Shields up!

Next story

Is there such a thing as too much protection? Let’s consult sci-fi lore for guidance.

If you’re a sci-fi fan, especially if you’re 40 or over, you have heard “shields up” so many times in your reading and viewing career that you might see shields, deflectors, and force fields as lame carryovers from the early days of sci-fi film and TV. While perhaps Buck Rogers’ or Flash Gordon’s ships didn’t have shields, there aren’t too many space adventurers that have gone boldly into the cosmos without them.

Since most of us now stream our sci-fi addictions, perhaps you, too, simultaneously watch and research strange bits of geekdom and sci-fi trivia. If that’s the case, while exploring the web for space and sci-fi geekery, let’s not strike out too boldly into the internet galaxy. Why? Because just like our heroes, we too can have chance encounters with hostile alien forces. When that does happen, our anxiety triggers the call to raise shields. The feeling is nearly universal. 

Again, just like our heroes, we are also equipped with sophisticated tech. While we may not pilot the Starship Enterprise or the fabled Millennium Falcon, we still need to be observant and assess the risks that may hinder us from keeping our cyberspace vessels in good shape. Of course, many PC users secure their cyberspace ships with digital security solutions. Still, have you ever wondered about the built-in settings that your “shields” have and how these can meet your needs in different conditions?

Familiar terms

“General quarters, general quarters! All hands man your battle stations!” In US Navy lingo, this announcement alerts the crew to prepare the vessel for potential combat. Fandom’s Military Wiki site characterises general quarters as follows: “Off-duty or sleeping crewmembers report to their stations and prepare for action, watertight doors and fireproof doors between bulkheads are shut, and security is increased around sensitive areas, such as the bridge and engineering rooms.” For IT users armed with digital security products, we can identify the default “balanced” settings as equivalent to general quarters.

The “balanced” settings for ESET’s consumer security products are ideal for practically every scenario; however, they can be modulated to “aggressive.” These differences might be comparable to placing a 21st-century warship side by side with a 20th-century one. In the last century, warships were designed for aggressive protection and could feature hardened steel armour upwards of 30 cm thick to repel projectiles. Today, warships are designed with a more balanced approach, relying less on armoured plates and more on electronic sensors to be lightweight and fast and detect and neutralise missile threats before they strike. This comparison provides a simple analogue: balanced protection brings speed, adaptability, and intelligence vs aggressive defence, which uses hardened protective armour as a shield to withstand attacks head-on.

Image 1. Detection Settings, Aggressive, Balanced, Cautious, Off 

 Is cyberwar sci-fi?

Although long anticipated, the potential emergence of cyberwar is now palpable. Misinformation, cyberespionage, surveillance, and the hacking of critical infrastructure are now on the table. Under such conditions, home users might upgrade their digital security solutions, moving from a popular but essential product like ESET NOD32 Antivirus to ESET Smart Security Premium. Businesses may feel less flexibility to protect their business continuity as they’ve likely already committed to a particular course of action. Home users faced a similar dilemma with moving at the height of the COVID-19 pandemic.But imagine you are in an acutely risky situation. Perhaps you are literally in a war zone or in a digital relationship with a business or individual that is likely to be targeted. What options do you have to beef up your protection? Suppose you have assessed your risks and come up with the following:

  • I work at an organisation in possession of sensitive data or that provides critical services
  • One or more digital relationships I hold have experienced digital disruption and security impacts
  • There is a failure in diplomatic relations with a powerful country
  • There have already been multiple cyberattacks, and there is a high likelihood of more to come
  • If you were on one of sci-fi’s storied spacecraft, it would be easy: raise shields to the aggressive setting, buy yourself some time, and think through the problem. But how is that done in cyberspace with your PC?

Image 2. Detection Settings for Firewall, Web and Email, and More

 “General quarters!” “Battle stations!” Or maybe not

There is a reason why you’ve likely never toyed with the advanced settings of your security software: I could screw it up! This is a distinct possibility. Luckily, in the case of ESET products, you can return to the default settings with a few clicks. To lessen any risks when experimenting with your settings, compare the default “balanced” set to the “aggressive” setting.The balanced mode allows your PC to engage with the internet without raising overly suspicious alarms that might burden the user experience. The aggressive setting will set off multiple paranoia-inducing alerts, appearing as: 

  • A blocked URL
  • A warning about an untrustworthy URL
  • A parental control warning about forbidden content

You will undoubtedly encounter these alerts if you try to access mature or explicit content or illegal download or streaming sites. However, in “aggressive” mode, even mundane websites may get flagged.

But back to sci-fi and shields. Having your shields up has a cost. That cost, among other things, would likely be the deterioration of usability. The correct settings – the ability to modulate the shield’s protection – depend on what the guard is trying to block. The comparison with digital security holds up well here. Using the aggressive setting could yield a higher number of suspicious URLs blocked, but some valuable resources could also be flagged and blocked too. The involved detections are primarily based on longitudinal threat data held by ESET on the behaviour of malicious websites and IP addresses, malware samples, and potentially unwanted applications, meaning ESET security products adjust in real-time to encountered threats.

Takeaway

Imagine that as an intergalactic explorer, large amounts of your attention and your ship’s energy supply are diverted to security and defensive shields. Logically, this slows down your efforts to discover new quadrants of the universe. The internet is a universe too, and your exploration of it is also affected by how much attention and energy is diverted to your security. 

This says a lot about why security software, malware research, and security awareness are critical to our digital lives. We depend on these elements working in concert and on each other as digital participants for collective security. 

After all, each machine running security software is part of an active sensor network feeding samples to be processed as clean, suspicious, or outright malicious. Once categorised, each device in this network is updated with new detections and tuned or “modulated” in its defensive capability. Luckily, this journey into the “what if we used…?” aggressive settings was hypothetical. If we were forced into an “aggressive” defensive posture on the internet, much of the fun and utility would be gone. In that scenario, we lose considerable benefit from digitalisation and instead of sci-fi fun, our user experience would become more akin to a zombie apocalypse.