造梦西游4装备爆点:US Cyber defenses prepare for handling 'elect...

来源:百度文库 编辑:九乡新闻网 时间:2024/10/05 22:04:15

US Cyber defenses prepare for handling 'electronic Pearl Harbor'



333333333333333.jpg (70.38 KB)
2011-6-4 15:19


The breach of Google’s Gmail accounts comes only a week after U.S. defense contractor Lockheed Martin announced that it had weathered a “sustained and tenacious” hack on its computer networks. Cybersecurity experts say, while such attacks are worrisome, they are not surprising and are indicative of the need to strengthen cyberdefenses, particularly in private-sector businesses that have access to sensitive information.


Lockheed does a lot of business with the Pentagon, building missile defense components, fighter jets and a bevy of other products that led to sales of $45 billion in 2010 alone.


All that business brings a lot of juicy information to its networks, data on the cutting-edge technology that gives the American military its edge in the world.


Data that other countries would love to have.


Google said senior U.S. government officials and military personnel were among those whose personal Gmail accounts were broken into.


In an email to Lockheed employees that was posted on the company’s Web site after the May 21 incident, Chief Information Officer Sondra Barbour wrote that the company implemented a plan to strengthen its IT security after this latest intrusion.


Analysts say the U.S. has faced what some call an “electronic Pearl Harbor” over the past decade, a pilfering of American economic and intellectual property via computer hacking that bypasses government cyberdefenses.


“Over the past decade, we have seen the frequency and sophistication of intrusions into our networks increased,” James Miller, the principal deputy undersecretary of defense for policy, said last year. “Our networks are scanned thousands of times an hour.”


Despite the establishment last year of U.S. Cyber Command, critics say America’s cyberdefenses are still embryonic. While initial steps are being taken, the Pentagon has no cyberdefense best practices in place for the defense industry, according to Alan Paller, director of research at the SANS Institute, a consortium for information security training and development.


The Wall St. Journal reported in 2009 that Lockheed suffered a similar breach. Data on the Pentagon’s pricey and politically troubled next-generation Joint Strike Fighter program was stolen in the process, according to the Journal. Lockheed and the Pentagon denied the claims.


The growing use of mobile communications devices by the U.S. military and by civilian agencies is shaping Pentagon efforts to protect information networks from cyber attacks, said a senior defense official.


One of the biggest challenges in protecting the IT infrastructure is having visibility over the thousands of computers and smartphones that soldiers use daily, said Michael J. Jones, chief of emerging technologies in the cyber division of the Office of the Army Chief Information Officer.


“You can’t defend what you can’t see,” he said June 1 at an Association for Enterprise Information conference in Alexandria, Va. “That’s why we’re spending a lot of effort and energy in getting asset visibility,” he told National Defense.   


The goal is to develop an "information technology asset management system" that would give cybersecurity officers the ability to see every node in the network and to screen each one, in order to prevent intrusions, he said. “When you’re talking about one out of the 900,000 assets out there and figuring out which one poses vulnerability or which one could have a bad day, it makes it a daunting task."


The State Department has a program called iPOST, a continuous monitoring and risk reporting application for the agency’s IT infrastructure. The Army is looking to adopt that same model by leveraging current "asset visibility tools," said Jones. Cybersecurity officials can pull that information back and “score” each of the devices on the network to quantify the risks that exist in cyberspace. “This allows us to then quickly identify what the next problem device is going to be so that we can get after it and then patch it,” he said. “As we look at adding more mobile electronic devices, we’ve got to make sure we have visibility of those devices. How can we make sure we control those devices? Continuous monitoring will help us — we call it ‘see, know and do.’”  

Jones expects a working system to be in place by next spring.  “I’m pretty confident that within nine months to a year on the outside, the repository that we’re looking for would be at a minimum at an initial operating capability,” he said in the interview.  

While pursuing these efforts, the Army also is experimenting with commercial tablet computers for battlefield use. Among the devices being tested is the PlayBook, made by RIM, which also manufacturers the BlackBerry smartphone. “We went with that device because we already had the management infrastructure in place,” said Jones. The same servers that maintain control over Defense Department BlackBerry devices are being used in a pilot program on how to employ PlayBooks. Jones said that he plans to brief Army Chief Information Officer Lt. Gen. Susan S. Lawrence on the results of the project by December.  




Stars and Stripes/National Defense