Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Sunday, September 11, 2011

Anonymous Ingin 'Setir' Trending Topic Twitter

Gerah akan topik-topik yang menjadi Trending Topic (TT) di Twitter, kelompok hacker Anonymous akhirnya merilis tool sendiri yang diklaim akan bisa membuat deretan TT versi mereka.

Anonymous menganggap Trending Topic yang ada di Twitter terlalu berlebihan dan mengetengahkan 'pop culture'. Grup ini pun ingin menyetir topik yang berada dalam daftar topik terpopuler tersebut agar memiliki bobot, bersentuhan dengan isu-isu terhangat dunia dan juga permasalahan real.

"Bagi kami hal ini sangat memprihatinkan dan kami tidak akan membiarkannya," demikian pernyataan resmi Anonymous dalam blognya yang dikutip detikINET dari Cnet, Jumat (9/9/2011).

Software versi beta yang dinamakan URGE (for Universal Rapid Gamma Emitter) ini sudah bisa diunduh bagi komputer Windows dan membutuhkan .Net Framework 4 untuk bisa dijalankan.

"Ini bukanlah tool hacking. Tool ini diciptakan untuk memudahkan kami mengirimkan tweet dengan lebih cepat tanpa harus melakukan copy-pasteterus menerus," jelas Anonymous.

Anonymous mengaharapan, URGE akan membantu mereka menyebarkan pesan seperti mengenai politisi yang korupsi, kerusuhan di Suriah atau mengenai rencana kerja Presiden AS Barack Obama.

dikutip dari detikinet semoga bermanfaat
Continue Reading...

Aksi Hacking Ancam Pemilik Mobil

Ancaman akan aksi hacking ternyata juga mengancam pemilik kendaraan seiring dengan makin canggihnya mobil yang mereka miliki.

Banyaknya teknologi yang ditanamkan di dalam kendaraan, menjadi penyebab ancaman ini terjadi. Menurut perusahaan anti-virus McAfee, kini kendaraan roda empat banyak yang dijejali dengan sistem wireless seperti Bluetooth hingga software-software yang ditanamkan dalam airbag serta sistem lainnya.

Potensi ancaman yang datang pun beragam, seperti misalnya pelumpuhan mobil dari jarak jauh, mengunlock dan menghidupkan mobil via ponsel, melacak lokasi si pengemudi termasuk kegiatannya, hingga pencurian data melalui sistem Bluetooth.

Dikutip detikINET dari DailyMail, Minggu (11/9/2011), para peneliti pernah mendemonstrasikan serangan pada mobil. Dilaporkan, hanya dengan melalui SMS mereka bisa membuka pintu dan menyalakan mesin mobil.

"Semakin banyak teknologi digital yang dimiliki kendaraan, maka ancaman makin meningkat," ujar Stuart McClure dari McAfee.

Kini para konsumen memang cenderung untuk selalu berusaha terkoneksi dengan internet di dalam kendaraannya melalui pengintegrasian ke piranti tablet dan smartphone. Perusahaannya pun menyarankan agar pabrikan mobil tidak boleh mengabaikan ancaman-ancaman seperti ini.

dikutip dari detikinet semoga bermanfaat
Continue Reading...

Tuesday, August 9, 2011

The Sun Tumbang, Times Juga Diincar Hacker

Setelah diserang sekelompok hacker yang menamakan diri Lulz Security atau LulzSec, situs The Sun tumbang. Tak hanya The Sun, situs media milik Rupert Murdoch lainnya juga diserbu.

Seperti diketahui, LulzSec memajang berita palsu soal kematian Rupert Murdoch di halaman situs The Sun. Selanjutnya, pengunjung situs diarahkan ke halaman Twitter LulzSec. Di halaman Twitternya, LulzSec memposting pesan yang isinya menyatakan mereka berhasil membobol data para staf The Sun.

Times pun mendapatkan perlakukan sama. Tak ayal, karena down, kedua situs berita yang berada di bawah naungan News Corp milik Rupert Murdoch ini pun ditutup sementara waktu.

News International, salah satu unit News Corp. yang mengelola dua situs tersebut menyebutkan pihaknya sangat mewaspadai serangan yang ditujukan ke The Sun dan Times.

"Tim teknis kami sedang bekerja memperbaikinya," kata juru bicara News International Daisy Dunlop dikutip detikINET dari Bloomberg, Selasa (19/7/2011).

LulzSec dikenal dengan serangan DDoS-nya (distributed denial of service). Serangan ini bisa menumbangkan sebuah situs dengan membanjiri situs tersebut dengan ribuan service request per detik.

dikutip dari detikinet semoga bermanfaat
Continue Reading...

AS Tangkap Hacker Pembela Wikileaks

Empat belas hacker yang membela Wikileaks di Amerika Serikat (AS) diciduk tim kepolisian. Para hacker ini ditangkap karena meretas situs PayPal yang telah menutup akses donasi ke Wikileaks.

Serangan cyber yang menimpa PayPal dilakukan oleh sekelompok hacker yang menamakan diri Anonymous. Aksi ini mereka lakukan sebagai bentuk protes penangguhan akun PayPal untuk Wikileaks.

Seperti diketahui, PayPal yang semula menjadi perantara penyampaian donasi, memutuskan untuk menutup rekening donasi Wikileaks sejak Desember tahun lalu. Saat itu, melalui Twitter Wikileaks menyebutkan keputusan situs e-commerce tersebut lantaran adanya tekanan dari pemerintah AS.

Dilansir situs ITP dan dikutip detikINET, Rabu (20/7/2011) para Anonymous ini bersimpati terhadap Wikileaks. Sejak Wikileaks ramai diberitakan serta mengalami pencekalan dan pengusiran, Anonymous melakukan berbagai aksi hacking membela situs whistleblower tersebut.

Kelompok hacker ini juga melakukan hal serupa terhadap situs Visa dan MasterCard Desember tahun lalu ketika layanan finansial tersebut menghentikan proses donasi untuk WikiLeaks dan pendirinya Julian Assange.

Empat belas hacker penyerang situs PayPal tersebut ditemukan di lokasi yang berbeda-beda yakni di Alabama, Arizona, California, Colorado, Wilayah Kolombia, Florida, Massachusetts, Nevada, New Mexico dan Ohio.

Mereka yang rata-rata berusia 20 hingga 42 tahun ini dikenai pasal pelanggaran telah melakukan konspirasi dan melakukan perusakan terhadap perangkat komputer.

dikutip dari detikinet semoga bermanfaat
Continue Reading...

Hacker 'Usir' Presiden Prancis dari Istana

Hacker menyerang situs Istana Kepresidenan Prancis, Elysee Palace. Pengunjung situs diarahkan ke sebuah halaman permainan video game berjudul 'Get Him Out'.

Pada halaman tersebut, tampak gambar kartun Presiden Prancis Nicolas Sarkozy menggunakan sebuah mobil pergi keluar melalui pintu gerbang istana. Game yang dibuat hacker ini memang bertema 'pengusiran' Sarkozy dari Elysee Palace.

Terdapat juga tombol 'Like' Facebook, yang setiap diklik akan membuat karakter sang Presiden Prancis di game tersebut akan selangkah lebih mendekat ke pintu gerbang istana sehingga akhirnya keluar.

Dikutip detikINET dari Telegraph, Kamis (28/7/2011), instruksi game 'Get Him Out' berbunyi,"Semakin banyak Anda mengklik, semakin cepat kita mengenyahkan Nicolas (Sarkozy)!"

Juru bicara Elysee Palace mengonfirmasikan serangan ke situs kenegaraan itu terjadi pada Selasa malam waktu setempat namun segera diatasi pada keesokan harinya.

"Hacker memanfaatkan sistem software yang sudah tua untuk melakukan re-route temporer di halaman depan situs," terang juru bicara tersebut.

Beberapa jam setelah situs diperbaiki, Sarkozy menuliskan pesan di halaman website yang ditujukan kepada hacker. "Terima kasih telah mengingatkan bahwa tidak ada sistem yang sempurna," tulisnya.

Sarkozy agaknya memang tengah menjadi sasaran empuk sebagian warga negeri menara Eifel yang coba menyuarakan ketidakpuasan mereka terhadap kepemimpinan presiden ke-23 Prancis ini. Tahun lalu, akun Facebook Sarkozy menjadi sasaran keisengan hacker. Kala itu, pembobol akun mengumumkan lelucon soal lengsernya suami dari mantan model Carla Bruni ini dari tahta kepresidenan.

dikutip dari detikinet semoga bermanfaat
Continue Reading...

Anonymous Ancam Tumbangkan Facebook

Facebook akan menjumpai ajalnya pada 5 November nanti. Demikian gol yang dikoar-koarkan oleh kelompok hacker Anonymous.

Dalam video yang diposting di situs YouTube tersebut, Anonymous membeberkan rencana mereka untuk 'menumbangkan' Facebook dan mereka mengajak siapapun untuk berperan serta dalam aksi tersebut. Dikatakan oleh grup tersebut yang dikutip detikINET dari FoxNEws, (10/8/2011), "medium komunikasi yang kamu kagumi akan dihancurkan".

Usaha menjatuhkan Facebook oleh grup peretas internet ini terkait dengan pendapat Anonymous bahwa Facebook telah melanggar privasi dan menyalahgunakan informasi penggunanya.

"Semua yang kamu posting di Facebook akan selamanya ada di sana meskipun kamu telah menghapus akunmu," demikian bunyi modulator suara dalam video yang diposting tanggal 16 Juni itu.

Anonymous mengklaim, informasi yang ada di Facebook telah dijual situs jejaring itu ke pemerintahan dan perusahaan keamanan untuk memata-matai orang.

Akan tetapi tentu dibutuhkan usaha yang ekstra kuat untuk menumbangkan situs raksasa yang didiami 750 juta pengguna ini. Anonymous dulu pernah gagal dalam upaya menumbangkan Amazon.

Di dalam grup Anonymous sendiri sepertinya tidak semua anggota turut serta dalam rencana menjatuhkan Facebook.

Melalui akun Twitter @GroupAnon, grup ini menuliskan "FYI-#OpFacebook diorganisasi oleh beberapa Anons. Hal ini berarti bahwa tidak semua #Anonymus setuju akan rencana itu".

dikutip dari detiknet semoga bermanfaat
Continue Reading...

Thursday, July 28, 2011

Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin

Company claims fighter project schematics and hosted government information were not leaked


Over a week has passed and Lockheed Martin Corp. (LMT), the U.S. government's top information technology services provider, was hacked. The attack has been characterized as a "fairly subtle", yet "significant and tenacious" attack on servers at its massive Gaithersburg, Maryland data center, located not far from the company headquarters in Bethesda.

As details emerge the attack is appearing more and more like it was lifted out of a spy movie or Tom Clancy novel. The hackers appeared to have gained entry using information stolen in a separate, even more audacious attack of one of the world's highest profile security firms.

I. RSA Sec. Breach -- Prelude to the Lockheed Martin Attack?

Back in March hackers gained access to RSA Security's servers. RSA Sec. takes its name from the last initials of founders Ron Rivest, Adi Shamir, and Leonard Adleman, three top cryptographers. The trio's popular public-key cryptography algorithm shares the same name -- RSA.

At the time of the RSA Sec. intrusion, the company commented that despite the fact that it believed information was stolen, the company did not believe customer information or the security of the company's software products were not comprised. Yet, they did advise clients to follow online advice to safeguard themselves against possible fallout from the data loss.

The attack on RSA was described as "extremely sophisticated".

Sources close to Lockheed point to compromised RSA SecurID tokens -- USB keychain dongles that generate strings of numbers for cryptography purposes -- as playing a pivotal role in the Lockheed Martin hack.

II. Damage Control

Hackers are believed to have entered Lockheed Martin's servers by gaining illegitimate access to the company's virtual private network (VPN). The VPN allowed employees to connect over virtually any public network to the company's primary servers, using information streams secured by cryptography.

With the RSA tokens hacked, though, those supposedly secure VPN connections were compromised.

Lockheed says that it detected the attack "almost immediately" and warded it off quickly. The company has since brought the VPN back online, but not before "upgrades" to the RSA tokens and adding new layers of security to the remote login procedure.

III. What Was Lost?

At this point the question on everyone's mind likely is "What was lost?"

Lockheed has cause for concern -- the company is not only safeguarding a wealth of U.S. government military information from external sources, it's also protecting its own valuable projects -- the F-16, F-22 and F-35 fighter aircraft; the Aegis naval combat system; and the THAAD missile defense.

A U.S. Defense Department spokeswoman, Air Force Lieutenant Colonel April Cunningham told Reuters Saturday night that the risk from the breach was "minimal and we [the USAF] don't expect any adverse effect."

Lockheed Martin claims that no compromise of customer, program or employees' personal data occurred. The company has made similar claims about past breaches.

Now that the Pentagon is involved, if anything was stolen, it should be identified shortly.

IV. Who Attacked Lockheed Martin?

After the pressing issue of what was lost, perhaps the second most compelling question is who was behind the breach. Military officials and security staff at Lockheed are looking for clues in local time stamped information stored on the server and IP logs, trying to find out who accessed the compromised systems from where and when.

The problem is not easy as hackers commonly reroute their malicious traffic through multiple proxies, disguising their location. That said, given the nature of attack -- take down one of the world's top security firms and then use that information to compromise a top defense contractor -- involvement by a foreign government is suspected.

Lockheed posted a job listing last week requesting the services of a "lead computer forensic examiner". Requirements included someone who could "attack signatures, tactics, techniques and procedures associated with advanced threats" and "reverse engineer attacker encoding protocols." The cyber forensics expert's first task will likely be to try to pinpoint the identity of the attacker.

The most likely suspect is obviously China, with whom the U.S. government has been waging a "cyberwar" with for a decade now. China hires freelance hackers and maintains a large military force of official hackers as well. It uses this force to infiltrate international utilities, businesses, government servers, and defense contractors, looking for valuable information.

China has recently been testing a stealth jet, the J-20, which contains features curiously similar to those found on past Lockheed Martin designs. China insists, though, that it did not use stolen information to build its new weapon.

V. One Million Threats

Lockheed Martin's IT staff say they encounter 1 million "incidents" a day. They have to filter through these, distinguishing "white noise" from serious threats.

The Maryland data center from which information was taken is a state of the art facility, built in 2008. It covers 25,000 square-feet and cost $17M USD to build. But even with relatively modern systems and protections, defenses were still not strong enough to hold off the sophisticated and savvy attacker.

The company has a separate back-up data center in Denver, Colorado, which shares some of the company's contract workload. That center is not believed to have been breached in the intrusion.

Going ahead, Lockheed Martin will invariably face pressure from the U.S. Military and Congress to do a better job in making its systems breach-proof. But given the company's budget versus China's virtually blank check given to cyber security efforts, one has to wonder how much the company will be able to do with so little.

Sondra Barbour, the company's chief information officer, reminded employees in an email, "The fact is, in this new reality, we are a frequent target of adversaries around the world."

dikutip dari dailytech.com
semoga bermanfaat
Continue Reading...

Chinese Hackers Score Heist of 35 Million South Koreans' Personal Info

Chinese authorities have not yet agreed to cooperate


There's an elephant in the room, when it comes to internet attacks, and that elephant is China. While America once was fearful of China's communist philosophies, today the Asian giant poses a far greater threat in its economic success.

China is home to some of the world's most sophisticated hackers, many of which are given a virtual green light to attack foreign governments and businesses, in attacks that assist China's government and Chinese businesses. It's a well known fact, but everyone is too afraid to try to stand up to the Asian nation, as it hold large amounts of debt, as well as enjoys control of much of the world's rare mineral resources and manufacturing.

South Korea has become the latest to reportedly bear the brunt of Chinese cyber aggression. The Korea Communications Commission (South Korea's equivalent of the U.S. Federal Communications Commission) says that hackers this morning attacked Nate portal and Cyworld blogging sites, both operated by SK Communications Comp., Ltd. (KDQ:066270).

The hackers reportedly made off with personal information from an astounding 35 million users. The stolen information includes -- in some cases -- phone numbers, e-mail addresses, names, and coded data of users. The attacks are believed to have originated from China.

South Korea, like the U.S., is struggling to protect its businesses from foreign attacks. In April, Nonghyup, a large South Korean commercial bank, suffered an attack which was believed to have been sourced from North Korea. Then in May, South Korea's Hyundai Capital, which is owned by Hyundai Motor Company (SEO:005380) and General Electric Comp. (GE) subsidiary, GE Capital International, suffered a similar breach.

Meanwhile in mid-May in the U.S. top defense contractor Lockheed Martin Corp. (LMT) was the victim of a sophisticated cyberintrusion, which was believed to have originated in China.

The U.S. government now says that cyberattacks can be construed as an act of war, if they cause real world death or destruction. However, the U.S., like South Korea, has done little -- officially, at least -- to respond when cyber-savvy nations like China threatened companies like Google Inc. (GOOG) for speaking out about cyberattacks.

South Korean officials are currently investigating the massive SK Comms breach, and are not yet working with Chinese officials.

dikutip dari dailytech.com
semoga bermanfaat
Continue Reading...

"Pwnies" are the Grammies of the Hacker World

Held at Black Hat, the awards celebrate security security expertise, incompetence

Hackers are gearing up for the annual Black Hat convention next month in Las Vegas, Nevada, and already one of the hottest topics is the annual "Pwnie" awards.

Inspired by awards programs like Grammies and the Academy Awards Show, the "Pwnies" celebrate both security super skills and horrific incompetence. They are voted on by professionals in the field of information security -- most of which would be called "grey" or "white" hat hackers.

The awards will be held August 3 and winners, as usual, will receive a painted gold My Little Pony -- a phonetic play on the internet slang "pwn" for being made a fool of (getting "owned on"). "Pwnie" and "pony" are homophones.

Returning categories this year include:
Best Server-Side Bug
Best Client-Side Bug
Best Privilege Escalation Bug
Most Innovative Research
Lamest Vendor Response
Best Song
Most Epic FAIL
The "Most Epic 0wnage" category has been add, as well. Competitors include the prolific LulzSec who hacked Sony Corp. (TYO:6758) and others [1][2][3][4][5][6][7] [8][9][10][11][12][13][14][15] earlier this year and Bradley Manning/Wikileaks who raised an international ruckus by publishing U.S. State Department and Department of Defense secrets [1][2][3][4][5].

Speaking of Sony, the company has been nominated multiple times for the "Epic FAIL" award. In fact, it's this year's only listed nominee.

One of the best song nominations -- George "GeoHot" Hotz's rap ditty "The Light It Up Contest" [video] -- is also Sony related. The song was written in response to Sony's lawsuit against GeoHot for jailbreaking the PS3.

It contains such gems as:
I shed a tear everytime I think of Lik Sang
But shit man, they're a corporation
And I'm a personification of freedom for all
You fill dockets, like thats a concept foreign to y'all
While lawyers muddy water and TROs stall
Out of business is jail for me
And you're suing me civilly.

Exhibit this in the courtroom
Go on, do it, I dare you.

Sony eventually settled with GeoHot.


dikutip dari dailytech.com semoga bermanfaat

Continue Reading...

Sunday, July 10, 2011

Anonymous meng-hack Jaringan Kontraktor FBI

Para hacker yang menyatakan diri mereka "Anonymous' AntiSec Campaign" telah menyusup ke jaringan IRC Federal, sebuah perusahaan rekayasa yang bekerja dengan beberapa lembaga federal termasuk juga FBI.

Kelompok hacker mengklaim telah memperoleh akses ke server web kontraktor, database email, login VPN dan informasi lainnya.

"Dalam email mereka(lembaga federal dan FBI), kami menemukan berbagai kontrak, skema pengembangan, dan dokumen internal untuk berbagai instansi pemerintah termasuk proposal FBI untuk mengembangkan proyek Special Identities Modernization (SIM) dalam rangka mengurangi aktivitas teroris dan para kriminal dengan melindungi semua catatan yang  berhubungan dengan pihak individu yang terpercaya (mungkin maksudnya mata-mata) dan mengungkapkan identitas orang-orang yang dapat menimbulkan resiko serius bagi warga Amerika Serikat dan sekutunya".

"Kami juga menemukan sidik jari kontrak masalah pengembangan DOJ Biometric untuk militer dan kontrak strategi National Nuclear Security Administration Nuclear Weapons Complex", tulis para hacker.

Setelah mencuri data, beberapa data tersebut lalu disebarkan di dunia maya dan para hacker menghapus database perusahaan itu kemudia men-deface website tersebut.

"Kami melaporkan ke pihak berwenang dan kami tidak berkomentar mengenai hal tersebut", kata seorang juru bicara IRC Federal New York Times, sementara pihak FBI enggan untuk berkomentar.

Kompromi dilakukan oleh pihak IRC Federal terkait para hacker yang mengakui bahwa mereka telah berhasil menemukan login untuk third-party VPNs dan Departemen Sistem Energi.

Dalam pengumuman mereka, mereka juga menjelaskan bagaimana para hacker beraksi. Seperti biasa, dimulai dengan kerentanan SQL injection vulnerability untuk mengekstrak kredensial administratif. Kemudia para hacker menemukan script untuk meng-upload gambar pada situs. Script ini memiliki kredensial daftar hitam untuk mencegah upload kode dieksekusi, namun tidak terjawab, termasuk file berekstensi .cfm

Dari sana para hacker mendownload database phpbb forum internal yang berisi password hash. Beberapa dari mereka meng-crack email para pekerja IRC Federal.

Semua vektor serangan, injeksi SQL, hash password crackable, password kembali, juga dimanfaatkan dalam serangan terhadap HBGary federal awal tahun ini. Orang akan berpikir bahwa Federal dan kontraktor IRC lainnya akan belajar sesuatu dari kejadian itu.


sumber : softpedia

semoga bermanfaat yooo

Continue Reading...

Sunday, July 3, 2011

Hackers Kill 4,800 Australian Sites Thanks to Brutal Attack on Web Host

Web host says sites are unrecoverable

It's every web administrator's worst nightmare -- your online presence is totally destroyed in a service outage. That's precisely what happened when Australian domain registrar and web host Distribute.IT was attacked.

Over 4,800 websites were reportedly lost when the hackers struck last Saturday, as four servers were reportedly left unrecoverable. The company comments:

The overall magnitude of the tragedy and the loss of our information and yours is simply incalculable; and we are distressed by the actions of the parties responsible for this reprehensible act.

At this time, We regret to inform that the data, sites and emails that were hosted on Drought, Hurricane, Blizzard and Cyclone can be considered by all the experts to be unrecoverable," it said.

While every effort will be made to continue to gain access to the lost information from those hosting servers, it seems unlikely that any usable data will can be salvaged from these platforms.

In assessing the situation, our greatest fears have been confirmed that not only was the production data erased during the attack, but also key backups, snapshots and other information that would allow us to reconstruct these servers from the remaining data.

The company promises to help customers "transfer your hosting and email needs to other hosting providers."

For large site owners that likely won't be a problem as they likely have save backup copies of their homepage. For smaller operators, though, this could be very bad news, as many of them don't have the resources to save backup copies.

Writes one customer in a local forum, "[The hack] has probably killed my business."

The question remains why Distribute.IT was penetrated so easily and thoroughly. It is also baffling why they chose not to back up their data off-site as most hosting firms do.

As the potential for abuse of the stolen private information of website owners is great, these factors may play a key role in possible future legal proceedings by site owners against the company.


Masih bahasa inggris, belum diterjemahkan, haha sekalian belajar bahasa inggris, dikit-dikit
sumber : dailytech.com
Continue Reading...

Laporan GAO: Pentagon Harus Memberikan Pelatihan yang lebih baik untuk Sistem Komando Keamanan Cyber Baru

Komando Cyber ​​baru sedang diberlakukan di pangkalan di Fort Meade di Maryland bersama dengan Badan Keamanan Nasional


Tahun ini telah diragukan lagi, hal itu ditandai dengan beberapa serangan cyber yang paling sering dan berani sejak tahun 1990-an. Sejak 4 Januari, kelompok-kelompok hacker seperti Anonim, Goatse Security dan LulzSec (alias "Lulz Security") telah meluncurkan web terkait serangan pada Sony, Lockheed Martin Corp, Gmail account, Bank of America dan sektor-sektor pemerintah yang berbeda di seluruh dunia termasuk di Tunisia, Inggris dan Spanyol.

Target pemerintah di Amerika Serikat telah menjadi US Central Intelligence Agency, sebuah afiliasi dari US Federal Bureau of Investigation dan US Senat server.

Selain itu, LulzSec dan Anonim telah bergabung untuk "menyatakan perang" pada pemerintah AS dan internasional serta bank. Sejauh ini, LulzSec telah meluncurkan lebih dari 18 serangan utama dan Anonim telah meluncurkan lebih dari 11 serangan.

Masalah keamanan menjadi sorotan utama para hacker meluncurkan serangannya. Bahkan, Government Accountability Office (GAO) merilis sebuah laporan pada Senin mengatakan bahwa Pentagon di tengah-tengah mendirikan US Cyber ​​Command baru. Tapi itu tidak cukup untuk menjamin akhir serangan cyber, pemerintah juga harus "menetapkan tenggat waktu untuk lay out pedoman lebih rinci tentang bagaimana tenaga kerja cyber bekerja bersama-sama."

Departemen (DOD) Pertahanan jaringan komputer sangat beresiko, menurut GAO. Jaringan komputer departemen-scan jutaan kali sehari, dan sangat penting bahwa keamanan ditingkatkan sebanyak mungkin. Untuk mengatasi masalah ini, Cyber ​​Command baru sedang diberlakukan di pangkalan di Fort Meade di Maryland bersama dengan Badan Keamanan Nasional.

Seiring dengan Cyber ​​Command baru, Pentagon juga harus membuat program pelatihan baik untuk staf. Ini akan mengidentifikasi pekerjaan maya cocok untuk anggota militer dan warga sipil. Selain itu, laporan GAO menyarankan bahwa peta Pentagon keluar struktur dan tugas Angkatan Laut, Angkatan Darat, Laut dan Angkatan Udara maya komponen yang terkait dengan Cyber ​​Command baru.

Robert Butler, wakil asisten menteri pertahanan untuk kebijakan cyber, menanggapi laporan GAO dengan mengatakan bahwa Pentagon adalah menangani masalah ini, namun saat ini belum ada "waktu untuk penyelesaian."

Sumber : dailytech.com
Continue Reading...
 

Free Download Copyright © 2009