Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Virtual Cyber Attack finds Flaws in Cyber Security

On September 15, 2006 the Homeland Security Department published the outcome of its drill simulating a cyberwar on the United States.

The drill was executed in February and was called "Cyber Storm". It involved re-creating an assault by an unlawful alliance of well-sponsored anti-globalization and radical "hackers" from various countries. They encompassed militant factions, dissatisfied workers-turned- cyber-terrorists and blogger's.

There wasn't any influence on the actual Internet throughout the drill engaging over 300 individuals from government, three states, five countries, nine technical organizations and six public utility companies.

As per the report, the hackers concentrated on compounding financial damages and inciting widespread suspicion about large companies and government by interrupting operations and misguiding the print media and other news network.

An inside agency file proves that the simulated strikes penetrated computer servers, shutting down the Federal Aviation Administration's regulatory system, vandalizing newspaper sites and foreshadowing power failures.

The major flaw the drill exposed was the restricted skills of members to connect various events across the numerous infrastructures and linking the public and the private segments.

The Government Accountability Office's director of IT management issues, David Powner, remarked that so far DHS (Department of Homeland security) has been unsuccessful in creating strategy for countering anti-vital infrastructure cyber-crimes.

George Foresman, undersecretary at Homeland security said, it was obvious that so far the department couldn't gauge America's cyber safety measures, as it is inconceivable to calculate zero by a normal rule.

The account resolved that respondents were usually incapable of deciding whether the chain of simulated cyber terror, which might have stopped metros and triggered off power failures, was remote or a fragment of synchronized attack.

To enhance the country's power to survive Internet breakdowns, DHS has range of plans, alongside operational teams to assist synchronization and drills in which government and private sector learn to counter cyber crimes.

Cyber terror is the leading safety menace we're encountering nowadays and there's been a sharp rise in the implementation of 'malware' misused to hack computers. The cyber world should endeavor to develop its power to successfully counter and recoup from the most suave cyber strikes.

Related article: Virtual Sandboxing - Safe Testing of Web Applications

ยป SPAMfighter News - 9/25/2006

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page