Connect with us

Blockchain

The Politics of Cybersecurity in the USA

The Politics of Cybersecurity in the USA, Cybersecurity is the theater of war of the 21st century, it’s vital to keep track of the politics of cybersecurity

mm

Published

on

The Politics of Cybersecurity in the USA

Cybersecurity is the theater of war of the 21st century. While the 20th century’s battles were fought on the oceans, in the air, or on the ground, today’s conflicts take place in the digital realm – a realm that the U.S. state is slowly equipping itself to dominate.

This is creating a struggle between privacy rights and free trade, and the power of government to ensure public safety. And it’s playing out in front of our eyes as the Trump administration seeks to crack down on malware created by foreign “adversaries.”

Because of this, it’s vital to keep track of the politics of cybersecurity. This article looks at the roots of the current situation, assesses recent developments, and tries to tease out some takeaways to put Trump’s policies into context. And to truly understand that context, we need to step back in time – to a time when Trump was a flashy property developer, and malware had barely been conceived.

1. Expanding War-Fighting Capabilities to the Digital Battlefront

During the 1990s and 2000s, U.S. war-fighting capabilities gradually started to embrace a new set of priorities. Seeing that forces based around tanks, fighter jets, and cruise missiles were rapidly becoming less and less relevant, planners started to focus on what became known as “cyber-warfare” – taking the fight into the realm of megabits and malware, instead of missiles.

Under the Bush administration, Strategic Defence Reviews stressed the need for “Full Spectrum Dominance,” including the ability to attack targets via digital weapons. And as the War on Terror kicked into gear, the Patriot Act armed intelligence agencies with a new set of powers to track, attack, and detain suspected enemies of the state.

This continued under the Obama administration, which deepened U.S. cyber-warfare capabilities, extending already-existing NSA surveillance to encompass virtually every byte sent across networks to and within the USA. New weapons emerged as well, such as Stuxnet – a malware agent that ripped through Iranian servers associated with nuclear research in the 2010s.

More recently, stories have emerged about the U.S. attempts to place malware in strategic locations within the Russian power grid – potentially providing Washington with a “nuclear button” to take down the nation’s electricity networks.

As usually happens in global affairs, U.S. attacks have sparked “blowback,” as adversaries seek to leverage their cyber-warfare expertise. However, while the state has learned more about how to fight wars in the digital realm, it has failed to boost its awareness about the threats posed by malicious online warriors. Cyber-warfare has trumped “cybersecurity,” leading to considerable vulnerabilities in the U.S. information infrastructure.

2. How Online Threats to State and Corporate Assets Has Grown

These weaknesses were exposed in vivid detail in 2016 and 2017 when the Lazarus and WannaCry malware attacks hit major US-based corporations. Both were immediately connected to North Korean hacking groups, raising strong suspicions that the reclusive east-Asian state had developed ways to attack American targets that the Pentagon and NSA couldn’t neutralize.

These malware attacks were complemented by the exposure of Electric Fish in 2019 – which has been linked to vast financial crimes across the world (and also traces its origins back to Pyongyang).

North Korea is the only state exposing U.S. cybersecurity weaknesses. Chinese groups like APT10 have been accused of targeting American utilities, potentially leading to crippling blackouts. And, in a development that shows how negligent U.S. authorities have been, there’s a good chance that Chinese digital attackers have been using code created by the NSA.

At the same time, cyber-attacks by non-state actors have become endemic. The sums are so huge that we can’t say for sure exactly how much these attacks cost American companies every year. According to Accenture, the average cost of individual cyber-attacks amounts to around $13 million, and the frequency of security breaches increased by 67% from 2014-2019.

Given that state of affairs, the fact that the U.S. government is taking action to boost its cybersecurity powers is unsurprising. However, coming after the shocking extent of the NSA surveillance scandals, and with distrust of the Trump administration rising, is this expansion a welcome development, and what does it mean for everyday internet users?

3. How the Trump Administration is Taking Action on Cybersecurity

On May 15, 2019, the White House released a highly significant Executive Order, entitled “Executive Orders on Secure the Information and Communications Technology and Services Supply Chain.” Forget about the clunky official title. The substance of this Order has some clear implications for the way we use the internet, and the security measures we need to adopt.

Trump’s Order responded directly to the kind of threats documented earlier, including the dangers posed to information storage infrastructure by ” economic and industrial espionage.”

Importantly, the Order placed blame for this situation on the growing use of foreign-developed technology (with the role of Chinese companies like Huawei firmly in the background). While acknowledging that free trade and technological exchange has significant benefits, the Order made one key demand, which put those ideals into question.

Trump’s Order has created a new prohibition on importing technology produced by companies in which foreign powers have a controlling interest, providing that the Secretary of State for Commerce has deemed that the technology would pose a severe security threat to the U.S. assets (private and public).

This essentially allows government officials to determine which foreign suppliers are approved, and which companies are unacceptable. And it enables the state to penalize companies or individuals who engage with those suppliers.
The idea is to prevent the importation of technologies that are capable of disseminating malware or spying on American citizens. But will it work? In that context, it’s worth remembering that this E.O. comes after a related Order in 2017, which sought to strengthen U.S. corporate and Federal defenses against cyber-attacks. That failed to have the desired effect, resulting in the need for more stringent measures.

4. Is the U.S. Government Tightening Its Grip on Cybersecurity?

Trump’s latest Executive Order could well raise alarms among US IT professionals. For instance, many companies work with Chinese firms like Huawei, or source products from Chinese manufacturers, and will need to ensure regulatory compliance for any future imports.

There are also signs that individuals have cause to be concerned as well. The Executive Order encompasses tech imports as well as “software and other products or services originally intended to fulfill the role of information or data processing, storage, retrieval, or communication by electronic means.”

This means that many of those downloading software developed abroad will need to take into account the status of the vendor. Seeing as almost all software these days incorporates “data processing,” the scope of the Order is potentially enormous.

So, on the surface, it seems as if the state is launching a new phase in its cybersecurity efforts, but what are the takeaways for everyday web users?

5. Understanding the Implications of Cybersecurity Politics

Understanding the Implications of Cybersecurity Politics

Firstly, there’s no need for businesses or individuals to panic. While the Order represents an expansion in the power of the government to sanction foreign companies and individuals, it does not mandate punishments for U.S. citizens.

Said that the future could hold some nasty surprises if the Order is pursued to its logical conclusion. For instance, companies may find it harder to recruit trained professionals from countries deemed “adversaries” of the USA.

Companies that have sourced software or hardware solutions from foreign-owned suppliers could find that their connections to suppliers are disrupted, leading to serious technical challenges.

There may also be challenges for individual software users. For example, many of the best VPNs are based outside the USA. The Executive Order could be used as a tool to suppress these privacy-enhancing services, especially if Congressional oversight is not sufficient.

So, what’s the key takeaway from our brief look at U.S. cybersecurity politics? While panic and alarm are counter-productive, the expanding state’s role in determining what technologies are acceptable is something to watch. When coupled with the dangers posed by official surveillance, it suggests that we should reinforce efforts to balance security and freedom in the digital age.

We are an Instructor, Modern Full Stack Web Application Developers, Freelancers, Tech Bloggers, and Technical SEO Experts. We deliver a rich set of software applications for your business needs.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Blockchain

Perché Dobbiamo Utilizzare Un’Applicazione Antivirus Su Android?

Perché Dobbiamo Utilizzare Un’applicazione Antivirus Su Android? Rischi diversi, Vantaggi dell’utilizzo di applicazioni antivirus su Android

mm

Published

on

PERCHÉ DOBBIAMO UTILIZZARE UN'APPLICAZIONE ANTIVIRUS SU ANDROID

Una soluzione altrettanto fondamentale per garantire che il tuo dispositivo non venga infettato da questi programmi software malevoli (virus, trojan, adware, spyware) è il programma antivirus. Di conseguenza, il codice rileva e respinge anche l’app che può essere sviluppata in modo inefficiente dagli hacker. L’altra virtù è che può anche aiutare la tua macchina a essere sotto tiro e prevenire altri attacchi informatici da attacchi di phishing.

1. Rischi diversi

Android, essendo il sistema operativo mobile più utilizzato a livello globale, è diventato un obiettivo primario per i criminali informatici. Dal malware e ransomware agli attacchi di phishing e al furto di identità, le minacce sono diverse e in continua evoluzione. A differenza dei computer tradizionali, i dispositivi mobili spesso non dispongono delle solide misure di sicurezza inerenti ai sistemi operativi desktop, rendendoli suscettibili di sfruttamento.

a. Minaccia malware

Il malware, abbreviazione di software dannoso, comprende un ampio spettro di minacce progettate per infiltrarsi, interrompere o danneggiare un dispositivo o una rete. Nel regno di Android, i malware possono mascherarsi da applicazioni legittime, nascondersi negli app store o mascherarsi da download innocui dal web. Una volta installato, il malware può provocare danni rubando informazioni sensibili, spiando le attività degli utenti o addirittura rendendo il dispositivo inutilizzabile.

b. Insidie ​​del phishing

Gli attacchi di phishing, un’altra minaccia diffusa, mirano a indurre gli utenti a divulgare informazioni personali come password, numeri di carta di credito o credenziali di accesso. Questi attacchi spesso utilizzano tattiche di ingegneria sociale, sfruttando siti Web, e-mail o messaggi falsi per ingannare le vittime ignare. Con la comodità di accedere alla posta elettronica e navigare sul Web sui nostri dispositivi Android, il rischio di cadere preda di truffe di phishing diventa sempre presente.

2. Vantaggi dell’utilizzo di applicazioni antivirus su Android

a. Il ruolo delle applicazioni antivirus

Le applicazione antivirus gratuita per Android si rivelano indispensabili guardiani della nostra sicurezza digitale di fronte a queste minacce incombenti. Queste soluzioni software sono progettate specificamente per rilevare, prevenire ed eliminare programmi dannosi, rafforzando così le difese dei nostri dispositivi Android.

b. Protezione in tempo reale

Le applicazioni antivirus utilizzano algoritmi sofisticati e analisi euristiche per identificare e neutralizzare proattivamente le minacce in tempo reale. Monitorando continuamente le attività del dispositivo e i flussi di dati in entrata, questi strumenti fungono da sentinelle vigili, intercettando il malware prima che possa infiltrarsi nel sistema.

5 Cyber Security Trends You Can not Ignore

c. Scansione completa

Una delle funzioni principali delle applicazioni antivirus è l’esecuzione di scansioni complete della memoria, delle applicazioni e dei file del dispositivo. Attraverso tecniche di scansione approfondita, questi strumenti ispezionano meticolosamente ogni angolo del dispositivo, eliminando ogni traccia di malware o attività sospette. Eseguendo scansioni regolari, gli utenti possono garantire che i loro dispositivi Android rimangano liberi da minacce nascoste.

d. protezione della rete

In un’era in cui la navigazione sul Web è diventata parte integrante della nostra vita quotidiana, le applicazioni antivirus estendono il loro ombrello protettivo per comprendere le attività online. Integrando funzionalità di protezione Web, questi strumenti possono rilevare e bloccare siti Web dannosi, tentativi di phishing e altre minacce online in tempo reale. Che si tratti di fare acquisti, operazioni bancarie o semplicemente navigare sul Web alla ricerca di informazioni, gli utenti possono navigare nel panorama digitale con sicurezza, sapendo che la loro applicazione antivirus è al loro fianco.

e. Misure antifurto

Oltre a combattere malware e minacce online, molte applicazioni antivirus offrono funzionalità aggiuntive come funzionalità antifurto e generatore di password sicuro. In caso di smarrimento o furto del dispositivo, questi strumenti consentono agli utenti di localizzare, bloccare o cancellare da remoto il proprio dispositivo Android, proteggendo i dati sensibili dalla caduta nelle mani sbagliate. Grazie alla possibilità di tracciare la posizione del dispositivo o attivare un allarme da remoto, gli utenti possono mitigare le potenziali conseguenze del furto o dello smarrimento del dispositivo.

f. Reputazione e affidabilità

Quando si valutano le applicazioni antivirus, è essenziale considerare la reputazione e il track record dello sviluppatore del software. Scegli marchi affermati con una comprovata storia nella fornitura di soluzioni di sicurezza affidabili e aggiornamenti tempestivi. Leggere recensioni e testimonianze di altri utenti può fornire preziose informazioni sull’efficacia e sulle prestazioni dell’applicazione antivirus.

g. Impatto sulle prestazioni

Sebbene le applicazioni antivirus svolgano un ruolo cruciale nella protezione del tuo dispositivo Android, non dovrebbero andare a scapito delle prestazioni o della durata della batteria. Scegli soluzioni leggere e ottimizzate che riducono al minimo il consumo di risorse e funzionano perfettamente in background. Evita applicazioni eccessive che consumano le risorse di sistema o causano rallentamenti, poiché possono compromettere l’esperienza dell’utente.

Conclusione

Le applicazioni antivirus fungono da guardiani indispensabili, proteggendo la nostra oasi digitale da malware, attacchi di phishing e altre attività nefaste. Protezione Web e misure antifurto: questi strumenti consentono agli utenti di navigare nel panorama digitale con sicurezza e tranquillità. Mentre abbracciamo le infinite possibilità offerte dai nostri dispositivi Android, non dimentichiamoci di rafforzare le loro difese con l’armatura della protezione antivirus.

Continue Reading
The Future of HR Technology in Health Services
Health & Fitness4 days ago

The Future of HR Technology in Health Services

How to Choose the Best Test Automation Tool for Your Development Needs
AI Tools1 month ago

How to Choose the Best Test Automation Tool for Your Development Needs

AI Tools1 month ago

A Guide To Using AI for Knowledge Management

Improving Decision Making with Better Data Handling
AI Tools1 month ago

Improving Decision Making with Better Data Handling

The Future of Event Planning Digital Innovations
Entertainment1 month ago

The Future of Event Planning: Digital Innovations

Navigating the Process of Selling Deceased Estate Shares
Business2 months ago

Navigating the Process of Selling Deceased Estate Shares

Everything You Need to Know about Installing and Using Hidden Keylogger for Android
Programming2 months ago

Top Benefits of Hiring a Professional Android App Development Company

PERCHÉ DOBBIAMO UTILIZZARE UN'APPLICAZIONE ANTIVIRUS SU ANDROID
Blockchain2 months ago

Perché Dobbiamo Utilizzare Un’Applicazione Antivirus Su Android?

CYBER SECURITY Business technology Antivirus Alert Protection Security and Cyber Security Firewall Cybersecurity and information technology
Cybersecurity2 months ago

Harnessing AI for Proactive Threat Detection and Response

Key Strategies for Successful Digital Transformation
Business3 months ago

Key Strategies for Successful Digital Transformation

Trending