Information Technology Reference
In-Depth Information
just give you approval to use that kind of equipment internally in Ukraine to
communicate in a secure mode to your partners in other countries. If you try to make
business with some government companies, for example, we will decide together that the
information which you will obtain should be protected by government equipment. If we
negotiate, we do not have any problems with banks or private companies.
Handy : I am curious. In Ukraine what are the three biggest threats to your Internet
infrastructure? Is it viruses, and then intrusion and then something else? Could you
clarify? And how are you attacking those threats?
Kolobov : First of all viruses, unfortunately. And that is a really big problem in
Ukraine. Intrusions could be considered the next one and intrusions also come from
other countries, ranging from South America to China. They usually use proxies and we
unfortunately cannot do anything with those kind of threats at the moment. Our
administrators on duty are working to select and gather statistics and to analyse and try to
develop our protection system against those kind of threats. There are other interesting
threats I wouldd like to add, such as problems with domaine system servers. That is a
headache because if the domaine system server is down, the network does not work and
if something is wrong with some kind of equipment that is a great problem for us and
also for our customers. Our customers are Cabinet Ministers, for example, and other
government authorities. We have a problem if they are e-mailing or posting and posting
just stops.
Gabovych : I would like to make a small addition to your question and to Professor
Kolobov's answer. There is a problem which we are facing on the Internet due to the
limitation of our external international connection channel bandwidth. We have a
problem due to massive attacks, like the denial of services attacks which can be targeted
to some small low-level server or low-level ISP, but can hold and block traffic for the
portion of Internet which has connections to this big channel. It is one of the outside
attacks which can distract and stop the working of the Internet connection in the country.
Handy : Given those threats where your systems go down, and actually I offer the
question to Turkey as well, do you have some sort of what I call triage or type of method
in terms of priority system; for example, which system are you going to restore first,
which is second, and which is third? In other words, do you determine what is the most
important part of the network you want to restore first, what is the next level that you
want to restore and what is the least important one to restore? Do you have that in place?
Kolobov : This is part of our scenario because our officers on duty have rules as to
what kind of services are the most important. We have to do everything to make it
possible to retain the services, or part of the services, or even to decide on the customers
who are not so important for us at that moment. For the officer on duty, each step is
structured in detail; for example, first he has to send the information on the problem to
the system administrator of the Presidential Administration and ask for advice on the next
step. That is why we are sure that we are trying to do our very best every time so as to
protect the most critical elements of infrastructure at each moment of attack.
Search WWH ::




Custom Search