by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : August 15, 2013
QWhat changes are you seeing in the nature of on- going cyberattacks? Attackers are shifting from directly targeting government and military networks to tar- geting networks in the defense industrial base and commer- cial critical infrastructure. e attacks are also increasing in frequency and severity. e goal is increased ex ltration of intellectual property and attacks on critical systems with the intent to in ict eco- nomic damage, without the victim even being aware. Q What are some emerging best practices in protecting critical infrastructure networks? A First, understand the threat: What do you need to pro- tect and against what kind of attacks? en develop a comprehensive security architecture and design it so you can implement it in phases and keep it within your budget. Of course, do the basics: Inventory your net- work assets, use strong access control, deploy rewalls and other boundary defenses, analyze audit logs, de- velop an incidence response capability -- all the stan- dard IT "security hygiene." Adopt a system that gives you a virtual view of your entire network, which not only can inform you of threats, but provide more detail on the type of threat and enable you to isolate it. It's like the quarterback who heads to the bench and looks at pictures from the press box during the game. From the eld he can't see all the moving parts, but with that "eye in the sky" feedback, he's going to be much more e ective as the game goes on. And don't forget about insiders. Not all threats come from the outside. Au- thentication and network compartmentalization are important aspects to securing your network. Q Experts now say it is important to take a holistic view of network protection. What does that mean? In large enterprises, sometimes just understanding the scope of the network is di cult, and an understand- ing of the threat usually develops over time. A holistic view encompasses an understanding of the network, the threat, and the weaknesses of various security systems. It also enables administrators to layer defense and not depend on a single approach. We're nding success in this approach with our critical infrastructure protection for the utility industry. QWhat are the key characteristics of a holistic approach? A One example is adding visualization into network secu- rity, with the objective of isolating and containing at- tacks instead of trying to prevent them. Zero-day at- tacks by nature can't be stopped since their signatures have not been observed, so this isolation strategy can be very e ective if it is added to typical signature blocking approaches. Q Increasingly, some organizations are opting to out- source their security operations centers. What are the advantages of this approach? A You can gain speed in implementation, tap into a far greater knowledge base, and lower your costs. e time and money needed to build your own multi-layer secu- rity system, then sta it, can seem pretty daunting. It can hold you back from what you know is a crucial need. By using a complete network protection service, you get the security you need in place much more quickly. And you leverage the knowledge being built every day by that third-party sta across a variety of enterprises. Even on an hour-by-hour basis, they can identify a new threat that might be attacking another network and be ready to pre- vent you from ever seeing that threat. A A Critical Infrastructure Protection Needs Holistic Approach Jerry Goodwin VP and General Manager ViaSat Secure Network Systems Sponsored Content For more information on ViaSat, go to www.viasat.com/trusted
July 30, 2013
August 30, 2013