Cybersecurity Today

 
 

Cyberattacks

Worms - exploits security vulnerabilities and spreads automatically through networks

Trojan Horses - malicious program that appears harmless

Viruses - a program that can copy itself and infect computers via networks or other medium

There’s also the risk that someone exploits a vulnerability and personally accesses private information such as account numbers.


Cybersecurity

Encryption - a way to send message from one machine to another in code; the only person able to decode the message is the person with the correct key; promotes confidentiality

Firewalls - constrain the use of systems and networks by blocking services, preventing malicious programs to enter a network; incoming packets that are flagged are not allowed through; disallows FTP connections to computers on the Internet

Antivirus Software - scans files and eliminates computer viruses and malicious software; refers to a list of known viruses that should be constantly updated

                                                    (source), (source)

Technological Examples and Background

Stats

(source)

Looking Globally

In the modern global economy, consumers, businesses and governments are all dependent on computing and information processing services that take place over information networks.

U.S. Domestic Policy Initiatives

Here are a few examples of current U.S. policy reactions to cyber security challenges today...

Obama’s Cyber Czar

In his first term President Obama created the position of Cybersecurity Czar: a senior White House Official who will have broad authority to develop strategy to protect the nation’s government-run and private computer networks.


The Rockefeller-Snowe Cybersecurity Act - National Cybersecurity Insurance

Senators Jay Rockefeller, D-WV, and Olympia Snowe, R-Maine, have introduced a bill that mandates President Obama, or his apointee, to report to Congress on “the feasibility of creating a market for cybersecurity risk management” within one year of the bill’s passing. 

(source)


The Lieberman Act

A bill introduced by Senator Joe Lieberman, I-Conn, seeks to establish a National Center for Cybersecurity and Communications under the Department of Homeland Security.

(source)






 

Journal of Information Management and Computer Security

Information systems, security issues, and decisions for small businesses

As the users of products and services provided by government and business that use our valuable private information like account numbers, contact numbers, social security numbers and more and more of our shopping and correspondence, being transmitted over cyberspace, consumers and citizens are at risk of becoming victims of cyberattack.  U.S. online retail reached $175 billion in 2007 and is estimated to grow to $334.7 billion by 2012. Online banking has become a new norm offered by almost all national banks, and 40% of dollars traded in the NASDAQ market are made over electronic communication networks.

                                                                               (source)


 

Consumers and Individuals

Networks and access points enable businesses to store information, transmit information to coordinate branches of global companies, carry out financial transactions, and manage large volumes of trade and customers.  This information and it’s proprietarity is crucial to modern business operations, privacy for consumers and company competitiveness.  A market for cyber security products like anti-virus software has emerged in the US, funding product development in the private sector.  More and more companies have IT teams today than ever before, but small businesses often struggle to find the funding to improve their information systems.


 

Businesses

Government

The government relies on networks for communications, control of infrastructure like power grids, and the processing and registry of data used in many of its services offered to citizens.  The department of defense stores volumes of classified material on computers within certain networks that is crucial for our intelligence and foreign policy.


 

Food for Thought!

Public school students are required to have vaccinations, because, if one student doesn’t get a vaccine and gets sick, that students puts everyone else at risk - Should the government could take a similar approach to cybersecurity? Mandating certain levels of protection for anyone who chooses to use the internet?  How could it go about implementing this?


 

Cybersecurity is a global problem - other countries struggle with the same vulnerabilities that the United States deals.  Recent cyberattacks (see Case Study 2!) across country borders demonstrate the global scope of this issue.  Here, we look at some examples of activity in the world of cybersecurity across the globe:


European Union

“Cyber Europe 2010” took place among member states in the EU in November 2010.  Since the EU member states are all part of a large cyberinfrastructure, they worked on establishing trust between members and used practice exercises to identify vulnerabilities in incident management.  The EU has also begun to prepare for mutual support procedures in the case of massive cyberattacks or incidents.  The United States could learn from this practice and begin to a establish a stronger contingency plan in the case of a large-scale attack. (source)


Malaysia

In Malaysia, an agency called “CyberSecurity Malaysia” is responsible for looking after the safety of Malaysia cyberspace.  CyberSecurity Malaysia conducts a large amount of services in order to improve the cyber-climate of the country.  They run a help center and encourage citizens to contact them to get in touch with a cybersecurity speacialist.  They run a training center and examination center for international certification of cybersecurity professionals under the belief that the country needs more professionals working in the field.  CyberSecurity Malaysia even develops educational content for various age groups (from students to office workers) and provide a free download for all interested parties.  This contrasts with the American model where there is not one single government-funded body responsible for overseeing cybersecurity, which can make it more difficult to take action or properly monitor cyberspace.  (source)


In general, most countries are struggling with issues of cybersecurity like the US.  Aside from a lack of funding and lack of publicity to the issue, there is not clear best practice for combatting cybersecurity concerns or improving cyberinfrastructure. 


China

China-based hackers have become a very significant part of the cybersecurity threat in the United States.  They have compromised security at Google and Yahoo, and have even allegedly successfully compromised portions of the US power grid.  Because of the global nature of the Internet and our information systems, we need to be aware of the issue of global cooperation in regards to cyberinfrastructure issues, as China’s current cyber-environment allows for these sorts of acts to be conducted.  For more on this story see NY Times.

But these parties traditionally have not worked together...