1566
VIEWS
VIEWS
SECURITY: Security in a Post-Snowden World
Recent Western Cape Business News
The NSA has paid security vendors to put backdoors in their products, listened in on the cellphones of global leaders, subverted the privacy of the customers of major companies such as Google and Microsoft, and even diverted and opened private postal shipments so as to insert covert spy devices into new PCs and routers before forwarding the packages on to their destinations.
"For years, paranoid security experts have been warning us all that the NSA is collecting everything and spying on everything," says Sven Lesicnik, MD of local open source software specialist LSD. "Now, thanks to the leaks provided by Edward Snowden, we know that they were telling the truth. It's no great secret that countries spy on each other - they always have and they always will - but the level to which the global Internet has been compromised by the NSA has come as a shock to most people."
Lesicnik says that the main casualty in the technology market has been trust.
"When you purchase hardware or software from a vendor, you have to trust that it's not spying on you behind your back or sending out your private information. Unfortunately, we know now that certain products do exactly 70-244 exam this and that in at least one case, the NSA paid the manufacturer to deliberately cripple them. As a result, businesses are looking for solutions that can be guaranteed to have no hidden back door surprises."
He says that open source software is far more resistant to back door attempts by anyone, even a US 70-410 exam Government agency.
"Because the code is in the open, it can be inspected by anyone. And because large projects have rigourous auditing processes, any attempts to put in back doors are quickly thwarted. An attempt to subvert the Linux kernel in 2003 was picked up immediately and rejected. With proprietary software, there is no way for a business user to know that the encryption it uses has been deliberately weakened for example. With open source, all the code can 070-294 dumps be independently checked."
There is a perception that open source is developed by hobbyists around the world. But for the large critical projects, such as the Linux kernel, the Apache web server and the JBoss middleware framework, Lesicnik says nothing could be further than the truth.
"These are written and added to by a combination of large technology vendors and users with a vested interest in Pass CCIE R&S lab seeing the software improved upon."
Business News Sector Tags:
Accommodation
Foreign Exchange
Directory
Fax 2 Email
Finance
Furniture
Online Casino
Restaurant
Shop Online
Study IT Online
Web Design
Weddings
Work from Home
|
||
Company News
|
||