Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Too much hysteria over cyber attacks: US experts
by Staff Writers
San Francisco (AFP) Feb 15, 2011


Fight computer viruses like epidemics: Microsoft
San Francisco (AFP) Feb 15, 2011 - Microsoft on Tuesday advocated fighting pernicious computer viruses with public health tactics used to stop the spread of SARS, H1N1 and other dangerous real world bugs. Computers could be granted health certificates to be used online to show they were checked for viruses, Microsoft vice president of Trustworthy Computing Scott Charney said at a RSA computer security gathering here. "There are a lot of parallels to the health model," Charney said. "In public health we give people advice like wash your hands to stay safe or get vaccinations," he continued. "We can do that in the Internet world as well, and if your computer is sick we give you treatment."

Computer versions of public health notices could include the importance of running updated anti-virus software or warnings about the latest malicious software spreading online. Charney told of "proof of concept" online identification software that could play a pivotal role in an online public health model by verifying that people on the Internet are who they claim to be. People wouldn't be compelled to use computer health certificates, but businesses could require them for certain services. "Instead of just reacting to tainted machines, we can look out for machine health," Charney said.

"It's not about quarantining machines," he continued. "It's about remediation." Charney caused a buzz last year at RSA with a suggestion that computers infected with malicious software be quarantined on the Internet. "We could flip it around to use the identity model," Charney said. "Where consumers would be asked for health certificates (for computers) and not providing one might have some consequences." People who didn't present health claims could encounter precautions such as caps on money accessed in online bank accounts or limited Internet data flow.

Overblown talk of full-on cyber war between nations fueled by recent attacks like the computer worm Stuxnet could hamper Internet security efforts, officials and experts warned Tuesday.

Serious attention should be paid to threats of cyber attacks from hackers, spies and terrorist groups but not to the extent of mass hysteria, speakers at the premier RSA computer security conference in San Francisco said.

"Cyber war is a terrible metaphor," said White House cybersecurity czar Howard Schmidt. "Don't make it something it's not."

Online espionage and hacking are not new, and hyping incidents as warfare distracts computer security champions from critical jobs such as safeguarding power grids, financial systems, and medical networks, he contended.

"We are in the midst of a cyber war of words," Schmidt said. "Let's quit pointing fingers and start cleaning up the infrastructure."

Renowned computer security specialist Bruce Schneier of BT Group said that use of warlike tactics in online conflicts is fueling hysteria that has the world on the brink of a "cyber arms race."

"We are not necessarily seeing cyber war, but increasing use of warlike tactics in more general cyber conflicts," Schneier said. "I think that is what's confusing us."

He cited a Stuxnet computer virus evidently crafted to find and disrupt an Iranian nuclear facility as an Internet Age attack that smacks of warfare but arguably falls short.

"It is not war," Schneier said. "It is in the middle somewhere."

Fears of cyber war are driving a needless cyber arms race that brings with it the danger that software weapons might accidentally be released, he argued.

"We haven't seen offensive cyber weapons companies, but they are coming," Schneier said. "Big defense contractors are working on this; you know they would be dumb not to."

The most prevalent cyber threat has been theft of information from networks, US Deputy Secretary of Defense William Lynn said in a keynote address to the gathering.

Foreign spy agencies have accessed military plans and weapons systems designs, while source codes and intellectual property have been swiped from businesses and universities, according to Lynn.

Attacks on computer networks have thus far been "relatively unsophisticated" and short in duration, the defense official said.

An emerging threat is that cyber tools will cause real-world damage, according to Lynn.

"The threat is moving up a ladder of escalation, from exploitation to disruption to destruction," he said.

Foreign spies have focused on mining US networks instead of disrupting them, according to Lynn.

"Although we cannot dismiss the threat of a rogue state lashing out, most nations have no more interest in conducting a destructive cyber attack against us than they do a conventional military attack," Lynn said.

"The risk for them is too great."

US defense officials are more worried about an accidental release of "toxic malware," he explained.

"Perhaps the greatest concern in our judgment is a terrorist group that gains the level of disruptive and destructive capability currently possessed by nation-states," Lynn said.

Terrorist groups could craft their own cyber weapons or buy them on the black market, he added.

"As you know better than I, a couple dozen talented programmers wearing flip-flops and drinking Red Bull can do a lot of damage," Lynn told the gathering of software savants.

"We have to assume that if they have the means to strike, they will do so."

Cyber commandos are being trained in the military, and the US is reaching out to allies to form collective online defenses, he said.

Lynn called on specialists in the computer security industry to team with the military to defend the nation's networks.

"The government cannot protect our nation alone," Lynn said. "It is going to take a public-private partnership to secure our networks."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US did not seek WikiLeaks cutoff: Clinton
Washington (AFP) Feb 15, 2011
The United States did not pressure private companies to deny service to WikiLeaks following its release of secret US diplomatic cables, US Secretary of State Hillary Clinton said Tuesday. Clinton, in a speech on Internet freedom at George Washington University here, repeated US condemnation of the release of the cables by WikiLeaks, saying it had begun with an "act of theft" and had put peop ... read more


CYBER WARS
Astrobotic Technology Annouces Lunar Mission On SpaceX Falcon 9

LRO Could Have Given Apollo 14 Crew Another Majestic View

NASA's New Lander Prototype Skates Through Integration And Testing

Draper Commits One Million Dollars To Next Giant Leap's Moon Lander

CYBER WARS
Walking On Mars

Opportunity Catching The Rays During Solar Conjunction

Mars, Brought To You By Corporate Sponsors

Volunteers begin virtual Mars 'space walk'

CYBER WARS
NASA Deputy Administrator Visits Colorado Innovation Sites

NASA Announces Fiscal Year 2012 Budget

NASA Names Winning Experiments In Kids Micro-G Challenge

Europe to simplify patent system

CYBER WARS
U.S. wary of China space weapons

Slow progress in U.S.-China space efforts

China Builds Theme Park In Spaceport

Tiangong Space Station Plans Progessing

CYBER WARS
Astro_Paolo And Views From Space

Cosmonauts To Perform 28th Russian Space Station Spacewalk

Azorean Station To Track Ariane Launch

International Partners Discuss ISS Operations

CYBER WARS
Ariane 5's Mission With The Automated Transfer Vehicle Is Postponed

Ariane 5 Ready For Launch Of Automated Transfer Vehicle Johannes Kepler

Ariane 5 Ready To Receive Yahsat 1A And Intelsat New Dawn

Vandenberg Launches Minotaur One

CYBER WARS
NASA Finds Earth-Size Planet Candidates In Habitable Zone

Las Cumbres Scientists Play Key Role In New Planetry System Discovery

A Six-Planet System

Earth-Size Planet Candidates Found In Habitable Zone

CYBER WARS
Apple unveils digital media subscription service

Kaspersky tips Android to dominate mobile

HTC launches social smartphones with Facebook

Orange launches low-cost branded tablet




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement