McAfee Research to SPARTA, 4/9/05
My new work email address will be <jim.horning@sparta.com>. <work@horning.net> should continue to reach me.
Items of interest in computer and network security, privacy, voting, public policy, etc., plus a few that just tickled my fancy or provoked my outrage.
Labels: Global Warming, Policy
Labels: Policy
Labels: Outrageous, Privacy, Risks
Labels: EVoting
IT dependence in the United States is evolving into a strategic center of gravity. This represents an inviting target to a potential adversary. While intrusions and hacks are not the exclusive province of large, hierarchical organizations, military and intelligence services possess an advantage over terrorist units for example in terms of resources, depth of personnel, and longer time-horizon reconnaissance and probes.
Moreover, as advanced industrial states such as the United States outsource their programming of software to countries such as India, Pakistan, China, Philippines, and Russia, the risk of rogue programmers using their access to commit cyber attacks rises. The possibility of abuse by hackers, organized crime agents, and cyber terrorists in countries not necessarily allied with the United States is great, and grows as more programming is sub-contracted to these countries for economic reasons.
We believe that scientific and engineering prowess in the United States and elsewhere, when properly harnessed and directed, can lead to improved security measures and better defenses (such as attack “indications and warnings”) against malicious intrusions. Technology, however, is no panacea.
In conclusion, we recommend improved vigilance on the part of our homeland defense authorities against ever more sophisticated and numerous cyber attacks and probes. Given the significant economic and other interests at stake, we recommend a more systematic and sustained effort to raise awareness at the grass roots level regarding security loopholes and vulnerabilities. These efforts, led by local and national political leaders and responsible officials in the United States, will be important in changing the way the populace currently views network security. Finally, we propose greater urgency be given to the recommendation in the U.S. National Strategy to Secure Cyberspace calling for an effective public/private partnership to develop realistic software security and related standards that manufacturers will accept.
Labels: Stimulating
Labels: Policy, Risks, Security, Stimulating
Labels: Assorted, Stimulating
Labels: Global Warming
Labels: Assorted
Labels: Privacy
Labels: Assorted
Labels: Policy
Labels: Privacy
Labels: Risks
Labels: EVoting, Outrageous, Policy, Risks
Labels: Assorted, Stimulating
Labels: Outrageous, Risks, Security
Labels: Policy
Labels: Assorted