U.S. Slow on Stepping Up Its Cyber Security Measures

By

The United States government has made some progress toward improving cyber-security efforts, but it will take several more years for the government to fully install high-tech systems to block computer intrusions, according to an Associated Press report.

The National Cyber Security Division of the Department of Homeland Security has identified what it terms “two overarching objectives”:

  • To build and maintain an effective national cyberspace response system; and
  • To implement a cyber-risk management program for protection of critical infrastructure.

However, the AP’s report suggests that as the DHS “moves methodically to pare down and secure the approximately 2,400 network connections used every day by millions of federal workers, experts suggest that technology already may be passing them by.”

The report said that the department that’s responsible for securing government systems other than military sites is “slowly” moving all the government’s Internet and e-mail traffic into secure networks that will eventually “be guarded by intrusion detection and prevention programs.”

Progress has been slow, however. Officials are trying to complete complex contracts with network vendors, work out technology issues and address privacy concerns involving how the monitoring will affect employees and public citizens.

According to the AP, the WikiLeaks release of more than a quarter-million sensitive diplomatic documents underscores the massive challenge ahead, as Homeland Security labors to build protections for all of the other, potentially more vulnerable U.S. agencies.

“This is a continuing arms race and we’re still way behind,” Stewart Baker, former Homeland Security undersecretary for policy, told the Associated Press.

Officials believe the sensitive documents were stolen from secure Pentagon computer networks by an Army intelligence analyst.

“WikiLeaks has far deeper consequences, but whether the players are highbrow or lowbrow, a great deal of collaborative activity can be quickly undone by a handful of clever and determined people,” TechZone360 contributor Jon Arrnold reported last week.

 “There are very few private sector actors who depend on information security who think that installing intrusion prevention systems is sufficient protection against the kinds of attacks that we’re seeing,” Baker added.


Erin Harrison is Executive Editor, Strategic Initiatives, for TMC, where she oversees the company's strategic editorial initiatives, including the launch of several new print and online initiatives. She plays an active role in the print publications and TechZone360, covering IP communications, information technology and other related topics. To read more of Erin's articles, please visit her columnist page.

Edited by Tammy Wolf

Executive Editor, Strategic Initiatives

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More