Topics

Alliances-Global, Climate Change, Defense, Deficit Department of Homeland Security, Economic Growth, EPA, Federal Reserve, Healthcare, Housing, Immigration, Infrastructure, Inner Cities, ISIS, Job Growth, Law Enforcement, Media Issues, NASA, National Security, Nuclear Weapons, Regional Issues, Sanctuary Cities, Tax Cuts, Terrorism, Trade, Trump Policies, US Government, World Affairs Policies

The World Continues To Be Vulnerable To CyberAttacks: Is There A Security System That Can Protect Current Software Users?

ArmchairPolitiicianCyberSecurity, January 1, 2018, by Brad Peery,

Book on Amazon.com: Trump’s Political Agenda and Achievements

Blog Site: WWW. ArmchairPolitician.US,
Email: ArmchairPolitician.US@gmail.com

*Cyberattacks worldwide have come from a variety of directions, with most of them having been inspired by governments. The Russian attack on the Democrats in the U.S. election was done by a Russian group known as APT 28 or “Fancy Bear”. This part of a widespread attack that hit other governments and elections in Germany, Ukraine, France, Sweden and Italy. APT 28 is only one of numerous Russian groups launching cyberattacks.
*Report From the Cyberwar Front, Wall Street Journal, By Tunku Varadarajan, December 29, 2017

The U.S. could be the target of infrastructure attacks. One example is the disabling of a Ukrainian power plant in 2016, and again in 2017. Although these were shutdowns that were limited geographically, there is little doubt that they might be attempted on a much wider scale in an attack on power infrastructure of the U.S.

The U.S. needs to develop a greater cybersecurity capability. It has already show it is vulnerable. In addition to the WikiLeaks thefts of Hillary Clinton’s emails and the the hack of the Democratic National Committee’s servers in the 2016 elections, plus Clinton’s campaign aid John Podesta’s emails. Major U.S. cyberattacks include a 2015 hack of the U.S. Office of Personnel Management, were the records of 23 million U.S. government employees were stolen. In 2017, the financial records of 145 million Americans were stolen when the Equifax database was hacked.

Outside of the U.S., NATO set up a cybersecurity alliance in Tallin, following the 2007 attack on Estonia. All of the other formerly Russian dominated countries surrounding Russia are as vulnerable as were Estonia and Ukraine. The NATO countries are protected by the U.S. under a mutual defense pact, but the difficulties of protecting them from cyberattacks have already been demonstrated by Russia. Russia is committed to destabilizing the elections of democracies, and more cyberattacks can be expected in the future.

North Korea and China are both engaged in cyberattacks. The WannaCry cyberattack worldwide in May 2017 has been attributed to North Korea is attributed to outdated Microsoft Windows XP software that is no longer updated by Microsoft, and is still being used by many that remain vulnerable to attack. Regular cybersecurity software updates are needed for software that users often do not remain vigilant by updating their software.

China is also a threat. It has companies such as Alibaba Computing and Tencent holding that are doing business worldwide, and competing with Google and Facebook, that help the Chinese government spy on its own citizens. China has been active in cyberespionage, hacking the armies and industrial sites of many countries to steal their military and industrial secrets. Iran is also active in such cyberespionage.

ArmchairPolitician.US Opinion
The U.S. and others remain vulnerable to governmental and private cyberattacks. It is not clear how these databases can be protected, since so many people have access to the databases, and their mistakes can make the databases vulnerable to attack.

A new technology, quantum computing, is being developed and in the next five years, could obsolete existing software security systems. Two factor security, which has a security code, plus a second factor known only to the owner of the information, might be a solution to current and future security threats. However, this would not seem to be a viable security system for massive government and commercial databases.
See:
ArmchairPolitiicianCyberSecurity, September 21, 2017, by Brad Peery, ArmchairPolitician.US@gmail.com, www.ArmchairPolitician.US
CyberSecurity Is The War Of The Future: What Can Be Done To Guard Against It?
See Also:
ArmchairTechInvestorRegulationQuantumComputing, October 31, 2017, by Brad Peery, WWW. ArmchairTechInvestor.Com
Email: ArmchairTechInvestor@gmail.com
Quantum Computing Will Dominate CyberSecurity. The Stakes Are High And The U.S. Must Win The Race.

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>