The Inevitability of International Cyber Attacks – Are We Ready?

The Inevitability of International Cyber Attacks – Are We Ready?

 

The problem of International Cyber Attacks

General Keith Alexander, Director of the National Security Agency (NSA) and the man in charge of Cybercom, the U.S.’s new cyber security command, issued a warning recently of massive increases in the number of attempts computercyber  by hackers and foreign countries to breach the nation’s internet security.

What had originally started as virus and malware attacks by amateur hackers and disgruntled employees against computers and networks have now morphed into worldwide penetration by criminal enterprises and state sponsored terrorists.

The world of information security attacks and threats are growing in power and sophistication with nation backed Cyber attacks emerging. Although constituting isolated attacks so far, the new wave of Cyber attacks are more prevalent and dangerous. And, with the advent of (often hostile) national involvement in Cyber offensives, the risk to our nation’s National Security is real and potentially devastating.

At risk are our tremendous advantages in military power, intellectual capital and industrial wealth.

Assets the United States has spent tremendous human and intellectual capital on to develop are now at risk of being stolen by clever cyber thieves that exploit weaknesses in our cyber security. The fact that cyber thieves can now operate across international borders and in safe have third countries with impunity only increases the threat. The threat affects government and industry alike.

Although most experts have predicted that this day would arrive, online infiltration could cause huge damage to the U.S. military and the nation’s infrastructure, and the government and industry is not presently prepared to secure itself against such attacks.

The Obama administration is promising to spend billions to upgrade cyber defenses, and has already hired hundreds of specialists with doctorates in computer technology to work at the Cybercom and start building better security measures.

 

Leave a Comment