I'm not sure this is a war we are ready to fight, let alone win. Yikes.
Somebody unleash our cyber-Army (you know, the Wii generation) back on China!
Here are the players:
1) The antagonists ...
Pentagon: Cyberattacks appear to come from China
The Defense Department said Monday that cyberattacks in 2007 against computer networks operated by governments and commercial institutions around the world "appear" to have originated within China -- marking the first time the Pentagon has so visibly pinned the blame against China for cyberattacks.
These intrusions require many of the skills and capabilities that would also be required for computer network attack. Although it is unclear if these intrusions were conducted by, or with the endorsement of, the [People's Liberation Army] or other elements of the PRC government, developing capabilities for cyber warfare is consistent with authoritative PLA writings on this subject."
2) Our front line of defense (LOL ...) ...
Users continue to compromise federal computer networks, says tech community
More than half of government IT professionals know of violations in security protocols, according to a recent survey. Funding challenges hinder agencies' ability to put proper security measures in place, while lack of systems and requirements standardization creates confusion in the market, said an industry official.
Of 474 federal IT professionals, 56 percent reported witnessing or hearing about a security violation, according to a survey by Washington-based research firm Pursuant on behalf of Quest Software Public Sector.
3) And finally, those (DHS) considering our cybersecurity "satisfactory" ...
DHS gives itself a 'C' for cybersecurity
The top ranking official in the Homeland Security Department's national protection division called the agency's efforts in cybersecurity satisfactory, assigning a grade of 'C' during congressional testimony Thursday. But members of Congress called the grade inadequate, emphasizing the need for better collaboration with agency technology leaders, real-time response to system attacks, and metrics that measure the ability to protect networks from specific threats rather than system compliance.
Educating our next generation of leaders ... are you prepared?
... devoted to online education in emergency preparedness and homeland security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment