Quote:
Originally Posted by Skybird
The updates you store on your precious discs, get created in some place. And that is the attack target, that is how I would take aim. Which makes the discs themselves already being infested. Also, there is the human factor. You will always have individuals who are prone to enemy blackmailing, and persuasions.
|
Again simple countermeasures...
Facilities to code new patches are not linked to the outside world. Personnel are searched for items such as thumb drives and CDs and have those confiscated and checked.
All software engineers work in randomly assigned pairs each day, each software engineer has access to each others code to insure one is not adding malicious code to the patch.
Patch disks are formatted and burned in triple redundancy on separate systems then sealed in their shipping box before leaving the facility. Before installation the disks are checked for consistency between the three.