Security Through Begging
from the even-better-than-security-by-obscurity dept
Last summer, the surprising news came out that Japanese nuclear secrets leaked out, after a contractor was allowed to connect his personal virus-infested computer to the network at a nuclear power plant. The contractor had a file sharing app on his laptop as well, and suddenly nuclear secrets were available to plenty of kids just trying to download the latest hit single. It's only taken about nine months for the government to come up with its suggestion on how to prevent future leaks of this nature: begging all Japanese citizens not to use file sharing systems -- so that the next time this happens, there won't be anyone on the network to download such documents. Beyond the fact that this is unlikely to have any effect (at all) on file sharing in Japan, it has nothing to do with the actual security breach. It wasn't the use of a file sharing system that was to blame here, but the security setup that allows an outside contractor to hook up his personal computer to the power plant's network without doing any kind of security check whatsoever to see if (a) his computer has malware or (b) his computer has file sharing software -- while leaving top secret documents available for his computer to access. If this is how government officials react to such leaks (taking forever and completely missing the root cause of the problem, while suggesting a solution that is impossible to implement), it's almost amazing that such leaks didn't happen sooner.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
Were is the IT's at
[ link to this | view in chronology ]
Re: Were is the IT's at
Pleaze sine op four mor C0re 3nglish callouses next simester!
[ link to this | view in chronology ]
This is bound to work.
[ link to this | view in chronology ]
Re: This is bound to work.
[ link to this | view in chronology ]
Re: Re: This is bound to work.
[ link to this | view in chronology ]
Re: Re: Re: This is bound to work.
Not to get too off topic, but nobody really seems to care what the orginal topic was. Was that irony or sarcasm?
If you're going to rip on someone, at least rip on them for the right reason. Hey, I guess this is related to the orginal topic after all! A good example of finding the wrong root cause. Boy am I good....
[ link to this | view in chronology ]
Re: Re: Re: Re: This is bound to work.
"If you're going to rip on someone, at least rip on them for the right reason."
I think he/she did. Where did you get your education?i·ro·ny (ī'rə-nē, ī'ər-) n., pl. -nies.
Sarcasm, by definition, is a form of irony.
[ link to this | view in chronology ]
Re: Re: This is bound to work.
[ link to this | view in chronology ]
Re: This is bound to work.
For Internet security, this already exists for traffic which complies with RFC 3514.
Firewalls [CBR03], packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. The problem is that making such determinations is hard. To solve this problem, we define a security flag, known as the "evil" bit, in the IPv4 [RFC791] header. Benign packets have this bit set to 0; those that are used for an attack will have the bit set to 1.
[ link to this | view in chronology ]
Re: This is bound to work.
[ link to this | view in chronology ]
Re: Re: This is bound to work.
basically, i don't fully believe anything unless i see it firsthand.
the media is not exactly a trustworthy source of information, to put it delicately.
[ link to this | view in chronology ]
Re: Re: Re: This is bound to work.
[ link to this | view in chronology ]
Re: This is bound to work.
[ link to this | view in chronology ]
Incompetent
[ link to this | view in chronology ]
We're arguing about Iraq now?
[ link to this | view in chronology ]
Next up, NAZIS~
[ link to this | view in chronology ]
job
[ link to this | view in chronology ]
Huawei Isn't Stupid
[ link to this | view in chronology ]