Showing posts with label Cyber Warfare History. Show all posts
Showing posts with label Cyber Warfare History. Show all posts

Cyber Warfare - What Is Air Gapping In Cyber Security?

 



The word "air gapping" refers to a security procedure implemented to safeguard a computer system against unauthorized access.

A computer system must be separated from any local area network or public wireless network in order to be air gapped.

Because of the sensitive information stored therein, the military, intelligence agencies, financial institutions, and even certain advocacy organizations air gap some systems.

Air gapping is primarily a security mechanism, but it may also refer to a data transmission technique from one classified system to another.

It's often utilized to transport material from the low side (unclassified machines) to the high side (classified equipment) (classified machines).

On the low side, data is cut to a CD-ROM and put on the high side.

Even isolating the system from the rest of the network may not be enough to keep it safe.

Recent exploits have shown the importance of air gapping in critical systems.

A hacker claimed lately that he gained access to a flight control system through the plane's media network.

The Stuxnet virus, which infected Iranian centrifuges, was delivered through a USB device linked to the machine.

Even if the system's exterior connections keep it safe from electromagnetic or other electrical attacks, they can't keep the system safe from internal errors or threats.

The US government created guidelines to aid air gap computer systems under the National Security Administration's (NSA) TEMPEST program (Telecommunications Electronics Material Protected from Emanating Spurious Transmissions).

To avoid intrusion, the guidelines propose keeping the system at a minimum safe distance and enclosing it in a Faraday cage.

 





See also: 


Cyber Security; Hardware; Internet


Further Reading:


Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins, 2010.

Libicki, Martin. Cyberspace in Peace and War. Annapolis, MD: U.S. Naval Institute Press, 2016.







Cyber Warfare - Who Is DMITRI ALPEROVITCH?




ALPEROV Dmitri Alperovitch cofounded CrowdStrike, a security technology firm that helps businesses and governments defend their intellectual property and secrets from cyber espionage and cyber crime, in 2011 and later became its chief technology officer.

Alperovitch graduated from Georgia Tech with a master's degree in information security and a bachelor's degree in computer science.

In the late 1990s and early 2000s, Alperovitch worked with a variety of computer security start-ups, including CipherTrust, which pioneered the TrustedSource reputation system.

He headed the research team that developed the software as a service company when CipherTrust was bought by Secure Computing in 2006.

When McAfee purchased Secure Computing in 2008, Alpero vitch became vice president of threat research.

In January 2010, he oversaw Operation Aurora, a probe of Google and two dozen other firms' Chinese breaches.

He also headed the investigation of Western multinational oil and gas firms' Night Dragon espionage program, which he tracked to a Chinese person residing in Heze City, Shandong Province, People's Republic of China.

Alp erovitch was also honored with the coveted Government 100 Award in 2011 for his services to federal information security in the United States.

Alperovitch was named one of Washingtonian's "Tech Titans" in 2013 and 2015 for his achievements in the area of cyber security.

In 2013, he was named one of MIT Technology Review's "Top 35 Innovators Under 35." In addition to his work at CrowdStrike, Alperovitch is a nonresident senior fellow at the Atlantic Council's Cyber Statecraft Initiative.

Alperovitch has done substantial research on reputation systems, spam detection, Web security, public-key and identity-based cryptography, malware detection and prevention, and public-key and identity-based cryptography.


 




See also: 


Cryptography; Encryption; McAfee



Further Reading:


“Atlantic Council Programs Report: July 2015.” Atlantic Council, August 3, 2015. http://www.atlanticcouncil.org/for-members/atlantic-council-programs-report-may2015-3.

“Dmitri Alperovitch.” CrowdStrike. http://www.crowdstrike.com/dmitri-alperovitch.

“Innovators under 35: Dmitri Alperovitch, CTO, CrowdStrike.” MIT Technology Review, October 10, 2013. https://www.technologyreview.com/s/521371/innovators-under-35-dmitri-alperovitch-cto-crowdstrike.