Connect with us

Hi, what are you looking for?

HEADLINES

Cybersecurity, tech infrastructure requires international trust

People often think of infrastructure as a set of technologies just sitting there, but in fact they’re living technologies – socio-technical systems that are constantly being maintained by people, and trust is central to that.

Photo by Nahel Abdul Hadi from Unsplash.com

In new research published in the journal Technology and Culture, Rebecca Slayton, professor of science and technology studies at Cornell University, uses the field of incident response to shed light on how experts – and nations – can more effectively combat cyberwarfare when they foster trust and transcend politics.

“People often think of infrastructure as a set of technologies just sitting there, but in fact they’re living technologies – socio-technical systems that are constantly being maintained by people, and trust is central to that,” Slayton said.

Most experts agree that state-sponsored hackers in Russia are trying to use the internet to infiltrate the US electrical grid and sabotage elections, yet internet security teams in the US and Europe actively seek to cooperate with their Russian counterparts, focusing on the issues where they can establish mutual trust.

“Even though they recognize that there are actors in the shadows in those countries whom they don’t trust, they have a shared goal of keeping the infrastructure running,” Slayton said.

Advertisement. Scroll to continue reading.

The field of incident response began after the internet was struck by “an attack from within” in November 1988. A self-replicating program – a “worm” – infected thousands of connected computers, causing them to stop processing and communicating normally.

Although computer scientists realized that the connected nature of the internet required international cooperation, global participation in these efforts was initially limited. But that began to change in the early 1990s, with the formation of the Forum of Incident Response and Security Teams (FIRST), which remains the leading global organization of security experts.

“Teams in the US and in Europe very much want to cooperate with teams in Russia, and they see that as a way of having influence they might otherwise not have in that space,” Slayton said.

Previous research on the history of computer and network security focused largely on development of new technology, rather than repair or maintenance. However, Slayton wrote in the new paper “Trusting Infrastructure: The Emergence of Computer Security and Incident Response, 1989-2005,” that without the efforts of incident responders, the internet as we know it wouldn’t exist.

“It’s one thing to come up with a new algorithm or a new technique for, say, intrusion detection, but actually making it work and operate requires people to implement and maintain it on an ongoing basis,” Slayton said. “It’s nice to think some innovative technology will fix everything. But in practice, people have to keep things up to date, particularly when you’re dealing with an intelligent adversary. You have to stay ahead of that.”

Advertisement. Scroll to continue reading.

The research was supported by the National Science Foundation.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

According to a new report from Kaspersky GReAT (Global Research and Analysis Team), the attackers targeted at least six organizations across the software, IT,...

White Papers

Among the primary risks are inadequate security measures and insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT...

HEADLINES

The campaigns show attackers are capitalizing on people’s increasing familiarity with completing multiple authentication steps online – a trend HP calls ‘click tolerance’. 

White Papers

IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on...

HEADLINES

Kaspersky participated in 95 independent tests and reviews, with its products being awarded first place 91 times and 92 TOP3 finishes, achieving the highest results among...

HEADLINES

‘Wangiri’ originated in Japan in the early 2000’s. The term describes the modus. ‘Wan’ is a play on the word ‘one’ while ‘giri’ means...

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

Advertisement