Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Argh (Score 1) 92

>Stuxnet infected a PC, causing it to change the signals it was sending to
>motor speed controllers, thus fouling up a process. Which is why you keep
>your SCADA PCs as far away from the Internet as you possibly can.

Stuxnet actually reprogrammed the PLCs, too. See the analysis at

http://www.symantec.com/connect/blogs/stuxnet-breakthrough

Comment Re:Cheap, but what about ongoing costs? (Score 1) 140

I work for a company where data is subject to HIPAA (United States' Health Insurance Portability and Accountability Act - a law whose provisions also address the security and privacy of health data). Our data has been encrypted -- at rest and in transit -- for years. The loss of private health information, like what Blue Cross did, is a serious crime under HIPAA and subject to major fines (in this case, at least tens of millions of dollars, probably, given how large the breach was). The initial cost to encrypt and any ongoing expenses will be pocket change compared to the fines that Blue Cross is potentially facing, with increased fines for repeat offenses.

In practice, once you have disk-level encryption set up for data at rest, and network encryption for transmitted data, your on-going costs are pretty minimal. There's some central administration and IT support to administer and maintain the tools, and your ISO needs to do some compliance reviews and risk assessments to make sure that things stay encrypted, but after installation they are pretty transparent.

Blue Cross should have been doing this all along. Nothing like a large fine to focus the mind.

Comment "Secret phonebook problem" variant (Score 1) 108

>Scale makes all the difference in many things.

The argument against Google's streetview seems to be a variant of the "secretive government agency phone book problem", In that example, the entire phone book is classified but individual numbers are not.

https://webcache.googleusercontent.com/search?q=cache:-x18fG3G-ioJ:www.acsac.org/secshelf/book001/24.pdf+&hl=en&gl=us

Similarly, Google is right that it is taking pictures of public streets, which people are generally free to do (sensitive locations notwithstanding), but the objection is to the compendium of pictures as a whole. This seems to many to be a security problem, possibly because of how easy it makes it for someone to do reconnaissance without actually visiting and taking their own photos, the act of which, presumably, could be detected.

Comment Re:Here's proof that... (Score 1) 114

...it is definitely possible to write secure software if you just simply follow sound and smart development methods and practices... and don't write half-assed, slipshod, thrown-together-in-a-hurry code.

Proof? I don't see any proof in the article that the NSA produces secure software, or even a claim that they do. Instead, the NSA Technical Director quoted in the article said "even within the NSA, the problems of application security remain maddeningly difficult to solve." That doesn't sound like they have solved the problem, but that they, too, are grappling with a fundamental issue in software development.

Comment Re:"Legacy"? (Score 2, Insightful) 73

Firewalls, anti-virus, and URL blockers are not legacy systems at all. They are the state of the art in security precisely because they have to protect legacy operating systems and applications, or new systems built to be backward compatible with legacy systems, which are the real "legacy" problem.

People use all sorts of old software because they have such a huge investment in systems and applications that are built on them. But that old software keeps needing to be patched. For example, there's Windows, of course, 'nuf said, and applications like Adobe Reader. Adobe has to come out with a new patch every week to fix another critical flaw, but they can't simply drop it and start from scratch to fix fundamental flaws - it's not economically feasible. And large numbers of businesses still use IE6, for crying out loud, because of all the infrastructure they've built around it. You can put all the security system armor you want around that soft, chewy center, but there will always be gaps.

As critics like Bruce Schneier have been pointing out for a long time, on the other hand, we've known how to prevent whole classes of attacks for many years, but no one seriously expects these fixes to be implemented because of the economics.

That said, there's no protection when administrators and users do stupid things with passwords and the like. Phishing will always work, no matter how hardened we make our systems. At best, we can put bounds on the damage.

Comment It destroys memory and weakens the mind (Score 1) 218

“[It] destroys memory [and] weakens the mind, relieving it of ... work that makes it strong. [It] is an inhuman thing.” The "it" referred to is writing. These words are attributed by Plato to Socrates, but you could easily replace Socrates with Carr and writing with "the Net" and you have essentially the same argument.

Comment Airforce handicaps (Score 1) 148

Few women, no gays, age limit. Then, too, there's the religious intolerance that has been reported at the Air Force Academy. (Google it, there are a lot of articles, most when it was first reported in 2005, but also since then.) I wonder what percentage of people with the talents needed to be "cyberwarriors" are evangelical Christians?
Image

Living In Tokyo's Capsule Hotels 269

afabbro writes "Capsule Hotel Shinjuku 510 once offered a night’s refuge to salarymen who had missed the last train home. Now with Japan enduring its worst recession since World War II, it is becoming an affordable option for people with nowhere else to go. The Hotel 510’s capsules are only 6 1/2 feet long by 5 feet wide. Guests must keep possessions, like shirts and shaving cream, in lockers outside of the capsules. Atsushi Nakanishi, jobless since Christmas says, 'It’s just a place to crawl into and sleep. You get used to it.'”

Comment Re:Win for Tivo - Lose for Customers (Score 1) 437

I have over 60 hours of programming on my DishNetwork DVR! How will I ever find time to watch it all before my DVR is disabled?

On the other hand, how would I ever find time to watch it all if it isn't disabled? If I had time to watch all that much TV, I wouldn't have so much stored on the DVR. Most of the stored stuff is old PBS shows or serious movies that I "should" watch, if I ever get around to it. This reminds me of the article about Netflix a short while ago, where it was found that movies people really wanted to see were watched and returned overnight, but movies that people felt they "should" see ("Schindler's list" was mentioned), tended to remain unwatched for weeks and then were often returned unwatched.

I'd better off-load to DVD the stuff I really want to save, though, just in case.

Slashdot Top Deals

Money is the root of all evil, and man needs roots.

Working...