Language Selection

English French German Italian Portuguese Spanish

Mock trial shows ISPs aren't to blame

Filed under
Security

Your Internet service provider isn't to blame if your company is hit with a distributed denial-of-service attack. That was the verdict of IT security professionals in a mock trial staged by Gartner at its IT Security Summit last month, in which ISPs were charged with not doing enough to keep subscribers' computers from being compromised and used as tools in attacks on corporate networks.

The plaintiffs, two fictional companies, argued that ISPs could do more to prevent so-called zombie machines from being used in attacks if they scan subscribers' computers, monitor traffic and shut down suspicious network uses. Real-life cybersecurity lawyer Ben Wright compared the ISPs' lack of enforcement to the owner of a dangerous piece of property (such as a shooting range) who doesn't buy a fence to keep others out.

But Stewart Baker, a partner with Steptoe & Johnson, who defended the fictional ISPs, argued that it would be a violation of privacy for ISPs to check subscribers' computers. Baker suggested that it's a computer owner's responsibility to protect against malicious viruses and worms.

The audience of hundreds of IT security professionals served as the jury, using electronic voting boxes to record their opinions. Only 30 percent backed the fictional plaintiffs. Fifty-four percent supported the ISP position, and 16 percent chose neither.

In a distributed denial-of-service attack, hackers often take over thousands of computers by sending out a worm that collects them, through an Internet relay chat server, into a network called a botnet. The bad guys then use these machines to mass attack and crash a Web server.

Source.

More in Tux Machines

35 Open Source Tools for the Internet of Things

In a nutshell, IoT is about using smart devices to collect data that is transmitted via the Internet to other devices. It's closely related to machine-to-machine (M2M) technology. While the concept had been around for some time, the term "Internet of Things" was first used in 1999 by Kevin Ashton, who was a Procter & Gamble employee at the time. Read more

IoT tinkerers get new Linux hub & open platforms

Cloud Media, the maker of entertainment box Popcorn Hour, launched a project on Kickstarter, Inc. that will add to the growing number of smart hubs for people to connect and control smart devices. Called the STACK Box, it features a Cavium ARM11 core processor, 256MB DDR3 RAM, 512MB flash, SD slot, 802.11n WiFi, Bluetooth LE 4.0, Z-Wave, standard 10/100 Ethernet port, optional X10 wired communication, 5 USB 2.0 ports, RS-232 port, 2 optocoupler I/O, Xbee Bus, Raspberry Pi-compatible 26-pin bus and runs Linus Kernel 3.10. IT also features optional wireless communications for Dust Networks and Insteon with RF433/315, EnOcean, ZigBee, XBee, DCLink, RFID, IR coming soon. Read more

Citrix and Google partner to bring native enterprise features to Chromebooks

Chromebooks are making inroads into the education sector, and a push is coming for the enterprise with new native Chrome capabilities from Citrix. Google and Citrix have announced Citrix Receiver for Chrome, a native app for the Chromebook which has direct access to the system resources, including printing, audio, and video. To provide the security needed for the enterprise, the new Citrix app assigns a unique Receiver ID to each device for monitoring, seamless Clipboard integration across remote and local applications, end user experience monitoring with HDX Insight, and direct SSL connections. Read more

Is Open Source an Open Invitation to Hack Webmail Encryption?

While the open source approach to software development has proven its value over and over again, the idea of opening up the code for security features to anyone with eyeballs still creates anxiety in some circles. Such worries are ill-founded, though. One concern about opening up security code to anyone is that anyone will include the NSA, which has a habit of discovering vulnerabilities and sitting on them so it can exploit them at a later time. Such discoveries shouldn't be a cause of concern, argued Phil Zimmermann, creator of PGP, the encryption scheme Yahoo and Google will be using for their webmail. Read more