Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How Real Is the Threat?

    Written by

    Dennis Fisher
    Published August 19, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      For nearly a year, federal officials have been telling anyone willing to listen that terrorists have the knowledge and equipment to carry out sophisticated information warfare attacks against targets in the United States. This declaration is usually followed by an ominous warning that a “digital Pearl Harbor” is around the corner.

      Bureaucrats have used this rallying cry to play on the fear and ignorance of elected officials and the public, pushing for harsher penalties for hackers, billions of dollars in increased funding for cyber-terrorism prevention and even an antitrust exemption for organizations sharing sensitive data with one another.

      And now, there are plans to bring all the governments information security organizations under the umbrella of the proposed Department of Homeland Security, an effort to improve coordination and response.

      All these efforts should help improve the security of government and private networks. But a growing number of people in the security community say the threat of cyber-terrorism is remote at best.

      Richard Clarke, chairman of the Presidents Critical Infrastructure Protection Board and a respected expert on combating conventional terrorism, has been the administrations point man on cyber-terrorism. Clarke has crisscrossed the country, meeting security experts, state and federal officials, and private-sector executives to warn of imminent danger from overseas.

      To Clarke, it is a question of when, not if, foreign terrorists launch a large-scale attack on U.S. networks.

      “We have the role of playing Paul Revere and waking people up,” Clarke said last month at the Black Hat security conference in Las Vegas. “Were going to spend $20 billion on security in fiscal 2004 through 2006. If a cyber-war comes—and come it will—we want to be prepared. Why does it always have to be we do a great job after were hit?”

      Of particular concern to Clarke and others in the Bush administration is the possibility of attacks on the nations electric power grid and other utilities or on the banking and financial system. Bringing down the computers that control a water filtration plant, for example, could have disastrous consequences, they warn.

      And while no one disputes these claims, some security experts say such attacks are unlikely.

      Page Two

      : How Real Is the Threat?”>

      “I dont think were as vulnerable as [Clarke] says we are,” said Scott Blake, vice president of information security at BindView Corp., in Houston. “If Im a terrorist, I want pictures on TV. You dont get that if you knock out the stock markets computers. And, the time to recovery [with a computer attack] is vastly shorter than with a physical attack.”

      A case in point is the recent warning issued by the FBIs National Infrastructure Protection Center regarding the possibility of wide-scale attacks from Western Europe against ISPs and Web servers. A handful of ISPs reported traffic spikes consistent with DoS (denial-of-service) attacks, but there were no reported service outages, and the service providers handled the incidents without a problem.

      Even the rash of distributed-DoS attacks in 2000 on sites such as Amazon, Yahoo and CNN were at worst an inconvenience for most Internet users. The attacks cost the sites involved money in terms of lost traffic, lost revenue and cleanup. But for the most part, service was restored within a day or so.

      However, even those who dont see much of a threat to computer networks from foreign terrorists said Clarkes warnings could do good in the long run.

      “I think some of that [rhetoric] is for effect. But these systems, as theyre deployed, are vulnerable,” said Jack Reis, CEO of NFR Security Inc., a Rockville, Md., intrusion detection vendor that does a lot of work with the federal government. “Attacks are happening. You dont see lot of press about it because people dont want it known. More sophisticated attacks are coming, and more sophisticated defenses need to be created. We have to continue to invest in security technology, to the point where it becomes an integral part of everything we do.”

      The one policy for which Clarke enjoys near-total support in the security community is his pledge to do everything he can to avoid government regulation and control of the Internet.

      “The government, having helped facilitate the Internet, has kind of walked away from it,” Clarke said, “and thats a good thing because if it was a government project, it would work worse than it does. I dont want the government controlling or regulating the Internet.”

      Clarke has said, however, that if software vendors dont improve the quality of their products, the government may have to step in to protect consumers and the countrys networks. This idea has gotten less support.

      “Im not sure how you would regulate software safety, even if you wanted to. Metrics are difficult to come by, and there is no way to avoid bugs in software,” said Avi Rubin, principal researcher at AT&T Labs-Research, in Florham Park, N.J., and an expert on network security. “The main reason is that there is no easy way to measure software security. How would you regulate this? You couldnt say, Software must be at least 57 [percent] secure.”

      Related Stories:

      • Clarke Lambastes Software Industry
      • Editorial: Security: The Feds Can Help
      • Congress Zeros In on Cyber-security
      • Feds Talk Security
      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×