Have you installed the best door locks, burglar alarms and motion sensitive lights available? Is Spot, your Doberman/pit bull/wolf family pet awake, alert and a little hungry? Does your exterior resemble a bunker with siding that could withstand a force five hurricane? Then what’s that sound of something destroying your home? A possible answer; termites, the threat from within. Your mission critical data could be at as much risk.
“It’s all about the data” is a popular expression today. More and more, we’ve come to realize that data is the central building block for protecting, processing, sharing and storing information. And, as government and industry data owners learn to believe in these realities, they quite often decide to establish their own data centers to maintain control. On the surface, this might easily seem like the right thing to do, but it isn’t always the best course to achieve effective consolidation. Being aware of data center consolidation experience and realities can save organizations large sums of money and improve operations.
Cyber warfare. Critical infrastructure. Increased threat. Information assurance—or information security—is not the endeavor it used to be. The democratization of the Internet has had the same, albeit unwelcome, effect on criminal cyberspace activities. The extensive incorporation of information systems and networks into every facet of our lives has created a web of vulnerability across the spectrum of society. A threat can emerge from anywhere at any time in virtually any form.
Hurricanes here, manmade trouble there, disasters, disasters everywhere. Between Mother Nature running amok and human-borne disasters, Florida has its share of dangerous incidents. Fortunately, the state is putting new measures in place to protect its citizens, and sharing them with other states. A cutting-edge communications system has been developed to fill gaps in current capabilities and offer new resources to emergency responders, and it is ready to take on whatever the rest of 2008 (and beyond) decides to dish up.
The United Kingdom is securing its border by throwing an electronic net around the entire nation. The U.K. Electronic Borders program, known as e-Borders, aims at keeping track digitally of every individual who enters or exits the country.
Say the words “security clearance” in a conversation with defense contractors, and the vast majority has a tale to tell of long waits and missed opportunities. Those two words have people in Washington, D.C., talking too. For two years, the organizations in charge of the security clearance process have worked hard to improve it. But for many, the time for revamping the old is over, and the time for creating a new process has begun.
It’s a small world after all. As the Internet continues to connect peoples across the globe, individuals and groups drawn to destruction find new ways to wreak havoc on communications and services. Now, government leaders are coming together with each other and the private sector to form a united front and fight back because a vulnerability in any region can wreak havoc globally. A new multilateral federation is combating cyberthreats and cyberterrorism, creating greater security in developing networks and stopping dangers before they spiral out of control.
Chalk it all up to Melissa, a computer virus that spread rapidly on the Internet and shut down entire e-mail systems. For both the computing public and the information security industry, the Melissa virus—named for a Florida lap dancer, of all things—was a huge wakeup call.
U.S. military and government computer networks are under constant attack from a variety of shadowy online enemies. Until recently, these threats were individuals or small groups without any major financial support. But just as advances in technology are making solo hackers more dangerous, the nation also faces a growing cyber threat from well-funded and equipped groups backed by organized crime or nation-states.
The business community may be both a back door and a front door to espionage activities that threaten U.S. national security. Hostile governments always have viewed companies that do business with their government as a possible conduit for valuable intelligence. But now that threat is extended to those companies’ own activities in the global economy.
A small yet dedicated cadre of network and intelligence experts is helping keep the U.S. Army’s network safe in Europe—and by extension, worldwide—by ferreting out the bad guys in cyberspace. This unique group of civilian soldiers characterizes the threat by examining how adversaries ping and attempt to infiltrate networks, and then it seeks to find their motives. Rather than simply identifying the techniques enemies employ, the group provides the service with the context surrounding attacks so cyberwarriors are better prepared to defend the Army’s information infrastructure.
TThe U.S. Army’s ambitious transformation program is making headway with a series of successful tests and demonstrations. Designed to create an integrated family of vehicles, robots and weapons systems linked through a unified battlefield network, the program has been criticized as being overly complex and expensive. But Army officials hope that the recent tests, coupled with the initial deployment of components of the new system, indicate that the overall effort is on track.
The U.S. Army’s LandWarNet program is reinventing itself as it progresses toward its goal of full connectivity from the command level down to the individual soldier. Technologies deployed in support of warfighters in Iraq and Afghanistan are leading to changes in the overarching program, and capabilities introduced by the private sector are adding a new flavor to the Army’s contribution to the Global Information Grid. Even Web 2.0 capabilities are coming into play as they resolve long-standing problems and offer radically new ways of development.