Friday, November 22, 2013

Users of Government feedback arm Reach's website must register from next month: PM


I can help by being at the forefront of defending the Government IT infrastructure from hackers instead of taking the back seat if i am given the opportunity.

The National & Gov infrastructure surface area are too big and too disparate currently and there are many points of entries - will be difficult to defend.
In fact, the recent website defacement can be prevented, the stolen information from the webserver will not have taken place if a more holistic approach - technology wise and process wise is undertaken. The 19 websites down during maintenance will also not have taken place if correct technique of DC diversity is used.
There is not necessarily exponential increase in the security cost of tightening the infrastructure - it is the how. How to do it cost effectively.
Technology is not the only solution. It is more than that.
If there is a recall of duty - I am more than willing to take up this offer instead of laying back at the back seat.


It anyone see the Diehard 4 and see how the group of hackers take control and create havoc by taking over the network, satellite, radio comm, wireless network, telecom etc to shut down the FBI network, to take control of media broadcast to broadcast the hacker message and threaten the whole country, to redirect traffic by changing the traffic light and cause car accidents throughout the whole country, to intercept and take over the police command and control centre and no one can call the police when there is emergency, intercepted the Airforce command and radio F35 fighter to fire on the police etc.

It is not a good feeling to see such things happening.  And it is exasperating to see things happening, where almost all incidents can be protected and prevented.

In the opposite poles – National and Government IT Infrastructure can be holistically planned and hackers will have very little chance.

We have few group of hackers:-
(1) Hackers from International Internet, Wireless comm.
(2) Hackers from Local Internet, Wireless comm - 3G/4G, and other Wireless comm.
(3) etc Need not mention.
A more holistic approach will be necessary.

No comments:

Post a Comment