During the opening ceremony of National Safety Month 1 October, Major General Roar Sundseth, Head of Cyber ??Defence, lectures.
See also: Cyber ??defense will have cyber strategy
Following the lecture, and in respect of the collection of so many wise heads of security, found Computerworld that his pkass to ask for something a little on the side during the press conference – the elephant in the room, one can say:
– How does one respond to espionage by nation-states, particularly from allies, in light of Snowden revelations about American mass monitoring of data traffic?
– All nations with respect for themselves engaged in information gathering on the Web. But it is also true that for the defense this is the gradient and hi-grade systems with a division where you have to physically connect it to gain access. Our hi-grade networks are also protected through “crypto”, starting Strait Seth.
– I note that others what has come up for both Snowden and Wikileaks in its time. It emphasizes to me that it continues to show the human factor is still important so that people who take decisions to reveal classified information, he continued.
– But there are other authorities which in this case must be able to answer your question, my job is to protect defense systems against intrusion.
– military communication systems were penetrated in Afghanistan?
– Exactly where was because someone plugged a memory stick. The case also shows that, indeed, it is not enough to have a separate distinction between the Internet and classified systems as long as you can access through the use of memory sticks. It is not only technology to use to protect themselves, it is also the consciousness of the individual.
on these issues was the organizer of National Safety Month, Norwegian Centre for Information Security (NorSIS), clarity:
– We are very concerned about the fact that others gain information from Norwegian companies. This may be used in a negotiating position for a country sitting on sensitive information. This is probably a wake up call for the industry, and certainly by the public, the information we have here is precious and we must ensure that both technological and human, says Tore Larsen order loop in NorSIS to Computerworld.
No comments:
Post a Comment