. | . |
The Ten Billion Dollar Cyber Defense Initiative - Part Eight
Washington (UPI) Jan 12, 2009 In 2008, the Bush administration during its last year in office began a Comprehensive National Cybersecurity Initiative that eventually will spend more than $10 billion strengthening defenses of U.S. government networks. During the 2008 U.S. presidential campaign, Sen. John McCain of Arizona, the Republican presidential nominee, noted the growing military role of information operations, while the victorious Democratic presidential nominee, Sen. Barack Obama of Illinois, stated the U.S. government needed to build "the capacity to identify, isolate and respond to any cyberattack." It appears, therefore, that U.S. national leaders do grasp the importance of network security and information assurance. But seeing the problem is not the same thing as solving it. Before that can occur, there are eight basic questions the incoming administration of President-elect Barack Obama needs to answer. First, do current trends in cyber threats indicate the United States faces a real crisis of confidence in its networks, or are efforts like the comprehensive cybersecurity initiative sufficient to deal with the challenge? Second, given how important global connectivity is to information superiority, is it possible to secure essential U.S. government networks while still maintaining links to the anarchic and anonymous Internet? Third, will the Internet in its current form ever permit users to trace sophisticated attacks to their sources, so that abuses can be effectively deterred and/or defeated? Fourth, what legal authorities are required so that the U.S. government can overcome barriers to dealing with attacks on critical private-sector networks and establish consistent security standards? Fifth, what is the proper relationship within the U.S. government between network defense and offensive information operations in formulating an integrated cybersecurity posture? Sixth, how can the U.S. government encourage a holistic, enterprise-wide understanding of its network resources and challenges, so that solutions are developed in a truly comprehensive rather than piecemeal fashion? Seventh, is the U.S. Department of Homeland Security an appropriate vehicle for managing government-wide cybersecurity efforts, or is a more focused organization better suited to the task? Eighth, if the U.S. government is too slow or decentralized to keep up with the rapid proliferation of cyber threats, how can it tap more agile suppliers of network security in the marketplace? These questions need to be answered before the United States suffers the digital equivalent of a Sept. 11, 2001, attack that so many experts have been predicting. Despite the growing array of problems associated with using and securing Internet-style networks, virtually nobody in the U.S. government thinks it is desirable to return to a pre-Internet way of doing business. So the real issue policymakers face in meeting the cybersecurity challenge is not whether they can live without digital networks, but how they prevent the enemies of the United States from using those networks against it. (Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.) (United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.) Share This Article With Planet Earth
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
Cyber Warfare Doctrines 2009 - Part Seven Arlington, Va. (UPI) Jan 9, 2009 Within the U.S. federal government, most of the funding allocated to information security and offensive cyber operations is spent by agencies of the Department of Defense. |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |