• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    How To Deal With Hacker Attacks

    2009/5/8 0:00:00 9

    ColinCrook, based on his own experience, gave advice on how to deal with security attacks.

    Crook served as chief technology officer of Citigroup (now Citigroup and Citibank's parent company) 10 years ago.

    At that time, a hacker broke into Citigroup's network.

    Crook is now a senior adviser to University of Pennsylvania's "WhartonFellows" agency, a member of the New York Academy of Sciences, a fellow of the Royal Institute of engineering and a co author of ThePowerofImpossibleThinking.

    Last week, he talked about his own experience at the "Converge05" meeting held by ID management company Courion.

    He stressed that business officials must be good at listening to other people's opinions and understand that safety is a human problem, not a machine problem.

    In his first article, which is divided into two parts, the Crook explains how the company survived the data theft.

    Question: what happened to Citigroup 10 years ago?

    This is a multi million dollar bet, which is a great blow to all of us.

    We know that the attack came from Eastern Europe, but we do not know whether the attacker is an unskilled hacker or a government agency.

    I'm really worried that this attack came from the KGB of the former Soviet Union.

    Question: what steps did you take after finding a security attack?

    TsutomoShimamura came to the company and helped us very well.

    He is a white hat (just a hacker).

    He helped the federal government arrest the hacker KevinMitnick (KevinMitnick was imprisoned for five years because of hacker crime, and later became a successful security consultant, author and speaker).

    Mitnick once invaded Tsutomo's computer and left a message saying, "I've attacked your computer."

    Tsutomo discovered the signal of Mitnick and tracked it to assist the federal government in arresting Mitnick.

    There's another interesting thing here.

    Tsutomo to help us confirm what happened.

    Our receptionist tried to drive him away.

    Tsutomo wore a blue satin shorts, a T-shirt full of mathematical equations, a helmet and a pair of roller skates.

    The receptionist waved him away and said, "we do not accept anything."

    The receptionist thought he was a delivery boy. Finally, he helped us understand that the intruder was an unskilled hacker, not a government agency.

    Question: what is the biggest lesson of this incident?

    We don't have a safe periphery.

    There are modems everywhere.

    Our company has 100 million customers and 300 thousand employees, and there may be assailants among them.

    This is very scary.

    The lesson is that security is a business and economic problem.

    Do not consider safety as a security issue.

    When the cache management system is broken, we say to our business people: don't think this is a security issue.

    Think of this as a business problem.

    Security is one of the most complex problems, and everything in business is permeated with security.

    Q: you mentioned the danger of too strict safety system in your Converge05 speech.

    Can you expand on that? All agencies are changing and adapting.

    There are few static companies.

    In Citibank, every employee has to work two times a year.

    Therefore, when you have a static and strict system that does not apply to such changes, you will surely fail.

    With the use of hi-tech systems and the adoption of flexible restrictions, some will find ways to attack the system.

    Q: when Citibank recently admitted that 3 million 900 thousand of its customers lost information, people would certainly recall your experience 10 years ago.

    Do you think it is inappropriate for the company to deal with the problem in this case, or is the company doing its best?

    You can't flinch from doing nothing and say nothing.

    Since all these concerns are related to theft of identity cards, it is not good to rush to success.

    We should adopt a more thorough and deliberate approach to this problem.

    In this case, we need to take a step backward and look at different ways of thinking.

    If we are anxious to succeed, legislators believe that they must legislate.

    This gives rise to a recognition that enterprises can not deal with this problem themselves.

    Hasty judgment often leads to imperfect solutions.

    Question: is there such an atmosphere in enterprises? When a security attack occurs, the enterprise will not be frank about this problem.

    When your emergency does not solve the security problem, security is still a tough job.

    How can an enterprise solve this problem? When you rely too much on experience, you will stop learning, so you should be able to observe things from different angles.

    When we first let a group of CEO sit in a room, it was a disaster.

    Everyone thinks he knows everything.

    This is what happens when you mature: your ability to discriminate is weakened, and you lose the ability to perform.

    We tell people that they have to take a step back and admit their limitations.

    At the same time, you must rely on your own experience.

    Experience is valuable. You can't change your experience just like changing certain things.

    You must combine experience with new ideas.

    Trust is the key.

    Enterprises must understand the importance of identifying people's identities.

    During the stay in the hotel.

    I went into the room and the maid in the cleaning room was in the room.

    She stopped working and asked me to put the key card in the lock.

    She wants to confirm whether I am the guest in this room.

    This left a deep impression on me.

    Enterprises should follow her example.

    Xu Qiyun, editor in chief:

    • Related reading

    Five Misunderstandings In Private Enterprise Management

    Business management
    |
    2009/5/4 0:00:00
    17

    How To Be Strict And Affable In Management

    Business management
    |
    2009/5/4 0:00:00
    5

    Subordinates Are Not United In Management.

    Business management
    |
    2009/5/4 0:00:00
    11

    How To Make The Team More Cohesive?

    Business management
    |
    2009/5/4 0:00:00
    19

    Benefit Management Is The Foundation Of Enterprise Management.

    Business management
    |
    2009/5/4 0:00:00
    89
    Read the next article

    Enterprise Management: Leadership Strategy Is Related To The Enhancement Of Executive Power.

    主站蜘蛛池模板: 日本pissjapantv厕所自| 国产肉体xxxx裸体137大胆| 调教视频在线观看| 青青草原亚洲视频| 色综合合久久天天给综看 | 国产一区小可爱原卡哇伊| 国产ts人妖合集magnet| 伊人久久精品午夜| 亚洲av乱码一区二区三区香蕉| 伊伊人成亚洲综合人网7777| 亚洲成a人片在线观看天堂无码 | 国产香蕉免费精品视频| 色偷偷人人澡久久天天| 波多野结衣1区| 日本高清视频免费观看| 天堂网在线www| 成人久久伊人精品伊人| 天天干天天做天天操| 国产成人精品无码播放| 免费精品视频在线| 亚洲午夜久久久精品影院| 中文字幕亚洲欧美在线不卡| 久久久xxxx| 99久久精品费精品国产一区二区 | 亚洲av丰满熟妇在线播放| 中文字幕无码毛片免费看| 两个人看的视频高清在线www| 亚洲国产成人精品无码区二本 | 国产1000部成人免费视频| 亚洲成年人电影在线观看| 久久久久亚洲AV无码专区首JN| 久久不见久久见免费影院www日本| 人人妻人人澡人人爽欧美精品 | 人禽伦免费交视频播放| 国产精品20p| 午夜三级A三级三点在线观看| 国产激情在线观看| 国产精品99久久精品爆乳| 啦啦啦www播放日本观看| 亚洲乱码精品久久久久..| xxxxx日韩|