The reason why Protect the Net should be replaced by hw is to make it easier to remember.
According to a query to the official website of the HuffPost community, the hw is to make it easier to remember that the Protect the Net operation is a network security attack and defense exercise organized by the Ministry of Public Security. The purpose is to target a nationwide real network target for the object of the actual combat attack and defense activities, aimed at discovering, exposing and solving security problems, test China's major enterprises and institutions, the Ministry of network security protection level and emergency response capability.
Cyberspace as the country's fifth space, its security is as important as territorial security and airspace security. The essence of cybersecurity is in confrontation, and the essence of confrontation is in the comparison of the capabilities of both attack and defense.In 2016, the Ministry of Public Security, together with the Civil Aviation Administration and the State Grid, organized and carried out the Protecting the Net 2016 cybersecurity attack and defense exercise. Since then the HW operation has become an important part of network security construction, and is a concrete initiative to implement the construction of a strong network country and win the cyber war.
Importance of protecting the network
Protecting the network with China's attention to network security, the units involved in the expansion, more and more are joining the protection of the network, network security confrontation exercises closer and closer to the actual situation, the various organizations to deal with the demand for network security is also from the passive construction, upgraded to the business of guaranteeing the immediate needs.
With the rapid development of big data, the Internet of Things, cloud computing, the increasingly intense network attacks have become a new challenge to national security. Protect the network action is organized by the public security organs of the network security attack and defense exercises, each team of 3-5 people composed of a clear target system, unlimited attack path, access to the target system's permissions, data can be scored, prohibit the implementation of destructive operations on the target, the operation of the key areas of the target system need to be approved by the command.