Posts Tagged ‘information sharing’

How the FBI Protects Against Cyber-Hacks

Monday, November 16th, 2015
Cyber Hacking

Information sharing helps protect against cyber-hacking.

You may remember the cyber-attack on Sony last year after they released the film “The Interview”. The comic farce, in which two men try to assassinate Kim Jong-un, was taken as a threat by North Koreans, who launched the cyber-attack as a response. While the FBI was able to figure out where the attack came from, it was still dangerous. James Clapper, the director of national intelligence, described the attack as “the most serious cyber-attack ever made against US interests”. Imagine that these kinds of attacks are directed at banks or sensitive government files. There are two main sources of cyber-attacks to protect from: crime-sponsored attacks that are used for extortion (criminals also make money by selling Malware), and state-sponsored attacks that are used for espionage. It takes constant vigilance to maintain our systems against cyber-attacks, and there are ways that we can ensure we have as safe a system as possible.

What is Information-Sharing?

Back in 2011, the Obama Administration proposed a reform that would make information-sharing easier, and since then, Congress has passed information-sharing bills every year. This kind of information-sharing technology allows for clues about potential hackers to be passed on to others. For example, if Oil Refinery A notices that someone is attempting to hack its systems, then it can pass that information on to Oil Refineries B, C, and D, so they can take preventative measures to keep from getting hacked. Obama’s reform this year has been to make it easier for information from the private sector to be shared with the government, which helps the government to prevent sophisticated cyber-attacks.

How Does Information-Sharing Help Me?

You have nothing to worry about when it comes to this type of information-sharing. The only information that is passed on is information that’s crucial to identifying hackers; things like IP addresses, routing information, and time stamps. Your personal information is not stored or collected. As it stands now, our information-sharing program still only creates a patchwork of security. We’re moving towards more security with security products—like anti-malware, antivirus, and intrusion protection systems—that scan for threats. Sharing crucial information is important to prevent cyber-attacks that affect American businesses and citizens directly. In 2013, US retailers were affected by point of sale malware called BlackPOS. You may remember how Target had to pay hack victims $10 million in damages after hackers stole bank card information for $40 million people from the Target in-store credit cards. Cyber-attacks get worse and worse every year, and it is up to companies like DHA Group, Inc. to stop them.

DHA Group, Inc.

An award-winning management consulting and contracting firm primarily serving federal, civilian and defense agencies, DHA group supports clients’ mission-critical work by delivering expert professional services. If you have more questions about automatic software whitelisting, contact DHA for knowledgeable service.

Follow us on social media on FacebookLinkedInTwitter or Google+.