilities. Emerging Internet banking, due to the pursuit of speed and requirements of the business is much higher than the security needs, although the business is not long, but the number and threat of exposure is among the best. As of the end of 2016, nearly 200 nationwide Internet banking platform was found loopholes.
国际网络安全环境堪忧:境外攻击大幅上涨
International network security environment worrying: offshore attacks rose sharply
2016年,来自境内的网络攻击明显增多,其中大部分攻击针对中国政府网站和P2P平台。境外的网络攻击占比35.3%。由于攻击源来自境外,给追踪造成巨大麻烦。还有4.4%的攻击源不明,不管是来自境内还是境外,都要对此类安全隐患尽早防范、有效规避。
2016, from the territory of the cyber attacks increased significantly, most of the attacks against the Chinese government website and P2P platform. Overseas network attacks accounted for 35.3%. As the source of the attack from outside, to cause great trouble tracking. There are 4.4% of the source of the attack is unknown, whether it is from inside or outside, we must guard against such security risks as early as possible, effectively circumvent.
2016年网络安全大事记
Network security event in 2016
北京德普信科技有限公司
Beijing Depp Technology Co., Ltd.
幻影卫士
Phantom guard

微信公众平台:BJ-depsen
暴力恐怖与意外灾难事件致使不必要的安全等级升高
WeChat public platform: BJ-depsen
网址:www.depsen.com
URL: www.depsen.com
微博:Depsen
Micro-blog: Depsen
用科技改变生活
Change life with technology
长按二维码浏览官网
Long according to the official website of the two-dimensional code
2016年,网络攻击和数据泄露事件频频发生,并从PC端延伸到移动端。随着物联网、设备虚拟化的普及,网络攻击的规模将会越来越大,攻击手段也会越来越多,造成的影响会越来越严重。
2016, network attacks and data breaches occur frequently, and extends from the PC to the mobile terminal. With the popularity of the Internet of things, equipment virtualization, the scale of network attacks will be growing, means of attack will be more and more, the impact will be more serious.
从目前来看,很多企业一直忽略的操作系统自身漏洞,导致黑客、恶意程序趁虚而入,给企业安全造成了严重危害。同时,针对企业服务器集群的APT攻击依旧强势,黑客攻击已经做到了产业化和普及化,安全防护需要做到快速响应、及时解决。不仅如此,要想做到企业服务器安全管理更加全面,更需要对未知威胁进行安全防御。
From the current point of view, their vulnerability to operating system of many enterprises has been neglected, leading to hackers, malware swoop, caused serious harm to enterprise security. At the same time, for the enterprise server cluster APT attack is still strong, hackers have been done to achieve the industrialization and popularization, security needs to achieve rapid response, timely resolution. Not only that, in order to achieve the enterprise server security management is more comprehensive, but also need to carry out the security of unknown threats.
目前的安全产品主要集中在已知安全漏洞检测和防御,对未知威胁的检测和防御一直是市场的短板。幻影卫士桌面安全与容灾系统从硬件裸设备层入手,采用独创的IDV架构模式,从底层解决了系统漏洞问题,即保证了桌面端的安全管理容灾,又有效的化解了服务器安全的隐患,同时结合特有的数据非明文备份恢复功能,为企业提供了一套安全闭环结构。
The current security products are mainly concentrated in the known security vulnerabilities detection and defense, the detection and defense of unknown threats has been a short board of the market. The phantom guards desktop security and disaster recovery system starting from the bare hardware device layer, using the original IDV architecture model, from the bottom to solve the loopholes in the system, which is to ensure the desktop security management of disaster recovery, and effectively resolve the server security, combined with the specific data of non plaintext backup and recovery functions, provides a set of safety loop structure for enterprises.
信息安全是一个不容忽视的问题,维护中国网络信息安全是幻影卫士的目标和使命,在2017年,我们将继续深入研发,扩展合作,投入我们的热情,为早日实现国产自主可控信息化安全贡献我们的力量。
Information security is a problem that can not be ignored, the maintenance of network information security is Chinese shadow defender’s goal and mission, in 2017, we will continue to further expand cooperation in research and development, our enthusiasm for the early realization of domestic self-control of information security in our contribution.
微信扫一扫关注该公众号
Sweep the concern of the public, WeChat

遵循良好的网络安全做法,以防止到您的系统的不必要的访问是非常重要的。把坏家伙们挡在外面,同时允许必需的业务活动正常进行是这一游戏的规则。

猜您喜欢

网络控制系统的信息安全研究
互联网金融您不知道的肮胀交易
网络安全公益短片防范移动僵尸网络
钦州:果农通过“互联网+”电商模式网上销售
CHU-GRENOBLE GREATRACEAUTOCICERO
信息安全意识游戏之捕鱼达人主题赛