Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

A Bad Mix: Hacks, Politics, and Cybersecurity

DZone's Guide to

A Bad Mix: Hacks, Politics, and Cybersecurity

Rumors abound that the recent hack of the DNC was orchestrated by a foreign government to meddle in the upcoming presidential election. Is this true? can we even know if it's true? Read on to find out.

· Performance Zone
Free Resource

Transform incident management with machine learning and analytics to help you maintain optimal performance and availability while keeping pace with the growing demands of digital business with this eBook, brought to you in partnership with BMC.

The FBI is now leading an investigation into a hack into the Democratic National Committee. This is the first acknowledgment from the agency that they are probing the incident, which US officials suspect came from a Russian cyber attack. The FBI said that the suspected Russian hack is part of a wave of Russian cyber attacks aimed at political organizations and academic think tanks in Washington. Over the weekend, Wikileaks began publishing emails from the DNC. The group didn't identify the source but Hillary Clinton’s campaign pointed the finger at Russia, saying the release of stolen emails was intended to help Republican nominee Donald Trump.

The FBI has sent experts to meet with the Republican National Committee, as well as the major campaigns, to discuss their security measures. No similar intrusions have so far been detected at the RNC or the campaigns of the two major party candidates.

Knee-jerk Reaction to Cyber Attacks Is Not an Effective Way to Protect Valuable Data

The “attribution problem” makes it extremely difficult to accurately know who is responsible for an attack. Perhaps the Russians were hacked first by North Korea? Who knows. We will never* know with certainty.  And that’s the problem…. Without certainty, there are no options for response. 

At the exact same time that every interesting effort is being turned into software, the attackers are becoming more organized, sophisticated, and creative. Yesterday it was about stealing money. Today it’s about influencing an election. Tomorrow, who knows? Maybe it’s about harming groups of people by attacking their healthcare, retail, or government, gaining a marketing advantage by using drones or crashing the electric grid. However, more than likely it will be something that isn’t obvious today.

It’s frustrating to watch this knee-jerk reaction to cyber attacks that focus exclusively on cyber response. We can do so much better at building software that is resilient to attacks. The government should be pushing software producers to create code that doesn’t have well-known obvious vulnerabilities. Like the items in the OWASP Top Ten that haven’t changed for the past 14 years. That’s an embarrassment. Why can’t organizations like the FTC strongly “encourage” organizations to at least follow some basic application security practices: training developers, threat modeling, automated verification, and runtime protection?  To me, it is negligence to not put these practices in place when the exposure and damage is obviously foreseeable.

Evolve your approach to Application Performance Monitoring by adopting five best practices that are outlined and explored in this e-book, brought to you in partnership with BMC.

Topics:
hack ,attribution

Published at DZone with permission of Jeff Williams, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

THE DZONE NEWSLETTER

Dev Resources & Solutions Straight to Your Inbox

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.

X

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}