The problem of cyber International
General Keith Alexander, director of the National Security Agency (NSA) and the man in charge of Cybercom, new command of the U.S. cyber security, recently issued a warning of a massive increase in attempts by hackers and foreign countries to violate the security of the nation on the Internet.
What had originally started as viruses and malware, hackers fans and employees discontent against computers and networks have become the worldwide penetration with illegal business and the state sponsored terrorists.
The world attacks on information security and threats are increasing power and sophistication with the nation supported emerging cyber attacks. Although attacks are isolated so far, the new wave of cyber attacks are more frequent and dangerous. And with the advent of the (often hostile) participation Cyber national offensives, the risk to our country's national security is real and potentially devastating.
At risk are our enormous advantages in military power, the intellectual capital and industrial wealth.
Assets the United States has spent much human and intellectual capital to develop are now in danger from being stolen by cyber thieves intelligent exploit weaknesses of our cyber security. The fact that cyber thieves can now operate across international borders and in the safe third country that impunity only increases the threat. The threat affects government and industry.
Although most experts have predicted this day would come, infiltration in line could cause huge damage to U.S. military and infrastructure of the nation, and government and industry is not ready now safe from such attacks.
The Obama administration is promising to spend billions to improve the cyber defenses, and has hired hundreds of specialists with doctorates in computer technology for work in the Cybercom and start building better security measures.
But the problem is daunting complicated by the rapid advance of technology, lack of clear definition of concept, the failure of adequate international cooperation and mistrust between the government and the private sector.
The battlefield of the 21st century is composed of many components include the Internet and all things that connect from one computer to the Internet. The site also includes information systems such as power grids, telecommunications systems, and various corporate and military systems.
Furthermore, although both offensive and defensive measures are required to fight the war against cyber terrorism, the cyber security world is clearly operating in a reactive way. Compounding the fact that the international data networks are growing technological pace development of over cybersecurity.
While new technologies and processes are emerging to combat hackers and cyber-terrorism, there is little uniformity in the use and adoption. In addition, international standards and protection against cyber threats laws are not yet in place.
It the threat real?
Although there is still no universal outcry against International Terrorism Cyber, recent events such as hacking database Pentagon's strategic and removal of Google's Internet operations in China are symptomatic of the magnitude of the problem. Many experts equate complacent International to cyber attacks such as that seen before the Japanese attack on Pearl Harbor that started the Second World War the United States or the attacks of September 11 2001 that began the war on Terror.
Cyber attacks are often classified as low probability, high damage events like disasters fatal aircraft accidents or natural. When they occur, the level of public concern is high. And the number of occurrences, the frequency and magnitude of the attacks are increasing quickly.
Developments in Cybersecurity Solutions
There is a growing awareness of the problem of cyber International, although the pace of development is slow and uneven. The Federal Government has commissioned two agencies (National Security Agency – NSA international cyber terrorism and the Department Homeland Security-DHS for national cyber attacks), but there are problems with coordination and funding. More attention, a clear vision, definition terms and the significant increase in funds needed to develop effective solutions.
In addition, infrastructure assets are necessary in the form of development and use of critical information and other databases. Each infrastructure development should be marketed and adopted by the online community the entire defense in order to improve and make available all the development of technology, law and standards. universal assessment of research and use centralized data is an important first step in the war against international cyber attacks.
Until government and industry recognize the problem and cooperate in Search of an international cyber attacks will grow and increase the threat to our cyber security.
Jon M. Stout is Chief Executive Officer of Aspiration Software LLC. Aspiration Software LLC is an Information Technology/Cyber Security services provider focused on the Intelligence Community (IC). For more information about Cyber Security and Information Assurance and Employment Opportunities in the Intelligence Community go to http://aspirationsoftware.com
Universal International Logo (1955)
[affmage source=”ebay” results=”25″]Universal International[/affmage]
[affmage source=”amazon” results=”6″]Universal International[/affmage]
[affmage source=”clickbank” results=”4″]Universal International[/affmage]