Saturday, April 23, 2011

the biggest loss is a cyberspy behavior

Harvard University professor, "soft power" theory ShouChangZhe Joseph s. nye, Jr. at the end of February also wrote in the New York times, said for America, the biggest loss is a cyberspy behavior and all kinds of Internet crime caused by, but the next 10 years, the network warfare and network terrorism may become more of a threat.
In the age of the Internet to American weakness, Obama government cried foul.MBT Habari, Obama thinks, network security has become the national economic and national security faces one of the most serious challenges.
"Strengthening coping" is the United States government first choice
In fact, in the maintenance of network security, the U.S. government has several departments shall be responsible for the subordinate, the government has six network security full-time institutions, namely, the emergency response team, affiliated computer homeland security; Joint forces global action network center, belonging to defense; National network survey joint task group, belonging to the fbi; Intelligence community network incident response center, affiliated with the national intelligence director office; Cyberspace security threats action center, belong to national security; Defence cyber crime center, belonging to the department of defense.
However, these institutions of intelligence and technology can share? Crisis, exactly how to coordinate the coping? The Internet industry is still in rapid development, the netizen team continues to expand, the network case, all these make frequent, the United States has not yet Obama was prepared to cope with the challenge of network safety preparation.
So, Obama, shortly after taking office established "web space policy assessment team", with complete assessment information and communication infrastructure security protection status and coping ability. He later adopted the assessmentmbt shoes uk team submitted network space policy evaluation report, such as the suggestion maintain close contacts with the President established the "White House network safety coordinator" and set up "the White House network security office", coordinate the federal government's military and civil department network security policy and action.
By the end of 2009, the United States has also established a "national communication and network security control joint coordination center", the main job is to coordinate and integration of the six network security full-time institutions to provide information, interdisciplinary network space development trend, analysis and report the ability to judge the operation status of the national network space.
Barack Obama in the government watch, former President bush signed the "national network security comprehensive plan" is also are fully implemented. This plan includes a series of complementary policies and measures, and the goal is by establishing and improving the federal government to network vulnerabilities, internal threats and safety accidents, ultimately through understanding of the risk at all levels of the government and the private sector, increase the whole society cooperation decisive action, reducing vulnerabilities and the ability to prevent invasion, strengthen future network space security. The government also organized governments at all levels MBT Ema,and departments of network attack maneuvers to collaborative.
In the children's online pornography crime blow job, the federal government will undoubtedly plays a leading role, multiple department has established a special agency or start special project strike child pornography. For example, the justice department funded the network crime hit children special forces, for state and local relevant action providing technology, equipment and manpower support.
Established on laws and regulations, from advanced network coordination management institutions, MBT Panda, to assess the network security situation, formulate response plan and relevant exercise, the United States is held by the United States maintains multiple mechanism of network security and national interests.

No comments:

Post a Comment