【24h】

Vulnerabilities of information technologies

机译:信息技术的脆弱性

获取原文
获取原文并翻译 | 示例

摘要

Faster than any technology before, Information and Communication technologies (ICTs) continue to change economies and societies in ways affecting many aspects of human life. Already after a short time organisations and individuals have become so dependent upon proper functioning of highly complex and hardly understandable ICT-systems that any deviation from "normal" behaviour may have adversary, if not damaging effects. Contemporary technologies are in many cases designed and implemented without adequate provisions for safe and secure functioning. These systems can easily be attacked, even by experimenting boys at the age of puberty, e.g. by injecting viruses and worms into The Internet, which then rapidly propagates these malicious gifts (in some cases even in epidemic amounts of up to 100 million emailed worms per 24 hours) into enterprises, offices, schools and everybody's PC. Internet communication protocols are weakly designed, and it is easy to "spoof ones email address, to "sniff" and to intercept messages, such as transfer of electronic funds. To protect these already overly complex systems, the usual solution is to add more complexity: firewalls, antivirus software and encryption. Two types of reaction to ICT related vulnerabilities can be observed. Some users have a "don't care" strategy, especially young people who leave a data trail of personal behaviour when surfing websites with potentially interesting economic or sociological content. Other users wish to exclude all risks and follow a strategy of "don't use". Both reactions are undesirable in the Information Society. Education on how to work with unsafe and insecure systems may help to protect users from undesired side-effects of ICT work.
机译:信息和通信技术(ICT)以比以往任何技术都要快的速度,以影响人类生活许多方面的方式继续改变经济和社会。在很短的时间内,组织和个人已经非常依赖高度复杂且难以理解的ICT系统的正常运行,以至于任何偏离“正常”行为的行为都可能带来敌手,即使不会造成破坏性影响。在许多情况下,现代技术的设计和实施都没有足够的安全和可靠功能规定。即使通过对青春期等男孩进行实验,这些系统也很容易受到攻击。通过向Internet注入病毒和蠕虫,然后Internet将这些恶意礼物(在某些情况下,甚至每24小时最多流行1亿个电子邮件蠕虫)传播到企业,办公室,学校和每个人的PC中。 Internet通信协议的设计较弱,很容易“欺骗电子邮件地址”,“嗅探”和拦截诸如电子资金转账之类的消息。为了保护这些已经过于复杂的系统,通常的解决方案是增加更多的复杂性:防火墙,防病毒软件和加密,可以观察到两种与ICT相关的漏洞的反应,有些用户采取“不在乎”策略,尤其是年轻人在浏览具有潜在经济意义的网站时留下个人行为的数据线索其他用户希望排除所有风险并遵循“不使用”的策略,这两种反应在信息社会中都是不可取的,有关如何使用不安全和不安全系统的教育可能有助于保护用户免受不良影响-ICT工作的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号