Trust in IT Software Vendors Under Strain
- Posted: Monday, June 22, 2009
- |
- Author: pradhana
- |
- Filed under: Business Analysis
Undocumented features could be used for spying
A recent report titled “Can you trust your vendor?” published by Ovum, the global advisory and consulting firm, found out that undocumented privileged administrator accounts have been discovered in new network routers belonging to two telecoms service providers. This raises serious concern about the motives of the people or organisations who created them. These ‘back doors’ could be used for both active and passive attacks on the networks. They call into question the reliability of the vendor and its products.
“This is not the first time that we have seen attempts to hack into enterprise and carrier networks by infiltrating network routers”, says Graham Titterington information security principal analyst at Ovum. “At the time of the Athens Olympic Games, rogue software in four mobile switching centres illegally intercepted calls by Greek politicians, including the Prime Minister, for a year. After the discovery of the software, both the network operator and the equipment vendor were fined several million euros. More recently, the US government detected an attack on IT systems in the Pentagon in 2007 in which 1,500 computers were found to have been compromised.”
These attacks can have serious consequences for enterprises, but when they attack carrier networks, they also have implications for national security. They threaten the commercial health of the communications service provider and its major customers. “The risk is much greater in this age of IP-based communications than it was with traditional telecommunications networks because network control and payload are not segregated”, explains Graham Titterington.
“There must be a relationship of trust between vendors and their customers, ideally based on a culture of partnership. Customers, in both the service provider and enterprise communities, need to place trust at the top of their criteria when selecting suppliers”, Titterington suggests.
Ovum’s report highlights that enterprises and carriers alike are dependent on the integrity of their suppliers and the trust relationship is crucial to both parties. “Vendors who fail to establish their integrity should be struck off supplier short lists.”
Enhanced network audit procedures would uncover this spook account type of exploit, but a vendor hacker could turn to embedding the spyware in the code of the product, making it much more difficult to detect.
Insofar as this threat impacts on critical national infrastructure and national security we can expect governments to take an increasing interest in this issue. However any response will be fragmented due to the limits of jurisdiction of any government. “The United States is likely to lead the way in government oversight. President Obama’s recent announcement on cyber security shows that the current administration is giving a much higher priority to the problem than previous administrations”, Titterington concludes. Insa/Ovum
Search-
Google Reader-
Blogging For Business-
Internet Business-
Recommended Links-
E-Commerce Optimization-
FastPitch, NiceOffers-
Sponsor Ad-
Blog Feeds-
You Are The Visitor No:-
Categories-
- 3G dan 4G (23)
- 3G Femtocell (8)
- Ad Spending (53)
- Ad Trends (6)
- Advertising (58)
- Advertising Metrics (3)
- Apple (28)
- Assets Management (2)
- Biometric Passport (1)
- BlackBerry (11)
- Blogging (9)
- Bluetooth (8)
- Brand and Branding (8)
- Broadband (45)
- Business Analysis (100)
- China (20)
- China Mobile (1)
- Commercial Telematics (1)
- Consumer Spending (1)
- Content Business (3)
- Cybercriminal (1)
- Data Security (2)
- Digital Content (106)
- Digital Home (2)
- e-Commerce (25)
- Enterprise 2.0 (1)
- Facebook (13)
- Friendster (1)
- Gadget (11)
- Global Ads Alliance (3)
- Going Green (1)
- Google (39)
- Google Ad Planner (2)
- Google Adwords (1)
- Google Android (10)
- Google Chrome (3)
- GPS (1)
- Handsets (13)
- Home Theater (1)
- HSDPA (2)
- HTC (2)
- Huawei (1)
- In-Game Ads. (1)
- India (10)
- Instant Messaging (3)
- Internet (26)
- Internet Advertising (139)
- Internet Explorer (1)
- Internet Users (30)
- iPad (1)
- iPhone (28)
- iPhone 3G (1)
- iPhone Advertising (5)
- iPod (5)
- IPTV (18)
- IT Business (3)
- IT Security (2)
- iTunes (4)
- Linux (5)
- Market Survey (306)
- Marketing (42)
- Media Market (7)
- Merger-Acquisition (29)
- Microsoft (21)
- Miscellaneous (76)
- Mobile Ads Revenue (10)
- Mobile Advertisers (2)
- Mobile Advertising (94)
- Mobile Applications (3)
- Mobile Broadband (4)
- Mobile Browser (1)
- Mobile Browsing (1)
- Mobile Business (7)
- Mobile Consumers (2)
- Mobile Content (90)
- Mobile Data (3)
- Mobile Data Revenue (2)
- Mobile Digital Media (5)
- Mobile Entertainment (1)
- Mobile Gaming (5)
- Mobile Market (20)
- Mobile Marketing (3)
- Mobile Messaging (1)
- Mobile Payments (2)
- Mobile Services (119)
- Mobile Shopping (1)
- Mobile Social Network (23)
- Mobile Technologies (1)
- Mobile TV (28)
- Mobile Video (14)
- Mobile Video Ads (2)
- Mobile Video Market (11)
- Mobile Widgets (5)
- Mobile-PRIZM (1)
- Motorola (10)
- MySpace (28)
- Netbook (1)
- New Format (2)
- New Trends (1)
- Nokia (28)
- Online Advertising (95)
- Online Banking (1)
- Online Business (8)
- Online buyers (1)
- Online Gaming (9)
- Online Services (176)
- Online Shopping (4)
- Online Spending (4)
- Online Travel (1)
- Online TV (3)
- Online Video (23)
- Online Video Ads. (16)
- Opera (3)
- PayPal (2)
- Phishing (2)
- PNDs (4)
- Podcasting (8)
- Premier Ultimate (1)
- Qualcomm (4)
- RFID (4)
- Samsung (2)
- Skymarket (1)
- Smartphone (12)
- SMS-based Advertising (1)
- Social Media (3)
- Social Network (39)
- Social Network Marketing (2)
- Sony Ericsson (5)
- Target and Segmentation (2)
- Texting (3)
- Ultra Wideband (5)
- User-Generated Content (2)
- Verizon Wireless (2)
- Video Game (1)
- Video on Demand (5)
- Video Surveillance (2)
- VoIP (15)
- Web 2.0 (9)
- Web Marketing (1)
- White Space (19)
- Wi-Fi (16)
- WiMAX (11)
- Windows Mobile (3)
- Wireless Market (7)
- Wireless Services (45)
- Yahoo (31)
- You Tube (24)
Blog Archive-
Lemon Twist Blogger Template is an extremely beautiful blogger template created by JackBook.Com based on Lemon Twist Wordpress themes by farfromfearless.com. Thanks to Chris Murphy and Jacky Supit for this great template.
- Copyright © 2008-2011 ICT & Internet Business. All Rights Reserved. Powered by Blogger
- Back To Top
- Log in
- Blogger
- Home
Recent Comments-