For this final article, I would like to discuss the historical failures that arose when Mr. Clifford Stoll (the author of the book "Cuckoo's Egg: Tracking a spy through the Maze of Computer Espionage") stumbled upon an accounting error of $0.75 and the revelations that followed, its potential outcomes, the associated risks and costs, and why it is important to address and patch such security holes. The Cuckoo's Egg is an interesting read and the author has managed to present to his readers the picture of the early days of the Internet (arpanet, then), and networking practices back then. Although this book describes a real incident that occurred in the 1980s, some of the findings are relevant and haunt us even today. One of the major historical failures involving security was the UNIX operating system (with GNU Emacs installed) at Lawrence Berkeley Laboratories and other military laboratories. At that time, UNIX operating systems were widely used by a large number of computer professionals and researchers. While the operating system cannot be classified as completely insecure, I believe that the default settings (which ultimately helped intruders take advantage) are one of the major mistakes that lead to other events mentioned in the book. However, I believe that users had a different vision/perspective on security mechanisms and in those times they trusted each other and didn't have to worry about protecting their information (that's how, exactly, a person's ignorance becomes that of another - hacker, here happiness). This book helps us understand vulnerabilities; its impacts and why it is important to address/resolve these gaps. As I already mentioned... half of the document... for real-time monitoring purposes, alerting and auditing purposes, as well as tools to analyze log information. Such tools help us a lot in forensic analysis. It is a positive change that organizations understand the importance of controlling information systems activities as well. Compared to the past, today we have strong security policies, well-established cyber laws, active monitoring systems and additional layers of security in the form of firewalls, etc., to prevent uninvited guests from accessing your network and, most importantly, increase user awareness. But vulnerabilities still exist in and around cyberspace that hackers exploit for different purposes. The monetary losses we suffer today are much greater in both magnitude and mass. But we are certainly in a better position than when the events described in this book took place.
tags