Best of the Week
Most Popular
1.Bitcoin War Begins – Bitcoin Cash Rises 50% While Bitcoin Drops $1,000 In 24 Hours - Jeff_Berwick
2.Fragile Stock Market Bull in a China Shop -James_Quinn
3.Sheffield Leafy Suburbs Tree Felling's Triggering House Prices CRASH! - Nadeem_Walayat
4.Bank of England Hikes UK Interest Rates 100%, Reversing BREXIT PANIC Cut! - Nadeem_Walayat
5.Government Finances and Gold - Cautionary Tale told in Four Charts - Michael_J_Kosares
6.Gold Stocks Winter Rally - Zeal_LLC
7.The Stock Market- From Here to Infinity? - Plunger
8.Ethereum (ETH/USD) – bullish breakout of large symmetrical triangle looks to be getting closer - MarketsToday
9.Electronic Gold: The Deep State’s Corrupt Threat to Human Prosperity and Freedom - Stewart_Dougherty
10.Finally, The Fall Of The House Of Saud - Jim_Willie_CB
Last 7 days
Gold Bullish on US Fed Interest Rate Hike - 16th Dec 17
The LORAX Explains What Happened to Sheffield's Street Trees 2017 - 16th Dec 17
Bitcoin Trading Alert: Bitcoin Pauses – Will Appreciation Follow? - 16th Dec 17
SanDisk Ultra 128gb 100mbs Micro SD Card for Smartphone's Speed Test - 15th Dec 17
Inflation is Spiking Globally… Bond Bubble Bursts in 3… 2… - 15th Dec 17
Sheffield's 'Real' LORAX Defending the Trees From the Labour City Council Patrol Units - 15th Dec 17
Stock Market Decline Signals are Near - 15th Dec 17
Santa Is Putting Christmas On The Blockchain And Saving Billions - 14th Dec 17
The Unprotected, the Protected, the Vulnerably Protected Classes—Which Are You? - 14th Dec 17
Gold’s Upside Target - 14th Dec 17
Year-end US Interest Rate Hike Again Proves To Be Launchpad For Gold Price - 14th Dec 17
2 Charts That Might Define the Fed’s Jerome Powell Era - 13th Dec 17
UK Stagflation Risk As Inflation Hits 3.1% and House Prices Fall - 13th Dec 17
Stock Market Elliott Wave Forecasts - Is the World coming to the end? - 13th Dec 17
A Method Traders Can Use to Confirm an Elliott Wave Count - 13th Dec 17
Best Time / Month of Year to BUY a USED Car is DECEMBER, UK Analysis - 13th Dec 17
A Former Wall Street Veteran: Good Traders Are Born, Not Trained - 12th Dec 17
Buy Gold, Silver Time After Speculators Reduce Longs and Banks Reduce Shorts to Continue? - 12th Dec 17
Masters of Economic and Political Illusion – in Taxes, Debt, Government, and Markets - 12th Dec 17
Approved Used Land Rover Main Dealer Real Customer Buying Guide - Hunters, Chester - 12th Dec 17
Gold Price 100% Bullish Signal - 12th Dec 17
Epic Stock Market & Fixed Income Bubble Will Not End Well - 12th Dec 17
Bitcoin can be stolen. Although Can’t be hacked - 11th Dec 17
Have Stocks Reached A Permanently Rigged Plateau? - 11th Dec 17
Trying To Beat The System Is A Fatally Flawed Investment Strategy - 11th Dec 17
Is This The Beginning Of The Next Silver Rush? - 11th Dec 17
The Dow Gold Ratio - 11th Dec 17
Evidence of a Stock Market Top Mounting - 10th Dec 17
Bitcoin Doesn’t Exist – Forks and Mad Max - 10th Dec 17
Bitcoin Doesn’t Exist – Putting the Banks Out of Business - 9th Dec 17
China’s Struggle for Market Economy Status - 9th Dec 17
Is Gold Really Strong? - 9th Dec 17
Bitcoin Parabolic Mania - 8th Dec 17
SPX Make a 61.8% Retracement - 8th Dec 17
Gold, Stocks and Bonds - The 3 Amigos Update - 8th Dec 17
Gold Stocks Break, Gold to Follow - 8th Dec 17
4 Charts That Show How Trump Tax Cuts Will Trigger A Recession - 8th Dec 17
Precious Metals Breaking Down! 3 Amigos to Abort? 4 Horsemen to Ride? - 7th Dec 17
Bitcoin Just Smashed Through $12k… Wait, $13k… Now $14k… This Is Getting Ridiculous! - 7th Dec 17
Stock Market Tops Look Like This - 7th Dec 17
Crude Oil, Oil Stocks and Invalidation of Breakouts - 7th Dec 17
Bitcoin Doesn’t Exist – 2 - 7th Dec 17

Market Oracle FREE Newsletter

Traders Workshop

The Equifax Hack Must Be A Wake-Up Call To Redefine Digital Security

Companies / Cyber Crime Sep 27, 2017 - 06:23 PM GMT

By: John_Mauldin

Companies

BY GEORGE FRIEDMAN : The Equifax hack must be the last straw in the saga of our inept computer industry. Critical information on the vast majority of American families was compromised.

To say that this was not a rare phenomenon understates it. There has been an endless array of stolen information—from the recent theft of still proprietary stock information from the Commerce Department to the theft of emails from the Democratic National Committee.


The chances that information on computers will remain confidential has become slim at best. It must be assumed that if people wish to steal information, they will. (I’ll be addressing this very topic at our upcoming New York conference—you can learn more here.)

The “Stupid User” Defense

The computer industry has developed a defense that most industries have tried at one point or another: the “stupid user” defense. When a hack occurs, the spotlight turns to the victim who is said to be responsible for preventing such attacks.

Consider my favorite attack: phishing.

A phishing attack happens when someone receives an email and clicks on a malicious link in the email. This triggers a process where the program linked to the email searches for, finds, and transmits information from the computer to the sender of the email.

The view of the computer industry is that the responsibility for this attack rests with the stupid user who clicked on the link. The industry has made it clear that you should never click on a link from an unknown sender. Announcing this has passed on the industry’s responsibility to the end user.

But assume that a company had 5,000 employees. The probability that one person out of 5,000 would not click on the link is near zero. An effectiveness rate of 99.98% in preventing clicks would not be enough to prevent potential disaster. A business or individual would have to prevent all mistakes perfectly and permanently.

At a higher level, the industry blames the stupid administrator.

The security sold with servers, laptops, and the rest is primitive. In selling the equipment, the rule is caveat emptor—let the buyer beware. It is the job of the IT administrator not only to keep things running but also to acquire and maintain a host of security hardware and software to keep the system secure.

The problem is not that these tools are fiendishly expensive, but that they constantly become obsolete and have to be replaced.

Attackers’ Advantages

In the computer industry, the attacker always has an advantage. The defender must reconfigure his system to meet a new attack, which the attacker will make certain is novel and so not anticipated.

This new attack must be detected by users and communicated among them, then a defense must be developed and implemented. This process takes days or weeks.

For midsized and small businesses, maintaining constant awareness of new attacks and having the expertise to block them is absurd. And for the very largest businesses, the resources are never enough to prevent all errors in protection.

If the attacker fails, no one knows about it and he will live to fight another day. If the defender fails—and the computing system is so shabbily built that it generates failures by its own lack of sophistication—he is all over the front pages.

We all know that computing systems are liable to attack. We also know that the system is designed for failure. At some point, someone will commit an error and click on a malicious link.

Given the increasing tempo of attacks, expecting that administrators will never fall behind the curve is ridiculous.

Geopolitical Implications

Computer companies have pushed the responsibility for security on users, telling them to acquire third-party software and hardware.

Security not only costs significant amounts of money, but it also requires expertise in acquiring, integrating, and configuring the equipment. Finally, the third parties are themselves liable to error.

Although it’s a big legal issue—and I am fascinated that no one that I know of has brought suits against the computer industry for knowingly selling defective products—my real concern is geopolitical.

The world has become utterly dependent on computing. I am typing this on a computer, and my personal information was compromised on a computer. The attacks are mounting, and the vulnerability of our financial and military systems are under constant attack.

We cannot abandon computing, nor can we risk the consequences of using these systems. Nor will the “stupid user” explanation work when most users are as ignorant of computing as they are of the internal combustion engine.

The computer and the car have become utilities where the manufacturers are given great value by society. Cars have roads, and computers have access to the Internet. Both have utilitarian necessity.

But cars are expected to maintain certain safety features. It would seem reasonable that an industry whose failures can wreak havoc globally should be expected to build security into its own systems.

Grab George Friedman's Exclusive eBook, The World Explained in Maps

The World Explained in Maps reveals the panorama of geopolitical landscapes influencing today's governments and global financial systems. Don't miss this chance to prepare for the year ahead with the straight facts about every major country’s and region's current geopolitical climate. You won't find political rhetoric or media hype here.

The World Explained in Maps is an essential guide for every investor as 2017 takes shape. Get your copy now—free!

John Mauldin Archive

© 2005-2018 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in

Catching a Falling Financial Knife