LAS VEGAS, the United States, July 22 -- A U.S. expert highlighted the progressive cooperation between the United States and China in cyber security, as companies strive for better solutions and top hackers started their annual meetings here on Saturday.
U.S.-CHINA CO-OP HIGHLY VALUED
Susan Shirk, Chair of the 21st Century China Center of University of California, San Diego, noticed that the bilateral cooperation evolved since leaders of the two countries met in April.
"Then we went to the G20 and tried to make it a global norm. So I think this is a great example of how the U.S. and China through frank negotiation can address a very difficult topic to make progress and then to move forward," she told Xinhua.
As enterprises need to strengthen their defense to make their own systems secure, government efforts are equally important to address the issue, said Shirk.
"I do think it's the governments' responsibility to try to work at the government to government level. We'd like to see government crack on it," she added in a recent interview.
TECH FIRMS ALWAYS ON ALERT
While governments remain active, IT producers are on high alert and intensively prepared to counter any attack.
"We have many layers of open security, encryption capability, fault tolerance capability, buffering, and so on. There is a lot of capability that Intel can bring, but there a lot of third parties out there that will bring that to the table," Jon Marshall, Senior Technical Marketing Engineer of Intel, told Xinhua.
Keith Shank, Director of Advanced Technology Labs of Ericsson, also took a hardened stance.
"Ericsson is working to make extreme robust networks that can tell what's been hacked. Not necessarily stopping, because that's really hard to do. However, you (can) know what's been impacted, so you can avoid it," Shank said.
Thorsten Held, managing director at White Encryption Code and Data Protection, emphasized the importance of web safety for automobiles.
"If anyone tries to modify the application, our system will set off some kind of alarm, which will recognize there is a modification, which can be classified as an attack and stop the execution," Held said.
On Wednesday, the Cyber Readiness Institute (CRI) was launched as a joint project between the Center for Global Enterprise and the Center for Responsible Enterprise and Trade.
The non-profit organization will bring together senior leaders of global companies to discuss best practices for managing security employees, processes and technology.
HACKERS ARE RESTLESS
In the battle field of IT, winner is always closely followed by challengers. Winner can be turned into underdog any minute.
In the city known as the gambling capital of the world, the annual Black Hat Conference opened on Saturday with its training session in the traditional high-stake style, where the bettors are cloak and dagger and the outsiders including the media are hard to get a chance to peek into the risks they take.
The conference was initiated in 1997 to involve system and network administrators, hackers and computer security experts, as a pal event of DEF CON, whose annual meeting will start on July 27 when the Black Hat is concluded.
DEF CON was created in 1993 as one of the world's largest hacker conventions, held annually in Las Vegas, Nevada.
During the Black Hat Conference, researchers will release an open-source SS7 firewall that aims to bolster security of mobile operators' core networks.
SS7 vulnerabilities, which can allow cyber criminals to hijack two-factor authentication codes texted to mobile phones, read and re-direct text messages, eavesdrop on phone calls, and track a phone's location, have existed since 2017.
托福考试写作模板6
新托福TPO 4综合写作详细解析:恒温动物
新托福TPO 5综合写作详细解析:查科峡谷的巨屋
托福写作突破满分有捷径:课外阅读不可少
新托福TPO 19综合写作训练详细解析:口碑营销
托福作文点评:高一生的托福作文
新托福TPO 18综合写作训练详细解析:怎样防止香榧数量下降
托福考试写作模板3
新托福TPO21综合写作训练详细解析:基因改良
托福写作引文应该怎么写
托福写作范文 你喜欢早起工作还是晚起工作到很晚?
托福考试写作模板2
托福考试写作模板7
名师剖析:托福写作应该是授之以还是授之以渔
新托福TPO 7综合写作详细解析:环保认证在美国无用
新托福TPO 8综合写作详细解析:塞恩加尔骑士的回忆录
托福写作中容易犯的四大错误
新托福TPO 20综合写作训练详细解析:森林“随它燃烧”策略
托福综合写作高分诀窍 了解评分细则训练能力
托福短文写作中使用率最高的五个基本句式
新托福TPO 1综合写作详细解析:四天工作制
新托福TPO 16综合写作详细解析:英国考古学的发展
托福写作备考结构性模版
总结:考生在新托福写作中常犯的不一致性错误
新托福TPO 2综合写作详细解析:团队的作用
托福写作两任务中的三大得分点
归纳总结:托福写作10种不加分都不行的句式
托福写作9大注意事项
如何在托福写作中善用复杂句式让文章不简单
四步搞定2013托福作文结尾
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |