How does Cisco put us at risk?

By Zhang Lulu
0 Comment(s)Print E-mail China.org.cn, June 21, 2013
Adjust font size:

As the Prism scandal, the secret U.S. National Security Agency (NSA) Internet surveillance program leaked by whistleblower Edward Snowden, continues to unfold, it has thus far provoked wide discussion regarding the purchase of networking equipment by the Chinese government and enterprises, as well as their security holes – as uncovered by the recent controversy.

According to Snowden, the NSA has monitored China's networks and computers through Cisco routers. Although Cisco Systems Inc., the giant networking equipment supplier, issued a statement denying any involvement in the surveillance program on June 19 for the first time after the exposure of the Prism project, it indeed plays a part in building almost all major network projects in China, covering key sectors such as the government, customs, postal services, finance, railways, civil aviation, medical treatment and military security. Additionally, Cisco also has a hand in the construction of the networking infrastructure of both China Telecom and China Unicom, two of China's tycoon telecommunication providers.

Meanwhile, Cisco is also the major supplier of the U.S. government and military communications and networking equipment. Security experts are hence concerned that once a war breaks out, the U.S. government may use globally-covered Cisco products in order to launch a fatal cyber attack on its enemies.

Government and enterprise procurement security

The U.S. House of Representatives Intelligence Committee issued a report in 2012, claiming that the U.S. telecommunications operators should avoid working with China's Huawei and ZTE, two leading network equipment manufacturers, since they may pose a threat to U.S. national security. In the same vein, the Indian government, out of concerns for its national security, banned its telecommunications operators from purchasing Chinese equipment as early as May 2010. Both cases show that nations all over the world, out of concerns for their national security, not only take security issues seriously when purchasing equipment, but also demonstrate a strong precautionary consciousness in terms of mandatory requirements.

As for China, although its government and enterprises do pay attention to security issues when purchasing equipment, their main concern still centers on the overall security such as the firewall, intrusion prevention and setting up a DMZ (Demilitarized Zone). Few of them have ever kept a watchful eye on switchboards and other equipment that may access confidential information, according to an unnamed source with Huawei.

Cisco, which now finds itself involved in the Prism controversy, is indeed being accused of acquiring information through routers.

According to the Huawei source, there is a network operating system present in routers and switchboards, which can be used by both users as well as developers. Nevertheless, developers have access to information in the back end that is not available to ordinary users, which the industry refers to as the "back door." The "back door," in other words, is created by developers to access the system without being known to users. As a matter of fact, as long as one taps into the routers on the backbone network, one will have access to thousands of computers instead of having to hack computers one by one. In doing so, the hacker can obtain information from practically any computer.

How to fix security holes?

When networks security holes are detected, both the Chinese government and enterprises usually remediate through software, hardware and security systems, for instance, purchasing firewalls, managing Internet behavior and adopting various kinds of attack-prevention measures. Few have paid sufficient attention to the information security incurred by router invasion though, according to the industry source.

In fact, the Prism program is not the only case in which an invasion was enabled by means of routers. In 2011, 4,500,000 households in Brazil fell victim to so-called "modem invasion," directing them to fraudulent sites that subsequently copied their online banking credentials -- which resulted in huge financial losses.

The Cisco router issue revealed by the scandal should draw the attention of the Chinese government, enterprises and general public to the issue of information security -- including those systems involving routers.

"The arm cannot beat the thigh"

As revealed by Snowden, not only Cisco, but Google, Yahoo, Microsoft, Apple, Facebook, AOL, PalTalk, Skype, and YouTube have all been involved in the Prism project.

Although Google and Facebook have denied being part of the NSA surveillance program and Microsoft and Yahoo have issued similar statements, the industry source argued, by quoting an old Chinese saying that "the arm cannot beat the thigh," that enterprises are unable to say no to the government if the latter makes any demands. "As to what the government will have access to, that all depends on what they want to have access to."

The issue has also sparked a debate on how enterprises should balance the responsibility for their customers'privacy and the governmental demands of access to information.

Print E-mail Bookmark and Share

Go to Forum >>0 Comment(s)

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Enter the words you see:   
    Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 波多野结衣一区二区三区高清在线 | 亚洲欧美另类在线观看| 不卡中文字幕在线| 欧美日韩高清完整版在线观看免费| 国产午夜亚洲精品不卡| 久久久久亚洲av无码专区| 欧美高清熟妇啪啪内射不卡自拍| 国产三级全黄在线观看| 521a成v视频网站在线入口| 新97人人模人人爽人人喊| 亚洲国产高清视频在线观看| 美女福利视频一区二区| 国产精品αv在线观看| 一本一本久久a久久精品综合麻豆| 欧洲精品99毛片免费高清观看| 免费无遮挡毛片| 饥渴难耐16p| 国产青草视频在线观看| 中文字幕无码无码专区| 果冻传媒91制片厂| 伊人久久精品无码AV一区| 视频在线观看国产| 国产精品天干天干| www.精品国产| 日本a级视频在线播放| 亚洲国产精品网| 欧美黑人巨大3dvideo| 亚洲黄色a级片| 美女羞羞视频网站| 国产一区二区三区在线观看免费| xxxx日本视频| 天堂mv免费mv在线mv观看| 丰满人妻一区二区三区免费视频| 欧美巨大xxxx做受高清| 免费看日b视频| 精品国产国产综合精品| 国产性猛交╳XXX乱大交| 91亚洲导航深夜福利| 婷婷人人爽人人爽人人片| 久久人午夜亚洲精品无码区| 欧美怡红院免费全部视频|