WASHINGTON (AP) -- The federal government is protecting 20 types of colorful coral by putting… [more...]
Science & Technology
- Control Spider Mites Naturally
- Tuolumne County Business Council Applauds Innovation Lab
- Water Loss In The Trillions
- Innovation Plan Released
- Collecting And Using Greywater
- NASA's new giant rocket system passes milestone
- Forest Service decides future of burned trees
- Japan lab unable to replicate stem cell results
- Official: Puerto Rico parrot births mark comeback
- Southern California prepares for big storm surf
- UN panel: Global warming human caused, dangerous
- Activists file complaint over 25 monkey deaths
- Napa rattled by 3.9 aftershock
- Hawaii volcano lava flow could threaten homes
- Last Call: Pluto bound craft crosses Neptune orbit
- Greek archaeologists enter large underground tomb
Have an internet problem? Curious about something?
(BPT) – Recently, emboldened Russian hackers breached the systems of power plants across the United States and Western Europe. In June, Chinese hackers attempted to gain access to several U.S. power plant operation control systems. And in May, the Department of Homeland Security announced hackers had actually gained control of a mechanical device at an unnamed U.S. energy facility.
These brazen cyber attacks on a critical infrastructure have raised new alarms within the information and homeland security sectors. Dr. Jane LeClair, COO at the, National Cybersecurity Institute notes that these types of incidents, in which hackers exploit vulnerabilities within the country’s digital infrastructure, are referred to in military parlance as “prepping the battlefield.” Following other recent high profile data breaches at private companies such as Target, Michaels, and eBay, and the digital bomb that was left in NASDAQ in 2011, the question is being raised – is America prepped to handle a contemporary cyber war?
While there may be no definitive answer to that question right now, it’s apparent the U.S. needs to look beyond the basics in cybersecurity like never before, says Dr. Sherly Abraham, program director for cybersecurity at Excelsior College. She emphasizes the need for a more proactive approach and comprehensive situational awareness.
Traditionally, the information security community has reacted to a cyber attack or discovery of a particular malware by developing an algorithm to identify the virus’s signature and then creating anti-virus software to prevent a future breach. But many in the security community argue in favor of training cyber professionals to “think like a hacker,” says LeClair. Many higher education institutions are now offering cyber programs that detail both offensive and defensive approaches.
The need for greater situational awareness and increased security education and training may seem like common sense, yet these are often underutilized or even ignored. Experts are urging private companies, organizations and governments to become attentive to the security strengths and weaknesses of their entire operational network – evaluating, monitoring and securing each device, user and service.
A strengthened posture of situational awareness also means taking into account individual weaknesses. Human error often is an organization’s largest cybersecurity vulnerability. Focusing on the human-side of the equation can help stave off social engineering, the criminal practice of using deception to trick an employee into giving up access to a company’s system or confidential information via clicking on a link that contains a virus or malware.
In fact, greater situational awareness and a proactive approach may have been able to prevent at least a few of the past data breaches. Data alerts surrounding the use of memory-scraping malware attacks against credit card companies were first issued in April 2013. A few days prior to Thanksgiving that year, malware introduced into Target’s security and payment system led to the theft of 40 million customer credit card numbers.
Did the merchant take the data alert warnings seriously enough? Even if they had, would this have prevented cyber intruders both at home and abroad (where there are reports of state-sponsored hacking efforts) from perfecting their craft? Industry analysts and commentators will continue to debate the issue. But what is certain is that better education and training can improve the likelihood that cyber-defenders not only heed attack signs in the future, but develop the necessary measures to build defenses against them before they are created in the first place.
Daily News from the Kim Komando Show