13:35 GMT +323 July 2017
Live
    Cyber security

    Global Malware Attack Exposes Severe Flaws in US Cybersecurity

    CC0 / Pixabay
    US
    Get short URL
    3800612

    A malware attack that swept across the globe on May 12 exposed crucial vulnerabilities in the United States cybersecurity system, James Stavridis, a retired US Navy admiral and NATO supreme allied commander, wrote in an article for Foreign Policy.

    According to Stavridis, despite spending billions of dollars on cybersecurity, the US still falls behind in withstanding massive cyberattacks.

    In the article, the author outlined six moves that need to be implemented to enhance US cybersecurity capabilities.

    First, Stavridis proposed reforms on the governmental level, including increased coordination between agencies in charge of cyber-issues. Currently, there are the NSA, the Department of Homeland Security and the FBI, and coordination leaves much to be desired.

    "Six separate centers for cybersecurity are scattered across the government, none of which really has the lead. And perhaps most worrisome, there is no single voice in the president’s cabinet for cybersecurity," Stavridis wrote.

    According to him, one cybersecurity agency should be established and a coordinating role in cybersecurity issues should be given to the director of national security.

    Second, Stavridis argued that creating a Cyber Force should be strongly considered.

    Third, the NSA and the US Cyber Command should be split, in order to optimize the decision making and management process.

    Furthermore, Stavridis proposed increasing cooperation between public agencies and private firms.

    "Congress can play an important role here by passing legislation that provides or backs up cyberinsurance, reduces liability for information sharing, and establishes formal private-public bodies, much as is done in other sectors," the article read.

    A fifth idea is developing "cyber-education." The author noted that over 70 percent of cyberattacks can be prevented if users follow the basic rules, including changing passwords and avoiding the use of thumb drives from unknown sources.

    Finally, according to Stavridis, the US needs a better doctrine and strategy, including a "theory of deterrence in the context of offensive cyberoperations."

    "This past weekend’s global attack was a harbinger. We have to improve our readiness to respond when the real cyber-Pearl Harbor threatens," Stavridis concluded.

    The large-scale cyberattack which has compromised organizations in dozens of countries worldwide started Friday, and, according to the Kaspersky Lab IT company, the attacks were carried out using a specific ransomware called WannaCry.

    The company registered about 45,000 ransomware attacks in 74 countries worldwide, with the largest number of targets located in Russia.

    On Sunday, Europol Executive Director Rob Wainwright said that 200,000 users in 150 countries, including businesses and large corporations, were subjected to the attack.

    Among other institutions and organizations, the malicious software affected the UK public health system NHS, the German state rail company Deutsche Bahn, the Russian Interior Ministry and banks. The virus blocked computers with messages flashing on the screen demanding money to remove the restriction.


    Never miss a story again — sign up to our Telegram channel and we'll keep you up to speed!

    Related:

    Hackers Who Leaked Tools For Global CyberAttack Set To Sell Secret Code
    European Cyber Agencies Scramble to Counter WannaCry Ransomware Attack
    Rise of Cybersecurity Threats Triggered by Culture of Gov't Secrecy
    US Deep State Policies Kept Society Vulnerable to Cyber Attacks - Whistleblower
    Tags:
    cybersecurity, WannaCry virus, United States
    Community standardsDiscussion
    Comment via FacebookComment via Sputnik
    • Сomment