Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Security upgrades needed with growing cyberwar threats

Oct 7, 2011 | ITNews.com

Countries need to take steps to upgrade critical infrastructure for protection from attacks by cybercombatants or rival countries conducting cyberwarfare, security experts said at a panel discussion this week.

Critical infrastructure such as industrial systems, transportation and power grids are easy targets for cyberattacks and people responsible for IT and national security are worried about the future, said Eugene Kaspersky, founder of Kaspersky Lab, during a panel discussion that was part of the company's Endpoint Security 8 launch event in New York. Cyberattacks could cause massive damage to the tune of billions of dollars, he said.

Some attacks in recent memory such as Stuxnet, which hit industrial systems, and the Blaster worm, which possibly hurt the electrical grid on the U.S. East Coast, were damaging and exposed the weaknesses of national infrastructures, Kaspersky said. Countries like North Korea, China, the U.S. and South Korea, and organizations like NATO are establishing cybermilitary units to protect infrastructure and respond to attacks.

"The question is this year, next year, do we expect to see similar incidents? Yes or no? The answer is obvious. Yes. It will happen," Kaspersky said.

Systems need to be built around a secure OS environment and government regulation is needed, especially for industrial software design, panelists said. Stuxnet wreaked havoc because of dated software design and poorly trained software engineers. Attack techniques are getting more sophisticated, but even simplistic hack techniques can hurt infrastructure.

"The interesting thing about Stuxnet is that the attack itself against Siemens was incredibly simple," said Gary McGraw, CTO of Cigital. "It used to work in online games in 2004."

But today's online games are much more advanced in tackling security threats, while the industrial systems still have a ways to go, McGraw said.

"You can't hack 'World of Warcraft' with this attack, but you can hack nuclear power plants," McGraw said.

In addition to protecting their interests, countries also need to work together to protect infrastructure from cybercrime. One idea proposed by Kaspersky was the establishment of an international cyberpolice unit to fight cybercrime.

"I call it Internet Interpol," Kaspersky said.

Online criminals are well-organized globally, and many attacks are carried out by script kiddies. The Internet has no borders, so there has to be international involvement to keep cybercriminals in check, Kaspersky said.

"They have much more money than IT engineers and security software engineers," Kaspersky said.

Some organizations hacked this year include Sony, Lockheed Martin, the U.S. Department of Defense, NASA, Google, the U.S. Central Intelligence Agency, Citibank and the European Commission.

Companies can fight back with better processes and technologies to identify and mitigate threats, said panelist Steve Adegbite, director of cyber-innovations at Lockheed Martin Information Technology.

Hackers go through a series of key events to execute an attack, and companies need well-trained engineers and processes to identify and disrupt potential threats, Adegbite said.

Beyond protecting endpoints, data on the cloud also needs to be protected. Banks of data are moving online, and if there's economic gain, hackers will target the cloud, Adegbite said.

"We're going to have to get faster, we're going to have to get better technology, and we're going to have faster and better processes," Adegbite said.

Many businesses will likely not move large data banks to the cloud, but retain important data at the endpoint, some panelists said.

Some suggestions on how to secure data in the cloud were also proposed at the Interop trade show this week in New York.

IT managers can set up rights for mobile devices to access certain documents in the cloud based on location, said Sujai Hajela, vice president and general manager of Cisco's wireless networking business unit in the network services group.

For example, if a doctor logs in from a hotspot such as a cafe, access can be limited to email, but not secure documents such as electronic medical records, Hajela said.

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/