Safe and convenient, which side to choose?
Many international security experts receive a certain amount of convenience in a way that reduces the security of security software.
At the Conference of ' Unix Australia User Groups ' (AUUG) in Melbourne yesterday, software security developers explained why IT industry still faces many problems.
Security standards written 10 years ago make it possible to keep up with the pace of hackers' growth with malware and increasingly cunning tricks.
Source: crcitalia
' Many' security products designed by cryptographers lack convenience. People can't use them appropriately , 'said Gutmann, a lecturer in computer science at the University of Auckland. He also emphasized that convenience is as important as ' giving a group of codes and telling people to decode them '.
The current protocols have not been designed for convenience. Even if a user-friendly graphical user interface (GUI) is built completely, it is unlikely that the original developer has accepted it.
' They like 100% of the complete software, which is not more convenient than 99% . Because synchronization is placed first.
OpenBSD developer Ryan McBride, who works with packet filters and IPSec code, reacts violently to intrusion detection systems. He thinks that these systems are useless, there is no way to determine whether a virus is attacking the network or not.
McBride is witty: ' I use IDS to work with Fortune 50 company and one day it says' Another box has virus, come and turn it off ' !'. It is true that ' it is difficult to automatically turn off everything safely '.
IDS does not solve the problem, but the one inside it does.
Lawrie Brown of the University of NSW Information Technology explained that the main problem with unsafe modern software is that the giant source body can leave many holes if people continue to use it. .
Up to now, in many areas of the computer world, it is still quite new and people do not have an important habit to keep information confidential.
A network security student in Germany, an assistant in this regard also commented that end users are not trained to cope with security risk coping skills.
' It will take about 20 to 30 years to teach people how to handle computer security issues. You don't want to give the key to your house to a stranger. So why do you do that with your password? '
T.Thu
- Instructions on how to choose safe food, avoid poisoning
- Quickly see the secret of choosing a safe seat when the car is in distress
- The secret to choosing clean food on Tet
- How to choose confectionery, safe food on Tet holiday
- 'Consecutive' refrigerator
- Nutrition experts suggest how to choose the moon cake for each group of people
- Tips for choosing safe, non-chemical fruits
- How to choose safe toys for your baby
- Israel developed a safe contraceptive for women
- 8 basic principles when using a public PC
- What do you understand about refrigerator Side by Side?
- How to choose safe vegetables