The rapid development of internet brings great convenience to our life but also a mass of problems exposed to the public at the same time. The webinarabout “Defense | How Education Sector Can Win the Battle during Red vs Blue” recently launched online. The security problems and solutions that education sector might face were discussed in the event. Chuanxing Liu, the technical expert from Insigma Security Services, introduced Stuxnet-a worm that has swept the world since 2010 themed on “Thinking of Enterprises Network Security from the Aspect of Epidemic Prevention”. The Stuxnet always attacks basic infrastructure in reality, such as nuclear power plant, dam and state grid etc. The spread of the worm is familiar with the novel coronavirus. It hurts thousands of enemies rather than killing them so as to reducing local fighting capacity. Iran was most seriously attacked by the Stuxnet. It attacked industrial automatic control facility of Siemens by using 3 0day bugs which result in the breakdown of a large amount of centrifugal machines, even delayed Iran’s nuclear programme forever.
It can be clearly seen from the above that the spread of Stuxnet can be a threat to state security and the network operating protection pushes us to realize the importance of network security. But most companies are still defending against miner viruses and ransomwares. As a key sector of implementing and popularizing level protection, the education industry is confronted with a large number of security defense loopholes due to its large scale, complex and open network environment of which the most typical is the defensive lapses of black list. We can solve 95% of security problems through the form of white list products + security services, and avoid security vulnerabilities caused by human factors through alerting by security equipment when facing advanced sustainable threat.
WhiteSheild, a product of Insigma Security Services, realizes enforcing strict control over the operating system and avoiding 0day threatening through building truststore, judging the credibility of the execution file, making use of millions of trusted application features along with 7 * 24 hours security audit service based on the white list protection mechanism.