Wednesday , October 16 2019
Home / senegal / In Japan, millions of connected facilities broke into testing the cyber security of the Olympic Games

In Japan, millions of connected facilities broke into testing the cyber security of the Olympic Games

To ensure a minimum level of security, the government has been empowered by the National Research Institute to approach all related facilities in Japan for five years. The measure raises questions.

The Japanese state does not joke with cyber security. Starting in February, the National Research Institute of Information and Communications in Japan (NICT) will be allowed to try to "hack" 200 million of related facilities used in the archipelago. By amending the law, the government gave green light to test cybersecurity levels in the country. Japan is preparing for hosting several international events: Olympic and Paralympic Games in 2020, but before that, the World Cup rugby this year and the G20 summit on June 28 and 29, preceded by a meeting of finance ministers G20 on June 8 and 9.

From distribution to ticketing, new technologies become increasingly important in organization and logistics events. Last year, Korea's Olympic Winter Games were the victims of an Internet attack just before the opening ceremony. The website of the Games did not work for ten hours, preventing ticket printing. The Wi-Fi network at the Olympic Stadium, as well as the home network's internet network, was disrupted. Related objects are recognized as a weak point of cybersecurity. According to NICT, more than 54% of cyber attacks discovered in Japan last year were related to facilities.

Approval for five years

Specifically, Japanese Institute teams will try to compromise objects such as webcams, routers, connected speakers, and other devices that inhabit homes. This will use the most basic but frequently used passwords – type "1234", "abcd", "admin" – to see if they allow access to the object. If they succeed in hacking an object, the owner will be contacted through their Internet service provider and encouraged to review their security.

According to the spokesperson of the institute Japan Times . Researchers will study devices with the consent of an Internet service provider and will focus on products that use physical access cables to the Internet. "We often see, for example, webcams that are already hacked because security settings are too simple and their images are unknown. Sometimes they are placed on public Internet sites without the owners knowing it," Tsutomu Yoshida says.

The goal is to ensure that the most basic level of security is ensured. Researchers will, for example, favor routers in cafes that allow free internet or webcams to connect, but will not perform complex operations such as smartphone verification.

The problem: this approval, released for five years, raises several questions, especially about the future of data that NICT teams can potentially access when they can "crack" security. The perimeter and duration of the study also cares for some citizens about respecting their private life. The Institute ensures that it will inform ISPs about vulnerable users without going to individual devices to look at the data stored in them. The Ministry of the Interior and Communications calls on Japanese citizens to "understand" on behalf of the desired goal.

Source link