Opinion

Biggest cybersecurity breaches originate from spotty defense, not hackers or spies

This past week, Chinese President Xi Jinping visited America on his first state visit. While President Barack Obama chatted with Xi and his wife over an elegant state dinner, the atmosphere was strained by allegations of Chinese state-sponsored cyber espionage on American firms.

Separating hyperbole from fact in this case is almost impossible, but what is known is that the state of computer security is astonishingly weak. New breaches have practically become routine. These breaches are problems that can be solved; however, unfortunately for those who seek an easy solution, they require a fundamental shift in corporate culture.

It is important to realize through all of these breaches that the core principles of cybersecurity have not been compromised. Advanced Encryption Standard-256, the method that is generally conventional for encryption, has not been weakened in any real sense: there are more possible ways to encrypt data than there are atoms in the entire universe. Companies that are willing to put in the effort to protect their data are virtually impregnable. However, to do so requires much more than a small cybersecurity team.

The biggest threats in cybersecurity are not created by hackers or spies, but by the average worker. If those in charge of protecting servers know what they are doing, attacking through the Internet might as well be impossible. However, any attempt to protect sensitive information is only as strong as its weakest link. Openings can be introduced as much through exploits in systems as through the mistakes made by people who don’t know any better.

In the dry humor of the IT world, these are referred to as PEBCAK errors: Problem Exists Between Chair and Keyboard. Dropping infected USB drives in parking lots so that workers take them into their offices to check what is inside, for instance, has become so common that many branches of the government outright ban the use of USB ports. Until gaping holes like these are closed, any discussion of hacking will be pointless, as there can be no security without everyone understanding what should be avoided.

Training workers to respect cybersecurity rules when they’re not particularly knowledgeable about technology is difficult, but not impossible. One potential way to move forward is to follow the model of Riot Games, a company most widely known for the multiplayer video game “League of Legends.” To buff up employee awareness about espionage, the company hires actors who pretend to be employees, according to a 2012 article from Eurogamer.net. Employees who spot the imposters are awarded a prize. By placing an incentive on being vigilant, Riot Games creates a culture where even those who know little about security understand what is and isn’t permissible.

Others would be wise to adopt policies like this and more. As such, even those who find cybersecurity boring and arcane will see a reason to care.

Andrew Langen is a junior majoring in economics and math.

Featured image courtesy pixelcreatures.

October 4, 2015

Reporters

Andrew Langen


Around the Web
  • Miami Herald
  • UM News
  • HurricaneSports

Nothing like a comic book cover on steroids to get University of Miami and LSU football fans juiced ...

They are two big bodies with experience, but new to the University of Miami. And the Miami Hurricane ...

Freshman quarterback Jarren Williams, who returned to practice Wednesday after missing most of Tuesd ...

Corey Gaynor is working hard to solidify his spot as backup center to UM senior standout Tyler Gauth ...

Former University of Miami football and NFL star player Jonathan Vilma made a splash in South Florid ...

Miami Law conducts its inaugural Legal Impact Hack for first-year students. ...

Conquer common back to school challenges with an expert's guide for parents and children. ...

Unique camp supports children whose parents have cancer. ...

New study shows that discriminating against workers with tattoos puts hiring managers at a competiti ...

Bill Clinton convenes the second summit of his CGI Action Network on Post-Disaster Recovery at UM. ...

Malik Rosier, Travis Homer and Ahmmon Richards are key returning playmakers, but they are just the b ...

Miami redshirt senior quarterback Malik Rosier was named to the preseason watch list for the Manning ...

The University of Miami's volleyball team returns to the Knight Sports Complex on Saturday at 3 ...

The University of Miami soccer team will travel to Boca Raton, Fla., Friday night as the team kicks ...

Miami head women's tennis coach Paige Yaroshuk-Tews revealed Thursday the team's schedule ...

TMH Twitter
About TMH

The Miami Hurricane is the student newspaper of the University of Miami in Coral Gables, Fla. The newspaper is edited and produced by undergraduate students at UM and is published weekly in print on Tuesdays during the regular academic year.