Monday, April 27, 2009

Internet warfare: Are we focusing on the wrong things?

___________________________________________________________
Computerworld Security
April 27, 2009
___________________________________________________________

***************SPONSOR**************************************

Managing Spend on Information Security and Audit for Better Results
The benchmarks conducted by the IT Policy Compliance Group show almost all
organizations have financial incentives exceeding 100 percent to make
improvements to reduce financial risk from data loss, downtime and regulatory
audit. This report includes findings covering the principal operational
outcomes being experienced by organizations, financial risks, losses and
returns, and the practices making the most difference to control risks, reduce
costs, and improve results.

http://cwflyris.computerworld.com/t/4900888/283856143/186019/0/

************************************************************

In this issue:

1. Internet warfare: Are we focusing on the wrong things?

2. The new ground zero in Internet warfare

3. Software: The eternal battlefield in the unending cyberwars

4. The fog of (cyber) war

5. Cyberwar's first casualty: Your privacy

6. A short history of hacks, worms and cyberterror

7. Douglas Schweitzer: Captcha can getcha too

8. Russia's cyber blockade of Georgia worked. Could it happen here?

9. Jaikumar Vijayan: If a security vendor breaks into a malicious site, is it hacking?

10. Ex-federal IT worker charged in alleged ID theft scam


OTHER RESOURCES
_______________

Preventing Data Loss When Migrating to Microsoft 2007
http://cwflyris.computerworld.com/t/4900888/283856143/184875/0/

_______________

Internet warfare: Are we focusing on the wrong things?

Lack of vision and leadership have left the U.S. woefully unprepared for a cyber
catastrophe. Yet tech threats are growing and pose a grave risk to national and
economic security.
http://cwflyris.computerworld.com/t/4900888/283856143/186121/0/


The new ground zero in Internet warfare

Cyber experts concur that the electric power grid is the most vulnerable to
attack of all critical infrastructure in the U.S. But that's about the only
thing they agree on.
http://cwflyris.computerworld.com/t/4900888/283856143/186122/0/

Software: The eternal battlefield in the unending cyberwars

Internet attacks take many forms, but most of them exploit persistent weaknesses
in software. The old protections are no longer enough.
http://cwflyris.computerworld.com/t/4900888/283856143/186123/0/

The fog of (cyber) war

There's no global agreement on the definitions of cyberwarfare or
cyberterrorism, so how does a nation conform to the rule of law if it's
compelled to respond to a cyberattack?
http://cwflyris.computerworld.com/t/4900888/283856143/186124/0/

Cyberwar's first casualty: Your privacy

Opinion: Preston Gralla says that in the era of cyberwar, privacy will be the
first casualty.
http://cwflyris.computerworld.com/t/4900888/283856143/186125/0/


***************SPONSOR**************************************

Open Source Security Myths Dispelled
Open Source Software is computer software whose source code is available to the
general public. When choosing between proprietary and open source security
solutions, organizations are misled by myths. As a result, they ask the wrong
questions when evaluating their options and unnecessarily limit their solutions.
This white paper will help dispel myths, allowing IT decision makers to focus on
more important organizational issues.


http://cwflyris.computerworld.com/t/4900888/283856143/186126/0/?3e076d18=YXVzdGluYW1lczIwMDgucGNtYWdAYmxvZ2dlci5jb20%3d&x=992e0dc9

************************************************************


A short history of hacks, worms and cyberterror

From Captain Crunch to Ghostnet, a rogue's gallery of pranksters, hackers and
cybercrooks.
http://cwflyris.computerworld.com/t/4900888/283856143/186127/0/

Douglas Schweitzer: Captcha can getcha too

Sometimes figuring out what those squiggly characters are is tricky and that's
the point. Captchas were designed to require some thinking. Typing in those
letters and numbers that appear in the little colorful box is supposed to be a
challenge and task that only humans carry out. Online criminals can't use their
bots (and botnets) to distinguish letters and numbers that have been altered
beyond their automated recognition capabilities.
http://cwflyris.computerworld.com/t/4900888/283856143/186128/0/

Russia's cyber blockade of Georgia worked. Could it happen here?

Russia's cyber hijacking of Georgia was bad, but the response to it made matters
worse by crippling Georgia's financial systems. Could it happen here?
http://cwflyris.computerworld.com/t/4900888/283856143/186129/0/

Jaikumar Vijayan: If a security vendor breaks into a malicious site, is it hacking?

Security vendors sometimes break into malicious Web sites and systems to gather
data for stopping cyber crooks. How justifiable is that practice?
http://cwflyris.computerworld.com/t/4900888/283856143/186130/0/

Ex-federal IT worker charged in alleged ID theft scam

A former IT analyst at the Federal Reserve Bank of New York and his brother were
arrested Friday on charges that they took out loans using stolen information,
including sensitive information belonging to federal employees at the bank.
http://cwflyris.computerworld.com/t/4900888/283856143/186131/0/


***************SPONSOR**************************************

A Practical Guide to Building an Effective Patch Management Process
Worms, viruses and hackers are a constant threat to IT systems, and maintaining
timely patching practices is the best defense. This white paper surveys today's
best practices for implementing a sound patch management strategy and process.

http://cwflyris.computerworld.com/t/4900888/283856143/186132/0/?3e076d18=YXVzdGluYW1lczIwMDgucGNtYWdAYmxvZ2dlci5jb20%3d&x=8ed5242d

************************************************************


SHARK BAIT OF THE DAY
_____________________

Sometimes, they just don't listen...

I have a manager that requested network accounts for two of his sales guys. Not
really a problem, except these two guys are really old-school, and they have had
network accounts set up for them multiple times in the past. Every time, they
stop logging in to their computers, and 90 days later, their accounts are
deleted due to inactivity ...

http://cwflyris.computerworld.com/t/4900888/283856143/186034/0/

SEEKING THE VERY BEST IT LEADERS
________________________________

Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at

http://cwflyris.computerworld.com/t/4900888/283856143/183552/0/
(Send questions to premier100@computerworld.com.)


NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwflyris.computerworld.com/t/4900888/283856143/156832/0/

COMPUTERWORLD ON TWITTER
________________________

Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld

http://cwflyris.computerworld.com/t/4900888/283856143/126780/0/


___________CONTACTS/SUBSCRIPTIONS___________________________


FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com


ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.


PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/4900888/283856143/72509/0/


SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.

To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/4900888/283856143/72510/0/

To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/4900888/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz00OTAwODg4&x=3ba1f558

If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.

Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/4900888/283856143/72511/0/

Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701

No comments: