issue102:critique_litteraire
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
issue102:critique_litteraire [2015/11/03 18:56] – auntiee | issue102:critique_litteraire [2015/11/07 19:52] (Version actuelle) – erlevo | ||
---|---|---|---|
Ligne 20: | Ligne 20: | ||
ISBN: 978-0393244816 | ISBN: 978-0393244816 | ||
- | Si la sécurité informatique et celle des données | + | Si vous avez quelque intérêt dans la sécurité informatique et celle des données, il est probable que vous connaissez déjà le nom de Bruce Schneier. Vous êtes peut-être |
- | Étant donné | + | Étant donné |
Ligne 34: | Ligne 34: | ||
There is no doubt about the immense potential good that this represents, but he asks about the costs and security consequences. Of course plenty of facts are cited but the importance of this book is that he questions everything with the careful eye of someone who knows the field and has the experience to recognize where real balance is needed. For example, he notes that the U.S. National Security Agency does in fact purchase zero-day exploits, and the whole world would be better off if they simply released them to the computer industry for patching. But, he recognizes that a security offense capability may at times be the only viable option, and should exist along with a palpable defense. Thus he suggests the NSA release most exploits and keep a select few for when they are demonstrably needed.** | There is no doubt about the immense potential good that this represents, but he asks about the costs and security consequences. Of course plenty of facts are cited but the importance of this book is that he questions everything with the careful eye of someone who knows the field and has the experience to recognize where real balance is needed. For example, he notes that the U.S. National Security Agency does in fact purchase zero-day exploits, and the whole world would be better off if they simply released them to the computer industry for patching. But, he recognizes that a security offense capability may at times be the only viable option, and should exist along with a palpable defense. Thus he suggests the NSA release most exploits and keep a select few for when they are demonstrably needed.** | ||
+ | |||
+ | Néanmoins, Data and Goliath vient à notre secours, avec toutefois quelques conditions. L' | ||
+ | • Le monde que nous sommes en train de créer. | ||
+ | • Les enjeux. | ||
+ | • Ce que l'on peut faire. | ||
+ | |||
+ | Il est clair que cela représente un bien potentiel énorme, mais il pose des questions sur les coûts et les conséquences sécuritaires. Bien entendu, il cite de très nombreux faits, mais ce livre est important à cause des questions qu'il pose sur tout, avec l'œil avisé d'une personne qui connaît le domaine et a l' | ||
+ | |||
===== 3 ===== | ===== 3 ===== | ||
Ligne 40: | Ligne 48: | ||
As noted above, this book can save the day, but only if we are willing to do something about it. Politicians are unwilling to control excess surveillance because without push-back from the electorate, they respond like David Cameron. He said “I am simply not prepared to be a prime minister who has to address the people after a terrorist incident and explain that I could have done more to prevent it.” Schneier makes a critical comparison with organized crime, saying “Terrorists don't cause more damage or kill more people; we just fear them more.”** | As noted above, this book can save the day, but only if we are willing to do something about it. Politicians are unwilling to control excess surveillance because without push-back from the electorate, they respond like David Cameron. He said “I am simply not prepared to be a prime minister who has to address the people after a terrorist incident and explain that I could have done more to prevent it.” Schneier makes a critical comparison with organized crime, saying “Terrorists don't cause more damage or kill more people; we just fear them more.”** | ||
+ | |||
+ | Les États-Unis ont la capacité de stocker arbitrairement toutes les données, mais le faire serait aussi logique que la philosophie militaire mal conçue exprimée par : « Tuez-les tous et Dieu décidera. » Avant tout, cela remplace une démocratie par une société orwellienne qui freine le progrès et ne permet pas des discussions au sujet du changement. Malheureusement, | ||
+ | |||
+ | Comme indiqué ci-dessus, ce livre peut nous secourir, mais seulement si nous avons la volonté de faire quelque chose. Les hommes et femmes politiques ne veulent pas contrôler l' | ||
===== 4 ===== | ===== 4 ===== | ||
Ligne 46: | Ligne 58: | ||
| | ||
Finally, the individual also has to play a larger role until much better security is baked into the industry as a whole. A variety of specific options are noted and worth considering/ | Finally, the individual also has to play a larger role until much better security is baked into the industry as a whole. A variety of specific options are noted and worth considering/ | ||
+ | |||
+ | De la même façon, les grandes entreprises devraient faire preuve de davantage de responsabilité et ne pas laisser les « facteurs externes limiter la motivation des sociétés à améliorer leur sécurité ». Sans la responsabilité fiscale, les seuls qui sont sanctionnés sont ceux qui fournissent les données - et qui paient généralement ce privilège d'une façon ou d'une autre. Les très grandes industries de l' | ||
+ | |||
+ | Enfin, l' |
issue102/critique_litteraire.1446573379.txt.gz · Dernière modification : 2015/11/03 18:56 de auntiee