And if you think that the U.S. is the top in terms of computer security, well, that is dead wrong. Essentially what this means is that the U.S., while being the world super power, is especialy vulnerable to cyber-attacks I guess the electromagnetic spectrum is its soft underbelly. For the full report follow the link
http://www.computerweekly.com/Articles/2007/07/30/225877/learn-from-mistakes-made-in-us-security.htm
Monday, July 30, 2007
World Simulation
Well, this is quite interesting. Imagine the size of the computer server farm that will be required to host all this information!
http://www.theregister.com/2007/06/23/sentient_worlds/
"Called the Sentient World Simulation (SWS), it will be a "synthetic mirror of the real world with automated continuous calibration with respect to current real-world information", according to a concept paper for the project."
http://www.theregister.com/2007/06/23/sentient_worlds/
"Called the Sentient World Simulation (SWS), it will be a "synthetic mirror of the real world with automated continuous calibration with respect to current real-world information", according to a concept paper for the project."
Thursday, July 26, 2007
Managing Cyber Security Resources
The book Managing Cybersecurity Resources: A Cost-Benefit Analysis takes an original approach to cyber-security. It's main empahsis is on the impact of security breaches in the financial and business sectors of the economy. Seeking to answer the question of: "how can you know if your firm is committing too much money, or not enough, to protect itself against such unseen hazards?" the book provides economiy models for risk assement so that organizations can manage their cyber-security resources in a rational war.
This book is an invaluable resource for information security managers responsible for establishing cybersecurity initiatives, and financial managers that are responsible for figuring how much funding cyber-security initiatives should consumer from the overall budget.
This book is an invaluable resource for information security managers responsible for establishing cybersecurity initiatives, and financial managers that are responsible for figuring how much funding cyber-security initiatives should consumer from the overall budget.
Wednesday, July 25, 2007
The Health Consequences of Cyberwar
This article
http://www.globalresearch.ca/articles/WOR406A.html
is quite interesting in that it brings to light some undiscussed issues of war in the information age. Cyberwar is more than just hacking, cracking and other computer network attacks. There are direct consequences to our health. The fact that most technology is classified means that we will not know how much harm is really being done since we will do not know the nitty gritty of how cyber-war machines work.
To quote the article
"It will likely be years before Americans are told what is being tested upon them during our present chemtrail/space wars era. The Hanford downwinders did not learn until 1986 what had been unleashed upon them some 30 years earlier; SHAD victims filed suit in 2003 to learn the extent to which they were intentionally exposed to dangerous substances in the 60s."
http://www.globalresearch.ca/articles/WOR406A.html
is quite interesting in that it brings to light some undiscussed issues of war in the information age. Cyberwar is more than just hacking, cracking and other computer network attacks. There are direct consequences to our health. The fact that most technology is classified means that we will not know how much harm is really being done since we will do not know the nitty gritty of how cyber-war machines work.
To quote the article
"It will likely be years before Americans are told what is being tested upon them during our present chemtrail/space wars era. The Hanford downwinders did not learn until 1986 what had been unleashed upon them some 30 years earlier; SHAD victims filed suit in 2003 to learn the extent to which they were intentionally exposed to dangerous substances in the 60s."
Labels:
cyber-war,
electromagnetic spectrume,
health
Tuesday, July 17, 2007
Defining Cyberspace
Before getting into the nitty-gritty details of cyberspace and cyber-securty, a proper definition is require of what cyberspace is.
cyberspace is defined as a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures. According to this definition, cyberspace is a very real, physical domain that is comprised of electronics and networked systems that use electromagnetic energy.Cyberspace exists across the other domains of air, land, sea, and space and connects these physical domains with the cognitive processes that use the data that is stored, modified, or exchanged. Cyberspace is therefore distinct from the information that may be resident in or transferred through the domain. Using this understanding of cyberspace, the following sections discuss misperceptions about the boundaries of the domain and operations conducted in the domain.
Cyberspace: Not Just the Internet
As the electromagnetic (EM) spectrum gets more crowded with broadcasts from devices of every kind, from sensors to video feeds on unmanned aerial vehicles, computers to radios to wireless devices, all in support of network−centric operations, the risks to civilians, businesses and the military from EM disruption grow significantly. We are geared to deliver you information that goes beyond the standard paradigm of cyberspace.
Subscribe to:
Posts (Atom)