- The Strategist - https://www.aspistrategist.org.au -
Cyber wrap
Posted By David Lang and Simon Hansen on February 26, 2014 @ 14:00
Let’s kick things off at the RSA Conference in San Francisco, which brings together information security professionals and business leaders to discuss emerging cybersecurity trends. This year’s conference has drawn criticism from leading security experts as RSA Security—the network security company that manages the conference— has been accused of taking money from the National Security Agency to incorporate a flawed encryption algorithm into one of its security products.The Obama administration has been engaged in a largely secret debate about whether cyberarms should be used like ordinary weapons, whether they should be rarely used covert tools or whether they ought to be reserved for extraordinarily rare use against the most sophisticated, hard-to-reach targets. And looming over the issue is the question of retaliation: whether such an attack on Syria’s air power, its electric grid or its leadership would prompt Syrian, Iranian or Russian retaliation in the United States.
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-17/
[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2013/07/cyber-logo.jpg
[2] RSA Conference: http://www.rsaconference.com/
[3] drawn criticism: http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/07/at-least-six-security-experts-boycott-prominent-security-conference-over-nsa-ties/
[4] the announcement of a new underwater communications cable: http://www.reuters.com/article/2014/02/24/us-eu-brazil-idUSBREA1N0PL20140224
[5] less-than-successful: http://www.zdnet.com/brazil-struggles-to-create-cybersecurity-policies-7000026701/
[6] news: http://english.cntv.cn/20140225/100553.shtml
[7] Global Multistakeholder Meeting on the Future of Internet Governance: http://netmundial.br/
[8] recently released: http://www.state.gov/e/eb/rls/prsrl/2014/221946.htm
[9] role that American cyber weapons might play in Syria:: http://www.nytimes.com/2014/02/25/world/middleeast/obama-worried-about-effects-of-waging-cyberwar-in-syria.html?_r=0
[10] surprised some: http://theconversation.com/south-koreas-cyber-war-ambitions-could-backfire-badly-23628
[11] candidly announced: http://english.yonhapnews.co.kr/national/2014/02/19/3/0301000000AEN20140219003100315F.html
[12] Stuxnet: http://en.wikipedia.org/wiki/Stuxnet
[13] called for a data-breach notification law: http://www.pcworld.com/article/2101140/us-attorney-general-calls-for-databreach-notification-law.html
[14] interesting piece: http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue
[15] offline with trading suspended: http://www.wired.com/wiredenterprise/2014/02/bitcoins-mt-gox-implodes/
[16] Part III: http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/02/20/the-political-science-of-cybersecurity-iii-how-international-relations-theory-shapes-u-s-cybersecurity-doctrine/
[17] Part I: http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/01/23/the-political-science-of-cybersecurity-i-why-people-fight-so-hard-over-cybersecurity/
[18] Part II: http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/02/12/the-political-science-of-cybersecurity-ii-why-cryptography-is-so-important/
[19] here: https://www.aspi.org.au/publications/cybersecurity-by-executive-order/SI68_Cybersecurity_EO.pdf
[20] ordered a pilot: http://www.rcsi.ie/index.jsp?n=110&p=100&a=4385
[21] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/