Posts About Problems
Bulk Equipment Interference
I remember a time when encryption standards were controlled by the government. The respective national information security agencies would not allow the export of software (or hardware) that contained new encryption algorithms (formulas) unless the software/hardware maker could provide the agency with a “key” to break the code.
Those days are gone. Computers have progressed so much that hackers can create their own encryption algorithms on the fly without any outsiders being given a key or an export license.
How do hackers get in?
Governments and most major companies have installed
extensive cyber security defenses. However their weakest links are the
contractors and independent devices that have links into their computer
networks.
These smaller contractors often do not invest in cyber
security at the same levels and many of the independent devices have little or no
security.
Do you use Google Chrome?
Have you noticed that many of the smaller websites you visit using Chrome now carry the admonition of “not secure”? These websites have not changed, Chrome has changed.
Elections and Cybersecurity
99% of votes in the USA are either cast or counted by computers. We have invested in computerized elections because they reduce miscounts, help voters with disabilities, improve access to voting for rural voters, and speed up delivery of results. That’s goodness. Unfortunately, we have NOT invested in strong security for our computerized elections.
Will the Russians again meddle in the upcoming American elections?
I’m sure they will.
And why shouldn’t they? Especially when we do the same thing all the time.
Problems cannot be solved…
…without breaking them down into issues.
Like so many other things in life, problem solving activities have an “80-20 Rule”. To correctly address problems, spend 80% on your time on the problem and 20% of your time on the solution. Most people do it the other way around