Items Tagged with "National Security"
March 28, 2012 Added by:Joel Harding
What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?
March 27, 2012 Added by:Pierluigi Paganini
While I understand the defensive approach, I believe that such behavior could have serious repercussions on the global market. In terms of security, little will change by breaking strategic alliances. Cyber attacks will continue and will increase in frequency and efficiency...
March 27, 2012 Added by:Headlines
“CyberPatriot has introduced the area of cyber defense to tens of thousands of students across the country, and they’ve embraced the opportunity to learn and develop the skills to be successful in a field critical to America,” said Bernie Skoch, CyberPatriot Commissioner...
March 27, 2012 Added by:Jeffrey Carr
While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...
March 26, 2012 Added by:Headlines
Northcom's responsibility in the cyber domain "is consequence management in the event of a catastrophic cyber attack on this country. Northcom could certainly be called upon to provide support to civil authorities in the recovery. But we think our role is broader..."
March 22, 2012 Added by:Bill Gerneglia
Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century. The opportunity for cyber attacks grows daily...
March 22, 2012 Added by:Headlines
“It is critical that we strengthen our cybersecurity posture, and we urge Congress to recognize the need for new tools to more effectively prevent and respond to potential cyber attacks on the homeland..."
March 21, 2012 Added by:Headlines
“I think the capabilities are available in cyber to virtually cripple this nation, to bring down the power grid system, to impact on our governmental systems, to impact on Wall Street on our financial systems, and literally to paralyze this country..."
March 21, 2012 Added by:Rafal Los
Unfortunately, I suspect that if this actually happened at the Pentagon a quarter million times a year, America would be in a much, much worse position than we are today. Our battle plans would be compromised, launch codes, schematics, and covert identities would be compromised...
March 20, 2012 Added by:Headlines
"Stuxnet showed that airgapping is not a perfect defense. Even in secure systems, people stick in their thumb drives, they go back and forth between computers. They can find vulnerabilities that way. If people put enough attention to it, they can possibly be penetrated..."
March 19, 2012 Added by:Headlines
"It’s a very complex threat—pervasive, evolving, highly intelligent, very adaptive to our countermeasures. It ranges from nation-states to non-nation-state actors, criminal elements and individual hackers... It’s a wide and varied threat we have to defend against..."
March 13, 2012
The INSA white paper provides critical analysis of current cloud computing adoption best practices, and discusses potential cost savings, likely impacts on government organizational culture, potential deployment models and necessary security measures...
March 09, 2012 Added by:Stefano Mele
Developments in Chinese network operations applications and research and development point to a nation fully engaged in leveraging all available resources to create a technically advanced ability to operate in cyberspace as a means of meeting military and civilian goals...
March 08, 2012 Added by:Headlines
"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."
March 08, 2012
Cybersecurity is now expanded to address the following: combined power systems, information technology and communication systems in order to maintain the reliability, the physical security of all components, and the reduced impact of coordinated cyber-physical attacks...
March 05, 2012 Added by:Pierluigi Paganini
The internal investigation at NASA also revealed that almost none of the agency's portable devices are encrypted, and that at least one of the stolen laptops contained algorithms to command and control systems for the International Space Station...