Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 3000 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

RSA: Act now on cyberwar, security experts caution

February 16 2011

SAN FRANCISCO -- The time to act on cyberwar is now, several experts at the RSA Security Conference held here this week said.

Disagreements may persist on what constitutes an overt act of cyberwar or how to recognize such an act, they admitted. And questions also remain on whether cyberwar is an accurate term to describe deliberate attacks against critical infrastructure targets by enemies that may or may not be state-sponsored.

Even so, the time has arrived for the U.S. to develop a strategic plan for dealing with threats against critical infrastructure and those targeting U.S. economic interests, they said.

"I don't think we are in a cyberwar right now," said Michael Chertoff, former secretary of the Department of Homeland Security and an independent consultant. "But we would be foolish not to recognize the potential," Chertoff said during a keynote panel discussion at the trade show. "There is no doubt that cyber warfare is going to be within the domain of conflict," very shortly.

Chertoff and other panelists, including former National Security Agency Director Mike McConnell and security guru Bruce Schneier said that while there has been a lot of hype surrounding the issue, the core concerns remain unchanged.

"Cyberwar is a sexier term than a cyberattack," so a lot of people have been throwing the term around, Schneier said. "It's being talked about because that's what sells," Schneier said. "There's a lot of push for budget and power [within organizations] and overstating the threat is a good way to get people scared."

But the fact is that more "warlike tactics," including politically motivated hacking and attacks against critical infrastructure, are increasingly taking place, he said. "When you are attacked in cyberspace, who defends you?" he said. "You don't know who is attacking you and why," and this uncertainty can be a problem.

According to McConnell, the real challenge is to define the right legislative framework for dealing with the problem. Attacks against U.S. government and commercial targets leech terabytes' worth of intellectual property out of the country on a regular basis, he said.

Such espionage is every bit as insidious as any threat, he said. "The point I want to highlight is, let's not sell short the idea of electronic espionage," he said. "We as a nation need to be thinking about it," McConnell said.

The very nature of the Internet makes it hard to impose the same sort of rules that exist in the physical realm, the panelists said. Attacks on the Internet can be carried out with the same level of efficacy by state-sponsored actors and criminal groups. Unlike in the physical realm, the same attack tools are available and can be used by everyone.

Attacks in cyberspace are increasingly getting "democratized," Schneier said. The key is in knowing how to respond.

Expecting market forces to somehow recognize the threat and respond to it in a strategic manner is unrealistic, the panelists said. While private companies are responsible for a large portion of the Internet infrastructure, they need an incentive to be more proactively involved in defending it.

What needs to be decided is how much of role the federal government should take in enforcing better security and how much the private sector can be incented into taking the right measures, Chertoff said. The crucial issue is to figure out "how to handle the need to defend against high-end attacks. We need to understand who has the responsibility to do what, and when," he said. "We need to have some sort of declared policies," about response at a strategic, national level.

Discussions about a national strategy for cyberwar have assumed greater importance recently. Google's admission last year that its servers were compromised by attackers based out of China, and the attacks against critical targets in Estonia a few years ago have brought into sharp focus how devastating organized attacks can be.

"We are at the brink of a cyberwar arms race," Schneier said. "There's too much of a chance of this going off accidentally," he said, while stressing the need for international agreements to determine rules of engagement.

What's vital is that the government doesn't wait for a catastrophic event to happen before taking action, McConnell said.

Sours From

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html