Technology

Does it take a thief to catch a thief?

Are Reformed Hackers the Best IT Security People?

The answer to that question varies depending on who you ask. When The Donald based a season of The Apprentice on “Book Smarts vs. Street Smarts,” he could have been talking about the field of security. The debate revolves around whether reformed hackers are better qualified to protect your computer systems or whether those with formal training are better options.

Trends

Internet security has never been more important than it is now. Malware is spreading faster than a flu virus on a cruise ship. Public and private companies are experiencing so many network instructions that many are committing substantial resources to ensure their systems are as foolproof as possible. The Internet is now such a prevalent business tool that companies require security professionals to have the same high-level security clearance that the military requires. Even Microsoft has hired security experts to help the company address security issues.

We are also seeing trends where backbone security specialists and software developers work hand in hand to ensure robust hacker-proof code.

The global event similarly influences the need for computer security. For example, the 2010 Vancouver Olympics is expected to attract hackers and has therefore created a demand for people with strong basic internet skills. (“Internet backbone” refers to the intricate system of cabling, switches and routers, etc.)

These trends have created a burgeoning field of security professionals. “It’s not just about viruses or spam anymore,” said Marie-Helen Sakowski, managing director of Effective Placement, a corporate recruiting firm for the technology industry. “We’re concerned about the nasties that haven’t been named yet.” Sakowski predicts that the field of security will continue to grow for the foreseeable future and that emerging issues will include the security of mobile phones, PDAs and other Internet-enabled devices. “Today’s security analyst has to look at technology not as it is today, but where it’s going five to 10 years from now,” she says. “The security field is going crazy.”

smart book vs. street wisdom

Calvin H. Woosnam is a high-tech security consultant. His resume includes such impressive feats as designing the B1 secure network, a network he says is “a step above the red phone on the president’s desk.” Woodsman cautions that many self-proclaimed “security professionals” have minimal training and provide inadequate protection, sometimes recommending a solution that’s 1 percent better than a regular phone line. “When someone tells me they use a virtual private network to provide secure communications to a home or business, my response is: ‘Only from a novice hacker. Not from a serious hacker.’

Employers hire Woosnam to help recruit and evaluate their security personnel. The expectations of him are high. Reformed hackers are unlikely to hear: “You’re hired!” The security professional explains that hackers have found ways into systems, but security people need to be able to identify and fix vulnerabilities before hacking occurs. deep knowledge. Reformed hackers often find they lack the full range of skills needed to work in the security field, and end up going back to school to develop their skill sets. “Education allows you to see beyond what is already known, unlocking the potential of what can be,” says Woosnam.

However, practical experience is also crucial. Many system administrators are largely self-taught, but the self-taught person may encounter roadblocks in their career. Conversely, those with computer science degrees may face obstacles if they lack practical experience. People who combine training and experience are in high demand and often earn six-figure incomes.

So what about the Catch 22? How do you get the experience you need? Woosnam says it’s a matter of trust, learning and luck. Expect to be hired in an entry-level position, and work your way up as you gain experience and prove yourself.

the necessary skills

According to Woosnam, the most important thing to know is ATM technology, fiber optics, and understanding the layers of technologies.

ATM technology has replaced SONET (synchronous optical network) as the baking machine technology that prevents people from breaking into the system and redirecting their financial information. It is the technology used in the major backbone networks in North America, and there is a great need for capable people in this area. (Speaking of SONET, don’t show up for an interview with Woosnam unless he fully understands the difference between SONET and Ethernet.)

In the interest of preventing hacking, ATM technology training is not readily available at educational institutions. However, computer science teachers have been known to share knowledge with advanced students who have earned their trust. Delving deeper into ATM technology, the student quickly discovers that this is the tip of the iceberg.

Fiber optics is the next step and leads to a starburst of information shooting off in many different directions.

Describing fiber optics as the “future of telecommunications,” Woosnam stresses the importance of understanding different protocols and methodologies. He points to DWDM (dense waveform division multiplexing) as an example. DWDM is an optical technology used to increase bandwidth over existing fiber optic backbones and sometimes to make the backbone more secure. Basically it is the division of a fiber optic line into 32, 64 or 128 lights of different colors. Each can operate at any data rate and be completely separated from any other colored light, multiplying the capacity of a single fiber.

With telecom security, you also need to understand the environment well enough to know how easily you can detect when data has been tampered with. For example, in a B1 network, known as Common Criteria security level 5, tampering must be completely thwarted, making the information secure.

Understanding the layers of technology is the third critical thing to know when dealing with protocols like TCP/IP. The fewer the number of layers, the more secure the system. The hardware layer (ie the physical layer) is number one. “If you secure at a higher layer, like five or six, it can quickly be compromised by a hacker breaking into layers one through four,” Woosnam explained.

It goes without saying that you need a good understanding of various operating systems, including Linux. It may surprise some people to learn that communication skills and “people skills are very important too.” he commented. “But rarely does a person’s temper override their ability to communicate.”

An easier way?

But hey, isn’t all this too much work? Couldn’t you just hack into someone’s system to show them its vulnerabilities? Wouldn’t that convince them to hire you? System administrator MP Prakash R. Lewis of North Carolina doesn’t think much of that idea. He notes that while this approach might have worked in 3D once, it’s unlikely to work against today’s well-protected systems. “A good security administrator rarely leaves weak points,” he points out. “And we are constantly looking for new potential vulnerabilities.”

Leave a Reply

Your email address will not be published. Required fields are marked *