Access "Schneier-Ranum Face-Off: Should we ban anonymity on the Internet?"
This article is part of the January/February 2010 issue of Filling the data protection gap
Point: Bruce Schneier Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only the proper people have access to their own information. We'll know who is sending us spam and who is trying to hack into corporate networks. And when there are massive denial-of-service attacks, such as those against Estonia or Georgia or South Korea, we'll know who was responsible and take action accordingly. The problem is that it won't work. Any design of the Internet must allow for anonymity. Universal identification is impossible. Even attribution -- knowing who is responsible for particular Internet packets -- is impossible. Attempting to build such a system is futile, and will only give criminals and hackers new ways to hide. Imagine a magic world in which every Internet packet could be traced to its origin. Even in this world, our Internet security problems wouldn't be solved. There's a huge gap between proving that a packet came from a particular computer and that a ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
New data protection laws
by Richard E. Mackey, Jr., Contributor
Massachusetts 201 CMR 17.00 and Nevada's data protection law establish new standards for personal data protection
-
Disaster recovery plans and DLP solutions top 2010 priorities
Disaster recovery plans, DLP solutions, and regulatory compliance are top enterprise priorities, according to Information Security's Priorities 2010 survey
-
New data protection laws
by Richard E. Mackey, Jr., Contributor
-
-
Endpoint DLP fills data protection gap
by Rich Mogull
Learn how endpoint data loss prevention technology complements network DLP and secures data that users interact with on laptops, mobile and portable storage devices.
-
Attackers zero in on Web application vulnerabilities
Secure coding and vulnerability scanning could mitigate many Web application attacks
-
Endpoint DLP fills data protection gap
by Rich Mogull
-
Columns
-
Perspectives: Pet information security risks
by Ron Woerner
IT and security managers often make the mistake of being consumed with a specific risk or threat to the detriment of security
-
Schneier-Ranum Face-Off: Should we ban anonymity on the Internet?
Security experts Bruce Schneier and Marcus Ranum debate the possibility of eliminating anonymity on the Internet.
-
Leverage Google Attacks to Improve Cybersecurity
China's hacker attacks against Google's infrastructure, including Gmail accounts of human rights activists as well as Google's source code, should be used to educate enterprises about the reality of cyberespionage from nation states and organized criminals.
-
Perspectives: Pet information security risks
by Ron Woerner
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO