Tag Archive for: Adopt

Counties required to adopt security system


By MARY MURPHY
Washington State Journal

OLYMPIA – Under a bill Secretary of State Steve Hobbs endorsed, all counties are required to install “Albert Systems,” a technology that notifies counties when there is an attempted cybersecurity attack. 

Even though ballot-counting machines are not connected to the Internet, election data is often circulated on Internet communication channels. Technology like the Albert System can help protect the security of county records by monitoring any attempt to manipulate, intercept, or tamper with data transmitted through these channels. 

While 36 of 39 counties across the state already use this system, the counties that don’t have expressed concern about requiring this technology. Lincoln County officials, for example, spoke to its use of the Albert System and its potential flaws.

“Lincoln County became a victim of a ransomware attack in 2020,” Rob Coffman, Lincoln County Commissioner, said. “At the time, it had Albert Systems monitoring the county network. That attack brought the county to its knees for months, costing tens of thousands of dollars.”

Coffman said the third-party non-profit which runs Albert Systems, the Center for Internet Security, never notified the county of the attack. 

The version of the bill that passed requires counties to install the Albert System specifically. “We all want secure elections,” Tom Gaines, Grant County Commissioner, said. “We all want to make sure that the people in our communities know that their data is safe, but we shouldn’t be forced to put something into our data center that sits outside our firewall, that we’re not allowed to ask about, and that we don’t get a dashboard to see what’s going back and forth.”

Others, however, say this legislation is necessary and timely. 

“We are under threat from seen and unseen vulnerabilities within our election systems, and in Washington State,” prime sponsor, Sen. Joe Nguyễn, D-White Center, said. “Thanks to the leadership of our secretary of state, we figure by example. But we are not immune to the dangers that cast a shadow over the safety of our own votes.” 

Nguyễn…

Source…

NATO: Time to Adopt a Pre-emptive Approach to Cyber Security in New Age Security Architecture


Introduction

Cyber threats are complex and asymmetrical, particularly because cyberspace is “borderless” and exists digitally. NATO ensures its cyber security through collective action among its permanent members who respond based on the depth of the attack or vulnerability. With the new NATO Cyber Security Centre (NCSC), a cyber security command based in Mons, Belgium, NATO reinforces its capabilities in the cyber ecosystem. NATO seeks to secure its infrastructural digital networks through a centralized allied process. The main stated strategic goal of NATO’s cyber security infrastructure is to collectively counter “the full spectrum of cyber threats at all times.” The key pillars of this deterrence and defense posture include safeguarding vital networks, protecting infrastructures, and supporting cyber security missions. To mitigate the asymmetrical threat of cyberattacks, NATO must remain technologically advanced, agile, and interoperable in military operations to enhance its collective cyber resilience. NATO’s current policy simply responds to cyber attacks and minimizes vulnerabilities. NATO should transition towards preventing such attacks at all levels (from fundamental to complex wired infrastructure).

The Evolution of NATO’s Posture

As a security provider in the Euro-Atlantic region, NATO must ensure protection at all levels to prevent harm and damage from cyberattacks. NATO has long considered cyber defense to be a central defense mechanism. The need for a cyber security space feasibility requirement was first noted in the 2002 NATO Summit meeting in Prague, which discussed the necessity of technological agility and planning on electronic warfare and information systems. The Riga Summit in 2006 reiterated this necessity. Despite this recognition, no cyber security apparatus fully evolved, and interconnected cyber defense capacity remained low. Nevertheless, the summits accurately forecasted that future war operations would be far more complicated due to growing cyber security threats. Battles have occurred over an increasing number of dimensions–whether air, land, sea, or digital–particularly as electronic warfare has become a…

Source…

US Space Force Major urges Defense Department to adopt Bitcoin as an ‘offset strategy’


U.S. Space Force Major Jason Lowery has brought a novel perspective on Bitcoin to light, extending its significance far beyond finance and into national defense and cybersecurity.

In a detailed letter to the Defense of Defense’s (DoD) Innovation Board, Lowery argued that Bitcoin and similar proof-of-work (PoW) protocols hold substantial strategic importance, urging the government to delve deeper into their potential applications.

Macrochip

The major’s letter contextualized Bitcoin within the military strategy of an offset approach. The concept historically involves leveraging technological advancements to counterbalance adversaries’ strengths.

Lowery suggested that Bitcoin and its underlying technology could serve as contemporary tools in this regard, potentially redefining the landscape of cyber warfare and defense.

Lowery described Bitcoin as a pioneering “macrochip,” a concept that transforms the global electric power grid into a vast, resource-intensive computer. This innovative approach, he argued, introduces physical costs into the digital domain, offering a new method of securing a wide array of data across the internet.

According to Lowery, this strategy challenges the conventional paradigms of cybersecurity and could mark a significant shift in protecting national interests in the digital age.

Lowery also addressed the ongoing challenges in cybersecurity, highlighting the inadequacies of existing software-based solutions. He proposed that the proof-of-work protocol, as exemplified by Bitcoin, represents a significant innovation in this field.

By introducing the notion of real-world physical costs as deterrents in cyberspace, this approach could revolutionize the way digital security is enforced.

Recommendations to DoD

The letter further explored the implications of this technology for cyber warfare and defense strategies. Lowery emphasized the need for the United States to recognize and quickly adapt to Bitcoin’s potential as a strategic offset in cybersecurity.

He warned that failure to do so could impact the global balance of power, especially in an era where digital and interconnected systems are increasingly vulnerable to security breaches.

In his role as the U.S….

Source…

China Automotive Cybersecurity Hardware Research Report 2022: OEMs Generally Adopt the Security Chip + HSM Strategy to Build their Cybersecurity Protection System – ResearchAndMarkets.com


DUBLIN–()–The “China Automotive Cybersecurity Hardware Research Report, 2022” report has been added to ResearchAndMarkets.com’s offering.

Security chip and HSM that meet the national encryption standards will build the automotive cybersecurity hardware foundation for China.

OEMs generally adopt the security chip + HSM strategy to build their cybersecurity protection system.

At the core of cybersecurity hardware are security chip and hardware security module (HSM).

Security chip, or secure element (SE), is an integrated circuit that integrates cryptographic algorithms and features physical attack prevention design.

Hardware security module (HSM) is a computer device used to protect and manage the keys and sensitive data applied by the strong authentication system, and also provide related cryptographic operations. It is the basic support for automotive security solutions.

At present, most OEMs employ the security chip + HSM strategy to build an automotive cybersecurity protection system.

For example, in its automotive cybersecurity security system, NIO uses security chips and HSM to reinforce hardware and networks; in terms of secure communication, the HSM and certificate system featuring integrity, encryption, pseudonymization and anonymity is the basis for enabling data privacy protection. In addition, bug fixes over the air (OTA) are available in the case of emergency.

GAC completes the hardware security design and creates the four systems of border protection, automotive security, PKI certification & transmission, and security services, using security chip (SE) + HSM, and secure boot, trusted zone and encryption technologies. And at the vehicle end, GAC conducts in-depth research on vehicle inside and outside multi-node security protections, such as Linux OS for T BOX 4G module, Android OS for vehicle head unit, QNX OS for gateway and MCU, and communication interaction, aiming to establish an in-depth protection system for in-vehicle security.

Homemade SE chips are mass-produced and applied in vehicles.

As the US passed CHIPS Act, the localization of semiconductors in China assumes greater urgency. More chip equipment, materials and…

Source…