While organizations spend billions of dollars annually setting up firewalls and other security measures to protect their networks from outside forces, all those efforts are for naught if sensitive data is stored and transmitted in an unprotected or under-protected manner. When it comes to securing vital data, there is no room to compromise. Government and corporate entities must consider a holistic approach to cyber security, an approach that focuses on both preventing inappropriate access and protecting the data contained within. What can be done to prevent security breaches, tighten cybersecurity and raise our comfort level?Ī first step is to understand the severity of the threat and prioritize addressing it. Some intelligence officials believe that the cyber threat represents the greatest long-term risk to both the economic and national security of the United States.
How great a threat is hacking to our national security?Ĭohen: There is growing recognition in the United States and Europe that the cyber threat – and in particular the growing efforts by nation states to steal sensitive data from government and private sector systems – poses a significant threat to the economic and national security of the United States and other western nations. Hack into private and government information systems, extract sensitive information and use that information for illicit purposes. There is a common theme across the spectrum of cyber-attackers. Nation state intelligence organizations will use these same techniques to expand intelligence collection efforts, acquiring sensitive information about government officials and programs to aid recruitment and conduct covert intelligence operations. Criminal organizations will hack into a retail or banking system, steal credit card, bank account and other identity related information so they can use that information in other criminal activities intended to acquire ill-gotten gain. But, increasingly, hackers have conducted cyber intrusions that are intended to extract sensitive data contained within a targeted system. How great a threat is hacking to the security of our private information?Ĭohen: Cyber-attackers have turned away from attacks solely intended to annoy, disrupt information system operations and associated critical infrastructure. These trends reflect the growing use of cyberattacks by nation states such as Russia, China, Iran and North Korea to project global influence – essentially through the use of cut-out hacking groups to wreak havoc or steal sensitive economic, national security and other information in furtherance of geo-political goals. Government and private sector entities must deal with the growing likelihood that their systems will be compromised and sensitive data contained within will be extracted and utilized to support intelligence collection and/or other criminal activity. Why is this happening?Ĭohen: The continuing drum beat of high profile breaches show that the cyber threat environment continues to evolve and expand. In the past year, we’ve heard that the Democratic National Committee emails were hacked and that the email system used by the Joint Chiefs of Staff at the Pentagon was hacked.
#Critical ops hack october 24 2016 professional#
Cohen, a distinguished professor of professional practice in criminal justice and senior adviser to the Rutgers Institute for Emergency Preparedness and Homeland Security, about how we should react to these threats. Cohen was formerly Acting Undersecretary for Intelligence and Analysis at the United States Department of Homeland Security. Cohen formerly served as Acting Undersecretary for Intelligence and Analysis at the United States Department of Homeland Security. Cohen, distinguished professor of professional practice in criminal justice and senior adviser to the Rutgers Institute for Emergency Preparedness and Homeland Security.
Cybersecurity has been a major issue in the presidential campaign with wide ranging implications for both national security and private information. So have leaked emails from the Democratic National Committee.
The hacked emails of Hillary Clinton's presidential campaign chairman John Podesta have been making headlines.
#Critical ops hack october 24 2016 how to#
Rutgers professor who served as Homeland Security intelligence official assesses cyber threats and suggests how to protect against them