Monday, March 9, 2015

1:59 PM
network security

Eric Filiol, cryptologist from the military, heads the Laboratory of Virology and Operational Cryptology ESIEA West (College Computer, electronic and automatic). When, for the third time in four years, researchers have recently demonstrated that certain electronic certificates can be counterfeited, he commented on the evolution of computer security.
Why this critical flaw in Internet security has she not been filled?
This is the eternal problem of security: it has a cost, both financial and human. In this case, the different certificate authorities, and more generally, industrial computers, has not seen fit to invest, preferring to put the scope warnings. Laxity which may bear the brunt users who log on seemingly trustworthy sites.
Espionage, data theft, racketeering: the power of nuisance "cyberbandits" goes well beyond the hacking of secure sites.
 This electronic crime will increase?
Successful cyber attacks are by definition undetectable, it is very difficult to assess their real impact. Especially as businesses such as banks do not boast and do not file a complaint until the damage is not greater than the benefit. All we can say is that any good computer, anywhere in the world, is a potential threat. And it is much more profitable and less risky to practice computer data abduction abduction of the child. Or go rob a bank.
What is the most effective weapon for pirates of the Web?
The big threat is the "botnets": a set of zombie machines fell under the control of an attacker via a "worm" or a Trojan horse, and exploited maliciously. The biggest botnets discovered in the world involving the takeover of three to four million machines: with that, a single hacker can do whatever he wants. Attacking Estonia, for example, as was the case in May 2007. The botnet responsible for this state cyberwar was directed to all Estonian servers, he bombarded with digital packets. Result: all the services of the country were paralyzed. Similarly, a company may well hire the services of a botnet to cripple a competitor.
Technically, what safeguards hope against these threats?
None. The most powerful firewall never remove all risks. As for antivirus, they only detect known viruses. As in the medical vaccination, they only deal with the past. But the difference is the contamination time scale: for biological virus, it is counted in weeks or months, for computer viruses in seconds. In early 2003, when the Slammer worm attacked more than 200,000 servers, the planet has been infected in fifteen minutes. The same attack today take a minute.
Internet security is going to become more and more out of control?
It already is! And it was not all bad. If there were truly secure systems, the criminals could use to their advantage, and the police could no longer act. Hence the idea for states to use the same tools that hackers - spyware virus for example - to identify. Just as democracy is the worst system of government except all the others that freedom is the computer "less worse" solutions. It will pose huge problems because its means of intervention, everyone, have unparalleled power. We should be able to legislate. But given the excitement generated by the Internet, speed of development and the interests at stake, we do not take the time to think.
Computer weapon has it become a deterrent?
Nuclear power was a deterrent because few countries had, and needed to acquire a degree of advanced technology development. Stored data, anyone can start his bomb. All the ingredients for a disaster scenario (economic war between competitors or inter-state war) are thus combined. The experts are wondering more if it can happen, but when.
Can we limit the damage?
Avoid any scanned. Viruses do not read the paper, but they can read everything that is scanned. Result: it has never produced as much information with as much risk of losing them.
Interview by Catherine Vincent

0 comments:

Post a Comment

 
Google Analytics Alternative