{"id":19416,"date":"2018-01-20T19:13:28","date_gmt":"2018-01-20T19:13:28","guid":{"rendered":"http:\/\/dev.yogaesoteric.net\/news-events-en\/society-1602-en\/arhiva-3495-en\/the-worlds-best-security-engineers-are-working-on-flappy-bird\/"},"modified":"2018-01-20T19:13:28","modified_gmt":"2018-01-20T19:13:28","slug":"the-worlds-best-security-engineers-are-working-on-flappy-bird","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/the-worlds-best-security-engineers-are-working-on-flappy-bird\/","title":{"rendered":"The World\u2019s Best Security Engineers Are Working On Flappy Bird"},"content":{"rendered":"<p align=\"justify\">&#160;<\/p>\n<p align=\"center\">\n    <img loading=\"lazy\" decoding=\"async\" border=\"0\" hspace=\"5\" alt=\"\" vspace=\"5\" src=\"\/all_uploads\/uploads-dec17\/ianuarie\/20.01.2018\/14368\/14368_1.jpg\" width=\"500\" height=\"303\" \/>\n  <\/p>\n<p align=\"justify\">Fewer people want to engage in a modern &#8220;spy vs. spy&#8221;.<br \/>Eugene Kaspersky explains hacking like it&#8217;s a bank robbery: &#8220;Imagine you visit your bank and there are a thousand people crowding the offic. <br \/>There are so many of them, you simply can&#8217;t get inside. They&#8217;re just messing around asking irrelevant questions, shouting, and acting silly. Most workers at the bank won&#8217;t be able to serve you or anyone else that day. That&#8217;s a DDoS attack.<br \/>Later that night, someone unarms the alarms, breaks into the bank, cracks the vault, and steals all the money. That&#8217;s hacking.&#8221;<\/p>\n<p align=\"justify\">The bank in his metaphor is a server, and hackers in 2016 have had a banner year messing with them. In October, a chunk of code known as Mirai hijacked thousands of internet-connected devices to launch a record-size DDoS attack. <br \/>Together, they spewed access requests at a DNS server &#8211; a switchboard for the internet, basically &#8211; and brought down some of the biggest sites on the internet: Twitter, Reddit, and Spotify among them. Again, merely an annoyance. <\/p>\n<p align=\"justify\">The more sophisticated attack on a server is when hackers &#8211; either lone wolves, loose collectives, or state-sponsored snoops &#8211; retrieve information from a server and release it to the public to influence public opinion and even sway elections. This scenario should be familiar to everybody by now.<\/p>\n<p align=\"justify\">The problem is, there just aren&#8217;t enough people smart enough to guard the vaults. Kaspersky would know. He&#8217;s a big deal in the world of cyber security. <br \/>As the founder and CEO of cyber security giant Kaspersky Lab, he&#8217;s often in the news for spotting security flaws for his clients. He also can&#8217;t find enough people to work for him.<\/p>\n<p align=\"justify\">There are more than 1 million unfilled security jobs worldwide, a number that could grow to 1.5 million by the end of the decade, according to a report from technology conglomerate Cisco Systems.<br \/>Would a healthier cyber security industry have stopped the year&#8217;s biggest hacks &#8211; WikiLeaks and DDoS attacks &#8211; from being pulled off?<\/p>\n<p align=\"justify\">&#8220;Protecting against these two threats requires different skills and different technologies, including the software and hardware needed&#8221;, Kaspersky tells. &#8220;To some extent, there&#8217;s an overlap of skills simply because IT security people get to learn about both threats.&#8221;<\/p>\n<p align=\"justify\">But DDoS attacks are ham-fisted and blunt. They don&#8217;t do much damage and often don&#8217;t keep a website down for long. What&#8217;s more dangerous are targeted attacks carried out to destroy machinery or collect information. And there aren&#8217;t enough security experts to stop those, either. <\/p>\n<p align=\"justify\">Perhaps the most famous example is the so-called &#8220;zero day&#8221; virus named Stuxnet. Although the United States government still won&#8217;t even address it, the destruction of uranium enrichment machinery in Iran in 2009 &#8211; the kind that could provide ingredients for a nuclear bomb &#8211; is widely seen as an American ploy. The machinery was destroyed after malware infected the program that regulated centrifuges. <\/p>\n<p align=\"justify\">It then spread beyond its target of the Iran nuclear facility.<br \/>Eric Chien, an engineer at California-based security company Symantec, helped track how the weaponized code used in Iran known as &#8220;Stuxnet&#8221; worked. (Kaspersky Lab also analyzed the virus over the course of about two years.) <br \/>At a panel after a screening of Zero Days, a documentary about the attack, Chien lamented that the next wave of computer science graduates might be more interested in making freemium apps rather than uncovering international intrigue.<br \/>&#8220;We go into the office thinking about how we are going to defeat these adversaries.&#8221;<br \/>&#8220;We see a lot of people getting into things like mobile or social, and people are creating Flappy Bird and people are making millions of dollars&#8221;, Chien said. <br \/>&#8220;But what we both really love about this job and why we&#8217;re super-passionate about it&#8217;s that it is unique in some sense. While we have competitors in our business &#8211; also creating security products &#8211; when we go in the office, we&#8217;re not thinking about, &#8216;Oh, how do we make another dollar? How do we beat our competitor?&#8217; We go into the office thinking about how we are going to defeat these adversaries. How are we going to defeat these actors? And those actors are constantly changing.&#8221;<\/p>\n<p align=\"justify\">Bruce Schneier, a cyber-security expert and author, gets it. &#8220;Young engineers might not see security as interesting&#8221; he says. &#8220;Which is weird to me, because I think it&#8217;s the coolest ever. It&#8217;s spy versus spy.&#8221;<br \/>At a hacking competition at New York University, one could find a lot of students who would agree with that sentiment. <\/p>\n<p align=\"justify\">One of the annual competitive formats during NYU&#8217;s Cyber Security Awareness Week is known as &#8220;Capture the Flag&#8221; or CTF, and it attracts the kinds of students who could help fill the computer security talent gap. Students from all over the world compete in a 36-hour marathon, scrolling through endless lines of code to crack security challenges.<br \/>&#8220;The skills you learn in a CTF are exactly the type of outside-the-box thinking that is required,&#8221; says David Kohlbrenner, a Ph.D. student in security and systems at UC San Diego. <\/p>\n<p align=\"center\">\n    <img loading=\"lazy\" decoding=\"async\" border=\"0\" hspace=\"5\" alt=\"\" vspace=\"5\" src=\"\/all_uploads\/uploads-dec17\/ianuarie\/20.01.2018\/14368\/14368_2.jpg\" width=\"500\" height=\"303\" \/>\n  <\/p>\n<p align=\"justify\">He got involved in cybersecurity &#8220;purely through CTF&#8221; and is an original member of the Plaid Parliament of Pwning, a dominant CTF team from Carnegie Mellon that won the 2016 competition.<\/p>\n<p align=\"justify\">&#8220;What the companies need are people who can solve a variety of different challenges and can approach them from different angles&#8221;, Kohlbrenner tells.<br \/>Kohlbrenner says the Mirai botnet responsible for October 2016 massive DDoS attack was &#8220;honestly trivial to set up&#8221; and a continued dearth of security engineers (and, Schneier argues, a market failure to make the Internet of Things decently secure) could keep it that way in the future.<\/p>\n<p align=\"justify\">It&#8217;s clear, companies need more manpower, whether that&#8217;s to ward off DDoS attacks or server hacks. But when it comes to recruiting, Schneier says new technology companies have the upper hand in attracting talented young programmers.<br \/>&#8220;You don&#8217;t want to work for Procter &amp; Gamble&#8221; he says. &#8220;You want to work for Google, or you want to go work for Facebook, or the next high tech startup. But Procter &amp; Gamble, turns out, needs maybe a couple dozen cyber security people.&#8221;<\/p>\n<p align=\"justify\">Nick Winter, the co-founder of a gamified coding community called CodeCombat, agrees. &#8220;No one is thinking: &#8216;hmm, I&#8217;m going to get a job at an insurance company&#8217;.&#8221; <br \/>Doesn&#8217;t matter if they have all these interesting technological problems to solve and tons of important data to protect. They&#8217;re at a huge disadvantage there compared to any start-up in San Francisco or even, like a tech-focused, big tech company like Cisco.<\/p>\n<p align=\"justify\">Both Schneier and Winter&#8217;s examples are reminders that it isn&#8217;t just tech companies &#8211; from router manufacturers to dating apps &#8211; that have a lot to lose when security engineers are in short supply. &#8220;All companies become software companies&#8221;, Winter says. &#8220;And all data becomes more important and mission critical.&#8221;<br \/>Half of the 4,000 companies in a recent survey by Kaspersky Lab cited cyber security as a concern.<\/p>\n<p align=\"justify\">&#8220;The findings show a general shortage in full-time security staff and expert talent availability, which calls for the need for more specialists in the field,&#8221; reads a press release about the survey results.<\/p>\n<p align=\"justify\">It&#8217;s up to universities like NYU to prepare students for an ever-changing field, Kaspersky says. Server attacks in the future shouldn&#8217;t feel like bank robberies that change elections. <\/p>\n<p align=\"justify\">&#8220;The job market is changing too fast for the education system&#8221;, Kaspersky says. <br \/>&#8220;Universities are fairly conservative institutions, plus, of course, it takes considerable time to educate people. <br \/>We see that there&#8217;s a growing number of IT security programs, and more and more people are getting interested in the field, but the job market is expanding faster.&#8221;<br \/>His advice for young programmers? Learn how to prevent attacks.<br \/>&#8220;There are many skills that are in deficit that require very focused technical training&#8221; Kaspersky says. &#8220;Intrusion detection, development of secure software, digital forensics. All these skills are in high demand, but there are not many folks who have them.&#8221;<\/p>\n<p align=\"justify\">&#160;<\/p>\n<p>    <strong>yogaesoteric<br \/>January 20, 2018<br \/><\/strong><br \/>\n    <\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#160; Fewer people want to engage in a modern &#8220;spy vs. spy&#8221;.Eugene Kaspersky explains hacking like it&#8217;s a bank robbery: &#8220;Imagine you visit your bank and there are a thousand people crowding the offic. There are so many of them, you simply can&#8217;t get inside. They&#8217;re just messing around asking irrelevant questions, shouting, and acting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1314],"tags":[],"class_list":["post-19416","post","type-post","status-publish","format-standard","hentry","category-arhiva-3495-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/19416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=19416"}],"version-history":[{"count":0,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/19416\/revisions"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=19416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=19416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=19416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}