送女生什么礼物好| 几天不大便是什么原因| 12月8日是什么星座| 仓鼠夏天用什么垫料| 谷氨酸是什么| 蜈蚣为什么不能打死| 如果你是什么就什么造句| 深渊什么意思| 元五行属性是什么| 检查怀没怀孕挂什么科| 排卵期一般在什么时候| 阴虚阳亢是什么意思| 性激素六项什么时候查| 什么是居间费| 腹泻吃什么药好| 政委是什么军衔| 抗hp治疗是什么意思| 背疼是什么原因引起的女人| 女性为什么不适合喝茉莉花茶| 歹且念什么| 尿常规粘液丝高是什么意思| 女人脱发是什么原因| 喉咙痛吃什么药| 女性私处为什么会变黑| 什么的笋| 男性粘液丝高什么原因| 性交是什么| 淋漓不尽是什么意思| 白色糠疹用什么药膏| 乙肝有抗体是什么意思| 口腔医学是什么| 什么牌子的麦克风好用| 樟脑丸是什么| 宝宝湿疹用什么药膏| 红红火火是什么意思| 生育登记服务单是什么| 医生规培是什么意思| 属鼠男和什么属相最配| 芒果不能跟什么一起吃| 二甲双胍是什么药| 什么防晒霜好用| 黄茶属于什么茶| 梦见下雪是什么| 口蜜腹剑是什么意思| 睡不着觉是什么原因| 什么是肺部腺性肿瘤| 三花聚顶是什么修为| 氩气是什么气体| 斜视是什么症状| 何以笙箫默什么意思| 八月二十八是什么星座| 胰腺疼吃什么药| 11月1号是什么星座| 腹部疼痛挂什么科| 为什么人会衰老| 羽加立念什么| 上颌窦炎症是什么病| 有胃火口臭怎么办吃什么药| 羊水是什么| 气短心悸是什么意思| 反流性食管炎是什么症状| 蚂蚁喜欢吃什么食物| adh是什么| 疱疹是什么| 两侧肋骨疼是什么原因| 老人适合喝什么茶| 坐班是什么意思| 什么是玫瑰痤疮| 凤凰指什么生肖| 郡主是什么身份| mint什么颜色| 乳房发烫胀痛什么原因| 超声波是什么| 血糖高吃什么主食好| 前卫是什么意思| 牛柳是什么肉| 吃葡萄皮有什么好处| 胰腺炎是什么原因引起的| 汉尼拔是什么意思| 高血压可以喝什么饮料| 真谛是什么意思| 排暖期出血是什么原因| 外阴溃烂用什么药| 麂皮是什么皮| 卫字五行属什么| 菊花不能和什么一起吃| 妄想是什么意思| 为什么黑色吸热| 糖耐量是什么| led灯是什么灯| 万里晴空什么意思| 梦见家里水管漏水是什么意思| 牙痛用什么药止痛快| MR医学上是什么意思| 女性缓解疲劳吃什么好| 聚字五行属什么| 梦到老公出轨是什么意思| 粉玫瑰代表什么| 狗狗假孕是什么症状| 紫苏是什么东西| 摩羯女和什么星座最配| 头爱出汗是什么原因| 从容不迫什么意思| 教师节给老师送什么礼物| 夺嫡是什么意思| 抢沙发是什么意思| pearl什么意思| 董明珠什么星座| 泉中水是什么生肖| 忠贞不渝是什么意思| 关节痛去医院挂什么科| 变色龙形容什么样的人| 87年属于什么生肖| 劲酒有什么功效| 幽门杆菌的症状是什么| 柳暗花明是什么生肖| 苹果a1660是什么型号| 夏至是什么意思| 果葡糖浆是什么| 心烦焦虑吃什么药| 现在去贵州穿什么衣服| 肚子疼吃什么药管用| 女人做爱什么感觉| 红豆是什么意思| 下呼吸道是指什么部位| 出汗臭是什么原因| 户口是什么意思| 办护照有什么要求| ed什么意思| s是什么牌子| 梦见西瓜是什么意思| twice是什么意思| 痛风发作吃什么药| 咖喱是什么做的| 虚岁31岁属什么生肖| 淋巴组织增生是什么意思| 2100年是什么年| 血脂高吃什么中药| 三番四次是什么生肖| 早晨起来口干舌燥是什么原因| 唇炎去医院挂什么科| 出库是什么意思| 硬笔是什么笔| 男孩什么时候开始发育| 梦见小葱是什么意思| 什么是转基因食品| 耳石症是什么意思| 红花泡脚有什么好处| 证明是什么意思| 十指连心是什么意思| 乳糜血是什么意思| 既济是什么意思| 西米露是什么| 1977年是什么年| 虎虎生风是什么意思| 麝香对孕妇有什么危害性| 啃手指甲是什么毛病| 季昌明是什么级别| abo是什么血型| 眼睛干涩是什么原因| 经信局是干什么的| 付字五行属什么| 固精缩尿是什么意思| afc是什么意思| mio是什么意思| 羊水偏多是什么原因| 什么茶是绿茶| 胡萝卜不能和什么一起吃| 备孕前需要做什么检查| 立本是什么意思| 2025年属什么| 便溏是什么原因引起的| 为什么奢侈品都是pvc| 手指甲上有白点是什么原因| 6月6日什么星座| 甲状腺结节吃什么好| 青少年流鼻血是什么原因引起的| 什么食物是养肝的| 晨五行属什么| 新生儿嘴唇发紫是什么原因| kms是什么药| 经常失眠是什么原因| 10月4日什么星座| 脑梗吃什么药可以恢复的快| 封豕长蛇是什么意思| 侏儒症是什么原因引起的| 咒语是什么意思| 来大姨妈量少是什么原因| 身体发抖是什么病| 牛有几个胃分别叫什么| 胳膊肘疼痛是什么原因| 好事多磨什么意思| 什么是食品添加剂| 三伏天吃什么对身体好| 什么是原则性问题| 不等闲是什么意思| 什么光会给人带来痛苦| 甲亢和甲状腺有什么区别| 菩提树是什么树| 蛋白粉什么时候喝效果最好| 流产是什么症状| 舒克是什么职业| 月柱华盖是什么意思| 为什么心里总想一个人| 猫不能吃什么| 紫阳茶属于什么茶| 脑干诱发电位检查是检查什么| 1893年属什么| 害是什么意思| 叹气是什么意思| 紫草是什么| hkc是什么牌子| 书生是什么生肖| 弟子规是什么意思| 为什么会长结节| 过敏性紫癜是什么原因引起的| 狗牯脑茶属于什么茶| 嗓子烧灼感是什么原因| 突然胃疼是什么原因| 癌胚抗原是什么| 心脏供血不足吃什么药好| 子宫内膜双层什么意思| 美人尖是什么意思| 菠菜什么时候传入中国| 女性hpv阳性是什么意思| 谷维素治什么病| 胆囊炎吃什么水果好| 肾结石吃什么好| 已读不回是什么意思| 月牙代表什么意思| 什么时候测血压最准| 口爆什么意思| 心理学是什么| 痔疮长什么样子图片| 眼尖什么意思| 芭比q是什么意思| 赤小豆有什么作用| 羊奶不能和什么一起吃| 古代警察叫什么| 海苔是什么做的| 落下帷幕什么意思| 头晕是什么病的前兆| 蛋白高是什么原因| 小孩流鼻血是什么原因| 轻度脂肪肝什么意思| 沙棘对肝脏有什么好处| 梦见拔花生是什么预兆| 快速补血吃什么| 紫外线是什么| 亚撒西什么意思| 蟊贼是什么意思| 佳的五行属什么| 腹部b超能检查什么| 失恋是什么意思| 干眼症用什么药| 北京是我国的什么中心| 肾素高说明什么| 为什么老是梦到男朋友| 肺部积水是什么原因引起的| cacao是什么意思| 楚楚动人是什么意思| galaxy是什么牌子| 去疤痕挂什么科| fs是什么单位| 百度

Search the Site

新闻中心中国常州网 常州第一门户网 常州龙网 常州日报 常州晚报

百度 ”在陈虹看来,“当前我们国家人才制度有三个优势:党管人才的组织优势、中国特色的人才制度优势、注重分类施策的方法优势。

Rupert Murdoch, CEO of News Corp., sits in a car as he is driven along Whitehall, prior to a parliamentary committee hearing on the phone hacking scandal, in London, U.K. on Tuesday, July 19, 2011. (Photographer: Simon Dawson/Bloomberg via Getty Images)

You don’t have to be all that sharp to see that there’s a lot of hacking going on lately. As I type, Rupert Murdoch and his allies are testifying before British Parliament over the mushrooming News of the World disaster (live video here). It seems like everyone on earth is getting hacked: consultants and cops, Sony and the Senate, the IMF and Citi, and firms ranging from Lockheed Martin (China suspected) to Google (ditto) to dowdy old PBS. But is there really more hacking than usual of late, or are we just more observant?

To answer this question, we put together a Freakonomics Quorum of cyber-security and I.T. experts (see past Quorums here) and asked them the following:

Why has there been such a spike in hacking recently? Or is it merely a function of us paying closer attention and of institutions being more open about reporting security breaches?

Thanks to everyone in the Quorum for their sharp and helpful replies. There is a lot of information below, some of it contradictory, much of it provocative. Interestingly, it appears very very hard to quantify the level of hacking in any real way, in part because much of the most “valuable” hacking goes either undetected or unreported.

Bruce Schneier (earlier Q&A here) is an internationally renowned security technologist and author. His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as “the book the National Security Agency wanted never to be published.” Schneier has testified on security issues before Congress and runs the popular blog Schneier on Security.

The apparent recent hacking epidemic is more a function of news reporting than an actual epidemic. Like shark attacks or school violence, natural fluctuations in data become press epidemics, as more reporters write about more events, and more people read about them. Just because the average person reads more articles about more events doesn’t mean that there are more events — just more articles.

Hacking for fun — like LulzSec — has been around for decades. It’s where hacking started, before criminals discovered the Internet in the 1990s.?Criminal hacking for profit — like the Citibank hack — has been around for over a decade.? International espionage existed for millennia before the Internet, and has never taken a holiday.

The past several months have brought us a string of newsworthy hacking incidents.?First there was the hacking group Anonymous, and its hacktivism attacks as a response to the pressure to interdict contributions to Julian Assange‘s legal defense fund and the torture of Bradley Manning.? Then there was the probably espionage-related attack against RSA, Inc. and its authentication token — made more newsworthy because of the bungling of the disclosure by the company — and the subsequent attack against Lockheed Martin. And finally, there were the very public attacks against Sony, which became the company to attack simply because everyone else was attacking it, and the public hacktivism by LulzSec.

None of this is new.? None of this is unprecedented.? To a security professional, most of it isn’t even interesting. And while national intelligence organizations and some criminal groups are organized, hacker groups like Anonymous and LulzSec are much more informal. Despite the impression we get from movies, there is no organization. There’s no membership, there are no dues, there is no initiation. It’s just a bunch of guys. You too can join Anonymous — just hack something, and claim you’re a member. That’s probably what the members of Anonymous arrested in Turkey were: 32 people who just decided to use that name.

It’s not that things are getting worse; it’s that things were always this bad. To a lot of security professionals, the value of some of these groups is to graphically illustrate what we’ve been saying for years: organizations need to beef up their security against a wide variety of threats. But the recent news epidemic also illustrates how safe the Internet is. Because news articles are the only contact most of us have had with any of these attacks.

 

Tal Be’ery is senior web security researcher at the cyber-security firm Imperva.? He has spent years in cyber security as a researcher in the private sector and a practitioner in the military.

 

It’s both. There are more hacking incidents and there’s more visibility to it – so the combined effect gets squared. But there’s much more to it.

The economic drivers behind hacking have evolved dramatically over the years.? In the past, before we put data online, hacking was done for amusement. First, hackers would attack Microsoft because they were big and Bill Gates had lots of money. As websites came online, they mainly presented information and conducted a small level of transactions. Hackers focused on defacement, aka hacktivism, to embarrass these organizations. In the cases where websites focused on transactions (in the early days, it was online gambling), hackers would blackmail site operators with attacks that brought websites down (a “denial of service” attack in geek speak). But eventually, the network firewall was invented to stop this.

Then a crucial development took place: companies began digitizing data (credit cards, intellectual property, etc…). This data had tons of value on the black market, governments included. Consequently, the hacker focus shifted from denying service to stealing data. They’ve built a whole industry around it.

Here’s where we reach a critical problem: companies are poised for the old cyber security model which
was designed to keep the bad guys out. However, the same convenience that allowed individuals to access data from their living rooms meant hackers could too, say from a Starbucks, or a dorm room or Timbuktu. The old paradigm—keep them out—stopped working. Protecting the network, while still important, became secondary to protecting data. Few have recognized this evolution—except hackers. Today, of the $16 billion spent on security, less than 10% goes to data protection.

Here’s what this looks like in real life. When the small town of Pittsford, N.Y., was hacked and lost $139,000, the town supervisor said, “We have good firewalls and anti-virus software, and we weren’t at all lax in our security systems. We thought we were pretty secure.”? Did the same excuse get made at Sony, Epsilon…?? Probably.

We also see more hacking incidents which keeps it top of mind. Unlike in the past, hacking has grown and evolved as a discipline.? There are three types of hacking that currently dominate headlines:

  1. Advanced Persistent Threat (APT):? This refers to government-sponsored hacking. In this case, data theft can be either citizen data or intellectual property. Schematics for weapons are often targeted.? APT is growing for several reasons. It evens the playing field. Suddenly, isolated North Korea can attack the U.S. government, as it did two years ago. APT can also successfully paralyze an opponent’s infrastructure. For example, Stuxnet highlighted how a government could hinder Iran’s nuclear development capabilities. Lastly, APT is not punished. When China attacked Google, what happened to China?? Nothing.?
  2. Industrialized hacking: These are commercial hackers who do it for money. It’s growing for a few reasons: good guys are putting more data/commerce online; and more legal business activity fuels more illegal activity. Also, industrialization makes hacking a more efficient business. Automatic tools help hackers attack thousands of victims in just hours. Just as armies became more effective when they evolved from single shot to automatic rifles, hackers are experiencing the same sort of technological progress. Education is also fueling growth. Hacker forums, for instance, exemplify the spirit of web-based collaboration and education, offering a rich menu of tutorials, advice and technology designed to steal data. Analysis of one forum, with 210,000 registered hackers, showed that approximately 25% of the discussions were focused on hacking tutorials and techniques—ensuring a consistent supply of expertise in the marketplace.
  3. Hacktivism”: This relies on the same methods described above; the purpose however isn’t data theft but rather making a political statement. For example, you may take down a government website or deface it (as was done to Hugo Chavez when his picture was replaced with one of Austin Powers’s Mini Me).? Hacktivism, however, only thrives with attention. Much like terror, it needs media coverage.? No coverage, no terror.? Hacktivism is the same.

 

(Photo: iStockphoto)

Henry Harrison is the technical director for cyber security at BAE Systems Detica, an information-security firm. Harrison supports Detica’s work across government and commercial customers and helps steer investments toward new cyber-security capabilities.

 

Let me?restate what I think is?being asked here. Why is there so much hacking being reported in the media of?late? And is there actually more of it going on than there used to be?

Let’s work backwards. Over the longish term, there is definitely more?of every sort of cyber-crime and cyber-espionage going on than there used to be. Twenty years ago, the world was only very?loosely connected (in an electronic sense)?and still at the?very early stages of dependence on I.T. — so the returns to be had from hacking and other forms of nefarious?electronic activity were relatively limited. Since then, the world’s interconnectedness has grown quite astonishingly, meaning there are much greater incentives for those who want to hack into both corporate and personal I.T. systems.

What’s more, the online environment presents very little in the way of disincentive for this sort of activity. There are numerous ways to obscure the source of an attack, meaning that it’s very difficult to work out who’s doing these things, and even if they do, not much likelihood that they’re going to do anything really painful in return. Of course, it’s not a completely deterrence-free zone: people do go to prison, and diplomatic pressure does get applied. But it’s really nothing comparable to the real world. I doubt we need any scientific studies to assess the relative adrenalin levels of someone hacking into a network compared with someone walking into a bank with a stocking over their head and a shotgun in their hand (though it would be an interesting comparison).

So: increased incentives and relatively few disincentives. Over the longer term then, there is (a lot) more hacking going on than there used to be.

Now to the first question. Definitely one of the factors that’s leading to more hacking being reported is that more of it is going on. But of course there’s a media cycle element to it as well. Because more is going on, cyber security in general is getting to be a bigger story; this means that hacking incidents get to be front-page news more often than they used to. They feed a developing storyline rather than being reported only as individual incidents. And this in turn means that for those whose motivation is publicity, incentives are strengthened.

It would be a mistake though to think that this sort of publicity-seeking behavior is sufficient on its own to sustain the media attention. I think the media is sticking with this story because of the much more significant trend underneath it, as demonstrated by rarer, but occasionally reported, incidents such as RSA, Google (“Aurora”) and the oil companies (“Night Dragon”) — and by significant new government spending around cyber security in the U.S., U.K., and many other countries.

On that front, we?might just?be beginning to see corporations open up a bit about reporting incidents that happen to them. But that really is at a very early stage. Through our work with customers, we run up against a much larger proportion of potentially high-profile incidents which have never been reported and probably never will be. There’s an awfully long way to go in terms of better disclosure and consequently more awareness of what’s really going on out there.

What’s perhaps more surprising to many people is that there are even more incidents that have never even been detected, let alone reported. When the motivation for an attacker is to gain publicity, obviously the incident ends up being “detected” — because the perpetrator reports it. But if the motivation is to steal confidential information — intellectual property, or sensitive commercial data — then the whole objective is not to be detected. Most companies simply aren’t looking for this sort of covert infiltration today, and in various cases when we have started to look for it inside a new customer’s network, we have fairly rapidly found evidence of intruders who have had access into the network for some time, completely undetected by the victim organization. Extrapolating from that to the majority of organizations who — today — are still not looking for these covert activities inside their networks, we can be fairly certain that there are a significant number of hacking incidents which are successful but completely undetected.

< p>What will happen next? I suspect that the current media cycle has a while to run and that we will continue to see a large number of high-profile incidents where the motivation is to gain publicity. But I know more about security than I do about media, so I’d probably take that with a pinch of salt and pay more attention to my second prediction: that more and more organizations are going to start asking themselves whether they ought to be looking for evidence of the sort of covert data-stealing that’s currently going undetected. As more organizations find out that this sort of hacking is going on, they’ll start feeling the urgency to report the incidents because of the material impact they can have on the business.

 

Julie Conroy McNelley is a senior analyst within Aite Group’s Retail Banking practice, covering fraud, data security, anti-money laundering, and compliance issues. She has over a decade of product-management experience working with financial institutions, payments processors, and risk management companies.

Hacking and malware attacks are on the rise, and that trend will only continue to grow. Many of the headlines about data breaches over the last several months reflect the concerted effort of a highly organized underground economy whose business is financial gain through cyber crime. We can’t pin all the blame for these attacks on organized crime, however; nation-states have also been implicated in a number of the high-profile attempts, such as the NASDAQ, Google, and IMF attacks.

The uptick in attacks is spurred by a number of things:

  1. Technological innovation: The sophistication of the malware and hacking attacks is on the rise, and the innovation among the criminal element is further enhanced by the fact that they actively collaborate. The inventor of ZeuS, one of the more pernicious Trojans, licenses his software via underground bulletin boards, reinforcing the notion that cyber crime is now run like a business. True to the open-source model, licensees are free to modify ZeuS to make their attacks more difficult to detect and prevent. The rapid pace of technological innovation by legitimate businesses also provides an opportunity: as new technologies are deployed, the law of unintended consequences often means that there’s a security gap somewhere that hasn’t been fully thought through (until it’s too late).
  2. The success of PCI: Introduced mid-way through the last decade, PCI is an information security standard governing organizations that handle bankcard data. While it’s not a silver bullet for data security issues, it has significantly contributed to a decrease in breach events. The law of supply and demand dictates that as the number of credit card records that are available to the criminal underground decrease, the value of this data on the open market increases. The price for stolen card data is therefore on the rise, which means that the criminals are redoubling their efforts. Card data isn’t the only thing they’re after, of course. Online banking credentials, particularly those associated with business accounts, are also a hot commodity.
  3. Bad guys don’t require business cases: Whereas most businesses require a business case to deploy new levels of protection, bad guys are generally free from these constraints. Moreover, a criminal that is successful only in 1 of 100 attempts is still having a great day: in that one successful attempt, he was likely able to make off with thousands, if not millions, of data elements that can be monetized. Conversely, institutions and businesses that are trying to protect their data have to consistently bat 1.000 in their security efforts. It’s tough to be perfect in the face of the barrage of attacks, which is why we will continue to see these headlines for some time.

Nation-states employ similar tactics to the organized criminal element, but their efforts more often target strategic information that can be used for diplomatic or economic gain. Cyberspace is the new battleground, and the battle is here to stay.

 

David Jevans is chairman of internet security firm IronKey. He is also chairman and founder of the Anti-Phishing Working Group, a leading non-profit dedicated to eradicating identity theft and fraud on the Internet.

The hacking headlines have been fast and furious this year, both because of more disclosure and the high-profile list of large and sophisticated victims. But that’s the tip of the iceberg. Hackers are also stealing millions from SMBs/SMEs, and while that only makes headlines when they get caught, the problem is so rampant a federal agency has just issued new, stronger security guidelines for Internet banking security.

Here are some of the reasons behind the cyber-crime onslaught on Internet banking and why their success rate is so high.

  1. Instead of attacking banks directly, cyber criminals attack the weakest point—the online banking customer’s PC. They are much more likely to find vulnerabilities at SMBs and SMEs than at a bank that has a strong internal security team and systems.
  2. Hacker toolkits like SpyEye and ZeuS have made it much easier for non-programmers to mount very sophisticated attacks. These tools are sold on the Internet, which increased the number of hackers.
  3. These same toolkits are command-and-control centers for armies of botnets, enabling criminals to create a pool of millions of computers that can be used to mount large-scale attacks very quickly.
  4. Cyber criminals have learned how to escape anti-virus detection by frequently changing their attack viruses. Anti-virus works based on having seen an attack before and looking for its “signature.” This leaves a window of vulnerability between the time a new attack is launched, and when it is detected. By morphing their attacks frequently, hackers avoid anti-virus completely.
  5. New attacks are much harder to stop even with stronger online banking security methods such as one-time passwords (OTPs). ?For example, one type of attack is man-in-the-browser, where the cyber criminal actually takes over the browser during an online banking session and invisibly passes additional ACH transfers to your account while you are using it too. To the bank, it looks like it is you.
  6. Thieves are going after higher value targets, such as businesses and municipalities, with more targeted attacks. For example, “spearphishing” involves learning enough about the mark that the criminal can send a very personalized and persuasive email that tricks the recipient into installing malware. New research from Cisco shows targeted, personalized attacks have tripled in the past year. They estimate the bad guys made more than $1 billion a year ago, and that targeted attacks, have an average payoff of $80,000.

Comments

女生适合什么工作 基尼系数是什么意思 突然膝盖疼是什么原因 顺丰为什么这么快 白色裤子配什么上衣
水浒是什么意思 宋威龙什么星座 什么是心律失常 啤酒花是什么 低gi食物是什么意思
属相鸡与什么属相相合 人类免疫缺陷病毒是什么 维生素c什么时候吃效果最好 西瓜吃了有什么好处 鸽子咕咕叫是什么意思
甲沟炎医院挂什么科 福报是什么意思 桂圆有什么功效 慢性阑尾炎挂什么科 佝偻病是什么
女朋友过生日送什么最好hcv9jop5ns5r.cn 命中劫是什么意思baiqunet.com 中位数是什么意思jasonfriends.com 偶数是什么hcv7jop6ns1r.cn 慰问金是什么意思hcv8jop5ns1r.cn
气垫是什么hcv9jop4ns7r.cn 玉的五行属性是什么mmeoe.com 间断性是什么意思hcv8jop4ns0r.cn 肩周炎吃什么药好hcv7jop7ns0r.cn 跪乳的动物是什么生肖hcv9jop7ns5r.cn
褥疮用什么药膏最好hcv9jop3ns4r.cn 贼是什么意思hcv7jop6ns9r.cn 乾隆的名字叫什么hcv7jop6ns0r.cn fsh是什么hcv7jop7ns2r.cn 泸州老窖是什么香型hcv8jop8ns4r.cn
女性尿频尿急挂什么科dajiketang.com 1996年属什么hcv9jop0ns4r.cn 尿肌酐低是什么原因hcv9jop4ns1r.cn 手发胀是什么前兆hcv9jop0ns2r.cn 尿特别多是什么原因hcv8jop8ns9r.cn
百度