U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cyber Warfare: Who's Watching Your Network?

NCJ Number
194964
Journal
Journal of Counterterrorism & Homeland Security Int'l Volume: 8 Issue: 2 Dated: 2002 Pages: 4-5
Author(s)
Kristopher Carr
Date Published
2002
Length
2 pages
Annotation
This article discusses possible security countermeasures in the protection of information technology (IT) networks across the United States.
Abstract
Recent studies have indicated that in cyber warfare the enemy is often hidden within our own ranks and that two-thirds of corporate information technology (IT) network attacks originate from inside a company. It was noted that multiple security measures are necessary to reduce the amount of risk to IT networks. One such countermeasure identified was the Intrusion Detection System (IDS). The IDS supplements the firewall security and performs as an early warning system or burglar alarm. One of the most important security measures is the implementation of a Security Policies and Procedures document. The document articulates an organization’s vision and philosophy for a secure environment and minimizes insider threat. In addition to the above, physical information technology was identified as equally important in defining countermeasures within a network perimeter.