Today cyber security is a major concern for all countries and all nations need to be prepared for a massive attack that will take down their facilities. In traditional war the attacker starts by using air force to target critical systems in the country, this operation will make the enemy out of control of his army and decrease the communication in the country.Technology is changing and I think that cyber-attack going to be the first operation in any traditional war. If you penetrate their cyberspace first you will be able to gather very important information that can be used in the war, for example, number of soldiers, number of airports and types of systems used in the army communication etc…
To protect cyberspace it is very important to create a national strategy for all countries citizens that will include an action plan to protect their cyber borders. The first thing is identifying what we are looking to protect for example
hospitals , ministries , governmental institutions, media establishments , personal information and so on.
Next, we apply security standards and best practices to guarantee the confidentiality, integrity and availability of information at these organizations, by conducting a constant audit of the existing information systems. The audits can be twice a year or more, this will help us to understand if we are vulnerable to cyber-attacks or not.
Also Implementing honeypots for catching and detecting infected machines in the national cyberspace and launching a cyber-security community coordination (such as Honeynet project (1), Shadowserver(2), CERT’s (3)) to mitigate malware threats. This coordination can help by learning from other countries experience in defending their cyber boarders. Clean-up services is a very important activity that makes your cyber space safe, we can imagine the number of bot networks existing in the world and they may be used in a cyber-attack at any moment. Removing malwares from infected hosts will mitigate this threat by providing free tools and assistance if they are required by victims.Finally, an important question that many ask is how prepared are
we for cyber-warfare?
Reference:
(1) The Honeynet Project http://www.honeynet.org/
(2) Shadowserver http://www.shadowserver.org/wiki/
(3) CERT-CC http://www.cert.org/ (3)
About Author :
Mourad Ben Lakhoua is an Information Security practitioner.
Admin at www.sectechno.com | info@sectechno.com
No comments:
Post a Comment