{"id":2608,"date":"2017-12-28T14:15:39","date_gmt":"2017-12-28T17:15:39","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2608"},"modified":"2017-12-28T14:15:39","modified_gmt":"2017-12-28T17:15:39","slug":"es-tiempo-que-la-comunidad-internacional-se-ponga-seria-acerca-de-acciones-de-vulnerabilidad","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2608","title":{"rendered":"Es tiempo que la comunidad internacional se ponga seria acerca de acciones de vulnerabilidad"},"content":{"rendered":"<p>A principios de 2017, funcionarios de inteligencia estadounidenses informaron al Congreso que m\u00e1s de 30 naciones ya adoptan capacidades ciberofensivas.<!--more--><\/p>\n<p><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/wwwassets.rand.org\/content\/rand\/blog\/2017\/11\/its-time-for-the-international-community-to-get-serious\/_jcr_content\/par\/blogpost.aspectcrop.868x455.cm.jpg\/x1510851710897.jpg.pagespeed.ic.yg9cMONbLC.jpg\" alt=\"Computer hacker with magnifying glass\" width=\"378\" height=\"198\" \/>The U.S. government took a long-needed step when it\u00a0<a href=\"https:\/\/www.whitehouse.gov\/blog\/2017\/11\/15\/improving-and-making-vulnerability-equities-process-transparent-right-thing-do\" target=\"_blank\" rel=\"noopener noreferrer\">announced on Wednesday<\/a>new details about its Vulnerability Equities Process (VEP), the interagency process used to determine whether to notify a software vendor about a previously unknown (\u201czero-day\u201d) vulnerability, or to temporarily use the vulnerability for lawful, national security purposes. The public release of this charter is a positive step toward increasing transparency on this controversial process. This announcement is certain to prompt a new round of national debate as people continue to examine and question the specifics of the charter. But another key challenge is also beginning to surface: multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It&#8217;s time for the international community to get serious about vulnerability equities.<\/p>\n<p><strong>As Offensive Cyber Capabilities Rise, Few Consider Vulnerability Equities<\/strong><\/p>\n<p>More nations are bearing the responsibility to make well-informed trade-offs regarding vulnerabilities. In early 2017, senior U.S. intelligence officials\u00a0<a href=\"https:\/\/www.armed-services.senate.gov\/imo\/media\/doc\/Clapper-Lettre-Rogers_01-05-16.pdf\" target=\"_blank\" download=\"\" rel=\"noopener noreferrer\">told Congress (<abbr title=\"Portable Document Format\">PDF<\/abbr>)<\/a>\u00a0that\u00a0<a href=\"https:\/\/www.armed-services.senate.gov\/imo\/media\/doc\/Clapper-Lettre-Rogers_01-05-16.pdf\" target=\"_blank\" download=\"\" rel=\"noopener noreferrer\">more than 30 nations (<abbr title=\"Portable Document Format\">PDF<\/abbr>)<\/a>\u00a0are adopting offensive cyber capabilities. Such programs are increasingly integrated into military operations and planning. The\u00a0<a href=\"https:\/\/www.defense.gov\/News\/Article\/Article\/645212\/carter-encourages-cyber-command-to-intensify-fight-against-isil\/\" target=\"_blank\" rel=\"noopener noreferrer\">United States<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.standard.co.uk\/news\/politics\/britain-s-new-cyberwarriors-are-hitting-isis-defence-secretary-michael-fallon-reveals-a3574201.html\" target=\"_blank\" rel=\"noopener noreferrer\">United Kingdom<\/a>\u00a0speak openly about their use of offensive cyber operations against ISIS. Russia has\u00a0<a href=\"http:\/\/carnegieendowment.org\/files\/2010russia_military_doctrine.pdf\" target=\"_blank\" download=\"\" rel=\"noopener noreferrer\">publicly stated (<abbr title=\"Portable Document Format\">PDF<\/abbr>)<\/a>\u00a0its intention to use offensive cyber operations before resorting to conventional military force.<\/p>\n<p>To accomplish offensive cyber missions&#8211;including law enforcement, military and traditional intelligence missions&#8211;states look for flaws or weaknesses in hardware and software that allow them to remotely access and manipulate an adversary&#8217;s computer system. Zero-day vulnerabilities provide valuable access to targets; in fact, they played important roles in prominent malware such as\u00a0<a href=\"https:\/\/arstechnica.com\/information-technology\/2012\/06\/zero-day-exploit-links-stuxnet-flame\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet and Flame<\/a>, which was used to disrupt Iran&#8217;s nuclear program. In addition to these offensive interests, every nation also has defensive cyber interests, such as securing the systems upon which its government, businesses and citizens rely. Stronger defensive concerns relative to offensive ones, might induce a state to disclose a vulnerability to the vendor, which may then issue a patch or otherwise protect its users.<\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"https:\/\/www.rand.org\/blog\/2017\/11\/its-time-for-the-international-community-to-get-serious.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.rand.org<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A principios de 2017, funcionarios de inteligencia estadounidenses informaron al Congreso que m\u00e1s de 30 naciones ya adoptan capacidades ciberofensivas.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2608"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2608"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2608\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}