Monday, June 27, 2011
Pentgon is Reading this Blog
The Pentagon must be reading my blog. Interestingly enough, the Pentagon is back-pedaling on its threshold for declaring war due to cyber-attacks. According to CBS News, the U.S. military may never have a direct answer on when to fire back against a computer-based attack. The Pentagon is developing different scenarios for its cyber war plans. These scenarios are intended to define the rules of war as they apply to cyber war. The scenarios do include launching attacks from unknowing civilian computers attacking civilian computers. Critics of the Pentagon argue that it is not progressing fast enough in determining what constitutes a cyber-attack. Pentagon spokesperson reminds these critics that the US is constantly being barraged with attacks from countries such as China. However, much of what the US is doing to protect its cyber infrastructure remains secret and, therefore, is not open to the public. The Pentagon did express that retaliation to cyber-attacks would most likely be in kind. In other words, the US intends to fight fire with fire.
Sunday, June 19, 2011
Evolution of Cyber Crime
In the beginning, cyber security issues began as purchasers of software attempted and succeeded at breaking the anti-copy seal of software. Software was purchased by a single individual and then boot leg copies were made and distributed to friends and relatives. Software developers made several attempts to create a “seal” that would prevent copying the software, only have someone, somewhere break the code nd distribute the software freely for use by non-purchasers. The difficulty to break the seal became ever increasingly more difficult as time wore on. Nowadays, software is protected by a “key” which consists of several apparently randomly generated alpha-numeric key codes which will unlock the software for use.
Monday, June 13, 2011
War Over Cyber Security?
Another apparently significant breach of information security was reported this week. The International Monetary Fund was hacked with some files being transferred by unknown parties. However, an identified security expert indicated the hackers were believed to be connected to an unspecified government. In addition, this week, a Fox News story reports that the US Pentagon indicates that computer sabotage coming from another country can constitute an act of war. The news story raises several questions. For example, can an otherwise anonymous person, masquerading as a foreign government agent hack into the US governments computers, commit sabotage, and cause a war? Alternatively, can a foreign government agent, posing as an anonymous civilian hacker, do the same with the same results? What are the retaliation options for the US government?
Friday, June 3, 2011
Learning Something New
If you want to learn something new, read an old book. A British Member of Parliament (MP) is likening internet security to the imposition of highway and roadway traffic laws. A hundred years ago, with the advent of the automobile, Americans were given the freedom to explore and travel beyond the norms of their times. But with this new freedom came a responsibilities that needed to be learned through the automobile accident. As a result, rules of the road were developed, Stop signs, traffic lights, speed limits and other traffic control measures. The PM is linking this evolution with the recently found freedoms that internet travel is allowing people’s all over the world. New rules will need to be devised to assure personal safety whilst traveling through the internet. The PM argues new regulations are needed while assuring that Big Brother is not interjecting himself into our private lives.
Protecting Critical Digital Assets
Hi Everyone & Welcome to my new blog site.
This blogging site is to help me become aware of protecting critical digital assets (CDAs).
I am employed at a nuclear plant which generates electricity. Many of the controls for the reactor plant and secondary side (electric generator plant) are digital control systems (DCS). For cyber security reasons we designate some of these as CDAs. These are controls which are computers (programable logic computers) or other platforms which need to be isolated from unauthorized use.
My intent here is to have you provide me with some perspectives external to my organization.
Hopefully, I can provide you with some insights too.
Robert Nilsson
Assignment 1.4
This blogging site is to help me become aware of protecting critical digital assets (CDAs).
I am employed at a nuclear plant which generates electricity. Many of the controls for the reactor plant and secondary side (electric generator plant) are digital control systems (DCS). For cyber security reasons we designate some of these as CDAs. These are controls which are computers (programable logic computers) or other platforms which need to be isolated from unauthorized use.
My intent here is to have you provide me with some perspectives external to my organization.
Hopefully, I can provide you with some insights too.
Robert Nilsson
Assignment 1.4
Subscribe to:
Posts (Atom)