USEUROPEAFRICAASIA 中文雙語Fran?ais
    Home / World

    All must share security burden

    China Daily | Updated: 2013-01-09 07:23

    Internet | Art Coviello

    Strong cyber security cannot be achieved by any of us in isolation: It's a group condition, a group responsibility.

    International cooperation is needed. Chinese companies that are concerned about the safety of their digital assets must reach out to organizations they trust to exchange security information.

    They need to learn what their business partners - and the partners of their business partners - are doing to protect this interconnected community's digital assets.

    These three points are often true about cyber attacks: an enemy prefers to target a group's weakest members, the best places to strike are connection points, and a group is only as strong as its weakest link.

    These points have been noticeable as companies and government organizations across the world face increasingly frequent cyber attacks.

    We've heard about some of them, but most go unreported. Because the attacks are often executed with stealth, organizations whose security has been breached often aren't aware of it. Also, many organizations won't admit that they have been attacked.

    All must share security burden

    Besieged organizations also may not realize that even the most up-to-date anti-virus programs, firewalls and other prevention technologies amount to nothing in the face of advanced cyber security attacks. Attackers can still get in.

    To truly make their information more secure, organizations that have suffered cyber attacks should talk to other organizations - not just providers of information security products and services, but also close business partners and competitors. They'll often find that those they speak to have encountered attacks in which similar, or even identical, techniques were employed.

    Through such exchanges, organizations can assemble more pieces of the puzzle and gain a deeper understanding of how such attacks are carried out. They may also come to be more aware of who their attackers are and what they're ultimately after. The ultimate hope is they will be able to change the outcomes of future attacks.

    When organizations gain a broader perspective on cyber threats, they become less reliant on preventive technologies that are easily evaded by sophisticated attackers. They instead turn their attention to identifying and protecting their most important information assets. They invest their security resources in technical and procedural solutions that result in a faster detection of attacks and quicker responses to them.

    Some organizations may believe they are unlikely targets of cyber attacks. Consider, though, that attackers often wage cyber attacks against companies in order to get at their business partners.

    Cyber attackers prey on the vulnerabilities of our digital connections and are often far more aware of those vulnerabilities than we are ourselves.

    In 2013, cyber security will continue to be challenged in the following ways:

    Hackers are more likely to become even more sophisticated.

    Our attack surfaces will expand and any remaining semblance of a perimeter will continue to wither.

    Changes will occur whether security teams are ready or not.

    Governments will continue to struggle to write rules concerning evidence, information sharing and the reform of privacy laws.

    Nation states will continue to move past intrusion and deliberately attempt to disrupt and destroy.

    Responsible people in organizations will move beyond being aware of the seriousness of the situation and obtain a genuine understanding of it.

    Adopting an intelligence-based security model that includes big data and analytics will prove essential in the formation of a true defense-in-depth strategy.

    This year will be one to witness our efforts toward achieving greater cooperation. The continued growth of our interconnected global economies will depend on it.

    The author is the executive chairman of RSA, the security civision of EMC.

    (China Daily 01/09/2013 page16)

    Today's Top News

    Editor's picks

    Most Viewed

    Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
    License for publishing multimedia online 0108263

    Registration Number: 130349
    FOLLOW US
    无码AV中文字幕久久专区| 国产亚洲大尺度无码无码专线| 日韩综合无码一区二区| 亚洲av无码国产精品色在线看不卡 | 亚洲国产精品成人AV无码久久综合影院 | 亚洲成A人片在线观看无码不卡 | 无码人妻丰满熟妇啪啪网站| 毛片无码全部免费| 色情无码WWW视频无码区小黄鸭 | 无码人妻精品一区二区三区蜜桃| 亚洲中文字幕日本无线码| 久久水蜜桃亚洲av无码精品麻豆| 日韩免费码中文在线观看| 中文字幕人妻无码一区二区三区| 国产成人无码免费看片软件| 国产成年无码AV片在线韩国| 日本高清不卡中文字幕免费| 精品久久久无码人妻中文字幕| 国产成人无码午夜福利软件| 黄A无码片内射无码视频| 无码人妻精品一区二区三区在线 | 欧美成人中文字幕在线看| 中文字幕无码精品三级在线电影| 内射无码专区久久亚洲| 国产成人AV一区二区三区无码 | 免费AV一区二区三区无码| 水蜜桃av无码一区二区| 亚洲AV无码一区二区二三区入口| 久久精品无码一区二区WWW | 中文字幕无码一区二区免费| 久久中文字幕无码专区| 中文字幕亚洲免费无线观看日本| 中文字幕日本高清| 中文字幕一区二区三区永久| 中文字幕久久精品| 制服丝袜日韩中文字幕在线| 免费无码作爱视频| 亚洲国产精品无码久久一线| 亚洲大尺度无码无码专区| 日韩精品专区AV无码| 久久久久亚洲AV片无码下载蜜桃|