The post Worth Reading: Lego Robots versus Gesture Security appeared first on 'net work.
When Cyrus wanted to capture Babylon, he attacked the river that flows through the city, drying it out and then sending his army under the walls through the river entrance and exit points. In a similar way, the ventilator is a movie favorite, used in both Lord of the Rings and Star Wars, probably along with a thousand other movies and stories throughout time. What do rivers and ventilators have to do with network security?
Side channel attacks. Now I don’t know if the attacks described in these papers, or Cyrus’ attack through the Euphrates, are considered side channel, or just lateral, but either way: the most vulnerable point in your network is just where you assume you can’t be attacked, or that point where you haven’t thought through security. Two things I read this week reminded me of the importance of system level thinking when it comes to security.
The first explores the Network Time Protocol (NTP), beginning with the general security of the protocol. Security in a time protocol is particularly difficult, as the entire point of encryption is to use algorithms that take a lot of time for an attacker to calculate—and there’s probably some relationship between Continue reading
Don't be the IT hero who has to do everything yourself. It might feel good, but you're an operational bottleneck who doesn't give others a chance to learn.
The post You Can’t Do Everything Yourself appeared first on Packet Pushers.
Don't be the IT hero who has to do everything yourself. It might feel good, but you're an operational bottleneck who doesn't give others a chance to learn.
The post You Can’t Do Everything Yourself appeared first on Packet Pushers.
Duh! Networks are becoming more software-centric.