Print 25 comment(s) - last by ayat101.. on Oct 28 at 2:26 AM

China remains the largest cyberthreat to the western world

The threat of cyber attacks by China is increasing as hacker groups begin to organize with a Chinese government interested in increasing its long-term cyber attack capabilities.

An independent report issued by the congressional advisory panel said some elite groups of hackers are controlled by Beijing officials who issue the groups orders on targets to attack.

The Chinese government continues to build a cyber army aimed at attacking the U.S. government and other western nations, the U.S.-China Economic and Security Review Commission noted in its report.  The Pentagon, electric grids, and similar high-profile targets need to be better protected from foreign-based threat.

Even without endorsement of the Chinese government, independent hackers still pose a serious threat.  The U.S. military has created a new cyber defense department to better protect military computer networks, even though a recent report is pleading with the government not to spend a lot on cyberdefense.  President Barack Obama also is expected to announced a cyber security advisor who will discuss cyber issues with officials.

Along with China, hacker groups in Eastern Europe and North Korea have also reportedly attacked western targets in the past.  If the U.S. government cannot do a better job protecting its infrastructure, cyber attacks that end in compromised data, crippled networks and heavy repair costs will begin to devastate victims.

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

By wyndhaml on 10/27/2009 11:14:01 AM , Rating: 2
rm -rf /*

By ayat101 on 10/27/2009 11:46:40 AM , Rating: 2
aha... LOL

sudo chmod -R 440 /

By ayat101 on 10/27/2009 11:51:17 AM , Rating: 2
... or better:

1. sudo chown -R root /

2. hosts.deny > ALL: *.cn

&& hosts.allow > sshd: *

By Titanius on 10/27/2009 11:52:52 AM , Rating: 2
The problem with that is they are probably using Windows, not Linux or Unix.

By ayat101 on 10/27/2009 12:47:15 PM , Rating: 3
... certainly, but Windows have firewalls too. I am not sure how a computer with properly configured security, Linux or Windows, can be accessed without permission. Add DOS detection at switch/router level, and you are done.

I have several computers, both Windows and Linux, and quite simply my philosophy is that only specific computers can connect to specific machines.

Why in the world would you allow open access to sensitive computer systems?!

The problem is a lot of computers ARE NOT configured with security in mind. Not even Linux is perfect... try setting up private key access through ssh on Linux. The so called hacking is the exploitation of other people's mistakes - design the OSs so these are not allowed.

By CommodoreVic20 on 10/27/2009 9:02:30 PM , Rating: 3
Not exactly. A lot of enterprise level firewalls and switches have weaknesses in them. Exploiting those weak links can easily compromise the security. Same goes for any OS. Its exactly that type of thinking that allows these cyber attacks to successfully occur. These hacker groups usually work by finding and exploiting these weak links and when they don't exist, they create them. For instance a lot of firewalls are now using open sourced OSes and software. Any competent developer or group of developers can join and contribute code to an open source project. A trust relationship isn't difficult to form and before you know it back doors and vulnerabilities can intentionally be introduced. That is just a simple basic example, but you can imagine what can be accomplished when a government with great financial resources is enabling such a group. There is no easy solution to the problem.

By ayat101 on 10/28/2009 2:26:03 AM , Rating: 2
... this is the same as what I said.

Something like security certified Linux distro is needed. Plus holes can be plugged - you just have to know how to set up secure systems... and the knowledge is the lacking part.

The only reason for cyber "defense" I can think of is to have the ability to conduct OFFENSIVE actions.

"Spreading the rumors, it's very easy because the people who write about Apple want that story, and you can claim its credible because you spoke to someone at Apple." -- Investment guru Jim Cramer
Related Articles

Most Popular Articles5 Cases for iPhone 7 and 7 iPhone Plus
September 18, 2016, 10:08 AM
No More Turtlenecks - Try Snakables
September 19, 2016, 7:44 AM
ADHD Diagnosis and Treatment in Children: Problem or Paranoia?
September 19, 2016, 5:30 AM
Walmart may get "Robot Shopping Carts?"
September 17, 2016, 6:01 AM
Automaker Porsche may expand range of Panamera Coupe design.
September 18, 2016, 11:00 AM

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki