What the count of Monte Cristo can tell us about cyber security

 3r33939. 3r3-31.
In 184? Alexander Dumas described a hacking of telecommunications based on insider threats and social engineering.
 3r33939. What the count of Monte Cristo can tell us about cyber security  3r33939.
 3r33939. What can a 174-year-old French novel tell about cyber security? It turns out a lot. The novel by Alexandre Dumas "3r311. The Count of Monte Cristo,
" Was published in 184? and he certainly did not know anything about the Internet, and probably knew little about electricity. But the writer was well aware of human nature and how people interact with technology, and foresaw how to organize a technological attack, abusing personal phobias.
 3r33939. In the center of the book is such a telecommunication technology as the telegraph, although not familiar to us the electric telegraph - it was developed at the very time when Dumas was writing his novel. In 183? 3–3–317. Chalz Cook and William Wheatstone
demonstrated their electrical telegraph system in London, and Samuel Porze patented the idea of ​​telegraph in the United States.
 3r33939. Louis XVI 3-33358. and 3r3357. Marie-Antoinette the revolutionary government decided that it needed a national communications network under its control. At that time, the only method of sending messages over long distances was the post, organized by Louis XIV, and which the royal family, the aristocracy and the clergy continued to exert a strong influence - three groups that were enemies of the revolution and were unworthy of trust.
 3r33939. Optical telegraph Chappa eliminated the enemies of the revolution from the messaging system, and replaced them with ordinary citizens who were paid a modest salary for work at semaphore stations. Dumas described them as "miserable poor creatures" who obeyed strict discipline, who needed to be in office from dawn to dusk, and spy on their colleagues, marking every incorrectly transmitted symbol. “I have no responsibility,” says one operator in the “Count of Monte-Cristo”. "I mean the car, that's all."
 3r33939. The method of breaking the telegraph, invented by Dumas, was quite predictable. The count, a man who was unjustly imprisoned in his youth, places a false message in the telegraph, which should destroy one of the dishonest people who have done so. He does this through bribing the operator, giving him enough money so that he can leave the telegraph service, escape punishment, and start life anew in another place. The obvious moral is that people are often the weakest link in a technological system.
 3r33939. However, Dumas also revealed the second weak link of the system. The count had not just to throw false information. He needed to make it so that this lie was taken for the truth. No technology, no matter how new or omnipotent it can be, can automatically make the transmitted messages true. Recipients of telegraph messages would begin to criticize and evaluate any information that came into their hands. To emphasize this, Dumas filled the book with characters who did not trust the telegraph. “You think you know everything, because the telegraph informed you,” one character says to another. “Believe me, we are as informed as you are.”
 3r33939. The count makes his message resemble the truth, using the second human weakness contained in the French telegraph system. He notes that his victim's wife is friends with a government secretary who has access to the telegraph. The secretary never says, however, “stockbrokers immediately shorthand“ his words. However, something in the behavior of the secretary says that he has something to hide. Dumas calls this "anxiety of reason" Count uses this concern. A private conversation with the count forces the secretary to agree to deliver a false message to the victim's wife, who sends it to her husband. This completes the graph plan.
 3r33939. This is how old technologies can give us universal lessons in a simple and understandable language. The weak link of the French telegraph was not unique: all communications systems rely on service personnel, who must obey the rules of work and organizational discipline, while being subject to external influence. As the history of Dumas indicates, these systems are also vulnerable to security risks that go beyond the operating staff.
 3r33939. The readers of the Count of Monte Cristo naturally want to empathize with the hero, the person who ultimately gets what he wants: wealth, knowledge, and revenge for his pursuers. However, Dumas says that we, the readers, may not be a hero - we can be an operator who can be bribed, or a secretary who agrees to undermine the telegraph. Technical weaknesses can be found in all communication systems, but often the weakest is in the people who manage and use these systems.
3r33939. 3r33939. 3r3386. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e.parentNode.insertBefore (r, e)}; "[object Opera]" == e.opera? a.addEventListener? a.addEventListener ("DOMContentLoaded", d,! 1): e.attachEvent ("onload", d ): d ()}}} t ("//mediator.mail.ru/script/2820404/"""_mediator") () ();
3r33939. 3r33939. 3r33939. 3r33939.
+ 0 -

Add comment