Skip to main content

What lessons can be learned from the latest cyber attack on the US State Department?

The news has just leaked out:

The US State Department was recently the victim of a cyber-attack.

The attack is believed to have taken place a few weeks ago, shortly after a Senate committee warned of the risk of a data breach.

What is surprising is that this is not the first time the State Department has been the subject of a cyber-attack. Indeed, it was one of dozens of federal agencies - and thousands of private data networks (more than 18,000 government and private computer networks) - hit by the massive SolarWinds breach in December 2020.



What then of the computer security lessons learned from the Department of Defense (DOD) "Zero Trust Reference Architecture"(1) and from the National Institute of Standards and Technology's Special Publication 800-207 on "COMPUTER SECURITY" devoted to the ZERO TRUST ARCHITECTURE (2)?

Is this just another example of the famous saying that it is the shoemaker who is the worst shod?

Or should we look further and analyse the content of the American ZERO TRUST concept to understand what has happened?

In fact, a closer look at the concept shows us that it is still focused on human behavior with the training of the staff in charge and the abundant hierarchy of cascading authorizations and privileges.

Is this not the heart of the matter?

We all know that the human factor is the weakest link in the IT security chain. No one is safe from a mistake and when the attacker has access to the credentials of the highest authorities in a system, he has access to everything he wants.

This is why we at PT SYDECO have created a close protection system, totally independent of the human factor and the type of attack, precisely because we are aware of this weakness and because antivirus software only works with a certain delay when it comes to new viruses. We call this system SP-One©.

SP-One© is inspired by the processes and mechanisms of our IMMUNE SYSTEM to protect our computer systems against any external aggression.

Since 29 January 2021, SP-One© has been subject to numerous daily attacks, each one equally unsuccessful. As of August 23, 2021, they totalled 1,117,745 attacks. 

No one has succeeded in breaking through the protection of the program that SP-One© protects.

So isn't the best protection against cyber attacks the integration of SP-One© in a ZERO TRUST architecture using MICRO SEGMENTATION?

***

(1) Department of Defense (DOD) Zero Trust Reference Architecture

Version 1.0 February 2021 Prepared by the Joint Defense Information Systems

Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team

(2)This publication is available free of charge from

https://doi.org/10.6028/NIST.SP.800-207


Comments

Popular posts from this blog

Hannover Messe 2021

Hannover Messe 2021   The World's largest Industrial Technology Exhibition "Hannover Messe 2021" will be completed tomorrow, April 16, 2021. There is still time for you to visit the exhibition, there will be a lot of information that you get related to the development of industrial technology in the world. Various sectors of industrial from various countries are in the exhibition. Indeed this exhibition is different from Hannover Messe in previous years, because this year Hannover Messe held full Digital. this is certainly a strategy to anticipate the spread of the Covid-19. But you don't have to worry, because even if it's refreshed digitally you can still get all the information you need. because there are features available to share contacts, livestreaming and even meetings within the Platform. This year Indonesia was selected as a Country Partner and represented by at least 156 Companies from Indonesia. one of them is PT Sydeco who concentrate fully on Cyber S

KASEYA CRASH

  I can't help but draw a parallel between KASEYA and SOLARWINDS. Both companies offer I would say "hyper-integrated" solutions, the "all in one", management and security, easy to use and both put forward the IT security not only of their solution but especially of the whole IT system of the users.   And both seem to either be adept at "do as I say, not as I do" unless they are deceiving users about the quality and effectiveness of their solutions. On closer inspection, both offer full visibility that should allow for immediate reaction and data protection. It is clear that both companies were unable to detect the early stages of the attacks, despite the vaunted performance of their security solutions. The fault of these two companies is that they wanted to "hyper-integrate" everything, the IT protection solution with the IT management solution. Data management and IT security cannot be integrated in one product. Of course, when

Cyber Crime

  Cyber Crime Cyber Crime atau kejahatan digital pasti sudah tidak asing lagi di telinga kita. Dari kejahatan yang sifatnya kecil dan sederhana sampai yang sangat besar dan kompleks. Motif mereka juga berbagai macam, mulai dari mengkopi data, merusak data maupun situs bahkan meretas atau mencuri data atau sebuah situs. Tentu tindakan mereka sangat merugikan kita, baik kerugian secara moril sampai kerugian materiil yang sangat besar. Sasaran mereka juga beraneka ragam, mulai dari Individu, Lembaga, perusahaan, Instansi swasta, bahkan Instansi Pemerintahan sekalipun tak luput dari serangan mereka. Mereka juga menyerang semua sektor kehidupan, seperti Perbankan, Pendidikan, Kesehatan, Perindustrian, Perdagangan, Pertanian, Penelitian, Pertanian dan lain sebagainya. Metode yang mereka gunakan untuk menyerang juga beraneka ragam dan terus berkembang seiring dengan perkembangan Teknologi dan perkembangan Ilmu Pengetahuan. Mulai dari penyerangan dengan menyebarkan Virus, Malware, Ransomwa