How does Cisco put us at risk?

By Zhang Lulu
0 Comment(s)Print E-mail China.org.cn, June 21, 2013
Adjust font size:

As the Prism scandal, the secret U.S. National Security Agency (NSA) Internet surveillance program leaked by whistleblower Edward Snowden, continues to unfold, it has thus far provoked wide discussion regarding the purchase of networking equipment by the Chinese government and enterprises, as well as their security holes – as uncovered by the recent controversy.

According to Snowden, the NSA has monitored China's networks and computers through Cisco routers. Although Cisco Systems Inc., the giant networking equipment supplier, issued a statement denying any involvement in the surveillance program on June 19 for the first time after the exposure of the Prism project, it indeed plays a part in building almost all major network projects in China, covering key sectors such as the government, customs, postal services, finance, railways, civil aviation, medical treatment and military security. Additionally, Cisco also has a hand in the construction of the networking infrastructure of both China Telecom and China Unicom, two of China's tycoon telecommunication providers.

Meanwhile, Cisco is also the major supplier of the U.S. government and military communications and networking equipment. Security experts are hence concerned that once a war breaks out, the U.S. government may use globally-covered Cisco products in order to launch a fatal cyber attack on its enemies.

Government and enterprise procurement security

The U.S. House of Representatives Intelligence Committee issued a report in 2012, claiming that the U.S. telecommunications operators should avoid working with China's Huawei and ZTE, two leading network equipment manufacturers, since they may pose a threat to U.S. national security. In the same vein, the Indian government, out of concerns for its national security, banned its telecommunications operators from purchasing Chinese equipment as early as May 2010. Both cases show that nations all over the world, out of concerns for their national security, not only take security issues seriously when purchasing equipment, but also demonstrate a strong precautionary consciousness in terms of mandatory requirements.

As for China, although its government and enterprises do pay attention to security issues when purchasing equipment, their main concern still centers on the overall security such as the firewall, intrusion prevention and setting up a DMZ (Demilitarized Zone). Few of them have ever kept a watchful eye on switchboards and other equipment that may access confidential information, according to an unnamed source with Huawei.

Cisco, which now finds itself involved in the Prism controversy, is indeed being accused of acquiring information through routers.

According to the Huawei source, there is a network operating system present in routers and switchboards, which can be used by both users as well as developers. Nevertheless, developers have access to information in the back end that is not available to ordinary users, which the industry refers to as the "back door." The "back door," in other words, is created by developers to access the system without being known to users. As a matter of fact, as long as one taps into the routers on the backbone network, one will have access to thousands of computers instead of having to hack computers one by one. In doing so, the hacker can obtain information from practically any computer.

How to fix security holes?

When networks security holes are detected, both the Chinese government and enterprises usually remediate through software, hardware and security systems, for instance, purchasing firewalls, managing Internet behavior and adopting various kinds of attack-prevention measures. Few have paid sufficient attention to the information security incurred by router invasion though, according to the industry source.

In fact, the Prism program is not the only case in which an invasion was enabled by means of routers. In 2011, 4,500,000 households in Brazil fell victim to so-called "modem invasion," directing them to fraudulent sites that subsequently copied their online banking credentials -- which resulted in huge financial losses.

The Cisco router issue revealed by the scandal should draw the attention of the Chinese government, enterprises and general public to the issue of information security -- including those systems involving routers.

"The arm cannot beat the thigh"

As revealed by Snowden, not only Cisco, but Google, Yahoo, Microsoft, Apple, Facebook, AOL, PalTalk, Skype, and YouTube have all been involved in the Prism project.

Although Google and Facebook have denied being part of the NSA surveillance program and Microsoft and Yahoo have issued similar statements, the industry source argued, by quoting an old Chinese saying that "the arm cannot beat the thigh," that enterprises are unable to say no to the government if the latter makes any demands. "As to what the government will have access to, that all depends on what they want to have access to."

The issue has also sparked a debate on how enterprises should balance the responsibility for their customers'privacy and the governmental demands of access to information.

Print E-mail Bookmark and Share

Go to Forum >>0 Comment(s)

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Enter the words you see:   
    Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 九色国产在视频线精品视频| 午夜a级成人免费毛片| 91精品视频在线免费观看| 尾野真知子番号| 久久一区二区精品| 日韩成人在线网站| 亚洲国产品综合人成综合网站| 波多野结衣一区二区三区四区 | 二个人看的www免费视频| 在线一区免费播放| ssni-559侵犯新任女教师| 成人污视频在线观看| 久久久久久久亚洲AV无码| 日韩精品久久久肉伦网站 | 野花影院在线直播视频| 国产手机在线αⅴ片无码观看| 又粗又硬又爽的三级视频| 国产视频你懂的| 999zyz色资源站在线观看| 天堂在线观看中文字幕| www色在线观看| 精品国精品国产自在久国产应用男 | www.夜夜操.com| 少妇高潮惨叫久久久久久| 中国黄色毛片大片| 无码av免费一区二区三区| 久久久久人妻一区精品色| 日本道色综合久久影院| 久久精品乱子伦免费| 日韩在线视频观看| 久久精品人人爽人人爽| 日韩精品一区二区三区中文| 亚洲AV成人片色在线观看高潮| 未满十八18禁止免费无码网站| 亚洲一区二区视频在线观看| 欧美三级手机在线| 亚洲一区无码中文字幕| 欧美XXXX做受欧美1314| 亚洲av中文无码乱人伦| 最新无码a∨在线观看| 久久综合欧美成人|