Originally posted by inimalist
ok, and I do get that most chinese hacking attacks can, if at all, only loosely be traced back to the government, and there is a sense of national heroism to these non-governmental hackers, but if America is so awesome with its cyber-warriors, why are its national security networks so vulnerable.
It's hard to say, really: it's a combination of really high security and really low security. For real. You'll have an unpatched server sitting right next to an utterly armored server, in a DoD datacenter.
And, if America's "cyber-warriors" actually cared even a little about securing their own nation, maybe you'd have a point. They do it, literally, for the lulz and prestige.
Originally posted by inimalist
Like, I'm sure you are more aware of the military companies and governmental bodies that get hacked frequently, and all the data that has been copied and all that, how come we can't just shut them out?
I am aware. I get those reports, via e-mail. However, significant breachers aren't as often as you're making it out to be. If you saw some of the hacking traffic captured, you'd sh*t your pants. There's just so MUCh of it and the vast majority is really stupid amateur stuff that has been patched up a decade ago. The "good" stuff comes internally, from the US. Those attacks are successful, far more frequently.
Originally posted by inimalist
Granted, I'm not super knowledgeable about this, but if America really has the best of the best as you describe, shouldn't that not happen?
Sure, if the hackers actually gave a sh*t about our country...and our intelligence agencies were willing to work with ...well...criminals. Since neither of those scenarios hold true (with the latter seeing a tad bit of lax in recent days), we end up with the best hackers in the world, hacking for the lulz while China churns out thousands of low-quality hackers, each year, working for their nation.
Its very simple to secure you shizer...but don't tell anyone this stuff:
1. Default deny all on your external firewall. (After all of your business need exceptions are put in.)
2. Implement internal protection such as spoofing rules (these things come pre-written and have been a loooong time.)
3. Educat your employees.
4. Create a rigorous patch testing an deployment plan.
5. Contigency plan and document the crap out of it and update it frequently.
6. Follow ITIL best practices.
7. Bla bla bla: heuristic IDS/IP definitions that are frequently tested and updated.
Pretty simple to do all of those if you have a good CIO. No joke.
The problem:
Not everyone does that stuff. They do well on some and crappy on others or they don't do any of those very well.
Nothing can protect you from an 0 day, so you have to rely on the vendor/software developers to patch/hot fix that stuff. It's just how it goes.
So, I can sum up my whole post like this:
Chinese hackers: simple, massive numbers, and work together in loose pockets. Nationalistic or at least work for the government, "unofficially."
US hackers: Diverse skill levels with most of the world's best. Invividualistic, egotistical, and they don't play well with the US government.
Cyberwafare advantage: Chinese.
My job future: bumpy and complex but I'll always have a job.