You are using an outdated browser. For a faster, safer browsing experience, upgrade for free today.

"IIJ Technical WEEK 2021" Report (DAY 1), where you can check the latest technological trends on the Internet and the latest information on IIJ.

IIJ Technical WEEK 2021

Similar to the company's recent event, Technical WEEK was held online. This year, YouTube's premiere publishing feature was used to publish each pre-recorded session at the scheduled date and time.

This year's theme, entitled "IIJ Engineer Encyclopedia," focuses on engineers from various genres working at IIJ, and also introduces what kind of environment they usually work in. This may be a hint for how to work, not only for IT engineers and students who are aiming to become engineers in the same industry, but also for people in completely unrelated industries.

The session schedule is detailed on the company's Technical WEEK website, but 3-4 sessions are published daily every 30 minutes from 15:00. One session is as short as 15 minutes and as long as less than 30 minutes. Last year, there was one theme and one hour a day, so there are plenty of variations in the content of the session and it is worth seeing.

インターネットの最新技術動向やIIJの最新情報をチェックできる「IIJ Technical WEEK 2021」レポート(DAY 1)

In addition, since the recordings are released in sequence, there is no need for the moderator to proceed. Kiyotaka Domae of the company, who is usually in charge of the moderator, was developing comments on the session with the distribution staff on Twitter.

The first session on the first day was entitled "Security Trend 2021", and Mr. Mamoru Saito, General Manager of Security Division of the company, gave a lecture.

Many security incidents occurred last year, but Mr. Saito picked up security incidents related to outsourcing destinations, stability of cloud services, vulnerabilities in IoT devices, DDoS attacks related to blackmail and social situations, and ransomware. ..

Regarding the cases related to outsourcing destinations, as an example of so-called supply chain attack (a method of setting a backdoor on network equipment etc.), the case of unauthorized intrusion into a US government agency from the Russian direction was mentioned as an example, but at the same time. As a domestic example, a case where a customer is damaged by data leakage or ransomware due to an attack on a system operation company (MSP) (also called a "supply chain attack") is presented. It seems that there are many companies in Japan that outsource network and security operations to MSP, but in the future it will be necessary to prepare for intrusions from such outsourced companies.

As for the story that seems to affect general users, there are no plans to fix the vulnerabilities of IoT devices, especially the vulnerabilities of slightly older routers, and there are increasing cases where manufacturers recommend that the devices be discontinued. Since these IoT devices are often used as stepping stones and turrets for DDoS attacks, it is strongly recommended to check the security information of the router you are using, update the firmware, and change the administrator password.

In addition, regarding the vulnerability of the logging utility "log4j" that affected cloud services around the world, there is a possibility that in-house web servers etc. may also be targeted, log monthly processing, annual processing, etc. Warned that the problem could be revealed.