I can help by being at the forefront of defending the Government IT infrastructure from hackers instead of taking the back seat if i am given the opportunity.
The National & Gov infrastructure surface area are too big and too disparate currently and there are many points of entries - will be difficult to defend.
In fact, the recent website defacement can be prevented, the stolen information from the webserver will not have taken place if a more holistic approach - technology wise and process wise is undertaken. The 19 websites down during maintenance will also not have taken place if correct technique of DC diversity is used.
There is not necessarily exponential increase in the security cost of tightening the infrastructure - it is the how. How to do it cost effectively.
Technology is not the only solution. It is more than that.
If there is a recall of duty - I am more than willing to take up this offer instead of laying back at the back seat.
It anyone see the Diehard 4
and see how the group of hackers take control and create havoc by taking over
the network, satellite, radio comm, wireless network, telecom etc to shut down
the FBI network, to take control of media broadcast to broadcast the hacker message
and threaten the whole country, to redirect traffic by changing the traffic
light and cause car accidents throughout the whole country, to intercept and
take over the police command and control centre and no one can call the police
when there is emergency, intercepted the Airforce command and radio F35 fighter
to fire on the police etc.
It is not a good feeling to
see such things happening. And
it is exasperating to see things happening, where almost all incidents can be
protected and prevented.
In the opposite poles –
National and Government IT Infrastructure can be holistically planned and
hackers will have very little chance.
We have few group of
hackers:-
(1) Hackers from International Internet, Wireless comm.
(2) Hackers from Local Internet, Wireless comm - 3G/4G, and other Wireless comm.
(3) etc Need not mention.
A
more holistic approach will be necessary.
(1) Hackers from International Internet, Wireless comm.
(2) Hackers from Local Internet, Wireless comm - 3G/4G, and other Wireless comm.
(3) etc Need not mention.
No comments:
Post a Comment