Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home IT Management
    • IT Management

    Fear the Feds Who Fear IT Knowledge

    By
    Peter Coffee
    -
    December 23, 2002
    Share
    Facebook
    Twitter
    Linkedin

      In our end-of-year discussions about the coming years it issues, someone mentioned government concerns about training in computer security. “The more people take these classes, the more people know how to hack” seems to be a growing concern at No Such Agency and its District of Columbia brethren.

      Lets kill this thought before it multiplies. Its offspring might be limits on access to technical training, and that would be a terrible idea.

      When people understand how things work, they make better decisions about how to use technology. If you know that your cars parking brake is controlled by a cable attached to the handle between the seats, separate from the brake pedals hydraulics, then you might think of using the former as backup to the latter on the day when your brake pedal sinks to the floor. But I cant teach you that without telling you useful things about how to sabotage a car.

      Computer security involves the same dilemma. If you know about resource pools in Windows 9x, youll get in the habit of using just a few browser windows, rather than spawning windows willy-nilly to keep many Web pages open. You may even use a resource monitor to make sure your PC doesnt crash with little warning. Thats one of the simplest, most obvious examples of why even casual users ought to understand ITs underpinnings, even though that knowledge is also the foundation of malicious hacks.

      My own school-age sons have seen movies, like “GoldenEye,” in which hacking skills are plot elements. With touching confidence, they plead with me to teach them how to break in to systems. I always give them the same answer: “Read my book about PCs, then well talk.” That puts the subject to bed for a while. They dont want to learn that much; they just want to know what button they can push that will make things do what they want.

      Most malicious mischief makers dont want to work hard enough to learn precision hacking, but it takes an army of skilled developers to avoid creating the loopholes that enable a one-click attack. Lets not make it harder for future defenders to learn their craft.

      Avatar
      Peter Coffee
      Peter Coffee is Director of Platform Research at salesforce.com, where he serves as a liaison with the developer community to define the opportunity and clarify developers' technical requirements on the company's evolving Apex Platform. Peter previously spent 18 years with eWEEK (formerly PC Week), the national news magazine of enterprise technology practice, where he reviewed software development tools and methods and wrote regular columns on emerging technologies and professional community issues.Before he began writing full-time in 1989, Peter spent eleven years in technical and management positions at Exxon and The Aerospace Corporation, including management of the latter company's first desktop computing planning team and applied research in applications of artificial intelligence techniques. He holds an engineering degree from MIT and an MBA from Pepperdine University, he has held teaching appointments in computer science, business analytics and information systems management at Pepperdine, UCLA, and Chapman College.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×