User Tools

Site Tools


cyber:manufacturers_of_ict_hardware_and_software_shall_be_liable_for_negligent_security_failures_that_cause_harm

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
cyber:manufacturers_of_ict_hardware_and_software_shall_be_liable_for_negligent_security_failures_that_cause_harm [2019/05/22 16:37]
99.238.240.127
cyber:manufacturers_of_ict_hardware_and_software_shall_be_liable_for_negligent_security_failures_that_cause_harm [2019/05/23 00:33]
192.252.166.4
Line 14: Line 14:
 Now imagine that thousands of airliners, banks, electric grids, gas pipelines, and electric cars are seized all at the same time. Finally, as the cyber security expert Benoit Morel writes, “there is a realization that through the process of unlimited reliance on computer and ICT technology, the United states is increasingly exposed to potential devastating cyberattacks on its critical infrastructure,​ a kind of cyber Pearl Harbor.”((Morel,​ p. 416.)) And not only the United States but all other nations too. But finally, there are people looking for ways to prevent the disastrous consequences of faulty software. Now imagine that thousands of airliners, banks, electric grids, gas pipelines, and electric cars are seized all at the same time. Finally, as the cyber security expert Benoit Morel writes, “there is a realization that through the process of unlimited reliance on computer and ICT technology, the United states is increasingly exposed to potential devastating cyberattacks on its critical infrastructure,​ a kind of cyber Pearl Harbor.”((Morel,​ p. 416.)) And not only the United States but all other nations too. But finally, there are people looking for ways to prevent the disastrous consequences of faulty software.
  
-With the swift emergence of the Internet of Things (IoT) everything around us is turning into computers that can do things they were not originally invented for. Already your refrigerator,​ your printer,​((Christopher Meyer, [[https://​www.vice.com/​en_us/​article/​nzqayz/​this-teen-hacked-150000-printers-to-show-how-the-internet-of-things-is-shit|“This teen hacked ​150000 ​printers to show how they internet of Things is shit”]], //Vice Motherboard//,​ Feb 8, 2018.)) and your camera have turned into computers with astonishing new capacities. (One fellow even programmed a Canon printer, a Honeywell thermostat, and a Kodak digital camera to play the computer game Doom.)((Schneier,​ op cit.)) By next year – 2020 — about 75 billion devices are predicted to be connected to the Internet of Things((Tony Danova, [[http:/​www.businessinsider.com-75-billion-devices-will-be-connected-to-the internet-by-2020|“Morgan Stanley: 75 billion devices will be connected to the Internet of Things by 2020”]] //Business Insider//, Oct. 2, 2013.)) that can be hacked.+With the swift emergence of the Internet of Things (IoT) everything around us is turning into computers that can do things they were not originally invented for. Already your refrigerator,​ your printer,​((Christopher Meyer, [[https://​www.vice.com/​en_us/​article/​nzqayz/​this-teen-hacked-150000-printers-to-show-how-the-internet-of-things-is-shit|“This teen hacked ​150,​000 ​printers to show how the internet of Things is shit”]], //Vice Motherboard//,​ Feb 8, 2018.)) and your camera have turned into computers with astonishing new capacities. (One fellow even programmed a Canon printer, a Honeywell thermostat, and a Kodak digital camera to play the computer game Doom.)((Schneier,​ op cit.)) By next year – 2020 — about 75 billion devices are predicted to be connected to the Internet of Things((Tony Danova, [[https://​www.businessinsider.com/75-billion-devices-will-be-connected-to-the-internet-by-2020-2013-10|“Morgan Stanley: 75 billion devices will be connected to the Internet of Things by 2020”]] //Business Insider//, Oct. 2, 2013.)) that can be hacked.
  
 The cyber world has developed with astounding rapidity, partly by allowing for fast-and-loose standards of quality. Facebook’s old motto reflected this: “Move fast and break things.” Instead of perfecting a product through rigorous monitoring and in-house testing, software and even hardware producers rush their products to market full of coding errors, knowing that somewhere malevolent hackers are watching to detect and exploit them. The cyber world has developed with astounding rapidity, partly by allowing for fast-and-loose standards of quality. Facebook’s old motto reflected this: “Move fast and break things.” Instead of perfecting a product through rigorous monitoring and in-house testing, software and even hardware producers rush their products to market full of coding errors, knowing that somewhere malevolent hackers are watching to detect and exploit them.
cyber/manufacturers_of_ict_hardware_and_software_shall_be_liable_for_negligent_security_failures_that_cause_harm.txt · Last modified: 2019/06/25 03:41 by 99.238.240.127