Posts

Government Stance on Information Technology Security

President Obama and his administration are talking technology. Obama is taking the time to weigh in on his observation on the exponential growth and acceleration in the tech world. The president recognizes technology as an important factor which has driven our economic growth. The Obama administration is committed to ensuring America has a thriving and growing Internet economy, and takes a stance on information technology security.

Positive Thoughts for Information Technology

Information technology is the systematic process implemented to measure systems constructed to securely protect and safeguard information –business and personal data, voice conversations, still images, motion pictures, and multimedia presentations. The Obama Administration has publicly declared their encouragement of Internet innovation, protection of consumer choice, and the importance of defending free speech. The Administration created the Internet Policy Task Force to bring together the technology industry, consumer groups, and policy experts to help ensure the Internet stays reliable and trustworthy for consumers and businesses.

President Obama has declared that “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America’s economic prosperity in the 21st century will depend on cybersecurity.” To help the country meet this challenge and to ensure the Internet can continue as an engine of growth and prosperity, the Administration is implementing the National Strategy for Trusted Identities in Cyberspace. The Administration also released the International Strategy for Cyberspace to promote the free flow of information, the security and privacy of data, and the integrity of the interconnected networks, which are all essential to American and global economic prosperity and security.

 

Brief History of Information Technology Security

People are fiercely driven by ‘what is going to happen’ rather than ‘what has happened’. Due to the growing concern of intellectual property vulnerability, people have begun to investigate further into the past. By understanding the history of technology security you might be able to safeguard against potential threats. Information technology security protects sensitive assets and property through the use of technology processes and training. High concerns that stem directly from information security are protection of confidentiality, integrity, and availability.

“The more you know about the past, the better prepared you are for the future.” -Theodore Roosevelt

The Early Years

Despite the efforts of the “CIA Triad” (or more commonly known as the Parkerian Hexad) on confidentiality/control, information integrity, authenticity, availability, and utility, they were not able to guard against all threats. Early mainframes used by the military were connected to phone lines called ARPANET (precedent to today’s internet), which allowed integration of information between government data centers. A special ARPA squadron began to determine additional steps for better security by studying the unsecure points between the data centers and the public. Their studies jump started the first few precautions focused on mainframe operating systems. MIT, Bell Labs, and General Electric were the first pioneers to build multiple security levels and passwords into their mainframes.

The Boom of Hacking

Computer system hacking began in 1970’s with the boom of emerging telecommunication technology. Ready to ‘stick it to the man’, a group of hackers found a way to infiltrate the telephone and computer networks in order to make free long distance calls. Also known as “phreakers”, these groups were pioneers for organized crime against unsecured networks. After Ian Murphy’s crime of stealing information from military computers in 1986, the Computer Fraud and Abuse Act was created. The Emergency Response Team was created to alert computer users of network security issues after Robert Morris unleashed the Morris Worm to thousands of defenseless computers.

The Growing Concern

Although public use of the Internet is barely 20 years old, malicious Internet activity has turned into a major criminal enterprise for over a decade. Businesses are now under attack by big threats that can leave them defenseless and exposed. Growing concern for the safety of personal/business information comes from the accelerated worldwide use of electronic data and the heavy amount of business conducted over the internet. With this expedited advancement and expansion, more and more people are putting their personal information online, making them vulnerable for an attack. In 2010, a group of the nation’s top scientists concluded in a report to the Pentagon that “the cyber-universe is complex well beyond anyone’s understanding and exhibits behavior that no one predicted, and sometimes can’t even be explained well.”

We recognize that monitoring technology activities are important to continue to protect the safety and security of your business. If you have any questions or concerns about your technology contact Cognoscape today.