13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cyber <strong>Security</strong> Warning Networksystem, <strong>and</strong> can often add more layers to the operation ofthe computers. Until an attack, the value of the cybersecurity will be invisible. Thus, users <strong>and</strong> administratorscan resist the implementation of cyber security measures.Without dedicated scrutiny, the cyber security measuresthat are in place can lapse over time, creating opportunitiesfor breaching of the system.❚ FURTHER READING:BOOKS:Bosworth, Seymour (ed.) <strong>and</strong> Michel E. Kabay. Computer<strong>Security</strong> H<strong>and</strong>book. New York: John Wiley & Sons,2002.National Research Council, Computer Science <strong>and</strong> TelecommunicationsBoard. Cyber <strong>Security</strong> Today <strong>and</strong>Tomorrow: Pay Now or Pay Later. Washington, DC: TheNational Academies Press, 2002.Northcutt, Stephen, Lenny Zeltser, Scott Winters, et al.Inside Network Perimeter <strong>Security</strong>: The Definitive Guideto Firewalls, Virtual Private Networks (VPNs) Routers,<strong>and</strong> Intrusion Detection Systems. Indianapolis: NewRiders Publishing, 2002.ELECTRONIC:How Stuff Works. ”How Firewalls Work.“ Jeff Tyson. (15December 2002).SEE ALSOCodes <strong>and</strong> CiphersElectromagnetic PulseInternet SpiderCyber <strong>Security</strong>Warning Network❚ JOSEPH PATTERSON HYDERCommunication is critical during a time of national crisis.Emergency personnel need the ability to communicatequickly <strong>and</strong> effective with their colleagues in other parts ofthe country. In wartime, generals must remain in closecontact with comm<strong>and</strong>ers <strong>and</strong> troops in the field. In thecomputer age, all communications systems—telephones,cellular phones, email, <strong>and</strong> others–are intertwined. Acyberattack that takes down the Internet by attacking rootservers would also have a profound effect on all forms ofcommunications, which rely on switches <strong>and</strong> routers torelay signals. Therefore, a cyberattack coordinated withother terrorist attacks or occurring during wartime couldEncyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>have catastrophic effects on national security <strong>and</strong> theeconomy.In 2001, the George W. Bush administration <strong>and</strong> emergencyresponse officials began studying what would havehappened if an attack on America’s communicationinfrastructure had coincided with the September 11, 2001terrorist attacks. The more important question, however,was how to stop such an attack. The result was the CyberWarning Information Network (CWIN), part of Bush’sNational Strategy to Secure Cyberspace.Although the CWIN is not fully operational as of2003, one proposed function of the CWIN is to preventcyberattacks. The CWIN will accomplish this by creatingseveral industry specific workgroups, or Information Sharing<strong>and</strong> Analysis Centers (ISACs). Each ISAC will monitorInternet activity <strong>and</strong> cyberattacks on Web sites <strong>and</strong> Internetinfrastructure within its sector. The government agencies,companies, <strong>and</strong> network security firms involved inthat ISAC will then communication with each other oncyberattacks <strong>and</strong> increase security to prevent future attacks.IF action is taken quickly enough, an ISAC will beable to stop the spread of computer viruses before theystrike important systems.The Clinton administration developed the ISAC concept.Currently, ISACs exist for each of the followingsectors: information technology, banking <strong>and</strong> finance,telecommunications, chemical, <strong>and</strong> energy. The Bush administrationworked with government agencies <strong>and</strong> theprivate sector to develop ISACs for public transportationinfrastructure, water treatment, <strong>and</strong> agriculture <strong>and</strong> food.While the idea of sharing information about particularnetwork security vulnerabilities in order to increase securityfor all interested parties was considered favorable,many private sector members have been slow to volunteernetwork <strong>and</strong> software security problems. The Freedomof Information Act covers the CWIN, so these organizationshave shown hesitancy that any information sharedwith fellow ISAC members might become public. Untilthese companies receive a privacy guarantee from thegovernment, CWIN will not function as effectively asintended.The second major function of the CWIN will be toallow each ISAC to operate as an individual network, evenif the entire Internet is damaged in a cyberattack. This willallow ISAC members to continue to exchange criticalinformation if all other communications systems are down.The CWIN will accomplish this by establishing an independentIP network for each ISAC.Critics have found flaws with the CWIN on both conceptual<strong>and</strong> organizational grounds. Detractors argue thatin order for the CWIN to be effective, the private sector <strong>and</strong>network security professionals will have to play a majorrole. So far, the government has offered few incentives forthe private sector to invest the money <strong>and</strong> labor necessaryto accomplish this objective. The Department of Homel<strong>and</strong><strong>Security</strong> has also concerned some of the private301

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!