Internet Anthropologist Think Tank: Cyber Security Awareness Month, nah...

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Sunday, October 05, 2008

    Cyber Security Awareness Month, nah...



    Comments by Gerald: ( in caps for ease of reading )

    Cyber Security Awareness Month

    Binary code superimposed on a computer keyboard
    Today marks the beginning of
    National Cyber Security Awareness Month, which is a good opportunity to remind our readers of the importance of protecting yourselves and your businesses against the growing threat of cyber attacks.

    Worldwide, cyber attacks are increasing in sophistication and frequency every day. We have seen stories in the news recently of countries engaging outright in cyber warfare. Over the summer, authorities also uncovered the largest case of identity theft in U.S history, involving the theft of more than
    40 million credit card numbers stolen from the computer systems of several major U.S. retailers. ( I EXPECT THE RUSSIANS ARE BEHIND THIS, ONE OR TWO STEPS REMOVED, AND USING THE RBN, RUSSIAN BUSINESS NETWORK, THE FBS, IS THE MAFIA WITH A GOVERNEMNT INTEL ARM.G ) These acts have very real consequences for ordinary Americans, as any victim of identity theft can attest.
    ( THE BANKING SYSTEM AND CREDIT CARD COMPANIES AND CREDIT REPORTING AGENCYS HAVE THE TOOLS TO STOP ID THEFT, BIT THEY ALL MAKE A PROFIT OFF ID THEFT.G. )

    We take the threat of cyber attacks seriously at the Department. Working with other agencies, we have embarked on a
    major effort across the government to protect federal systems and networks. This includes reducing the number of external access points to our systems and improving our intrusion detection capabilities. We’ve established a new National Cyber Security Center to improve coordination and information sharing. We are expanding our 24-hour watch and warning system – the U.S. Computer Emergency Readiness Team – and hiring new cyber professionals. And we’re taking steps to prevent compromised computer products and electronics from entering the global supply chain and reaching our country.

    ( THEY HAVE NO SUCESSFUL PARADIGM TO STOP A WORLD WIDE BOT ATTACK, THE TOOLS ARE THERE, BUT THE LEADERSHIP IS MISSING, AND THEY ARE THINKING ONLY INSIDE THE BOX. G )

    But the reality is we can’t meet these challenges by ourselves. We don’t own the Internet or our nation’s IT or communications infrastructure. Most of our nation’s cyber assets are in private sector hands. Protecting them will require a new level of partnership with businesses and companies of all sizes, as well as individual citizens.

    ( USA HAS THE CAPABILITY TO OWN THE WWW LIKE THE AIR FORCE OWNS THE AIR, ANYTIME, ANYWHERE THEY WANT, THE TOOLS ARE THERE. THEY ARE MISSING AN EFFECTIVE PARADIGM, G.)

    What can you do to help? Start by
    making sure you are practicing good cyber security in your home or office. This means ensuring your antivirus software is properly functioning and up-to-date. Change your computer passwords regularly, and when you do, make sure you don’t write them down or leave them near your computer where someone can easily exploit them. Don’t open suspicious e-mail or visit suspicious websites. And make sure you know exactly what you’re downloading.

    ( NOTICE NO MENTION OF MALWARE SWEEPERS OR ROOTKIT & BOT TESTERS, THEY ARE AT LEAST A GENERATION BEHIND THE rbn, G.)

    These are all common-sense recommendations, but unfortunately too many Americans fail to take even these basic steps. I hope over the next month you’ll do your part to increase our nation’s cyber defenses from the ground up and help us mitigate the impact of a major cyber attack. The alternative could be a very serious disruption of a vital part of our society and our nation’s economy. Like other areas of homeland security, the time to prepare is now.

    ( ANYBODY NOT RUNNING PROPER SECURITY SHULD BE BANNED FORM THE WWW BY THEIR]
    ISP, THEY ARE ENABLING BOT FARMS WITH POOR SECURITY. G)

    Michael Chertoff

    THE CYBER CROOKS ARE A GENERATION AHEAD OF THE COMMERICAL INTERNET SECURITY COMPANIES. AND THE TERRORIST PARADIGM AND THE CYBER CROOKS PARADIGM ARE CONVERGING, AND USA LACKS THE LEADERSHIP TO STOP THEM, THE TOOLS ARE THERE,
    THE CAPABILITY IS THERE, THERE IS A PARADIGM TO COPE WITH THIS AND EVERYONE SEEMS TO BE LOOKING IN THE WRONG DIRECTION. G )

    LOOKING THE WRONG WAY. g

    Paradigm Intel portends another disaster in the credit card industry eqaual to the current bailout disaster, based on the paradigm that allowed the theft of the 40 million stolen credit cards.

    The technology and the paradigm are there to leapfrog the bot farms,
    to derail them mid cyber attack.

    Gerald
    Tactical Internet Systems analyst


    Gerald

    .
    problem
    Reblog this post [with Zemanta]

    Labels: , ,

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home