. Military Space News .
New Cyber Threats Part Seven

disclaimer: image is for illustration purposes only
by James Jay Carafano | Eric Sayers
Washington (UPI) April 3, 2009
It is important that U.S. policymakers learn to think strategically in planning to combat cybersecurity threats to the nation. There are many "first-order" questions that deserve serious thought as the United States considers the next steps in keeping the cyber commons open to the free flow of services and ideas while thwarting the activities of malicious actors.

These include everything from defining how deterrence works in cyberspace to understanding the realistic application of the rule of law in a place that in many ways is still lawless. Strategic thinkers must understand the costs and benefits of operating in cyberspace, the nature of the actors, the character of the environment and how traditional concepts of security and war and peace translate to the cyber world.

It is also important to understand risk and risk management. Quantifying and determining optimal responses to risk is a process called risk management. Properly assessing and reducing risk is central to a resiliency strategy. There are three types of risk-assessment methodologies, all consisting of similar components.

The first is threat assessment. This examines what an adversary can accomplish and with what degree of lethality or effect.

The second is criticality assessment. This evaluates the effect that will be achieved if the adversary accomplishes his goals. This examines both physical consequences, social and economic disruption, and psychological effects. Not all consequences can be prevented. In order to assist in prioritization, there is a process designed to identify the criticality of various assets: What is the asset's function or mission, and how significant is it?

The third is vulnerability assessment. This studies a country's vulnerabilities and how they can be mitigated, including weaknesses in structures, both physical and cyber, along with other systems and processes that could be exploited by terrorists. It then asks what options are available to reduce the vulnerabilities identified or, if feasible, to eliminate them.

It is also important to adapt best practices. Best practices and lessons learned can be effective tools. Ensuring that these are updated and applied should be the U.S. government's first priority.

Only programs that establish clear tasks, conditions and standards and ensure that they are rigorously applied will keep pace with determined and willful efforts to overcome security efforts.

Part 8: The importance of keeping ahead of the rapid evolution of technology and skills in the ever-evolving domain of the cyber environment

(James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


US senators call for cybersecurity czar
Washington (AFP) April 1, 2009
Two US senators introduced legislation on Wednesday aimed at creating a powerful national cybersecurity advisor who would report directly to the president.







  • Analysis: Wanted: Future NATO chief
  • Old Russia, role tenions still haunt NATO: experts
  • Analysis: France rejoins NATO
  • French, German cities head into NATO summit turbulence

  • China's Korean War vets uneasy over rocket launch
  • Obama seeks nuclear-free world on Europe charm tour
  • As NKorea launches rocket, its people go hungry
  • China's leverage on North Korea limited: analysts

  • Raytheon Standard Missile-2 Destroys Target
  • Indian tests cruise missile: official
  • US says warships deployed before NKorea launch
  • NKorea may launch several missiles: US general

  • BMD Watch: China targets U.S. carriers
  • Czechs don't expect US to scrap missile shield plans
  • Israeli Very-Short-Range Anti-Ballistic Missile Interceptor System Fails Part Four
  • US, SKorea, Japan coordinate on NKorea launch

  • Airlines fear failure of global climate talks
  • State takes control of China's first private airline: report
  • Troubled private Chinese airline says president missing
  • Cathay Pacific lost 1.1 billion dollars in 2008

  • Pakistan to discuss drone attacks with US envoy: spokesman
  • NKorea threatens US spy planes monitoring rocket
  • Israeli drones attacked Iranian convoys in Sudan: report
  • Washington plans new drone attacks on Pakistan: report

  • Dogs of War: Immunity, what immunity?
  • Iraq improving, but challenges remain
  • US, Iraq race to keep extremism at bay in north
  • Analysis: New terror-group tactics in Iraq

  • Thompson Files: Marines triumph with EFV
  • Outside View: Why F-22 is vital -- Part 14
  • Why The F-22 Is Vital Part 13
  • Why The F-22 Is Vital Part 12

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement