Sunday, May 2, 2010

international cyber-attack

The problem with International cyber attacks
General Keith Alexander, director of the National Security Agency (NSA) and the man who Cybercom, United States, the new Cyber Security Command, warned recently about the huge increase in the number of attempts hackers and others for infringement of its Internet Security.
What originally began as a virus and malware attacks by amateur hackers, disgruntled employees and against computers and networks, now transformed into the global reach of criminal enterprises, and government-backed terrorists.
A world of information security attacks and threats to power and refinement supported by rising new nation cyber attacks. While isolated attacks are so far the new wave of cyber attacks and more dangerous. And with the advent of (often hostile), participation in national cyber-attacks, the threat to our nation and the potentially devastating real National Security.
The risk that our enormous advantages in military power, intellectual capital and industrial wealth.
The assets in the U.S. has an enormous human and intellectual capital needed to develop is a risk that by clever cyber-thieves using stolen weaknesses in our internal security. The fact that cyber-thieves can now operate across international borders and is in safe third countries, only increases the danger of impunity. The threat of influence on government and industry.
Although most experts have predicted that this day would come, can have enormous damage online infiltration of U.S. military and infrastructure of the country and government and industry cause are not currently prepared to protect against such attacks.
Obama promises to spend billions to the Cyber Defense Update, and has already pledged hundreds of specialists with a PhD in computer technology to assist in the work of Cybercom and better security to build.
But the problem with a huge bowl of rapid technological progress is hampered by the lack of a clear definition of non-conceptual adequate international cooperation and mistrust between government and private sector.
The 21 century battlefield of many components, the Internet and all things that go from one computer to connect to the Internet. The site also contains information systems such as electrical networks, telecommunications and various social and military systems.
Furthermore, although both defensive and offensive measures are needed to the war against cyber-terrorism, cyber world a much more protective measures in a reactive way. This increase of the international network of data at a pace that surpasses the technology cyber security is growing.
While new technologies and processes are created for hackers and cyber-terrorists to fight, there is little uniformity in the application and approval. Moreover, the international standards to protect and cyber threats, laws come into force.
Real is the threat?
Although there is a universal protest against international terrorism, Cyber, recent events, such as hacking the Pentagon's Strategic databases and cancellation of Google on the Internet in China is symptomatic of the extent of the problem. Many experts like complacent attitude of international cyber-attacks before the Japanese attack on Pearl Harbor in World War II the United States of September 11, 2001 attacks began to see that the war against terrorism began.
Cyber-attacks often considered a low probability, a lot of damage events comparable to major natural disasters or fatal plane crash. If they pass the public concern is high. And accidents, the frequency and severity of attacks is increasing rapidly.
The development of cyber-security solutions
There is a growing awareness of the problem of International Cyber-attack, although the pace of development is slow and erratic. The federal government has commissioned two agencies (National Security Agency - NSA of international cyber-terrorism and the Department of Homeland Security DHS for national cyber-attacks), but there are problems with coordination and funding. More attention, clear vision, define the terms and a substantial increase in resources needed to develop effective solutions.
In addition, infrastructure facilities through the development and use of critical information and databases required. Everyone needs to develop infrastructure for the circulation of the whole society and cyber-defense, improve and use all available developments in technology, legislation and standards. Universal assessment of research and use of centralized data is an important first step in the fight against international cyber-attacks.
Government and industry to recognize the problem and work together to solve international cyber attacks will grow and the threat to our cyber security to increase.

No comments: