亚洲av成人无遮挡网站在线观看,少妇性bbb搡bbb爽爽爽,亚洲av日韩精品久久久久久,兔费看少妇性l交大片免费,无码少妇一区二区三区

  免費注冊 查看新帖 |

Chinaunix

  平臺 論壇 博客 文庫
最近訪問板塊 發(fā)新帖
查看: 3316 | 回復: 0
打印 上一主題 下一主題

The Feds\' Top Hacker Speaks [復制鏈接]

論壇徽章:
0
跳轉到指定樓層
1 [收藏(0)] [報告]
發(fā)表于 2002-08-29 10:03 |只看該作者 |倒序瀏覽
The Feds\' Top Hacker Speaks  -- By Sharon Gaudin \r\nOne man is known for attacking the computer networks at various government agencies in the United States. \r\n\r\nHis photo, along with a warning to not give him admittance to the building, is posted all around the Beltway. He may not necessarily be the most popular guy in town but 24 government agencies, like the IRS and the Department of Agriculture, are more secure because of him. \r\n\r\nKeith A. Rhodes, chief technologist with the U.S. General Accounting Office, makes it his business to attack the networks so he can find any holes and seal them up before a malicious attack can take advantage of them. \r\n\r\nRhodes and his team run penetration tests 10 times a year, and they never fail to break in. Here he talks about what companies should be doing to protect themselves, what risks are looming ahead and what exciting security technology is coming down the road. \r\n\r\nQ: How good are U.S. companies at protecting their computer networks and their information?\r\nIt\'s uneven. Some firms are very, very good and they tend to be banks, the stock exchange and other financials. The day-to-day run-of-the-mill business is not all that good. That\'s one of the myths that needs to be dispelled -- that the government is the only one that doesn\'t know how to do security. Because of the testing work the government does, they actually do it better than the private sector. \r\n\r\nQ: What are companies doing right?\r\nThey are laying out firewalls. They are putting routers that filter packets and filter IP addresses. They are doing more employee awareness. They are installing better login authentication systems. They are doing secured conferencing more than the government is. But it\'s still uneven. You go to some firms and you see all those things in place. You go to some other firms and see next to nothing in place. \r\n\r\nQ: What isn\'t working when it comes to corporate security?\r\nThe chief security officer is not in the boardroom. The CIO is not speaking for security. The CIO is speaking for the business function, and I accept that because he is a business director. What cache does the security officer have with executives in the company? If he doesn\'t report to a top executive, the company isn\'t taking security seriously. If the CIO and the CTO are in the top box and the CSO is just outside the box, they\'ve got to rearrange their priorities. If the CSO isn\'t in the boardroom, then the company goes forward at its own peril. \r\n\r\nQ: What is the biggest corporate security threat today?\r\nIndustrial espionage -- someone trying to steal your idea. This is an idea game. Somebody wants to steal your patents, or your first production line item, or how you\'re going to bid on a contract. They want the normal stuff that any other business wants. Don\'t try to nail it down to an individual country. Everybody in the global market is in business for themselves, and they\'ll come after you one way or another. They\'ll see you at a conference and they\'ll come after you there. They\'ll say they\'re a grad student doing some research. People are going after your information like nobody\'s business. \r\n\r\nQ: What security risks are looming ahead that IT executives should be preparing for?\r\nOne of these days in the not so distant future, your PDA, your laptop and your phone will be one appliance. It will be video and it will be voice. It will be everything to you. When you have everything in one place, then it becomes very dangerous. If somebody does the digital equivalent of a smash and grab, you could lose everything -- all your information. That\'s what people need to worry about. If you keep your entire digital life and your corporate plan and everything else all in one place, when somebody gets it physically or virtually, then you\'re done. \r\n\r\nQ: What security technology is coming down the pike that you\'re the most excited about?\r\nThere are some tools that are coming to secure this all-in-one laptop/desktop device. High levels of encryption are coming. We\'ll be able to get the entire corporate network security structure in a handheld device. I\'ve seen some prototypes and it\'s really quite exciting. The chips are small and high-powered. You can put them into these smaller devices and it\'s amazing to see the miniaturization of the technology. And some national labs are working on quantum cryptography -- basing cryptology on sub-atomic particles. They\'re using the vibrations of atoms to generate random numbers. It\'s nano technology in terms of very, very small locks for your data. Molecular-size security devices. \r\n\r\nMay 10, 2002\r\n \r\n
您需要登錄后才可以回帖 登錄 | 注冊

本版積分規(guī)則 發(fā)表回復

  

北京盛拓優(yōu)訊信息技術有限公司. 版權所有 京ICP備16024965號-6 北京市公安局海淀分局網監(jiān)中心備案編號:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年舉報專區(qū)
中國互聯網協會會員  聯系我們:huangweiwei@itpub.net
感謝所有關心和支持過ChinaUnix的朋友們 轉載本站內容請注明原作者名及出處

清除 Cookies - ChinaUnix - Archiver - WAP - TOP