Who'd Phish from the Summit of Kilimanjaro?
نویسنده
چکیده
Phishing emails are now so convincing that even experts cannot tell what is or is not genuine; though one of my own quiz errors resulted from failing to believe that genuine marketeers could possibly be so clueless! Thus I believe that education of end users will be almost entirely ineffective and education of marketing departments – to remove “click on this” (and HTML generally) from the genuine material – is going to take some time. Providing end users with one-time passwords (pads of single-use numbers, SecureID tokens, PINs sent by mobile phone) can ensure that phishing only works when there is a real-time, Man-in-the-Middle (MITM), attack, which will immediately deter the bad guys whose technical expertise runs solely to copying websites. However, formal protocol analysis shows that only a handful of the “bag of bits” being passed around can be considered to be authenticated – and the MITM will be able to steal what they wish. Insisting on SSL (https) connections will prevent the use of random URLs for phishing websites and bring the focus back to control of the DNS. However, once the second level (fakebankname.com) is secured then the attackers will just move down a level (to bankname.plausible-second-word.com). I predict a lot of wasteful activity before the nature of DNS delegation is fully understood. Insisting on client certificates prevents MITM, but also stops me paying my gas bill from a holiday cybercafé – which is bad for business. But why do I need the same authority to pay the bill as to change the name of the gas company? A range of authentication systems is needed, chosen as the risk varies. The banks could learn from the activity monitoring systems of the credit card companies, and thus ensure that extra authentication is seldom necessary or onerous. For example, a check can be made on the IP address of incoming connections. If the session arrives from a cybercafẽ in Latvia or a web hosting rack in suburban Moscow then Mr. Jones in Acacia Avenue is not connecting directly... if he really does want to set up a new payee then perhaps he could ring the branch manager directly to confirm that he’s taking an East European holiday? To conclude; I can see no silver bullet (I can imagine success for phishing emails that ask for client certificates), and most of the proposed argentoammunition is useless once the end-user machine is compromised. Nevertheless, a blend of security improvements will freeze out all but the most competent criminals. Society may need a general solution to online security, but the banks only have to persuade the bad guys to move on to more attractive targets. However, the fixes must not be introduced one by one, allowing each to be overcome individually. What’s needed is a ‘Kilimanjaro effect’, where the security suddenly dominates the landscape and it will always seem to be a long way to the summit.
منابع مشابه
Solar-radiation-maintained glacier recession on Kilimanjaro drawn from combined ice-radiation geometry modeling
[1] In the context of investigating modern glacier recession on Kilimanjaro, which began around 1880, this study addresses the glacier regime of the vertical ice walls that typically form the margins of Kilimanjaro’s summit glaciers. These walls have suffered a continuous lateral retreat during the twentieth century. To evaluate the role of solar radiation in maintaining glacier recession on Ki...
متن کاملDeterminants of summiting success and acute mountain sickness on Mt Kilimanjaro (5895 m).
OBJECTIVE To determine the incidence of acute mountain sickness (AMS), the frequency of summiting success, and the factors that affect these in trekkers on Kilimanjaro, one of the world's most summitted high-altitude peaks. METHODS The study group comprised 312 trekkers attempting Mt Kilimanjaro summit by the Marango Route. Trekkers ascended over 4 or 5 days along a fixed ascent profile, stop...
متن کاملThe montane circulation on Kilimanjaro, Tanzania and its relevance for the summit ice fields: Comparison of surface mountain climate with equivalent reanalysis parameters
a r t i c l e i n f o Keywords: mountain climate montane circulation land-use change ice-field We compare surface climate (temperature and moisture) measured on an hourly basis at ten elevations on Kilimanjaro with equivalent observations in the free atmosphere from NCEP/NCAR reanalysis data, for September 2004–July 2008. On the lower forested slopes the mountain surface is consistently cooler ...
متن کاملDeglaciated areas of Kilimanjaro as a source of volcanic trace elements deposited on the ice cap during the late Holocene
Ice fields on Kilimanjaro (5895 m a.s.l., Tanzania) are retreating and 85% of the ice cover has been lost since 1912. The degree to which this recession is exceptional during the Holocene is uncertain, as age control of the entire ice stratigraphy exists only for the very shallow and very bottom ice of the Northern Ice Field. This empirical evidence suggests that the Kilimanjaro ice cover may b...
متن کاملA paleoclimatic perspective on the 21st-century glacier loss on Kilimanjaro, Tanzania
Assessing the significance of current glacier loss on Kilimanjaro, Tanzania, demands a wellconstrained temporal perspective. That context is provided by direct measurements, ancillary observations of the ice fields and the analyses of the ice cores collected from them. Ice retreat mechanisms observed there today are consistent with the preservation of the oldest ice, 11.7 ka, in the central dee...
متن کامل