Home / Blogs

Am I Safer Within an Organization or by Myself?

An Internet Bill of Rights may or may not be a good idea. The point here is that, besides highly commendable topics such as net neutrality and privacy, some of them seem to mandate cybersecurity. Approved in Brazil last May, the Marco Civil includes the principle of preservation of stability, security and functionality of the network, via technical measures consistent with international standards. The Italian Draft Declaration of Internet Rights, clause 12, states that network security must be guaranteed in the public interest, ensuring infrastructure integrity and protection from external attacks, and in the interest of individuals.

Undoubtedly, law enforcement is important for cybersecurity. However, I don’t think it is possible to grant security to users irrespectively of what they do. In some cases it may be difficult to track attackers, and there are countries where criminals cannot be prosecuted. Spam Nation depicts a very colorful account of the situation. A more recent post confirms that botnets are getting worse. In his Cynic’s View of Security Predictions, Gunter Ollmann asks whether big data is a cure, surmising that that’s where companies are heading for, for the good and the bad of it. But how big is big, nationwide?

Security is not my forté, but it seems to me that corporate firewalls lower security to the level of their weakest user. For example, HTTP proxies are often used for anti-virus scanning; they can easily circumvent encryption by forcing clients to trust corporate certificates. An attacker who breaks in by infecting the weakest user, could gain control of that proxy. In that case, I guess wise users would have been safer by themselves. In general, if it is advantageous to centralize security management, how large shall the implied bailiwicks grow to be effective?

Some say one cannot expect users to be the primary security managers of their accounts. Users certainly need support, education, and coordination. I wonder why we don’t need some kind of license to operate computers, like we do to drive cars. Obama’s 2013 order to improve cybersecurity talks about a voluntary program to support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure. Any computer connected to the Internet must be considered a critical infrastructure, as it can become a zombie if improperly operated. Obama’s approach seems to promote active, rather than passive, involvement. Yet, his order doesn’t address the question of what training computer owners need in order to join the program.

By Alessandro Vesely, Tiny ISP and freelance programmer

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API