Tuesday , June 18 2019
Home / senegal / In Japan, millions of hacked objects hacked to test the computer security of the Olympic Games

In Japan, millions of hacked objects hacked to test the computer security of the Olympic Games



In order to ensure a minimum level of security, the government has approved the National Research Institute to gain access to all attached Japanese objects for five years. The measure raises questions.

The Japanese state is not doing with cyber security. Since February, NICT's National Research Institute for Information and Communication (NICT) will be able to "hack" 200 million united objects used in the archipelago. The new law has released a green version that tests the level of cyber-security security in the country. Japan is preparing for the organization of several international events: the Olympic and Paralympic Games in 2020, but before this year's Rugby World Championship and the G20 summit to be held on 28-29 June and preceded by the G20 Finance Ministers Meeting on 8 and June 9.

From distribution to ticket issuance, new technologies are becoming increasingly important in the organization and logistics of events. Last year, the Winter Olympics in Korea were victims of cyber-attacks shortly before the opening ceremony. Website Games has been disabled for twelve hours, which prevents ticket printing. The Wi-Fi network at the Olympic stadium was interrupted, as did the internet network of the press room. Attached objects are a recognized weak point of cyber security. According to NICT, more than 54% of computer attacks detected in Japan last year included interconnected objects.

Permit for five years

Specifically, the Japanese Institute teams will try to compromise objects such as webcams, routers, connected speakers, and other home-based devices. For this purpose, they will use the most basic but often used passwords of type "1234", "abcd", "admin" – and find out if they allow them to access the object. If they can hack an object, they will contact the owner through their Internet provider and encourage them to review their security.

According to a spokesman for the institute quoted Japanese times , Researchers will study devices with the consent of ISPs and will focus on products using physical cables to access the Internet. "We often see, for example, web cameras that are already hacked because security settings are too simple and their images are seen by strangers, and sometimes they are featured on public web sites without being aware of them," says Tsutomu Yoshida.

The aim is to ensure that the most basic levels of security are provided. Researchers prefer, for example, routers in cafes that allow for free Internet access or webcams but do not perform complex operations such as smartphone authentication.

Problem: This five-year entitlement raises a number of questions, especially regarding the future of data that NICT teams can access if they can "rule out" security. Circuit and length of study also worry some citizens about respecting private life. The Institute ensures that it will inform ISPs about vulnerable users without going to individual devices to look at the data stored inside. The Ministry of Interior and Communications asks Japanese citizens to "understand" the name of the target.


Source link