|
An Internet Bill of Rights may or may not be a good idea. The point here is that, besides highly commendable topics such as net neutrality and privacy, some of them seem to mandate cybersecurity. Approved in Brazil last May, the Marco Civil includes the principle of preservation of stability, security and functionality of the network, via technical measures consistent with international standards. The Italian Draft Declaration of Internet Rights, clause 12, states that network security must be guaranteed in the public interest, ensuring infrastructure integrity and protection from external attacks, and in the interest of individuals.
Undoubtedly, law enforcement is important for cybersecurity. However, I don’t think it is possible to grant security to users irrespectively of what they do. In some cases it may be difficult to track attackers, and there are countries where criminals cannot be prosecuted. Spam Nation depicts a very colorful account of the situation. A more recent post confirms that botnets are getting worse. In his Cynic’s View of Security Predictions, Gunter Ollmann asks whether big data is a cure, surmising that that’s where companies are heading for, for the good and the bad of it. But how big is big, nationwide?
Security is not my forté, but it seems to me that corporate firewalls lower security to the level of their weakest user. For example, HTTP proxies are often used for anti-virus scanning; they can easily circumvent encryption by forcing clients to trust corporate certificates. An attacker who breaks in by infecting the weakest user, could gain control of that proxy. In that case, I guess wise users would have been safer by themselves. In general, if it is advantageous to centralize security management, how large shall the implied bailiwicks grow to be effective?
Some say one cannot expect users to be the primary security managers of their accounts. Users certainly need support, education, and coordination. I wonder why we don’t need some kind of license to operate computers, like we do to drive cars. Obama’s 2013 order to improve cybersecurity talks about a voluntary program to support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure. Any computer connected to the Internet must be considered a critical infrastructure, as it can become a zombie if improperly operated. Obama’s approach seems to promote active, rather than passive, involvement. Yet, his order doesn’t address the question of what training computer owners need in order to join the program.
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix