Register to reply

Cyber War

by GRB 080319B
Tags: cyber
Share this thread:
GRB 080319B
#1
Jun16-10, 11:25 PM
P: 146
Cyber War: Sabotaging the System





Can electronic/internet systems ever be as secure as physical systems? Seeing how easily e-voting booths can be hacked, money and private information stolen from banks, firewalls and security systems for the DOD and the Pentagon breached and government/military data stolen, and the possibility of domestic infrastructure attacks carried out by hackers, its seems that the current electronic/internet systems are repleat with flagrent security vulnerabilities I know there has been monetary and information theft before the advent of the internet, but it seems like these incidents have become increasingly more common and with increasing severity as the world becomes more dependent on these network systems. Have corporations/governments become complacent with these threats, seeing them as a "necessary evils", to remain connected through the internet? If so, is there any pragmatic solution to this fundamental problem of internet security?
Phys.Org News Partner Science news on Phys.org
Sapphire talk enlivens guesswork over iPhone 6
Geneticists offer clues to better rice, tomato crops
UConn makes 3-D copies of antique instrument parts
Dav333
#2
Jul12-10, 12:11 AM
P: 89
good god this is scary. TB's of data stolen wow
Bill Simpson
#3
Jul12-10, 12:23 PM
P: 1,030
Cyber War: What It Is and How to Fight It, Richard Clarke

http://www.booktv.org/Program/11562/...+Fight+It.aspx

34 minutes 10 seconds into that he gives the three laws of cyber security:
1: Don't have a computer.
2: If you have to have a computer, don't turn it on.
3: If you have to have a computer and you have to turn it on, don't plug it into anything, like the internet.

ShineyPenny
#4
Jul12-10, 04:49 PM
P: 8
Cyber War

From my Naval Systems Security course:

"The best computer protection is only as good as its user."
SpartanG345
#5
Jul27-10, 06:51 AM
P: 72
why don't they not connect to the internet lol, so remote access is impossible.
Would it be possible for the Military to create there own country wide network. But then that could get hacked from within the military
Borg
#6
Jul28-10, 05:08 AM
PF Gold
Borg's Avatar
P: 759
Quote Quote by SpartanG345 View Post
why don't they not connect to the internet lol, so remote access is impossible.
Would it be possible for the Military to create there own country wide network. But then that could get hacked from within the military
The military does have separate networks. Hacking them isn't the biggest concern - those networks are more vulnerable to incidents like the Wikileaks incident that occurred this week.
newtech
#7
Aug1-10, 05:28 PM
P: 4
One thing I was wondering throughout the videos was how was these systems being compromised? Were the attackers using vulnerabilities in the OS, or software that was being used? Were the attackers using social engineering techniques to get information? I had no idea about the previous attacks that caused power outages. That is a scary thought.
Svensken
#8
Aug5-10, 11:45 AM
P: 29
As with everything within hacking:

- You can hack system "X" if there is a hole that allows system "X" to be hacked.
- Since we are humans, system "X" will almost always be open to a dedicated hacker (pref: "cracker").
- We can protect system "X" but we need to be ahead of the game.
GRB 080319B
#9
Aug15-10, 12:35 PM
P: 146
Quote Quote by newtech View Post
One thing I was wondering throughout the videos was how was these systems being compromised? Were the attackers using vulnerabilities in the OS, or software that was being used? Were the attackers using social engineering techniques to get information? I had no idea about the previous attacks that caused power outages. That is a scary thought.
One possible method of intrusion:

Stuxnet could hijack power plants, refineries
XxsithlordxX
#10
Aug21-10, 02:13 PM
P: 9
Bottom line is that its all about 1's and 0's. A system is only as complicated and secure as the human brain that made it. "If it is made, it can be broken".
mugaliens
#12
Oct6-10, 11:56 AM
P: 595
Quote Quote by Svensken View Post
As with everything within hacking:

- You can hack system "X" if there is a hole that allows system "X" to be hacked.
- Since we are humans, system "X" will almost always be open to a dedicated hacker (pref: "cracker").
- We can protect system "X" but we need to be ahead of the game.
Well said, and I'm glad you said it, as many people believe both all OSes and all encryption can be hacked.

Not so.

Just as one-time-pads cannot be cracked provided the pad is sufficiently random, certain operation systems employing the proper techniques are similarly beyond reproach.

Sadly, Microsoft's, Apple's, Unixes, and most of the other common ones aren't among them.
GRB 080319B
#13
Nov20-11, 02:27 AM
P: 146
Cyber Weaknesses Should Deter US From Waging War

Foreign cyber attack hits US infrastructure

This is arguably the first case where we have had a hack of critical infrastructure from outside the United States that caused damage


Register to reply

Related Discussions
Sign Up Now for the PF Cyber Bus Trip to Tom's General Discussion 115
Cyber Inaugural Ball! General Discussion 18
X cyber General Discussion 1
Cyber women test what's real: BBC Social Sciences 1
Cyber sex gone wrong General Discussion 3