“It has long been basic computer science textbook knowledge how to implement “cryptographic end to end message authentication”, a very effective technique to prevent unauthorized parties executing commands on remote devices.”
“This story appears to be little more than someone gaining temporary access to some remote computer that steers a satellite dish,” he continued. Nottingham Trent University’s Professor John Walker lists the problems of the systems relying on command-and-control from computers based on the ground, which “opens up an opportunity to circumvent security, depending on how it is being applied.” Nevertheless, Amichai Shulman, Imperva’s Chief Technology Officer, spoke of the need to update security on the satellites. “This is yet another wake up call for these organisations to gradually abandon their older model and start deploying in-depth layered security into their information systems, much like the commercial organizations do,” he told the Media.
LINK TO OUR HOME PAGE :