CAREER OUTLOOK
profit from online users.” That definition can be ex- panded to hacktivist groups, teams of online criminals and countries that both use the activity to enrich elements of their hierarchy, to cripple other states and perhaps in combination with the former turn a blind eye to the activity of citizens involved in the practice. Although there are disagree- ments about the exact figures, ABC News said that in 2009, U.S. corporations swallowed about $50 billion in losses from their research and development efforts. In the same report, Robert “Bear”
Professional Life V
arious websites define cyber piracy as an action that “involves various deceptive practices that companies or individuals engage in to
Stanton Gatewood, chief information security and ePrivacy officer, University System of Georgia
Bryant, the national counterintelligence executive, said that “if our research and development — $400 billion a year — is pilfered, frankly, it will destroy part of our economic viability in this country.”
Cyber crooks also prey upon students, who are often criticized for downloading of music, television shows and movies. USNEws. com published in October 2012 — National Cyber Security Aware- ness Month — that college campuses face “anything from users’ online bank accounts being compromised to their email accounts being hacked and used to mass-distribute spam.
Stanton Gatewood says the monetary value of safeguarding intellectual property is priceless. He, the chief information secu- rity and e-privacy officer of the University System of Georgia, should know.
Gatewood, 55, says institutions and citizens can secure and protect their names, possessions and reputations by instituting policies and standards, staying abreast of technology and staying aware of possible threats. Organizations must establish an Appropriate Use Policy (AUP) with has standards to control how users and outsiders connect to a network, handle and share data, manage incident or attacks, prepare how to maintain continuity of operations when under assault, and teach management to remain vigilant. Organization technology must include network protection, host
66 USBE&IT I WINTER 2012
by Frank McCoy
fmccoy@ccgmag.com DEFENDING INTELLECTUAL PROPERTY RIGHTS AND THWARTING CYBER PIRACY
protection and data protection for examples measure to prevent intrusion into networks and hosts, and consistent encryption of data at-rest and in-transit. To do these things, all personnel must adopt a position of shared responsibility, remain aware of threats, upgrade their skills and use role-based training for enforce learning.
The most common threats to the University System of
Georgia include attacks against the confidentiality, integrity and availability of information and information systems. In response, the CISO, known internationally as an informa-
tion security, infrastructure protection and electronic privacy expert rolled out admired counter measures: • Installing standardizing endpoint security and security management.
• Protect endpoints, such as smart devices, tablets, laptops and desktops, by unifying them with via a single product and service.
• Establishing a statewide security and privacy awareness and training program for all 35 state colleges and universities, more than 400 Georgia public libraries and more than 100 state agencies.
• Creating an “e-privacy” portal for all Georgia citizens.
Of course, battling cyber thieves never ends. The “Info- Sec Evangelist” says the new intellectual property protection includes hardening the geo-fencing—virtual perimeters based upon real land or sea—and geo-location—the actual location of an object—of data.
Plus Gatewood says people are trying to do the impossible: completely protecting data headed to the cloud, in the cloud and coming out of the cloud. “We, users of cloud computing, need to ensure that the con-
fidentiality, integrity and availability model for data is factored into this technology,” Gatewood said. “Do we fully understand the technology, the good, bad and ugly?” To protect cloud data, he advocates end-to-end encryption for local and cloud providers as well as cloud training for users, technologists and management.
Gatewood has direct advice for would-be CISOs:
• Maintain “a sweet mixture of education/certifications, expe- rience and passion.”
• Monitor how people think and act as in the world of the free flow of information and the exchange of ideas awareness is the greatest tool for securing and protecting IP.
www.blackengineer.com
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86