myspace views counter
Ker, a Dinka man from south Sudan, blinded by his slave master in the north, comes to the USA for treatment. Learn about his journey.
Search

Search Talk Radio News Service:

Latest Photos
@PoliticalBrief
Search
Search Talk Radio News Service:
Latest Photos
@PoliticalBrief

Recommend Security in a Cyber World (Email)

This action will generate an email recommending this article to the recipient of your choice. Note that your email address and your recipient's email address are not logged by this system.

EmailEmail Article Link

The email sent will contain a link to this article, the article title, and an article excerpt (if available). For security reasons, your IP address will also be included in the sent email.

Article Excerpt:
The Internet has evolved into a tool of war. "The Georgia-Russian conflict, perhaps, that is the first instance of a military action containing a clear cyber component. Denial-of-service attacks were launched by Russia against Georgia," said Deputy Secretary for the Department of Homeland Security Paul A. Schneider during a forum on the nation's cyber security posture. "There were large swaths of Georgians that could not access any information about what was happening in their country. Government websites were defaced and the delivery of government information was seriously curtailed". To meet high-tech threats such as these the DHS has rolled out a series of safety measures called the Cyber Initiative, with the goal of strengthening the security of both federal and private sector networks, operating and defending in real time, and expanding counter intelligence capabilities against foreign governments. "Intelligence is one of our best preventative tools. I don't have to go into any detail, you all know the examples...up through World War II with the use of radar. We need to have similar types of tools in order to make better use of intelligence in the cyber domain in order to stop our adversaries before they can launch attacks against us,' said Schneider. Another important aspect of the initiative is to create a more centralized manner of dealing with cyber threats. The National Security Cyber Center has been recently created to coordinate protection across the federal networks, including the .mil and .gov domains. Schneider addressed concerns that the initiative could violate the privacy of citizens. "If someone is seeking to access our systems and possibly inject some sort of malware it is perfectly within our right to take a closer look and see whether that code poses a threat, just as you would ask a few questions from a stranger who would want to enter your house."


Article Link:
Your Name:
Your Email:
Recipient Email:
Message: