About Computer Memory
In computing, memory refers to a device that is used to store information for immediate use in a computer or related computer hardware device. It typically refers to semiconductor memory, specifically metal–oxide–semiconductor memory, where data is stored within MOS memory cells on a silicon integrated circuit chip.
Why a 'hologram revolution' could be on the way
... Because of our good understanding of how Computer Memory management works, we ve been able to make algorithms that reduce holograms down to just one computer...
Three key priorities in crucial US-China talks
... China responded by enacting its own ban on Computer Memory chips sold by Micron, the largest US manufacturer...
Should cyber-security be more chameleon, less rhino?
......
Should cyber-security be more chameleon, less rhino?
Do we need to rethink our approach to cybersecurity?
Billions are being lost to cyber-crime each year, and the problem seems to be getting worse. So could we ever create unhackable computers beyond the reach of criminals and spies? Israeli researchers are Coming Up with some interesting solutions.
The Key to stopping the hackers, explains Neatsun Ziv, vice president of cyber-security products at Tel Aviv-based Check Point Security Technologies, is to make hacking unprofitable.
"We're currently tracking 150 hacking groups a week, and they're making $100,000 a week each," he tells the BBC.
"If we raise The Bar , they lose money. They don't want to lose money. "
This means Making It difficult enough for hackers to Break In that they choose easier targets.
And this has been the main principle governing the cyber-security industry ever since it was invented - surrounding businesses with enough armour plating to make it too time-consuming for hackers to drill through. The rhinoceros approach, you might call it.
But some think the industry needs to be less rhinoceros and more chameleon, camouflaging itself against attack.
"We need to bring prevention back into The Game ," says Yuval Danieli, vice president of customer services at Israeli cyber-security firm Morphisec.
"Most of The World is busy with detection and remediation - threat hunting - instead of preventing the cyber-attack before it occurs. "
Morphisec - Born out of research done at Ben-Gurion University - has developed what it calls "Moving Target security". It's a way of scrambling The Names , locations and references of each file and software application in a computer's memory to make it harder for Malware to get its teeth stuck in to your system.
The mutation occurs Each Time the computer is turned on so The System is never configured the same way twice. The Firm 's tech is used to protect the London Stock Exchange and Japanese industrial robotics firm Yaskawa, as well as bank and hotel chains.
But The Most effective way to secure a computer is to isolate it from local networks and The Internet completely - so-called air gapping. You would need to gain physical access to the computer to steal Data .
Yuval Elovici believes that no way of protecting a computer is 100% reliableYuval Elovici, head of the cyber-security research centre at Ben-Gurion University, warns that even this method isn't 100% reliable.
"The obvious way to attack an air-gapped machine is to compromise it during the supply chain when it is being built," he says.
"So you then have a compromised air-gapped computer in a Nuclear Power station that came with the Malware - the attacker never has to enter the premises. "
Indeed, in October last year, had managed to insert chips on servers made in China that could be activated once The Machines were plugged in overseas. The servers were manufactured for US firm Super Micro Computer Inc.
The story suggested that Amazon Web Services (AWS) and Apple were among 30 companies, as well as government agencies and departments, that had used The Suspect servers.
Apple and Amazon strenuously denied the claims.
While air gapping is impractical for many businesses, so-called "co-operative cyber-security" is being seen as another way to thwart the hackers.
Imagine there are four firms working together: Barclays, Microsoft, Google and a cyber-security company, say.
Each of The Four firms gives a piece of Data to each other. They don't know what the Data is that they are protecting, but they hold it in their networks.
In order to access sensitive information from any of the firms, attackers would need to hack all four networks and Work Out which piece of Data is missing, to be able to make any sense of the files stolen.
"If the likelihood of breaking into a single network is 1%, then to penetrate four different networks, the likelihood would become 0. 000001%," explains Alon Cohen, founder of cyber-security firm nsKnox and former chief technology officer for the Israeli Military .
Check Point's Neatsun Ziv believes "there's no such thing as an unhackable computer"He calls the concept "crypto-splitting", and it involves encoding each sequence of Data as thousands of numbers then dividing these cryptographic puzzles between The Four companies.
"You would need to solve thousands of puzzles in order to put the Data back together," says Mr Cohen.
Check Point also collaborates with large multinational technology firms in a Data -sharing alliance in the belief that co-operation is key to staying One Step ahead of the hackers.
But while such approaches show promise, Check Point's Neatsun Ziv concludes that: "There is no such thing as an unhackable computer, the only thing that exists is The Gap between what you build and what people know How To hack today. "
There is always a trade-off between usability and security. The more secure and hack-proof a computer is, the less practical it is in a networked world.
"Yes, we can build an unhackable computer …but it would be like a tank with so many shields that it wouldn't move anywhere," says Morphisec's Mr Danieli.
The concern for the cyber-security industry is that as the nascent "internet of things" develops, powered by 5G mobile connectivity, The Risk of cyber-attack will only increase.
And as Artificial Intelligence becomes more widespread, it will become just another tool hackers can exploit.
The arms race continues.
Follow Technology of Business editor Matthew Wall on and
cyber-security, cyber-attacks, computer hacking
Source of news: bbc.com