Cyber Attacks Won't Keep Olympians from Chasing Gold in London

By

While the computer systems associated with key systems going into the 2012 Olympic Games in London have already been attacked several times, the prevailing mood among those responsible for computer security is upbeat, and has already led to recent word that cyber attacks shouldn't get in the way in the chase for gold throughout the 2012 games.

The primary reason for the optimism is that all of the attacks that have been brought to bear so far on Olympics-related computer systems have been staged, and are the result of over 200,000 of simulated attacks and associated testing. Atos, the primary source of technology for the Olympics, both Summer Games and Winter Games alike, since 2002, is immediately responsible for close to 11,500 computers scattered around the whole of Great Britain, according to reports. This kind of a widely-dispersed network of computers and servers alike is something of a risky proposition, especially considering said network is geared toward providing not only Olympic venue scoreboards, but also event timetables for athletes and accreditation information to the various border officials. Tampering at any one of those levels could raise immeasurable havoc with the Games themselves, and thus, Atos has launched a series of punishing tests designed to find as many gaps as possible, and fix them in advance of the event.

Drawing on the skills of what are called "ethical hackers", sometimes known as "white-hat hackers", the purpose is to attempt to break into a system to find its deficiencies before the system is put into wider use, where less ethical hackers--also sometimes referred to as "gray-hat" or even "black-hat" hackers based on old cowboy movie conventions--will attempt those same break-ins but for more nefarious purposes.

The demand for such services is impressive, and growing. The 2012 Olympics are expected to handle 30 percent more key data than was handled in only 2008 in Beijing. Meanwhile, systems in Beijing faced off against 12 million cyber security-related problems each day, classified as "potential" problems. The London Olympics, meanwhile, expect to see at least that number and slightly more--12 to 14 million per day--though only expect that 20 events a day will actually prove to be likely threats and classified as "formal incidents" to hand over to law enforcement.

With plenty at stake--everything from altered results to stolen records to the potential for unauthorized political messages to break onto Olympic scoreboards--the necessity of a well-protected system will always be a factor in all Olympic planning. Atos' protective measures seem to be sufficiently robust to keep the system running at its peak for the Games. It will take the conclusion of the Games, however, to see just how robust the system was, but at this point, Atos' protection measures seem to be best placed to win their own gold.




Edited by Brooke Neuman

Contributing TechZone360 Writer

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More