User Tools

Site Tools


cyber:manufacturers_of_ict_hardware_and_software_shall_be_liable_for_negligent_security_failures_that_cause_harm

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cyber:manufacturers_of_ict_hardware_and_software_shall_be_liable_for_negligent_security_failures_that_cause_harm [2019/05/22 16:38]
99.238.240.127
cyber:manufacturers_of_ict_hardware_and_software_shall_be_liable_for_negligent_security_failures_that_cause_harm [2019/06/25 03:41]
99.238.240.127
Line 14: Line 14:
 Now imagine that thousands of airliners, banks, electric grids, gas pipelines, and electric cars are seized all at the same time. Finally, as the cyber security expert Benoit Morel writes, “there is a realization that through the process of unlimited reliance on computer and ICT technology, the United states is increasingly exposed to potential devastating cyberattacks on its critical infrastructure,​ a kind of cyber Pearl Harbor.”((Morel,​ p. 416.)) And not only the United States but all other nations too. But finally, there are people looking for ways to prevent the disastrous consequences of faulty software. Now imagine that thousands of airliners, banks, electric grids, gas pipelines, and electric cars are seized all at the same time. Finally, as the cyber security expert Benoit Morel writes, “there is a realization that through the process of unlimited reliance on computer and ICT technology, the United states is increasingly exposed to potential devastating cyberattacks on its critical infrastructure,​ a kind of cyber Pearl Harbor.”((Morel,​ p. 416.)) And not only the United States but all other nations too. But finally, there are people looking for ways to prevent the disastrous consequences of faulty software.
  
-With the swift emergence of the Internet of Things (IoT) everything around us is turning into computers that can do things they were not originally invented for. Already your refrigerator,​ your printer,​((Christopher Meyer, [[https://​www.vice.com/​en_us/​article/​nzqayz/​this-teen-hacked-150000-printers-to-show-how-the-internet-of-things-is-shit|“This teen hacked ​150000 ​printers to show how they internet of Things is shit”]], //Vice Motherboard//,​ Feb 8, 2018.)) and your camera have turned into computers with astonishing new capacities. (One fellow even programmed a Canon printer, a Honeywell thermostat, and a Kodak digital camera to play the computer game Doom.)((Schneier,​ op cit.)) By next year – 2020 — about 75 billion devices are predicted to be connected to the Internet of Things((Tony Danova, [[https://​www.businessinsider.com/​75-billion-devices-will-be-connected-to-the-internet-by-2020-2013-10|“Morgan Stanley: 75 billion devices will be connected to the Internet of Things by 2020”]] //Business Insider//, Oct. 2, 2013.)) that can be hacked.+With the swift emergence of the Internet of Things (IoT) everything around us is turning into computers that can do things they were not originally invented for. Already your refrigerator,​ your printer,​((Christopher Meyer, [[https://​www.vice.com/​en_us/​article/​nzqayz/​this-teen-hacked-150000-printers-to-show-how-the-internet-of-things-is-shit|“This teen hacked ​150,​000 ​printers to show how the internet of Things is shit”]], //Vice Motherboard//,​ Feb 8, 2018.)) and your camera have turned into computers with astonishing new capacities. (One fellow even programmed a Canon printer, a Honeywell thermostat, and a Kodak digital camera to play the computer game Doom.)((Schneier,​ op cit.)) By next year – 2020 — about 75 billion devices are predicted to be connected to the Internet of Things((Tony Danova, [[https://​www.businessinsider.com/​75-billion-devices-will-be-connected-to-the-internet-by-2020-2013-10|“Morgan Stanley: 75 billion devices will be connected to the Internet of Things by 2020”]] //Business Insider//, Oct. 2, 2013.)) that can be hacked.
  
 The cyber world has developed with astounding rapidity, partly by allowing for fast-and-loose standards of quality. Facebook’s old motto reflected this: “Move fast and break things.” Instead of perfecting a product through rigorous monitoring and in-house testing, software and even hardware producers rush their products to market full of coding errors, knowing that somewhere malevolent hackers are watching to detect and exploit them. The cyber world has developed with astounding rapidity, partly by allowing for fast-and-loose standards of quality. Facebook’s old motto reflected this: “Move fast and break things.” Instead of perfecting a product through rigorous monitoring and in-house testing, software and even hardware producers rush their products to market full of coding errors, knowing that somewhere malevolent hackers are watching to detect and exploit them.
Line 56: Line 56:
 In addition to the sophisticated worm, the Stuxnet bug included four “zero days,” just for good measure. ​ A zero day is a computer vulnerability that is unknown to the people who should have eliminated it, and which they will find out about with a shock on the day when it is exploited – the “zero day.” There is a lively trade in the buying and selling of zero days on the “dark web,” a portion of the Internet that is invisible because inaccessible to ordinary browsers. Many illegal activities, such as the sale of drugs and weapons, involve communications on the dark web. In addition to the sophisticated worm, the Stuxnet bug included four “zero days,” just for good measure. ​ A zero day is a computer vulnerability that is unknown to the people who should have eliminated it, and which they will find out about with a shock on the day when it is exploited – the “zero day.” There is a lively trade in the buying and selling of zero days on the “dark web,” a portion of the Internet that is invisible because inaccessible to ordinary browsers. Many illegal activities, such as the sale of drugs and weapons, involve communications on the dark web.
  
-The only way of reducing these threats is by legislating new rules to incentivize the producers of software to be scrupulous in designing and testing their software before releasing it. This will require government action. Computer ​professional ​generally agree as to how the law needs to be changed, but few politicians know enough to propose better legislation. Thus it is the responsibility of well-informed citizens to tell their parliamentarians what is needed. You are invited to take that task upon yourself. ​+The only way of reducing these threats is by legislating new rules to incentivize the producers of software to be scrupulous in designing and testing their software before releasing it. This will require government action. Computer ​professionals ​generally agree as to how the law needs to be changed, but few politicians know enough to propose better legislation. Thus it is the responsibility of well-informed citizens to tell their parliamentarians what is needed. You are invited to take that task upon yourself. ​
cyber/manufacturers_of_ict_hardware_and_software_shall_be_liable_for_negligent_security_failures_that_cause_harm.txt · Last modified: 2019/06/25 03:41 by 99.238.240.127