123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Focus On Weaknesses And Vulnerabilities In Computer Systems Helps Prevent Unauthorized Access To Con

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Governments are probably finding it not easy to strengthen its line of defense in cyber warfare because history lacks experience in cyber conflict. They have no past to learn from, much less conceptualize how a national-level conflict would be fought.
"I would give us today probably a 'C,' going up," said General Keith Alexander of the US military when asked during a House Armed Services Committee hearing to grade the ability of the Defense Department to defend its networks.
The US military has made improvement in hardening its computer networks against cyber attack but more remains to be done, the Pentagon's top cyber warrior said. The Defense Department is working extremely hard on hardening their networks.
"I'd like to say an 'A' but I think it's going to take some time to get to an 'A' and an 'A' is where I believe nobody can penetrate the network," Alexander, head of the Pentagon's Cyber Command and the top secret National Security Agency. Alexander added there had been tremendous progress over the last two years and they have made it extremely difficult for adversaries to get in. "When you look at the ...
... problems we had on our networks a few years ago to where we are today it's a huge improvement," he said.
Frequent attempt to breach the Defense Department’s networks and data security have put DOD’s information security personnel under increasing pressure. Continuous cyber attacks also are raising the benchmark for how the military manages information networks.
The changes come from DOD's realization that the department can no longer protect networks and the data that flows over them simply by building a better firewall, DOD officials say. The department's networks are inextricably tied to public and private networks. And defending the ability to use those networks — and having ways to work around attacks on them — is as important as securing the data in transit on the networks or at rest on systems connected to them.
EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals. CAST will provide highly advanced technical security training such as Advanced Penetration Testing, Digital Mobile Forensics Deep Dive, Advanced Application Security, Advanced Network Defense, and Cryptography Deep Dive. These highly sought after and advanced information security conference will be offered at all EC-Council hosted conferences and events, and through specially selected training partners. The launch classes for CAST will be at the upcoming TakeDownCon Dallas, from May 15-17, 2011.
Meanwhile, DOD has already has taken initial steps to defend its security network. The US Department of Defense has included EC-Council’s Certified Ethical Hacker (CEH) IT security training program into its Directive 8570, making it one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP). Advanced security training skills provide the defender situational awareness required to defend its IT security infrastructure and mounting security threats.
Any governments around the world, including the US is vulnerable to attacks, and attacks can vary in scale. US defense officials are concerned with malware attacks, which had infected significant parts of the Unclassified but Sensitive IP Router Network (NIPRnet) and Secret IP Router Network (SIPRnet).Officials have denied that specific attacks happened or declined to discuss them, including the alleged Chinese hacker attack on Lockheed Martin’s F-35 Joint Strike Fighter data. However, DOD's leadership is pushing for big improvement in how the military secures its data and counters cyber attacks.
The US Defense’s initiative to form highly trained cyber security defenders is a very good step towards achieving its goal in getting a grade “A” for ability to defend its networks.
About EC-Council
EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security conference programs offered in over 60 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 30,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.

Total Views: 279Word Count: 713See All articles From Author

Add Comment

Computers Articles

1. Redefine Customer Experiences Through Progressive Web Apps
Author: Elite_m_commerce

2. All You Need To Know About Mist Computing
Author: TechDogs

3. A Quick Guide To Community Cloud Implementation
Author: TechDogs

4. Top 10 Aws Services List
Author: Top 10 AWS Services List

5. Mastering Cfd Preprocessing: Key Steps For Accurate Simulation Results
Author: cfdsupport

6. Elevate Your Online Presence With Custom Website Design And Expert Woocommerce Developers In Sydney
Author: Amelia Thompson

7. Lexicon Systems: Your Solution For Computer Rentals In Chennai
Author: Hubraseo

8. Aws Vs Azure Vs Google Cloud: Best Suitable Cloud Service Provider For Your Business
Author: goodcoders

9. Top 7 Reasons Why Your Business Needs Firewall?
Author: goodcoders

10. Top 9 Benefits Of Using Laravel Framework For Web App
Author: goodcoders

11. Top 8 Flutter Devtools To Enhance Your App Development Process
Author: goodcoders

12. How To Choose The Best Usb-c Hub For Your Devices: A Guide For Businesses
Author: computer accessories wholesale

13. India's Semiconductor Growth Supported By Solutions From The Busch Group
Author: Busch Vacuum Solutions

14. Video Editing Tips
Author: premiereboyz.online Ratnesh Yadav

15. 5 Reasons Your Project Needs A Business Analyst
Author: 5 Reasons Your Project Needs A Business Analyst

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: