Kevin Mitnick Will Arrive In Moscow To Help To Develop Immunity Against Deceit
Jan 13, 2006
Information security is still a very important issue in the majority of companies. What should you do and what should you remember in order not to find out that confidential information was stolen from your networks? Kevin Mitnick will tell about his experience and his suggestions concerning this problem during the conference program of INTEROP Moscow 2006.
Kevin Mitnick has great experience of getting in other’s computer networks that gave him the fame of Hacker Number One in the world and the entry in the Guinness Book of Records. But he was "hacker who uses his might only for pure amusement" (Jonathan Littman "The Fugitive Game"), he never uses his knowledge in IT-sphere for money.
Now he is the founder of Mitnick Security Consulting, LLC and is considered to be one of the best IT-security experts in the world. He was invited in the US Senate for the oral consultations on security of governmental nets. The leading companies providing telephonic facilities recruit him as technical consultant. He investigates and actively develops methods which can be used to resist socioengineering attacks – the high-performance attacks basing on the human factor as the most vulnerable component in the corporate security systems.
The problem of the modern nets is the following: the different technologies of security (Internet shields, identification devices, encoding tools and detection of network attacks systems) have top-heavy confidence. "It’s naïve to think that installing simple means of defense like firewall can protect from potential threats", said Mitnick. "Such assurance makes false feeling of security which is worse than the absence of security at all". Actually the weakest part of any system is a human – and Kevin Mitnick was the first who understood this and proved it in practice. For protection each employee, from director to secretary, should know about techniques usually used by socioengineering hackers. Otherwise, your employees will never know that they fell a prey to socioengineers.
At the same time Kevin Mitnick recognizes that unfortunately many people are sure that the name in the line "From" is the genuine name of the sender when they receive e-mail or fax. While as far as security is concerned, in Mitnick’s opinion, "on can believe only in God, others are under suspicion".
Kevin Mitnick has great experience of getting in other’s computer networks that gave him the fame of Hacker Number One in the world and the entry in the Guinness Book of Records. But he was "hacker who uses his might only for pure amusement" (Jonathan Littman "The Fugitive Game"), he never uses his knowledge in IT-sphere for money.
Now he is the founder of Mitnick Security Consulting, LLC and is considered to be one of the best IT-security experts in the world. He was invited in the US Senate for the oral consultations on security of governmental nets. The leading companies providing telephonic facilities recruit him as technical consultant. He investigates and actively develops methods which can be used to resist socioengineering attacks – the high-performance attacks basing on the human factor as the most vulnerable component in the corporate security systems.
The problem of the modern nets is the following: the different technologies of security (Internet shields, identification devices, encoding tools and detection of network attacks systems) have top-heavy confidence. "It’s naïve to think that installing simple means of defense like firewall can protect from potential threats", said Mitnick. "Such assurance makes false feeling of security which is worse than the absence of security at all". Actually the weakest part of any system is a human – and Kevin Mitnick was the first who understood this and proved it in practice. For protection each employee, from director to secretary, should know about techniques usually used by socioengineering hackers. Otherwise, your employees will never know that they fell a prey to socioengineers.
At the same time Kevin Mitnick recognizes that unfortunately many people are sure that the name in the line "From" is the genuine name of the sender when they receive e-mail or fax. While as far as security is concerned, in Mitnick’s opinion, "on can believe only in God, others are under suspicion".






