Security of Internet providers: can we trust it?

by Janeth Kent Date: 29-05-2023 ISP security cybersecurity

This year has been a time of many changes. Now, more people are connected to the Internet through their home routers for teleworking, shopping, or leisure. This is where the security of Internet operators becomes more important.

The question is whether the ISP's security is good enough to be the only one needed by our companies and teleworkers.

Today we are going to talk about security when connecting from our homes to the Internet, and why ISP security measures are not enough for teleworkers.

In case you don't know, ISP stands for Internet Service Provider. It is basically a company that provides Internet connection services to its clients.

The Covid-19 pandemic has changed the way we work and also the way we live. Right now many people are working remotely from their homes, either because of the Coronavirus or because they used to work from there. Without a doubt, these workers depend on their Internet operator to do their job. Thanks to the Internet service they receive, they can keep in touch with their customers, suppliers and colleagues during their working day. In addition, they use the network for personal matters such as shopping and private relationships with family and friends.

Is the ISP' security adequate?

One aspect to consider is that Internet operators or ISPs are not known for their security protections. However, many of them claim that they are increasing their defenses against attacks carried out by cyber-criminals, either by having a specific cybersecurity division, or by directly contracting hardware and support from leading companies in the world of cybersecurity. One of the questions is whether small and medium-sized businesses can be confident that with these measures they will have sufficient protection, i.e. is the protection that ISPs have sufficient to prevent attacks from affecting us?

According to Vince Crisler, executive director of Dark Cubed and former director of information security at the White House, the answer is no. The reason he argues is that security for small businesses and residential users is primarily about minimalist capabilities driven by marketing purposes rather than security.

Reasons why ISP security protections are not sufficient

Now let's look at the reasons why the security capabilities of ISPs tend to be minimal or incomplete. In that sense, Crisler comments that this is because the ISP is mainly focused on providing a reliable and stable bandwidth for their customers. He also comments that they value these two things above all else. Therefore, if they needed to make a decision between security and uptime their decision would focus on uptime.

Another issue to take into account is that the domestic hardware offered by ISPs is often obsolete and not well protected, as it has many security vulnerabilities or uses old versions of their internal software. It should be noted that many clients rent or use network hardware from their ISP. These devices, such as routers, often lack basic security controls. The problem is that these devices rarely receive firmware updates, and sometimes even leave services such as Telnet or web management open and exposed.

However, ISPs defend themselves by saying that security problems do not depend solely on them. This is also true, due to the high expectations their clients have, but this does not mean that they should not improve.

How ISP security can be improved

Shrihari Pandit, president and CEO of Stealth Communications, thinks the best way to solve this is by making changes to the OSI communication layers.

In the Layer 1 / Physical layer, one problem is that traffic is not encrypted between the ISP and the client in most cases. This is particularly serious with providers who provide services over wireless or PON fiber technologies. These technologies transmit traffic to all subscribers and allow attackers to physically access the network. The GPON standard, makes use of AES encryption as indicated by the standard.

On the other hand, the Layer 2 / Data Link Layer (Ethernet), which represents a communication route between the ISP and the client, usually also has no encrypted traffic and is prone to espionage. One way to improve security in this area is by implementing technologies such as MACsec.

At Layer 3 / Transport Layer (Internet Protocol) users and organizations can implement IPsec to provide end-to-end encryption between two endpoints on the Internet.

This makes it difficult for cybercriminals to access the Internet so they can decode the traffic from the Internet provider. That is, making use of VPN protocols to add an additional security layer.

Vince Crisler says that ISP customers want to use their Internet connections for any purpose, without being monitored by their provider. However, to provide security ISPs should go beyond our privacy. The issue of ISP security is complex, and right now to maintain privacy free VPNs are becoming one of the best alternatives we have.

Technology vector created by freepik - www.freepik.com
 
by Janeth Kent Date: 29-05-2023 ISP security cybersecurity hits : 3021  
 
Janeth Kent

Janeth Kent

Licenciada en Bellas Artes y programadora por pasión. Cuando tengo un rato retoco fotos, edito vídeos y diseño cosas. El resto del tiempo escribo en MA-NO WEB DESIGN AND DEVELOPMENT.

 
 
 

Related Posts

The ultimate cybersecurity checklist for programmers

In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect…

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We…

6 Best Alternative Privacy Focused Browsers in 2021

In today's article we take a look at free private browsers which are relevant in 2021. We will compare their advantages and disadvantages, specs, etc. Let's get into it. What are alternative…

Brief History of Biometric Authentication

These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your…

A beginner’s guide to software vulnerabilities

What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising…

The BleedingTooth vulnerability and other Bluetooth security risks

Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of…

Network and port scanning with Zenmap

This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated…

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine…

How to block any website with a password from your browser

We are going to explain how to block any website with a password from your browser, and for this purpose we are going to use an extension called Block Site.…

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had…

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from…

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our…

Clicky