Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: The Future of Cyber Security and Cyber Conflict
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > The Future of Cyber Security and Cyber Conflict
Uncategorized

The Future of Cyber Security and Cyber Conflict

BobGourley
BobGourley
8 Min Read
SHARE

As I write this there is evidence that the Russian’s are once again attacking another country through massive denial of service attacks.  For a recap with analysis you will not see elsewhere see The Kyrgyzstan Cyber Attack That No One Is Talking About .  This is not the first time that a major nation state has been accused of launching attacks like this.  Russia has been implicated as responsible for two other large scale attacks (Estonia and Georgia).   In other investigations China has been implicated of sponsoring/supporting attacks designed to extract information.  These are very serious high end attacks that are hard to mitigate, but organized crime is also becoming increasingly capable, investing large amounts in R&D to allow their continued ability to sap resources through cyber theft.   In a recent example a payment processing company called Heartland Security Systems admitted its security system had been breached and millions of credit and debit card numbers were extracted. I’ve previously written about the government’s response and many of us have been strongly supportive of the efforts and activities of Melissa Hathaway and th…


As I write this there is evidence that the Russian’s are once again
attacking another country through massive denial of service attacks. 
For a recap with analysis you will not see elsewhere see The Kyrgyzstan Cyber Attack That No One Is Talking About . 
This is not the first time that a major nation state has been accused
of launching attacks like this.  Russia has been implicated as responsible for two other large scale attacks (Estonia and Georgia).   In other
investigations China has been implicated of sponsoring/supporting
attacks designed to extract information.  These are very serious high
end attacks that are hard to mitigate, but organized crime is also
becoming increasingly capable, investing large amounts in R&D to
allow their continued ability to sap resources through cyber theft.  
In a recent example a payment processing company called Heartland
Security Systems admitted its security system had been breached and
millions of credit and debit card numbers were extracted.

I’ve previously written about the government’s response and many of us
have been strongly supportive of the efforts and activities of Melissa
Hathaway
and the team of coordinators she assembled in government.  
Her approach has been viewed as very positive by all credible
observers and it is good to know she will be continuing to work to make
our nation safe in this area. 

It was also good to see the approach of the Obama team posted on the
Whitehouse.gov site.  In a homeland security policy statement six key
goals were articulated.  They are copied below:
   

More Read

Podcast with Amy Wohl about Cloud Computing
Top 5 IT Resolutions for 2015
What does Twitter do with Our Conversations?
100 Ways to Measure Social Media
Aggregating Tags

    Protect Our Information Networks

    Barack Obama and Joe
    Biden — working with private industry, the research community and our
    citizens — will lead an effort to build a trustworthy and accountable
    cyber infrastructure that is resilient, protects America’s competitive
    advantage, and advances our national and homeland security. They will:

  • Strengthen Federal Leadership on Cyber Security:
    Declare the cyber infrastructure a strategic asset and establish the
    position of national cyber advisor who will report directly to the
    president and will be responsible for coordinating federal agency
    efforts and development of national cyber policy.

  • Initiate a Safe Computing R&D Effort and Harden our Nation’s Cyber Infrastructure:
    Support an initiative to develop next-generation secure computers and
    networking for national security applications. Work with industry and
    academia to develop and deploy a new generation of secure hardware and
    software for our critical cyber infrastructure.

  • Protect the IT Infrastructure That Keeps America’s Economy Safe: Work with the private sector to establish tough new standards for cyber security and physical resilience.

  • Prevent Corporate Cyber-Espionage:
    Work with industry to develop the systems necessary to protect our
    nation’s trade secrets and our research and development. Innovations in
    software, engineering, pharmaceuticals and other fields are being
    stolen online from U.S. businesses at an alarming rate.

  • Develop a Cyber Crime Strategy to Minimize the Opportunities for Criminal Profit:
    Shut down the mechanisms used to transmit criminal profits by shutting
    down untraceable Internet payment schemes. Initiate a grant and
    training program to provide federal, state, and local law enforcement
    agencies the tools they need to detect and prosecute cyber crime.

  • Mandate Standards for Securing Personal Data and Require Companies to Disclose Personal Information Data Breaches:
    Partner with industry and our citizens to secure personal data stored
    on government and private systems. Institute a common standard for
    securing such data across industries and protect the rights of
    individuals in the information age.

Another goal was in the Defense portion  of the Whitehouse.gov site which called for DoD to lead in operational defense.  It reads:

  • Protect the U.S in Cyberspace: The Obama-Biden
    Administration cooperate with our allies and the private sector to
    identify and protect against emerging cyber-threats.

My assessment of these seven goals:  This is too important for us to kibitz on at all.  Now is the time for us to all form up on these goals and execute.  Collectively we have to move faster in all these areas if we are to lesson the impact of the thinking/changing/technologically advanced adversaries that face us.  I only add that we should keep bold visions in mind.  I really believe that security and functionality of IT are totally connected and should always be considered in the same breath.  And both can be dramatically improved, this is not a zero sum game where functionality is compromised by security.  I believe our goal should be, as I’ve stated before, that the security and functionality of the federal enterprise will be improved by two orders of magnitude over the next 24 months.  And I believe the cyber and CTO team of the new administration can deliver on that.

I also believe that DoD will continue to have a key leadership roll in cyber, since increasingly that domain is being used by military adversaries and our own military must be able to operate with knowledge that their IT systems are safe from adversary attack.    

More later.

Link to original post

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data intelligence in healthcare
How Data Is Powering Real-Time Intelligence in Health Systems
Big Data Exclusive
intersection of data
The Intersection of Data and Empathy in Modern Support Careers
Big Data Exclusive
blockchain for ICOs
The Role of Blockchain in ICO Fundraising
Blockchain Exclusive
ai in business
How AI Helps Businesses Discover Specialized Niches
Exclusive Marketing

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Virtual Workforce, A Growing Part of the New Normal?

5 Min Read

Your Movements Speak for Themselves: Space-Time Travel Data is Analytic Super-Food!

17 Min Read

Capturing IDs Correctly

4 Min Read

The Challenge of Predicting Consumer Response to Innovation

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?