{"id":5284,"date":"2016-01-18T02:38:11","date_gmt":"2016-01-18T07:38:11","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=5284"},"modified":"2019-11-15T15:24:17","modified_gmt":"2019-11-15T11:24:17","slug":"alexander-erofeev-interview","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/alexander-erofeev-interview\/5284\/","title":{"rendered":"Alexander Erofeev answers Kaspersky Academy questions"},"content":{"rendered":"<p>In today\u2019s post, we\u2019ll offer the answers to some questions that Kaspersky Academy fielded to Chief Marketing Officer at Kaspersky Lab, Alexander Erofeev. He will tell us about the role that he believes IT security should play in university curriculums and who is most interested in enhancing their knowledge of IT security. He will also talk about the first \u201cpredictions\u201d of the Internet by science fiction writers.<\/p>\n<p><strong>1. How would you respond to the claims held by some in academia that IT security is not a science that can or should be included in university curriculum?<\/strong><br>\nIT security is definitely not a scientific discipline, but should certainly be included in the university curriculum for many established subjects. IT security is a necessary field of knowledge for students who are engaged in a variety of engineering, social, economic and financial problems; as well as those directly involved in IT security. It\u2019s like a course in philosophy or mathematics that is read not only by philosophers and mathematicians.<\/p>\n<p>In my opinion, if we are talking about standard knowledge in the 21st century, it should necessarily involve an understanding of how the IT world works and what dangers are lying in wait for users. Information security is also a must because ignorance of this issue is fraught with unpleasant consequences.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How <a href=\"https:\/\/twitter.com\/hashtag\/cybersavvy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cybersavvy<\/a> are you? Find out in our quiz: <a href=\"https:\/\/t.co\/DgDPNu9P47\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/DgDPNu9P47<\/a> <a href=\"http:\/\/t.co\/4DhyKTxSKQ\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/4DhyKTxSKQ<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/648882239011426304?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 29, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>IT security is definitely not science. It is an applied discipline that explains phenomena discovered by other sciences: mathematics, computer science, physics, psychology, and even sociology, because social aspects are especially important here. To draw an analogy with the engineering disciplines, IT security is like the theory of the strength of materials, only in the cyberworld. The difference is that the theory of the strength of materials is necessary for engineers who work with physical objects, whereas in the cyberworld there is a bit of an engineer in all of us even if we do not deal with IT.<\/p>\n<p><strong>2. Who should be the most interested in improving their knowledge of IT security? Government? Intelligence services? Business? Science? The general public? Authorities?<\/strong><br>\nI think this primarily concerns society as a whole, because a higher level of IT security awareness among different groups of people reduces risk and raises the level of credibility in the environment where we live.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Why people cherish <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a>, yet cheerfully surrender it <a href=\"http:\/\/t.co\/sHZefVCdaI\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/sHZefVCdaI<\/a> via <a href=\"https:\/\/twitter.com\/TheEconomist?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@TheEconomist<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Kaspersky?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Kaspersky<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/558069104759021568?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 22, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>People who are engaged in developing cutting-edge technologies should also be interested because there are no state-of the-art technologies without software. This, of course, is important for entrepreneurs too as they would like to have employees who do not need to have obvious things explained, and who clearly understand the consequences of their actions. I do not know if scientists would be interested, but as members of society they probably are. And she secret services, of course, for obvious reasons.<\/p>\n<p>We recently had an interesting experience. We work closely with the Business School at Moscow State University and we told them about our game dedicated to Critical Infrastructure Protection. And suddenly, they responded: \u201cWe are interested, we want to participate in that!\u201d I said: \u201cLook guys, you are all businessmen, you\u2019re not IT specialists, you are studying to get an Executive MBA. All of you will run businesses, and none of you, as far as I understand, is going to be engaged in the computer industry\u201d.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">94% of companies have experienced some form of external security threat <a href=\"https:\/\/t.co\/YGF3KT5SZU\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/YGF3KT5SZU<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/whitepaper?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#whitepaper<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/t.co\/oRHKUTXzJi\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/oRHKUTXzJi<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/669542461954531329?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 25, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>They said: \u201cThat\u2019s true. But we believe that if we are the ones making the decisions we need to understand which of the threats that jeopardize corporate networks fall under the umbrella of information security. We need to understand that to take right decisions, when we are working with the IT specialists and organizing the work of the company in general\u201d. Well, that would be a good way to comprehend the situation.<\/p>\n<p>This is a very good example of why IT security knowledge is important.<\/p>\n<p><strong>3. In the 18th century the doctrine \u201cBack to nature!\u201d was born, calling on mankind to reject technological progress\u2026 Is life without computers, cell phones and Internet possible in the 21st century?<\/strong><br>\nThe doctrine of \u201cBack to Nature!\u201d was formulated by the French philosopher Jean-Jacques Rousseau. The core of the doctrine was the theory of Natural Human. Its main idea is not in the fact that \u201chumans in the state of nature\u201d lived in a hut but that within each of us lives a \u201cnatural human\u201d with \u201cuncorrupted morals\u201d yet we fall prey to the negative influences of civilization and thus need to return to basics. The point is that man is virtuous by nature. Rousseau was not suggesting that we turn away from technological progress.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">My risky gamble: 24 hours without a <a href=\"https:\/\/twitter.com\/hashtag\/smartphone?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#smartphone<\/a> <a href=\"https:\/\/t.co\/eze99as560\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/eze99as560<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/digitalamnesia?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#digitalamnesia<\/a> <a href=\"http:\/\/t.co\/RupoKf9LAO\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/RupoKf9LAO<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/623850450085920768?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 22, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I\u2019m not sure that modern civilization can remain stable without using a large number of technological achievements. We should understand that even people who now live in isolation from the rest of the Earth\u2019s population to a large extent depend on what is going on in the wider world. They get their medicine, food and information from it; they are connected with it one way or another. Therefore, rejecting technical progress will lead to a drastic reduction in life expectancy, to begin with, and to deterioration in the quality of life.<\/p>\n<p><strong>4. Science fiction writers predicted planes, submarines, atomic bombs and video phones \u2014 but none of them predicted the appearance of the Internet. What is the reason for that?<\/strong><\/p>\n<p>Alexander Pushkin, who is considered by many to be the greatest Russian poet and the founder of modern Russian literature, wrote in one of his fairy tales in verse:<\/p>\n<p>\u201cTell me, pretty looking-glass,<br>\nNothing but the truth, I ask:<br>\nWho in all the world is fairest<br>\nAnd has beauty of the rarest?\u201d<br>\nAnd the looking-glass replied:<br>\n\u201cYou, it cannot be denied.<br>\nYou in all the world are fairest<br>\nAnd your beauty is the rarest.\u201d<\/p>\n<p>In literature, not necessarily in science fiction but in the works of famous writers, we often come across descriptions of a place where knowledge is kept. There has always been an opportunity to receive images or to share information remotely, to start an interactive \u201cchat\u201d, just as we have seen in Pushkin\u2019s verses. People could imagine all these things quite well. Maybe it wasn\u2019t called \u2018the Internet\u2019, but the general idea of access to knowledge has existed for centuries.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The Internet causing 'digital amnesia'? <a href=\"https:\/\/t.co\/Tb2fyR55ne\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/Tb2fyR55ne<\/a> via <a href=\"https:\/\/twitter.com\/TODAYshow?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@todayshow<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/video?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#video<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/digitalamnesia?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#digitalamnesia<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/618149800756793344?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 6, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>According to the Ancient Greek philosopher Plato, who definitely wasn\u2019t a sci-fi writer, we have a large but finite resource of knowledge, much of which we cannot remember. If we try, we can recollect more of this knowledge. Plato did not have a practical way of accessing this common pool of knowledge, but he formulated it as a theory. In some ways, this could be viewed as a kind of \u2018Internet\u2019, a place where all information can be stored.<\/p>\n<p><strong>5. What do you think of predictions that soon the most effective \u2014 and therefore the only \u2014 way to wage war will be to hack the enemy\u2019s computer networks, while tanks, missiles and aircraft carriers will become museum exhibits?<\/strong><\/p>\n<p>The people who think so suggest that the aim of the war is to inflict maximum damage on the opponent. This is the logic of terrorist-guerrilla warfare. If we proceed from the assumption that future conflicts will involve that kind of warfare, then indeed this proposition has some merit.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Cyberwar is is not that different from a nuclear war: you can't feel the radiation or see it, but it kills. Same story with IT. <a href=\"https:\/\/twitter.com\/hashtag\/SAS2013?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#SAS2013<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/298512481549185024?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 4, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>But if we open a classic study of military strategy, we see that wars can have different objectives. Damaging the enemy or increasing revenues might be among them. But often the goal is not to capture resources but to annex territory. Yet another goal is to oppress the enemy, not necessarily causing damage. And we must understand that even having captured the enemy\u2019s cyberspace, one must still be able to exploit it correctly.<\/p>\n<p>Although the role of the Internet environment will be very important in the wars of the future, unfortunately conventional methods of warfare will not disappear.<\/p>\n<p><strong>6. If the Nobel Prize was also awarded for IT security, who would be the first winner?<\/strong><\/p>\n<p>It\u2019s not an easy question. Among the current candidates, maybe Eugene Kaspersky?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s post, we\u2019ll offer the answers to some questions that Kaspersky Academy fielded to Chief Marketing Officer at Kaspersky Lab, Alexander Erofeev. He will tell us about the role<\/p>\n","protected":false},"author":40,"featured_media":5285,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1485],"tags":[1124,1012,1026,352,97,321],"class_list":{"0":"post-5284","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-alexander-erofeev","9":"tag-internet","10":"tag-interview","11":"tag-kaspersky-lab","12":"tag-security-2","13":"tag-technology"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/alexander-erofeev-interview\/5284\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/alexander-erofeev-interview\/6554\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/alexander-erofeev-interview\/6635\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/alexander-erofeev-interview\/6540\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/alexander-erofeev-interview\/7523\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/alexander-erofeev-interview\/7260\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/alexander-erofeev-interview\/10522\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/alexander-erofeev-interview\/11082\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/alexander-erofeev-interview\/10109\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/alexander-erofeev-interview\/10522\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/alexander-erofeev-interview\/11082\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/alexander-erofeev-interview\/11082\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/alexander-erofeev\/","name":"Alexander Erofeev"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5284"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5284\/revisions"}],"predecessor-version":[{"id":14894,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5284\/revisions\/14894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5285"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}