Indiana University Working to Quell ‘Cybergeddon’

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<strong>Jan. 22 &mdash; Bloomington, Ind. </strong><br />Cyberattacks pose one of the greatest threats to the United States, lagging behind only nuclear warfare and weapons of mass destruction in terms of their potential devastation, FBI experts said earlier this month. <br /><br />Indiana University is assisting in research and education to help prevent such attacks on American infrastructure, said Fred H. Cate, a distinguished professor of law at the IU Maurer School of Law – Bloomington and director of the Center for Applied Cybersecurity Research. In 2008, IU was recognized by the National Security Agency and the Department of Homeland Security as a National Center of Academic Excellence in Information Assurance Research. <br /><br />”While cyberattacks pose the greatest threat to the United States in terms of potential devastation caused, they are in fact first in terms of prevalence,” Cate said. “IU is investing heavily in identifying and blocking those attacks and in ensuring that we build the tools and provide the education so that individuals and institutions can protect themselves against catastrophic attacks.” <br /><br />Cate&#39;s comments follow an Internet security conference in New York in which several federal agencies warned of a potential &ldquo;cybergeddon,&rdquo; an attack that could paralyze the international economy and other infrastructure with the click of a button. <br /><br />During the conference, Shawn Henry, assistant director of the FBI&#39;s cyberdivision, said terrorist groups want to create an electronic Sept. 11, “inflicting the same kind of damage on our country, on all our countries, on all our networks, as they did in 2001.” <br /><br />Cate, who was recently named one of the world&#39;s top computer privacy experts by Minnesota Privacy Consultants, said smaller-scale cyberattacks happen with more frequency than most probably imagine and often target the computers and networks of law-abiding individuals and organizations. <br /><br />”Organized attacks by governments and terrorist groups against U.S. computers occur on a daily basis,” Cate said. “What is even more frightening is that those attacks target both public- and private-sector computers and often use the same techniques that ordinary fraudsters and hackers employ.” <br /><br />While a large-scale cyberattack has yet to paralyze American systems such as bank communications, air-traffic control programs or water treatment management systems, cyberterrorists have not stopped trying, Cate said, and attackers have held some networks hostage. <br /><br />For that reason, the CACR is conducting major research initiatives focusing on vulnerabilities, such as phishing attacks and other efforts to defraud users into providing passwords and other personal information. <br /><br />Researchers at IU&#39;s Advanced Network Management Lab also track, and in some cases block, the spread of network attacks. IU&#39;s cybersecurity experts regularly advise members of Congress, government agencies and the private sector on how best to combat potential attacks. <br />

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>