14 June 2012

Centralized Decision-making Is Essential to Cybersecurity


American politicians love to bash the Europeans. A common refrain during many campaigns here in the states is ‘my opponent’s policies will make us more like Europe’, as if the entire continent was a monolithic monster spewing forth a subversive socialist agenda.................
When it comes to a unified strategy to address cybersecurity, it appears that Europe is moving forward with a more concerted effort to address the issue..............
Cybersecurity has received increased attention from recent presidential administrations. While the handful of cybersecurity bills currently being considered by the US Congress have largely avoided the partisan rancor of more mainstream legislative initiatives, progress continues at a glacial pace while would-be cybercriminals and terrorists hone their skills.
The concept of cyber-terrorism is very real, hard to define, and even more of a challenge to combat. After all, what exactly does the word ‘cyber-terrorism’ mean? Does it include internal actors such as domestic saboteurs? Does it include only independent groups – sometimes with state-sponsored affiliations? Is it when a country like China steals IP from enterprises, or allegedly places malware on SCADA systems connected to the power grid?.............
What constitutes ‘terrorism’ is often a matter of perspective. When someone planted the Stuxnet malware at an Iranian nuclear facility – setting the country’s nuclear program back year, what if the Iranian nuclear program really was intended to provide sustainable energy for the country? If so, then Stuxnet could be viewed as a terrorist attack meant to weaken the nation’s critical infrastructure............
The objectives of any security program are to protect, prevent, or limit the damage to a particular asset. The role of government with respect to terrorism appears to be the same. If we can put our trust in a prime minister or president to execute our military and police functions, then there should be no reason why this can’t be extended to defense in the digital world, provided there is a system of checks and balances inherent in most representative governments..............

Click here to read more .... 

Solutions : www.xcyss.in

No comments:

Post a Comment