. | . |
New Cyber Threats Part Seven
Washington (UPI) April 3, 2009 It is important that U.S. policymakers learn to think strategically in planning to combat cybersecurity threats to the nation. There are many "first-order" questions that deserve serious thought as the United States considers the next steps in keeping the cyber commons open to the free flow of services and ideas while thwarting the activities of malicious actors. These include everything from defining how deterrence works in cyberspace to understanding the realistic application of the rule of law in a place that in many ways is still lawless. Strategic thinkers must understand the costs and benefits of operating in cyberspace, the nature of the actors, the character of the environment and how traditional concepts of security and war and peace translate to the cyber world. It is also important to understand risk and risk management. Quantifying and determining optimal responses to risk is a process called risk management. Properly assessing and reducing risk is central to a resiliency strategy. There are three types of risk-assessment methodologies, all consisting of similar components. The first is threat assessment. This examines what an adversary can accomplish and with what degree of lethality or effect. The second is criticality assessment. This evaluates the effect that will be achieved if the adversary accomplishes his goals. This examines both physical consequences, social and economic disruption, and psychological effects. Not all consequences can be prevented. In order to assist in prioritization, there is a process designed to identify the criticality of various assets: What is the asset's function or mission, and how significant is it? The third is vulnerability assessment. This studies a country's vulnerabilities and how they can be mitigated, including weaknesses in structures, both physical and cyber, along with other systems and processes that could be exploited by terrorists. It then asks what options are available to reduce the vulnerabilities identified or, if feasible, to eliminate them. It is also important to adapt best practices. Best practices and lessons learned can be effective tools. Ensuring that these are updated and applied should be the U.S. government's first priority. Only programs that establish clear tasks, conditions and standards and ensure that they are rigorously applied will keep pace with determined and willful efforts to overcome security efforts. Part 8: The importance of keeping ahead of the rapid evolution of technology and skills in the ever-evolving domain of the cyber environment (James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.) (United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.) Share This Article With Planet Earth
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
US senators call for cybersecurity czar Washington (AFP) April 1, 2009 Two US senators introduced legislation on Wednesday aimed at creating a powerful national cybersecurity advisor who would report directly to the president. |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |