Political Wrinkles  

Go Back   Political Wrinkles > General Forum > News & Current Events
Register FAQDonate PW Store PW Trivia Members List Calendar Search Today's Posts Mark Forums Read

News & Current Events Discuss US works to secure networks as hackers advance at the General Forum; Well like the rest of our infrastructure the Govt./Military PC systems need work to get them up to date. I ...

Reply
 
LinkBack Thread Tools Display Modes
  #1 (permalink)  
Old 12-05-2010, 11:47 AM
mlurp's Avatar
PW Enlightenment
 
Join Date: Mar 2008
Location: Flatlands
Gender: Male
Posts: 37,487
Thanks: 19,199
Thanked 10,921 Times in 8,518 Posts
Default US works to secure networks as hackers advance

Well like the rest of our infrastructure the Govt./Military PC systems need work to get them up to date. I heard yesterday that the reason we aren't attacking WikiLeaks is because our network hacker's don't want to give away the tricks we use to other's who we fear more. Like Russia, China and the likes.

Now I understand why!!!!

Quote:
US works to secure networks as hackers advance


By LOLITA C. BALDOR, Associated Press Lolita C. Baldor, Associated Press – Sun Dec 5, 5:24 am ET.

WASHINGTON – It will take several more years for the government to fully install high-tech systems to block computer intrusions, a drawn-out timeline that enables criminals to become more adept at stealing sensitive data, experts say.

As the Department of Homeland Security moves methodically to pare down and secure the approximately 2,400 network connections used every day by millions of federal workers, experts suggest that technology already may be passing them by.

The department that's responsible for securing government systems other than military sites is slowly moving all the government's Internet and e-mail traffic into secure networks that eventually will be guarded by intrusion detection and prevention programs.

Progress has been slow, however. Officials are trying to complete complex contracts with network vendors, work out technology issues and address privacy concerns involving how the monitoring will affect employees and public citizens.

The WikiLeaks release of more than a quarter-million sensitive diplomatic documents underscores the massive challenge ahead, as Homeland Security labors to build protections for all of the other, potentially more vulnerable U.S. agencies.

"This is a continuing arms race and we're still way behind," said Stewart Baker, former Homeland Security undersecretary for policy.

The WikiLeaks breach affected the government's classified military network and was as much a personnel gap as a technological failure. Officials believe the sensitive documents were stolen from secure Pentagon computer networks by an Army intelligence analyst.

The changes sought by Homeland Security on the government's nonmilitary computers would be wider and more systemic than the immediate improvements ordered recently by the Departments of Defense and State as a result of the WikiLeaks releases. Those changes included improving the monitoring of computer usage and making it harder to move material onto a portable computer flash drive or CD.

"There are very few private sector actors who depend on information security who think that installing intrusion prevention systems is sufficient protection against the kinds of attacks that we're seeing," Baker said.
US works to secure networks as hackers advance - Yahoo! News

510 Comments and some video's at the site.
__________________


Improvise - Adapt - Over Come...
Reply With Quote
The Following User Says Thank You to mlurp For This Useful Post:
  #2 (permalink)  
Old 07-08-2017, 01:04 PM
Banned
 
Join Date: Dec 2011
Location: Okolona
Gender: Male
Posts: 2,220
Thanks: 1,645
Thanked 609 Times in 522 Posts
Angry Re: US works to secure networks as hackers advance

UPDATE:

Hackers tryin' to trigger nuclear meltdown...

Hackers breached a dozen US nuclear plants, reports say
Fri, 07 Jul 2017 - Operating firms were targeted by malicious code hidden in fake job applications, US media report.
Quote:
Hackers breached at least a dozen US power plants in attacks in May and June, US media report, citing intelligence officials. The targets included the Wolf Creek nuclear facility in Kansas, according to several reports. An urgent Department of Homeland Security (DHS) report indicated a foreign power, possibly Russia, was responsible, the New York Times said. The DHS document carried the second-highest threat rating, the Times said. Wolf Creek Nuclear Operating Corp declined to say if the plant was hacked but said there had been "no operational impact" at the plant. "The reason that is true is because the operational computer systems are completely separate from the corporate network," spokeswoman Jenny Hageman told Reuters.


The Wolf Creek plant in Kansas was reportedly among those attacked

In a joint statement with the FBI, a spokesman for the Department of Homeland Security said there was "no indication of a threat to public safety". The hackers appeared to be attempting to map out computer networks for future attacks, according to the DHS report seen by the Times. They sent highly targeted emails to senior engineers at operating firms behind the nuclear plants, mimicking job applications but laced with malicious code, the newspaper said. Officials told the Times that the techniques resembles those used by Russian specialists linked to previous attacks on energy facilities.

US investigators accused Russia-based hackers of being behind a 2015 attack that caused blackouts across Ukraine. Hacking is a tool increasingly deployed by nation states to infiltrate foreign industrial networks. The US and Israel reportedly used the now-infamous Stuxnet worm in an attempt to damage an Iranian nuclear facility. The worm attacked the facility's nuclear centrifuges by overriding the system and instructing them to spin much faster than intended, reportedly causing severe physical damage.

http://www.bbc.com/news/world-us-canada-40538061
See also:

Could new data laws end up bankrupting your company?
Thu, 06 Jul 2017 - The EU General Data Protection Regulations (GDPR) start next year, but many firms are ill prepared.
Quote:
The European Union's General Data Protection Regulation (GDPR) comes into force in May 2018, radically changing the way organisations have to look after our personal data. Failure to comply could lead to huge fines, yet many businesses are far from ready. Here's why you should care.


Many companies are in full "panic" mode, says KPMG's Mark Thompson

What is GDPR exactly?

A new EU regulation governing how organisations should handle and protect our personal data. Many of the stipulations are already covered by the UK's Data Protection Act; but simply put, organisations need to keep records of all personal data, be able to prove that consent was given, show where the data's going, what it's being used for, and how it's being protected. Accountability is the new watchword. If personal data gets stolen after a cyber-attack, companies have to report the breach within 72 hours of realising it. And the definition of personal data has been extended to include extra categories such as your computer's IP address or your genetic make-up - anything that could be used to identify you.

Why should businesses care?

Non-compliance with the GDPR could lead to huge fines of 20 million euros or 4% of global turnover, whichever is the greater. For a company like tech giant Apple, that could amount to billions of dollars. Consult Hyperion, an electronic financial transactions specialist, forecasts that European financial institutions could face fines totalling 4.7bn euros (4.1bn; $5.3bn) in the first three years following the GDPR coming into force. Anthony Lee, a partner in law firm DMH Stallard, says: "Talk Talk [a UK telecoms company] was fined 400,000 for failing to prevent the 2015 customer data breach, but under the new regime fines could be many multiples of this."


Is this your firm's attitude to GDPR?

However, a spokesperson for the UK's Information Commissioner's Office (ICO) - the body responsible for enforcing GDPR in the UK - says: "The new law equals bigger fines for getting it wrong but it's important to recognise the business benefits of getting data protection right. "There is a real opportunity for organisations to present themselves on the basis of how they respect the privacy of individuals - and gain a competitive edge. "But if your organisation can't demonstrate that good data protection is a cornerstone of your business policy and practices when the new law comes in next year, you're leaving your organisation open to enforcement action that can damage both public reputation and bank balance."

Why should consumers care?
Reply With Quote
The Following User Says Thank You to waltky For This Useful Post:
  #3 (permalink)  
Old 07-08-2017, 02:56 PM
mlurp's Avatar
PW Enlightenment
 
Join Date: Mar 2008
Location: Flatlands
Gender: Male
Posts: 37,487
Thanks: 19,199
Thanked 10,921 Times in 8,518 Posts
Default Re: US works to secure networks as hackers advance

Yea they best bury their heads in the sand as Trump had set up a policy to increase security to stop these hacks.

Yet when he set up his budget little $ was applied to do the complete work. I learned this from my local news as Wolf Creek Nuclear Plant, which is around 50 miles south of Topeka was also hacked but the security is layered so all the were able to do is get personal files..

The Plants inter workings which is computer control isn't connected to the Internet.

Which is the most secured from Hackers, I think..
__________________


Improvise - Adapt - Over Come...
Reply With Quote
The Following User Says Thank You to mlurp For This Useful Post:
Reply

Tags
advance, hackers, networks, secure, works

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On

Forum Jump


All times are GMT -5. The time now is 01:01 PM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2019, vBulletin Solutions, Inc.

Content Relevant URLs by vBSEO 3.2.0