GPS News  
Outside View: Internet threats -- Part 6

disclaimer: image is for illustration purposes only
by Loren B. Thompson
Arlington VA (UPI) Jan 5, 2009
U.S. network software and procedures must be continually updated to eliminate weaknesses, and tested to assure gaps have been successfully closed.

Also, there must be a mechanism among network administrators across the United States for sharing information about threats that provides timely and useful warnings of danger.

Finally, defensive measures carried out by the U.S. government and its relevant agencies must be sensitive to the missions of users, so that they do not impair network functionality in the process of providing protections.

The respected SANS Institute uses a six-step framework for explaining how cyber incidents should be addressed that begins with being prepared, and then proceeds through identification of danger, containment of the threat, eradication of the threat, system recovery and follow-up.

Each of these steps may entail dozens of discrete actions aimed at detecting, characterizing, isolating and suppressing the danger, and then restoring the network to its beginning state.

Experts typically stress the importance of being prepared before an attack occurs, and conducting postmortems to derive useful lessons about how dangers can be minimized in the future. Military experts also emphasize the importance of developing offensive cyber capabilities as a way of deterring or countering attacks.

While the generic measures necessary to cope with cyber aggression are easy enough to identify, applying them to specific threats and mission areas can be devilishly difficult. Efforts to do so have revealed a number of chronic problems that policymakers eventually must address.

First, vital national networks are so balkanized among military, civil and commercial operators that it is difficult to enforce any particular standard with regard to cyber defense.

Second, the inability to trace attacks made over the Internet to their point of origin severely hampers efforts to deter or punish predators.

Third, network administrators seldom have the sort of enterprise-wide view of their information assets needed to fashion a durable and complete security regime.

Fourth, government by its nature is not well equipped to keep up with such a fluid and multifaceted challenge.

The U.S. federal government acquired most of its information networks on a piecemeal basis, without much thought as to how the parts one day might fit together or how enemies might try to exploit them.

The U.S. government's recent efforts to organize for cyber defense have been hampered by the fragmented character of federal information systems. This problem is compounded by the fact that many networks vital to the economy are in the private sector, and the legal authorities for implementing security measures there are incomplete at best.

(In Part 7: The role of the National Security Agency in securing U.S. national cyber and Internet security)

(Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


'Cybergeddon' fear stalks US: FBI
New York (AFP) Jan 6, 2009
Cyber attacks pose the greatest threat to the United States after nuclear war and weapons of mass destruction -- and they are increasingly hard to prevent, FBI experts said Tuesday.







  • Cathay Pacific books 7.6 billion HK dollar loss over oil hedging
  • India signs 2.1 bln dollar plane deal with Boeing
  • China Eastern says bailout increased to one billion dollars
  • Britain's environment minister concerned by Heathrow plan

  • China's Foton to form 930-mln-dlr truck partnership with Daimler
  • Traffic fatalities in China fall to 73,500 in 2008: report
  • Japan races to build a zero-emission car
  • China's Foton says clean energy car factory opened in Beijing

  • Boeing Develops Common Software To Reduce Risk For TSAT
  • USAF Tests Battlespace Information Solution On AC-130 Gunship
  • Harris Awarded Contract For USAF Satellite Control Network Program
  • LockMart Delivers Key Hardware For US Navy's Mobile User Objective System

  • Pentagon denies missile defense sales talks with India
  • BMD Watch: New missile for S-400 Triumf
  • What Motivates Iran And Russia On The S-300 Deal Part Two
  • Moscow Says Offer To On Joint Radar Use Still Stands

  • Ladybugs a sign of healthy olive trees
  • Half the planet could be hit by food crisis by 2100: study
  • China has arrested 60 over tainted milk scandal: police
  • World's first 'drought-tolerant' corn ready by 2010: Monsanto

  • Search halted, dozens still missing after deadly Guatemala landslide
  • More than 20 jailed over 2007 China bridge collapse: state media
  • Blasts at China fireworks factories kill 14: state media
  • New Study Examines Effects Of South Carolina Chlorine Gas Disaster

  • Solving The Mysteries Of Metallic Glass
  • Princeton Researchers Discover New Type Of Laser
  • Brazil Begins Mechanical Tests On Satellites
  • ThalesRaytheonSystems To Upgrade US Army Firefinder Radar

  • Marshall Sponsors Four Student Teams In FIRST Robotics Competitions
  • Jump Like A Grasshopper
  • Rescue Robot Exercise Brings Together Robots, Developers, First Responders
  • Honda unveils leg assist machine for elderly

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement