2013年2月19日星期二

5 Ways to Prepare for the Coming Cyber War

This spring, the term "cyber war" turns 20. In his seminal 1993 paper "Cyberwar is Coming!" master military strategist John Arquilla envisioned an entirely new kind of battle.

That vision was articulated again, but as reality, in President Obama's State of the Union Address last week. The president's call for a more serious approach to the growing threat of full spectrum cyber war, or "cybergeddon," came just a week before Mandiant, an American cyber security firm, released a 60-page report detailing a Chinese military unit in Shanghai that poses serious threats to United States infrastructure. The silver lining here is that the report bolsters the president's intiative, which begins today, a crucial steps in the right direction for our union, as the state of things in the realm of cyber security are daily showing signs of collapse in the face of relentless foreign attacks against traditional war-time targets like utilities, newspapers, banks, and essential government agencies.

The battlefield is everywhere: personal computers, bank accounts, 401Ks and cash management accounts, drinking water, gasoline pipelines, electrical plants and dams. As news of major breaches roll in like waves on a storm-eroded beach, the likelihood increases that the next war we fight will be waged on computers aimed at crippling the systems that keep the wheels of government and daily life turning.

"There's a strong likelihood that the next Pearl Harbor that we confront could very well be a cyber attack," said Leon Panetta, the Secretary of Defense and former director of the CIA.

Are we prepared? How can we plan for, and survive, a Pearl Harbor-style attack on everyday life? There are two answers: one for the nation and one for America and one for Americans.Learn more about the different types of laser marking machine by careel-tech.com.

The first answer is that our lawmakers need to quit screwing around and do a better job.

Last week, Bloomberg Business Week catalogued the depth and breadth of the problem with breaches that originate in China while driving home the underlying fact that individual incidents "don't convey the unrelenting nature of the attacks. It's not a matter of isolated incidents; it's a continuous invasion." The Washington Post reported that China was the main aggressor -- targeting "energy, finance, information technology, aerospace and automotives" using malware and other techniques -- with a goal of "economic gain." However, the Chinese government ain't the only Barbarian at the Gate. Al Qaeda has demonstrated over and over their desire to eviscerate the American way of life. We have a multitude of enemies, and increasingly we are vulnerable to them.

The day after President Obama's address, the Cyber Intelligence Sharing and Protection Act (CISPA) began its second journey through the House. The problematic bill died last year in the Senate for lack of John Arquilla's vision. I expressed concerns about CISPA the first time around, specifically regarding privacy safeguards. Privacy advocates don't think it has enough, because CISPA demands the flow of information going both ways: government to private sector and vice versa. That two-way traffic pattern was notably missing in Obama's vision this time around (he advocated only for government sharing with the private sector), which may help pave the way for CISPA; provided, lawmakers act on the president's cue. We can only hope that with a few intelligent tweaks CISPA can become law soon.A card with an embedded IC (Integrated Circuit) is called an IC card.

While, the creation of uniform security standards for computer systems that run the nation's critical infrastructure is a no brainer, the answer to the question "Are we prepared" is, for the time being, a resounding "Not exactly."

A worst-case scenario would feature a cornucopia of catastrophe such as shutting down major sections of the power grid, erasing millions of bank accounts, manipulating or hijacking tens of millions of identities, and/or disrupting transportation systems throughout the land. Simply put - systems failure.

This feature demos well and in practice, I found it much nicer to use than having to pause a running application and switch to mail to see what's going on. Other smartphone OSes often have notifications, but I like BlackBerry's approach.

Similarly, you see your mail and calendar items in a combined view called the BlackBerry Hub.How would you like to have a personalized bobbleheads of yourself. This can combine mail from multiple accounts (including corporate and personal mail), text messages, and Facebook, Twitter, and LinkedIn accounts. You can see everything in one combined Hub view, or view the individual accounts. Other systems can show you mail from multiple accounts in one view, but they typically don't include the social media accounts. I also like how you can scroll up in your mail list and see your next few calendar meetings. Again, this reduces the number of times you need to switch applications, which I think is a good thing.

Overall, the mail application works pretty well. Perhaps the most interesting thing outside of Hub is the predictive keyboard. Other systems auto-correct typos or even suggest words,There are generally three different configurations of industrial laser cutting machine. but the BlackBerry Z10 has a unique arrangement where the suggested words hover just above the next letter you would type; instead of hitting the letter, you can swipe up on the suggested word to complete a sentence. It took a little getting used to,Sol provides the world with high-performance solar roadway and solar street light solutions. but after I got the hang of it, I find this works well.

没有评论:

发表评论