chrome hearts
asics

chrome hearts

chrome hearts
chrome hearts

Tuesday, February 4, 2014

Solar Sunrises and Moonlight Mazes

Solar Sunrises and Moonlight Mazes

Department of Defense in 1969. government in the last ten years, such as Solar Sunrise and Moonlight Maze, prove that an original creator does not know all forever. Some news stories call the attackers brilliant or sophisticated but I find them to be anything but. Like most engineered attacks, even against normal Internet users, hackers focus on very weak vulnerabilities and betrayals of common sense. Government security officials claim they are suffering from hightech espionage but I think it merely boils down to the basics of phishing and social engineering. government to obtain sensitive information. As I read an article detailing how a hacker in China sent a very believable email to an executive of a government consulting firm, it made me realize how far we are from sealing security here. Even if the government IDS, Einstein, ever reaches the front of all government networks, there is no way to successfully stop human error. But I have an idea for them.

The only answer to keep hackers out of government information is to completely lock down all of the networks. No agency would receive an email unless it most definitely traced from a certain range of government IP addresses. Agencies just outside of the government performing any work would have to use the same method. With multiple reinforced layers, there would be no way an email originating from China and passing through untrusted networks would reach an official. This recurring problem of faked emails including malware should be stamped out before anything else moves forward. I scratch my head wondering why this is still an issue?

While the rest of Internet users just try to keep their online banking logins secure and keep spam out of their inboxes, the government will spend $17.0 billion dollars on a cyber initiative. The Bush administration cyber initiative, known as Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer. Hackers seemingly based in China stole untold amounts of email data from the Department of Defense servers. This initiative, which has been in talks since 2007, will create guidelines on auditing government networks. Unfortunately the initiative has not even reached a starting point as we head towards 2009. At least I have trouble finding if it has. Their slow pace frightens me. What else will hackers uncover during this period of disorder?

No comments:

Post a Comment