{"id":107,"date":"2012-02-02T16:52:17","date_gmt":"2012-02-02T16:52:17","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=107"},"modified":"2012-02-02T16:52:17","modified_gmt":"2012-02-02T16:52:17","slug":"cyberthreats-are-you-ready","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2012\/02\/02\/cyberthreats-are-you-ready\/","title":{"rendered":"Cyberthreats &#8211; Are You Ready?"},"content":{"rendered":"<p>Within the last week, there have been two articles on major news sources regarding the importance of Cybersecurity in the Information Age.\u00a0\u00a0 I\u2019ll summarize them below. These articles demonstrate how everyone needs to have an awareness of cyber threats and the ways to handle them.\u00a0 We\u2019ve seen a good trend in that Cybersecurity is now (finally!) taking a priority for organizations. Whether it\u2019s protecting from Cyberthreats or responding to Cyber incidents, Companies need a security plan of action. They can no longer hide from Cyber risks, but proactively address them.<\/p>\n<p style=\"padding-left: 30px;\"><strong>ABC News \u2013 <a href=\"http:\/\/abcnews.go.com\/blogs\/politics\/2012\/01\/fbi-director-says-cyberthreat-will-surpass-threat-from-terrorists\/\">FBI Director Says Cyberthreat Will Surpass Threat From Terrorists<\/a> <\/strong>(<a href=\"http:\/\/abcnews.go.com\/blogs\/politics\/2012\/01\/fbi-director-says-cyberthreat-will-surpass-threat-from-terrorists\/\">http:\/\/abcnews.go.com\/blogs\/politics\/2012\/01\/fbi-director-says-cyberthreat-will-surpass-threat-from-terrorists\/<\/a>) <strong><\/strong><\/p>\n<p style=\"padding-left: 30px;\">FBI Director Robert Mueller and National Intelligence Director James Clapper testified this week before the Senate Select Committee on Intelligence on Cyberthreats. The threat of economic fraud and espionage from state actors such as Russia and China is a real and growing concern. \u201cWe foresee a cyber-environment in which emerging technologies are developed and implemented before security responses can be put in place,\u201d Clapper said. The article lists many of the complex computer breaches that highlight the wide array of threats the officials were testifying about.<\/p>\n<p style=\"padding-left: 30px;\">\u00a0<\/p>\n<p style=\"padding-left: 30px;\">\u00a0<strong>USA Today &#8211; <a href=\"http:\/\/www.usatoday.com\/money\/jobcenter\/workplace\/bruzzese\/story\/2012-01-31\/profession-that-hunts-cybercriminals\/52909566\/1\">Want CSI without the blood? Investigate computer forensics<\/a><\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n<p style=\"padding-left: 30px;\">The Television show CSI and its spin-offs has greatly enhanced the profile of forensics practices. Of course, it\u2019s not as easy as it looks on TV. Computer forensics is a skilled discipline that takes years of practice to perfect to ensure all evidence is properly obtained and secured. Today, there\u2019s a huge need as most investigations involve some aspect of information technology.\u00a0<\/p>\n<p style=\"padding-left: 30px;\">This article in USA Today discusses the increasing prevalence of computer forensics in law enforcement and investigations. It quotes that \u201c<a href=\"http:\/\/www.usatoday.com\/money\/jobcenter\/workplace\/bruzzese\/story\/2012-01-31\/profession-that-hunts-cybercriminals\/52909566\/Bureau%20of%20Labor%20Statistics%20article\" target=\"popup729\">Bureau of Labor Statistics estimates computer forensics jobs<\/a> are expected to grow more than 13 percent in the next several years.\u201d\u00a0 The growth isn\u2019t limited to only computer forensics, but all aspects of Cybersecurity.\u00a0 The <a title=\"More news, photos about National Security Agency\" href=\"http:\/\/content.usatoday.com\/topics\/topic\/Organizations\/Government+Bodies\/National+Security+Agency\">National Security Agency<\/a> has plans to hire 3,000 specialists to combat the thousands of cyberattacks every day in the <a title=\"More news, photos about United States\" href=\"http:\/\/content.usatoday.com\/topics\/topic\/Places,+Geography\/Countries\/United+States\">United States<\/a>, while the <a title=\"More news, photos about Department of Homeland Security\" href=\"http:\/\/content.usatoday.com\/topics\/topic\/Organizations\/Government+Bodies\/United+States+Department+of+Homeland+Security\">Department of Homeland Security<\/a> is hiring about 1,000 more Cybersecurity specialists<\/p>\n<p>These articles show that a new warfront is cyberspace. As a nation, individuals and organizations need to step up their cyber protections and be ready when cyber attacks occur.<\/p>\n<p>We will discuss this and many other aspects of Cyberwar in our webinar \/ live debate on Wednesday, February 22<sup>nd<\/sup>.\u00a0 See <a href=\"http:\/\/www.bellevue.edu\/cyberwar\/\">http:\/\/www.bellevue.edu\/cyberwar\/<\/a> for details and to register.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Within the last week, there have been two articles on major news sources regarding the importance of Cybersecurity in the Information Age.\u00a0\u00a0 I\u2019ll summarize them below. These articles demonstrate how everyone needs to have an awareness of cyber threats and the ways to handle them.\u00a0 We\u2019ve seen a good trend in that Cybersecurity is now [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,5,3],"tags":[],"class_list":["post-107","post","type-post","status-publish","format-standard","hentry","category-cyberwar","category-forensics","category-security-management"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=107"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/107\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/107\/revisions\/110"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}