backtop


Print 25 comment(s) - last by ayat101.. on Oct 28 at 2:26 AM

China remains the largest cyberthreat to the western world

The threat of cyber attacks by China is increasing as hacker groups begin to organize with a Chinese government interested in increasing its long-term cyber attack capabilities.

An independent report issued by the congressional advisory panel said some elite groups of hackers are controlled by Beijing officials who issue the groups orders on targets to attack.

The Chinese government continues to build a cyber army aimed at attacking the U.S. government and other western nations, the U.S.-China Economic and Security Review Commission noted in its report.  The Pentagon, electric grids, and similar high-profile targets need to be better protected from foreign-based threat.

Even without endorsement of the Chinese government, independent hackers still pose a serious threat.  The U.S. military has created a new cyber defense department to better protect military computer networks, even though a recent report is pleading with the government not to spend a lot on cyberdefense.  President Barack Obama also is expected to announced a cyber security advisor who will discuss cyber issues with officials.

Along with China, hacker groups in Eastern Europe and North Korea have also reportedly attacked western targets in the past.  If the U.S. government cannot do a better job protecting its infrastructure, cyber attacks that end in compromised data, crippled networks and heavy repair costs will begin to devastate victims.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: UHOH HOTDOG
By ayat101 on 10/27/2009 12:47:15 PM , Rating: 3
... certainly, but Windows have firewalls too. I am not sure how a computer with properly configured security, Linux or Windows, can be accessed without permission. Add DOS detection at switch/router level, and you are done.

I have several computers, both Windows and Linux, and quite simply my philosophy is that only specific computers can connect to specific machines.

Why in the world would you allow open access to sensitive computer systems?!

The problem is a lot of computers ARE NOT configured with security in mind. Not even Linux is perfect... try setting up private key access through ssh on Linux. The so called hacking is the exploitation of other people's mistakes - design the OSs so these are not allowed.


RE: UHOH HOTDOG
By CommodoreVic20 on 10/27/2009 9:02:30 PM , Rating: 3
Not exactly. A lot of enterprise level firewalls and switches have weaknesses in them. Exploiting those weak links can easily compromise the security. Same goes for any OS. Its exactly that type of thinking that allows these cyber attacks to successfully occur. These hacker groups usually work by finding and exploiting these weak links and when they don't exist, they create them. For instance a lot of firewalls are now using open sourced OSes and software. Any competent developer or group of developers can join and contribute code to an open source project. A trust relationship isn't difficult to form and before you know it back doors and vulnerabilities can intentionally be introduced. That is just a simple basic example, but you can imagine what can be accomplished when a government with great financial resources is enabling such a group. There is no easy solution to the problem.


RE: UHOH HOTDOG
By ayat101 on 10/28/2009 2:26:03 AM , Rating: 2
... this is the same as what I said.

Something like security certified Linux distro is needed. Plus holes can be plugged - you just have to know how to set up secure systems... and the knowledge is the lacking part.

The only reason for cyber "defense" I can think of is to have the ability to conduct OFFENSIVE actions.


"Paying an extra $500 for a computer in this environment -- same piece of hardware -- paying $500 more to get a logo on it? I think that's a more challenging proposition for the average person than it used to be." -- Steve Ballmer

Related Articles













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki