Download now Free registration required
The Wharton Aerospace & Defense Report recently published an article about the growingnumber of attacks against Defense Department and defense contractor computer networks, andthe feeble response over the past decade to defend against such attacks. The attackers' goal is not to debilitate military networks, security experts say, but rather to steal classified design and engineering data about the United States' most advanced weapons systems, the article noted. As if on cue, The Wall Street Journal reported just after the Wharton Aerospace & Defense Report article appeared that digital spies had infiltrated and stolen several terabytes of data related to the Pentagon's $300 billion Joint Strike Fighter project. The spies, however, did not gain access to some of the most sensitive data, which was stored on systems not connected to the Internet. A consortium of federal and defense agencies and private companies have compiledguidelines - known as Consensus Audit Guidelines (CAG) - that define the most criticalsecurity controls required to protect federal and defense industry systems. The CAG initiative is part of a larger effort led by the Center for Strategic and International Studies in Washington, D.C., to set up best practices for cybersecurity.
- Format: PDF
- Size: 517.73 KB