Lead by example through making certain government computer systems and networks are secure and that the best information security measures are used.
On the cyber-security threat, Blair's written testimony described an inability to contend with attacks using computer networks and telecommunications systems.
As a result, most home networks and computer systems never progress beyond the default settings they ship with, which leaves them wideopen.
FORBES: With Rise Of Consumer Mobile Devices, We're All CIOs Now
These products are used in telecommunications networks, computer-controlled systems, security systems, emergency lighting, electric utilities and switchgear, medical equipment, rail signaling, renewable energy, and military and aviation equipment.
But experts say a successful, large-scale attack on U.S. computer systems could hobble electric-power grids, transportation networks and industrial-supply chains.
Jan Verplancke, the chief information officer of Standard Chartered, says that international banks build their large computer systems in the places that have the most reliable communications and power networks and are least prone to natural disasters.
Speaking to reporters at the task force ribbon-cutting ceremony, Mike Dorsey, a special agent with the Naval Criminal Investigative Service who is working directly with the JTF-CND to investigate computer crimes against DOD networks, said unauthorized attempts to access DOD systems are on the rise but that DOD does not have the resources to respond to every incident.
An attack on U.S. computer networks could knock out power grids, telecommunications, transportation and banking systems in a matter of seconds.
"We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach, " says Lt.
The distributed denial-of-service attack failed to crash those payment networks, but David says Anonymous did manage to poke around their back-end computer systems.
Unknown hackers, perhaps a world away, had inserted malicious software into the computer networks of private-sector companies that operate most of our transportation, water and other critical infrastructure systems.
应用推荐