Introducing the tech that keeps the lights on The Register

Now, an idea is making its way out of the murky worlds of government, industrial, and high-security networks into commercial awareness - unidirectional gateways, better known as data diodes. They're network appliances that pass data in one direction only, and they do it in hardware. Unlike a firewall, which blocks traffic only if its software is correctly configured, the laws of physics prevent data going the wrong way through a data diode. Data diodes have been around since the mid '80s, and were invented by people with highly classified networks who nevertheless needed to pass selected information out to networks with a lower security rating. Data diodes provided a connection allowing that but completely eliminating any pathway through which an attacker who'd compromised the less secure network could touch the good stuff. Physically, data diodes are if anything simpler than ordinary gateways. Somewhere within any normal network connection, there's a physical circuit that transmits data and another that receives it. In networks the problems with data diodes are software, specifically data transmission protocols. The whole of the internet is designed to detect and correct errors in data transmission. Packets are sent with extra information that the receiver can use to check for data integrity, and if there's been corruption or other problems, the receiver sends back a request for retransmission. Transmitters need these signals to operate properly, and data diodes block them. A data diode that was only hardware would be completely incompatible with modern systems. The answer is to have software in the data diode that creates the reverse traffic each protocol needs so that it looks as if it's a normal network as far as possible. Data diodes will always need to be incorporated with intelligence and finesse. One particular incident illustrates why data diodes are so in vogue with industry sectors where significant physical infrastructure needs to be integrated with IT systems. Routing the security cameras through data diodes would have eliminated them as an attack vector, while keeping the sensors on the secure side of a data diode isolated network segment would have stopped them being disabled. If you don't happen to run a pipeline or highly classified networks, data diodes still have potentially significant applications. Take database replication, where an attacker who manages to compromise one network for the purposes of ransomware, say, won't be able to attack the copy behind a data diode. It's no miracle cure, of course, as very few commercial systems can be neatly isolated from data input, control, and requests, but as a design option that can significantly reduce a system's attack surface. Data diodes play a big and increasingly important part in partitioning the truly critical from more vulnerable environments.

This Cyber News was published on www.theregister.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000


Cyber News related to Introducing the tech that keeps the lights on The Register

Wearable Tech Future: Where Fashion Meets Function - From fitness trackers and smartwatches to augmented reality glasses, the future of wearable tech is full of potential. In this article, we will explore the current benefits and challenges of wearable technology, uncover its different types and ...
11 months ago Securityzap.com
CVE-2013-0135 - Multiple SQL injection vulnerabilities in PHP Address Book 8.2.5 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) addressbook/register/delete_user.php, (2) addressbook/register/edit_user.php, or (3) ...
7 years ago
CVE-2017-17713 - Trape before 2017-11-05 has SQL injection via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp ...
6 years ago
CVE-2017-17714 - Trape before 2017-11-05 has XSS via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, ...
6 years ago
Internationalizing Efforts to Counter Tech Support Scams - The Central Bureau of Investigation, India's federal enforcement agency, recently conducted a series of criminal raids against illegal call centers across the country in an attempt to clamp down on tech support fraud. These raids were the result of a ...
11 months ago Darkreading.com
CVE-2017-12757 - Certain Ambit Technologies Pvt. Ltd products are affected by: SQL Injection. This affects iTech B2B Script 4.42i and Tech Business Networking Script 8.26i and Tech Caregiver Script 2.71i and Tech Classifieds Script 7.41i and Tech Dating Script 3.40i ...
5 years ago
CVE-2023-52780 - In the Linux kernel, the following vulnerability has been resolved: net: mvneta: fix calls to page_pool_get_stats Calling page_pool_get_stats in the mvneta driver without checks leads to kernel crashes. First the page pool is only available if the bm ...
5 months ago Tenable.com
CVE-2024-47716 - In the Linux kernel, the following vulnerability has been resolved: ARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros Floating point instructions in userspace can crash some arm kernels built with clang/LLD 17.0.6: BUG: unsupported FP ...
2 weeks ago Tenable.com
The Future of IT: Info-Tech 2024 Conference - PRESS RELEASE. TORONTO, Jan. 9, 2024 /PRNewswire/ - Info-Tech Research Group, a global leader in IT research and advisory, has announced that its flagship annual conference, Info-Tech LIVE, will be hosted this year at Bellagio in Las Vegas from ...
9 months ago Darkreading.com
Tech workers fear being left unprepared for the future - While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job performance for 4 out of 10 IT employees, according to Skillable. Inadequate ...
10 months ago Helpnetsecurity.com
Holistic Approach To Privacy and Security in Tech - In this article, I would like to explain how I tackle privacy and security issues that are specific for large scale web and mobile applications and Big Tech. First, let's outline some of the biggest challenges Big Tech companies deal with in terms of ...
10 months ago Feeds.dzone.com
Tech Support Scammers Are Still At It: What To Look Out For - Tech scams are unfortunately still an issue in 2021, with technological advancements leading cybercriminals to find more creative ways to gain access to your data or charge you for services you don't need. As such, it's important to be aware of the ...
1 year ago Welivesecurity.com
Enhancing Home Privacy with Technology: Your Digital Shield - In an ever-evolving world, technology has become increasingly integral to home privacy. Smart lock systems, video doorbells, motion sensors, security cameras, and automated privacy settings are some of the popular home privacy tech options available. ...
10 months ago Securityzap.com
Big Tech to EU: "Drop Dead" - There's just one wrinkle: the Big Tech companies don't want that future, and they're trying their damndest to strangle it in its cradle. Right from the start, it was obvious that the tech giants were going to war against the DMA, and the freedom it ...
5 months ago Eff.org
CVE-2017-10265 - Vulnerability in the Oracle Integrated Lights Out Manager (ILOM) component of Oracle Sun Systems Products Suite (subcomponent: System Management). The supported version that is affected is Prior to 3.2.6. Easily exploitable vulnerability allows ...
5 years ago
CVE-2018-2566 - Vulnerability in the Integrated Lights Out Manager (ILOM) component of Oracle Sun Systems Products Suite (subcomponent: Remote Console Application). Supported versions that are affected are 3.x and 4.x. Difficult to exploit vulnerability allows low ...
5 years ago
CVE-2018-2568 - Vulnerability in the Integrated Lights Out Manager (ILOM) component of Oracle Sun Systems Products Suite (subcomponent: Remote Console Application). Supported versions that are affected are 3.x and 4.x. Easily exploitable vulnerability allows ...
5 years ago
CVE-2024-20906 - Vulnerability in the Integrated Lights Out Manager (ILOM) product of Oracle Systems (component: System Management). Supported versions that are affected are 3, 4 and 5. Easily exploitable vulnerability allows high privileged attacker with network ...
9 months ago
CVE-2023-28083 - A remote Cross-site Scripting vulnerability was discovered in HPE Integrated Lights-Out 6 (iLO 6), Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4). HPE has provided software updates to resolve this vulnerability in HPE Integrated ...
1 year ago
How to be more sustainable during the holidays - As a member of the Cisco Chief Sustainability Office, I am deeply invested in our planet and hope to help educate others on various topics surrounding environmental sustainability. Switch to LED lights: Decorating with lights is popular this time of ...
11 months ago Feedpress.me
CVE-2024-26706 - In the Linux kernel, the following vulnerability has been resolved: parisc: Fix random data corruption from exception handler The current exception handler implementation, which assists when accessing user space memory, may exhibit random data ...
7 months ago Tenable.com
Introducing the tech that keeps the lights on The Register - Now, an idea is making its way out of the murky worlds of government, industrial, and high-security networks into commercial awareness - unidirectional gateways, better known as data diodes. They're network appliances that pass data in one direction ...
11 months ago Theregister.com
The 5 Best VoIP Routers (Wired, Wireless, and Mesh) - As a VoIP router, it has everything you need, including redundant WAN ports for failover and load balancing, country-based QoS to prioritize VoIP traffic, outage reporting, VLAN traffic separation, support for various VPN connections, and LTE backup ...
1 month ago Techrepublic.com
Splunk Urges Australian Organisations to Secure LLMs - You can unsubscribe at any ...
1 month ago Techrepublic.com
Ho Ho Home For Christmas? Tips For Avoiding Tech Terrors This Festive Season - With Christmas fast approaching, many of us will be hoping to find some new tech under the tree. From innovative gadgets that spark creativity to interactive devices that bring families together, tech toys can add an extra layer of excitement and ...
10 months ago Itsecurityguru.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)