Regarding the practice of information security protection, we have talked about the importance of visibility many times in the past, emphasizing the significance of knowing ourselves and the enemy, not only to grasp the external threat situation, but also to have self-knowledge, we must understand and manage our own weaknesses and attack surfaces (Attack Surface), this is a “visible” strategy, but in fact, we can also apply a “invisible” strategy. What we mean here is not to actively attack hackers and malware organizations, to attack and defend, but It is to make good use of the “invisible” approach to promote information security.
