• October 31, 2014
  • Welcome!
    |
    ||
    Logout|My Dashboard

Queens Chronicle

Preparing for cyber warfare

Print
Font Size:
Default font size
Larger font size

Posted: Tuesday, July 22, 2014 1:00 am | Updated: 4:36 am, Tue Jul 29, 2014.

(BPT) - Recently, emboldened Russian hackers breached the systems of power plants across the United States and Western Europe. In June, Chinese hackers attempted to gain access to several U.S. power plant operation control systems. And in May, the Department of Homeland Security announced hackers had actually gained control of a mechanical device at an unnamed U.S. energy facility.

These brazen cyber attacks on a critical infrastructure have raised new alarms within the information and homeland security sectors. Dr. Jane LeClair, COO at the, National Cybersecurity Institute notes that these types of incidents, in which hackers exploit  vulnerabilities within the country’s digital infrastructure, are referred to in military parlance as “prepping the battlefield.” Following other recent high profile data breaches at private companies such as Target, Michaels, and eBay, and the digital bomb that was left in NASDAQ in 2011, the question is being raised – is America prepped to handle a contemporary cyber war?

While there may be no definitive answer to that question right now, it’s apparent the U.S. needs to look beyond the basics in cybersecurity like never before, says Dr. Sherly Abraham, program director for cybersecurity at Excelsior College. She emphasizes the need for a more proactive approach and comprehensive situational awareness.

Traditionally, the information security community has reacted to a cyber attack or discovery of a particular malware by developing an algorithm to identify the virus’s signature and then creating anti-virus software to prevent a future breach. But many in the security community argue in favor of training cyber professionals to “think like a hacker,” says LeClair. Many higher education institutions are now offering cyber programs that detail both offensive and defensive approaches.

The need for greater situational awareness and increased security education and training may seem like common sense, yet these are often underutilized or even ignored. Experts are urging private companies, organizations and governments to become attentive to the security strengths and weaknesses of their entire operational network - evaluating, monitoring and securing each device, user and service.

A strengthened posture of situational awareness also means taking into account individual weaknesses. Human error often is an organization’s largest cybersecurity vulnerability. Focusing on the human-side of the equation can help stave off social engineering, the criminal practice of using deception to trick an employee into giving up access to a company’s system or confidential information via clicking on a link that contains a virus or malware.

In fact, greater situational awareness and a proactive approach may have been able to prevent at least a few of the past data breaches. Data alerts surrounding the use of memory-scraping malware attacks against credit card companies were first issued in April 2013. A few days prior to Thanksgiving that year, malware introduced into Target’s security and payment system led to the theft of 40 million customer credit card numbers.

Did the merchant take the data alert warnings seriously enough? Even if they had, would this have prevented cyber intruders both at home and abroad (where there are reports of state-sponsored hacking efforts) from perfecting their craft? Industry analysts and commentators will continue to debate the issue. But what is certain is that better education and training can improve the likelihood that cyber-defenders not only heed attack signs in the future, but develop the necessary measures to build defenses against them before they are created in the first place.

Welcome to the discussion.