Wednesday, February 19, 2014

The Cuckoo's Egg

One thing that has definitely changed over the last 20-30 years is the importance of computer security. At a very low level, computers are just machines executing instructions. They do whatever they are told. Computers don't care where the instructions come from and they do not ask questions. They just execute. So, it is our job as humans to make sure that instructions that computers are given are from secure sources. This is not an easy task. Hackers continue to invent and find new ways to infiltrate systems and gain access to resources they are not meant to have access to. There is a constant battle between hackers and computer security experts. As the importance of protecting data increases, so does the intensity of the battle.

In the cuckoo's Egg, we learn of a hacker name Markus Hess. Hess was a hacker stationed in Germany who was after U.S. military secrets and would sell what he found to the Soviets. He was eventually found through the efforts of Clifford Stoll. Stoll was originally asked in 1986 to a resolve an accounting error and this led him to realize that their system had been exploited. It is interesting to see how much smaller of an issue this exploitation was back then compared to what it would be now. The FBI did little to help. Eventually, through keeping logs and setting up a hoax system, Stoll was led to Hess.

Today, computers security has become a very real issue. Just think about what all we use computers to do for us! We use them to manage our money, make purchases, find places we want to go, talk to people, etc. With so much information being given to computers the need for security becomes invaluable. And yet, it is still something we tend to look over. Just a few months ago a hacker was able to steal millions of people's data including credit card numbers from Target. With so much information at stake, why do we often look over security. Perhaps it is because of a lack of knowledge in how to be secure or a lack of sufficient money, or we just hope for the best. However, if there is one thing we can learn from the Cuckoo's Egg it is that we can never be too cautious when it comes to computer security.

Wednesday, February 5, 2014

Technology Everywhere!

Its just fascinating to think of all the ways technology influences our lives. In fact, its difficult to think of a part of our life that its not affected by technology. By affected, I mean controlled by a computer. When we have a question, we can ask the question to our phone which converts the sound into text and then converts the text into a request to Google. Google then responds with the data almost immediately. Our cars have computer systems. Our washing machines have computers and so does almost everything else. At what point, if ever, will technology control too much of our lives? Will humans ever become obsolete? It is an interesting question. Certainly, we can agree that technology is not going away anytime soon. In fact, I think we can agree that technology is going to increasingly affect more aspects of our lives. This recent news article shows how our watches may soon tap into our cars. This sounds cool, dangerous, and exciting all at once and shows that people continue to find more ways to add technology to our lives!

Monday, February 3, 2014

Is Facebook Safe?

I was once asked if Facebook is safe. In some ways Facebook is safe. For example, connections to Facebook are done over a secure connection so that data sent and received is encrypted and meaningless to outsiders who try to listen in. Also, Facebook gives us control over who can see what we post. So, with a little knowledge of how to change the Facebook privacy settings, we can control the privacy of what we post. However, there are many ways that Facebook is not safe. For example, what does Facebook do with the data we send it once it gets it? We hear all the time of government requests for data, such as in this recent news article. What if we knew the government had access to everything we posted to Facebook? While this is definitely an extreme and most likely not the reality, we should be aware that anything we post to the internet can potentially be accessed by anyone. This is something to keep in mind as we use the internet!