• []Internet Security Glossary.
  • Internet - Wikipedia
  • World Internet Usage Statistics ..

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide

The Global State of Information Security Survey 2018: PwC

The growth in digital devices is driving risk management

Key findings from The Global State of Information Security ® Survey 2018
Our US society does not have a "2 party system" nor a democracy. That went away in steps: 1913, the post-WWWII "national security" hairballs, the JFK assassination, the still unprosecuted 9/11 crime, etc. We have a rogue and criminally led One Party system controlled by Usual Suspects. These tie into the top financial and corporate interests - and "intelligence agencies" - in our world. This illuminati mafia hairball hates Truth and, thus, internet openness with a passion. Currently, this element is desperate to think that anyone other than Hitlery will be elected next US President, because "any other guy" might concede to certain powerful USG "White Hat" element demands for long-overdue "mass arrests" of key criminals in high positions in our private and public sector and some return to a semblance of lawful constitutional behavior in our nation; including ending the false flag war parade and the mind-boggling ongoing unprosecuted looting of the Treasury (esp. via Pentagon budgets).

Anonymity, Privacy, and Security Online | Pew Research …

Transportation Security Administration
I do not know exactly what you meant by "security software" on either a router or a switch but I am assuming you mean AV software. Routers and switches have their own OS and it doen't make sense to have AV software on them unless they also have something like a pix firewall. One of the major concerns for a router is to prevent IP spoofing. You don't want somebody "out there" pretending they are "in here." Edge firewalls frequently do have AV software but not for the firewall itself - they are guarding all the machines inside against web based malware. SMTP / POP agents also have their own malware scanning software. You do not want to turn on logging on very busy routers or switches. The drop in throughput will be noticed. Logging on most of these network devices is used primarily for debug purposes. I will blog about it later on my blog. Thousands of Windows bot machines all over the globe sending me spam and malware directly should be entertaining metadata for the NSA. For me it is an onerous burden.
But if you ask me, most of what is going on here is fear of the unknown.

 

IPSec, Internet Protocol Security protocol suite

Read our week in review blog post to learn about firearms discovered in carry-on bags and more
TL;DR the comments. What if it's a helpful srite, what wants to improve the internetz. What if I have a friend, and he knows how to do things, and knows the internet is weak, but wants it to be strong. He probes, he scans, he DDOS's these various points, testing the other points along the way is just a natural consequence and I think is being read into more than needs to be. Things are getting stronger, revisiting the folks appears to show that the improvements are working! Everything is so gloom and doom in security, just chill and lets see what happens.
If it were a nation-state, which I again think too much credit is given to, a few guys with mild coordination/discipline could do what "nation states" do, DOS is an unsophisticated tool, if I were a "nation state" I'd use something worse in addition to DOS.

Digital Divide - ICT Information Communications Technology
My thought exactly. We know that the government engages in "stress tests" of the financial system and the banking industry. So it would be expected that they would do the same thing with the internet. I'm deeply puzzled by Bruce's insistence that this must be a foreign actor. Someone say recently, "security researchers came to the conclusion that attribution was hard, then they promptly forgot it." This essay seems more evidence of that.


Red Hat and Other Third-party Public AMIs Security Concern

Internet still uses old concepts and that freedom of thinking and its ingenuity pays back as usual in bad ways; instead of dynamic ips, use fix ones, make it linked to a precise person or company, like a phone number; make it all secure - meaning that only certain ip addresses can go into certain sites; i know that everyone will start yelling about privacy; there is no privacy even now so calm down; all security issues are coming mainly from the fact that potentially any user can do anything; well, if you need to use a site, certify your identity, that's all. Than, it's up top the software to see which one did what. End of worries.