Beyond Firewalls and Encryption

"...Palmer says the prototype system will correlate historical traffic patterns with dynamic data from monitors, sensors and other devices capturing information about network traffic and user activity in real time. "It's going to introduce a whole new set of technologies we've been doing at IBM Research around botnets, detecting malware and other kinds of cyber threats," Palmer says

( Read More )

Botnets Drive The Ris e of Ransomware

'..Ransomware is the dominating threat with nine of the detections in the malware top ten list resulting in either scareware or ransomware infesting the victim's PC.Fortinet observed the primary drivers behind these threats to be two of the most notorious botnet "loaders" - Bredolab and Pushdo..'

( Read More )



About Information Quality Assurance And Its Needs


Let us know about information quality assurance. The information quality assurance was launched by national program (NHS) in the field of IT, to make sure that the documents of guidelines are provided to NHS and local providers to realize that the data produced by them must be according to the standards set NHS and would be placed in NHS CRS (care records service). In this article we would be learning about information quality strategies, rules and procedures to help you create better awareness and gather vital information for future reference. … 72542.html




About ISO27001 Benefits And Features 

What is commonly known as ISO 27001 is an information security management system. This is an expansion of ISMS standard. Its full name is ISO 27001. It was introduced in 2005 by the International Organization for Standardization (ISO) in collaboration with the International Electro Technical Commission (IEC). There are various features and benefit available to organization by getting the ISO 27001. Organizations can apply for independent certifications of their ISMS. The standard covers all types of organizations (like commercial enterprises, government agencies and non-profit organizations) and all sizes from micro-businesses to huge multinationals. … 72547.html




Benchmarking for Critical Infrastructure Protection 

Abstract : 
A critical infrastructure protection programme should have as its aim the improvement of the state of preparedness to counter the emerging threat of malicious electronic based attacks on critical assets by protagonists with a high level of capability. This aim, which is applicable at the corporate and the national level, recognizes the concept of criticality and the dynamic nature of the threat. … e3d923d996




Public–Private Partnerships are no silver bullet : An expanded governance model for Critical Infrastructure Protection 

For more than a decade, efforts have been underway to establish Public–Private Partnerships (PPP) for Critical Infrastructure Protection (CIP). Due to issues arising in connection with their implementation, there has been increasing criticism in recent years questioning the usefulness of such PPP. However, cooperation between the state and the private corporate sector in CIP is not only useful, but inevitable. This paper will therefore sketch a new and above all broader approach to public–private cooperation to help solve some of the problems that have become apparent. … 9d8ec1af7e



Critical infrastructures and responsibility: A conceptual exploration 

In this article some considerations are presented as a starting point for judging responsibility for infrastructural systems from a moral point of view. Infrastructural systems are essential for present day high-tech society. Without good working infrastructural systems people would hardly be able to survive. The importance and relevance of good working critical infrastructures for states and other public authorities are illustrated with some examples. Next, the meaning of the concept of responsibility in relation to infrastructural systems is developed. … e8a1ad6127



Securing the Critical IP Infrastructure 


The corporate Internet Protocol (IP) network has become a necessity for conducting business. Any impact to its performance can, and often does, impact the business. These days, network downtime is measured in both minutes down and in dollars of lost productivity. Computer Economics1, a company that tracks the impacts of computer viruses, has reported that the cost of the Code Red virus to businesses was estimated at $1.2 Billion USD. [1] Of that, $740 Million was spent on system checks, while $450 Million in cost was attributed to lost productivity due to network downtime necessary to clean up the virus. (A million here, and a million there, and suddenly we are starting to talk about real money!) … 3e2d5#toc3


What is Cyberwar?



Cyberwar is a form of war which takes places on computers and the Internet, through electronic means rather than physical ones. Cyber-warfare, as it is also known, is a growing force in the international community, and many nations regularly run cyberwar drills and games so that they are prepared for genuine attacks from their enemies.


The Cyberwar Plan  :  It's Not Just A Defensive Game; Cyber-Security Includes Attack Plans Too, And The U.S. Has Already Used Some Of Them Successfully.


Excerpt :

In May 2007, President Bush authorized the National Security Agency, based at Fort Meade, Md., to launch a sophisticated attack on an enemy thousands of miles away without firing a bullet or dropping a bomb. … 4_3145.php


China’s Cyber-Militia


Chinese Hackers Pose A Clear And Present Danger To U.S. Government And Private-Sector Computer Networks And May Be Responsible For Two Major U.S. Power Blackouts.



omputer hackers in China, including those working on behalf of the Chinese government and military, have penetrated deeply into the information systems of U.S. companies and government agencies, stolen proprietary information from American executives in advance of their business meetings in China, and, in a few cases, gained access to electric power plants in the United States, possibly triggering two recent and widespread blackouts in Florida and the Northeast, according to U.S. government officials and computer-security experts. … ite_search


Criminals are devising new threat paths



Sophisticated cyber criminals are successfully finding new threat paths that are going undetected, a cyber criminologist said yesterday.   “The players now include terrorists, white collar criminals, hackers, open source. The global underground cyber criminal community is actually trying to do better than what we do,” Subramanian said at the official launching of Valiant Technology office in Qatar, at an event hosted by local partners, Dyarco International, a subsidiary of Al Faisal Holding.. … rent_id=16




Cybersecurity and National Policy



'..When I think about cybersecurity and national policy, I can only conclude that the problem is the problem statement. At the highest level of abstraction, let me propose that the problem statement for a National Policy is this:

 … Final1.pdf