Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Cyber

Cybersecurity Tentacles Entwine Government

March 11, 2014
By George I. Seffers

It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

Chief Information Security Officers Support Continous Diagnostics and Mitigation Program

March 11, 2014
By George I. Seffers

Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.

World Complexity Creates Greatest Challenge

March 10, 2014
By George I. Seffers

The real challenge to keeping the homeland secure is dealing with the world's increasing complexity, Adm. Thad Allen, USCG, (Ret.), executive vice president of Booz Allen Hamilton, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday during his luncheon keynote address.

Technologies Offer Hope for Navy Operations

February 13, 2014
By Robert K. Ackerman

The U.S. Navy is looking to technology to help it fulfill its mission obligations in a time of severe budget constraints. Commercial technologies may provide effective solutions at a fraction of their military counterparts; innovations promise to add advanced capabilities to existing platforms; and new readiness plans may help economize deployments while increasing effectiveness. However, a lot of plans must fall into place for these technologies to take their places in the force.

 

Cyberspace Domination May Determine Conflict Victor

February 12, 2014
By Robert K. Ackerman

The realm of cyberspace, created by the United States, could be the undoing of its next major military operation unless the country regains control of its own creation. The virtual realm was let loose on the world where it was embraced by all manner of users, and some of them are counting on their expertise in it to overcome the overwhelming power of the U.S. military.

Naval Information Dominance Expands Its Reach

February 12, 2014
By Robert K. Ackerman

The U.S. Navy’s focus on information dominance is increasing along with its reach. Having organized the force along its lines, the Navy now is applying new operational tasks to its menu.

Ramping Up the Cyber Criminal Hunt

March 1, 2014
By George I. Seffers

U.S. Secret Service officials are establishing two new cybercrime task forces—in Cincinnati and Denver—that will enhance the agency’s ability to detect and investigate information technology-related crimes, including credit card theft, attacks on the banking and finance infrastructure and identity fraud.

Automated Diagnostics and Mitigation Protects Civilian Government Computer Networks

March 1, 2014
By Henry S. Kenyon

A Department of Homeland Security program is automating the cyber attack detection process to manage the bulk of intrusion detection and mitigation work in real time across the entire civilian government. This effort addresses a long-time shortcoming for detecting attacks and intrusions into government computer networks. Traditionally, this activity has been a time-consuming and manpower-intensive process that would take place days or weeks after the incident.

NATO Focuses on Terrorist Cyber Exploitation

March 1, 2014
By Robert K. Ackerman

NATO’s efforts to defend against terrorism now are focusing on cyberspace as a tool of terrorists instead of merely as a vulnerability for striking at alliance nations and their critical infrastructure. These efforts cover aspects of cyber exploitation that range from understanding terrorists’ behavior to how they might use social media.

Resolving the Critical Infrastructure Cybersecurity Puzzle

March 1, 2014
By George Kamis

The nation’s critical infrastructure and industrial-control systems have become such potential high-value targets for terrorists that their vulnerability threatens the fabric of society. And, as they increase in both importance and vulnerability, these systems cannot be protected using conventional information security measures.

The targets are electrical grids, transportation networks, water systems, oil/gas pipeline operations and other vital resources that serve in the interests of the U.S. economy and the public good—not to mention public safety—every day. Concerns are rising about reported increases in compromise incidents within these systems, coupled with advancements in the “sophistication and effectiveness of attack technology,” according to the Government Accountability Office (GAO). The number of incidents reported by federal agencies to the U.S. Computer Emergency Response Team has surged 782 percent from 2006 to 2012, the GAO reports.

Such attacks can “cause major economic losses, contaminate ecological environment and, even more dangerously, claim human lives,” according to a research report from the University of California, Berkeley. And, industrial control systems (ICS) lie at the heart of this vulnerability.

Global events have triggered the cautionary warnings. Among the most notorious was Stuxnet in 2010, which damaged uranium-enrichment centrifuges in Iran by infecting the country’s nuclear ICS network. In 2012, the Shamoon virus attacked Saudi Arabia’s state oil company, Saudi Aramco, replacing crucial system files with an image of a burning U.S. flag and overwriting essential data with what then-U.S. Defense Secretary Leon Panetta described as “garbage data.” Panetta added that the incident was the most destructive attack the business sector has seen to date, as more than 30,000 computers were rendered useless.

Pages

Subscribe to RSS - Cyber