Continued from page 1
While many things have changed in the post-9/11 world, defenses against cyber-terrorism haven’t. Many organisations are still relying on the same defenses developed in the mid-to-late 1990s, said Anup Ghosh, founder and chief scientist of Invincea. “We are defending against 21st century attacks with 20th century technology,” Ghosh said.
The Defense Department and DARPA’s (Defense Advanced Research Projects Agency) focus on fighting terrorism inhibited innovation in information security, according to Ghosh. Foreign cyber-attackers began penetrating US networks, but instead of publicising evolving threats and tactics, the government classified the details.
A few years ago, attacking critical infrastructure was just another “movie idea” — something no one really thought would happen — but last year’s Stuxnet Trojan attack was a “wake-up call,” F-Secure’s Hypponen said. Until Stuxnet was discovered, no one realised these kinds of infrastructure attacks were already happening.
“Look at Die Hard,” said Hypponen. He noted that as everything has become connected to the Internet and computers have become more ubiquitous, the movie plot has become reality.
But the security situation isn’t completely bleak. We have made some progress, especially in the areas of information sharing and inter-agency cooperation.
The private sector has done a good job communicating with the government about protecting the critical infrastructure, Todd Davis, CEO of LifeLock, told eWEEK, during a training summit for law enforcement officials at the New York Stock Exchange. The goal was to bring “front-line” law enforcement and specialised agencies together to share information on what techniques criminals were using and what tools were available for the good guys, he said.
The Defense Industrial Base Cyber Pilot is an example of how the industry is working with the Department of Defense to share classified and sensitive data about cyber-attacks. The information collected in a three-month pilot program with 20 companies helped stop “hundreds of attempted intrusions,” by identifying malware signatures, according to Deputy Defense Secretary William Lynn. The pilot will be expanded to include the rest of the industry and key areas of critical infrastructure, Lynn said.
“We are in so much better space than we used to be,” LifeLock’s Davis said, adding that now was “one of the best times for collaboration.”
In addition, advances in technology have made it much easier and faster for law enforcement and business to identify potential problems. Organisations can deploy forensics and monitoring tools to detect anomalous activity in near-real-time, while police officers have access to more information about drivers during routine traffic stops, Davis said.
The goal of all these efforts? To use technology to help stop cyber-attacks.
Page: 1 2
After relocating from California to Texas in 2020, Oracle's Larry Ellison now reveals plan to…
Share price hit after Meta admits heavy AI spending plans, after posting strong first quarter…
For third time Google delays phase-out of third-party Chrome cookies after pushback from industry and…
Elon Musk firm touts cheaper EV models, as profits slump over 50 percent in the…
Bad news for Tim Cook, as Counterpoint records 19 percent fall in iPhone sales in…
TikTok pledges to challenge 'unconstitutional' US ban in the courts, after President Joe Biden signs…