Search This Blog

Tuesday, April 07, 2009

Chinese information warfare capabilities

Analysis of China's information warfare capabilities and techniques
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by F5 Networks
rule

7 Key Challenges You Can't Ignore
Virtualization platforms, such VMware ESX and Microsoft Hyper-V, represent the first form of virtualization that is typically introduced into the data center. While these new infrastructure platforms provide considerable advantages; virtual machines (VMs) also add complexity, scale, and management challenges to your environment. By planning for your migration to virtual machine platforms, and recognizing the inherent challenges, you can make it seamless and optimize your virtual network and storage environment.

rule

Spotlight Story
Chinese information warfare capabilities

M. E. Kabay By M. E. Kabay
As world economic conditions continue to worsen, I expect to see growing use of industrial espionage techniques by current actors and by new ones. Threats against proprietary information and perhaps even risks from sabotage may well increase over the next months and perhaps years. Despite the reflex tendency for retrenchment as revenues fall, now is not the time to be reducing the information security workforce. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Slideshow: 10 ways the Chinese Internet is different from yours This slideshow complements our interview with James Fallows, national correspondent for The Atlantic Monthly, who has experienced "The Great Firewall of China" firsthand.What follows is a list of the differences between the Internet, as seen in the U.S. vs. China.

China denies cyber spy network charges China on Tuesday denied suggestions it could be involved in a cyberespionage ring that attacked computers worldwide from servers mostly based in the country.

China becoming the world's malware factory With China's economy cooling down, some of the country's IT professionals are turning to cybercrime, according to a Beijing-based security expert.

Cyber espionage from state governments? Don't be surprised The report "Tracking GhostNet: Investigating a Cyber Espionage Network," a collaborative effort by consultancy SecDev Group and the Munk Centre for International Studies at the University of Toronto, says it traced ...

Chinese high-tech spy case inches closer to trial Did software engineer Hanjuan Jin steal thousands of confidential documents from Motorola to share with the People's Republic of China? The strange and complex case is expected to go to trial in Chicago.

Yet another government attempt at cybersecurity The timing of two cybersecurity bills just introduced by Sen. John D. Rockefeller, IV (D.-W.Va.), Sen. Olympia Snowe (R.-- Maine) and Sen. Bill Nelson (D.-Fla.) seems a bit funny. It is not so much that they were introduced on April Fools¿ Day; more importantly, they were introduced before the widespread review of U.S. cybersecurity ordered by President Obama is completed by Melissa Hathaway.

IT Was Ready for A Conficker Attack An expected April 1 activation of the Conficker.c worm passed without incident, calming widespread fears that the Internet was in danger of attack.

The Sound of Y2k Can you hear it? Amid the deafening silence that was the the Conficker nonevent of April Fools' Day, you should be able to detect an echo from the past. It started as a quiet murmur, but over time, it will build to a crescendo that could make Conficker the most dangerous malware IT has ever seen.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by F5 Networks
rule

7 Key Challenges You Can't Ignore
Virtualization platforms, such VMware ESX and Microsoft Hyper-V, represent the first form of virtualization that is typically introduced into the data center. While these new infrastructure platforms provide considerable advantages; virtual machines (VMs) also add complexity, scale, and management challenges to your environment. By planning for your migration to virtual machine platforms, and recognizing the inherent challenges, you can make it seamless and optimize your virtual network and storage environment.

rule

Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

04/07/09

Today's most-read stories:

  1. Netscape alums tackle cloud storage
  2. Afraid of losing your job to a younger, cheaper IT worker?
  3. Bill would give Obama power to shut down Internet
  4. IBM, Sun unable to reach a deal, report says
  5. Cries of protest, censorship greet news of cybersecurity bill
  6. Five best router and switch features you never use
  7. Top 10 technology skills
  8. Microsoft says phones are bad
  9. Cisco.com domain name about to expire soon
  10. Economy forcing 'spoiled' generation to grow up
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: