Cyber Tech It

Rules of engagement to win the cyber war :


Rules of engagement to win the cyber war: mapping of virtual areas at risk; controls on purchases of technological goods and services; special powers in the event of a crisis, including the interruption of services (a cybernetic curfew). The decree law, approved by the council of ministers last September 19, is the protocol for the drafting of defensive strategies in the event of intangible attacks, capable of bringing the life of the nation to its knees with a click.

This is what it is. Now everything is online, all the services provided to the community, whatever sector they belong to, and administrations, schools, hospitals, media, transport, the industrial production system, and so on depend on the network and information systems and IT services.

Certainly we cannot go back, indeed the push is in the sense of the quantitative increase in the use of technological tools and of the qualitative increase, that is, of the improvement of services rendered by machines (faster, more resistant, more intelligent).

At the same time, dangers of the same nature are growing. Attacks that can compromise the confidentiality, integrity and availability of information necessary for national security and for the operation of all economic sectors, as well as the life of each individual, necessarily connected.


So let's see the contents of the provision just launched by the government.

Security perimeter. The decree law draws the "security perimeter" and that is the virtual area of ​​the infrastructure networks to be protected from cyber attacks. Within the protected perimeter there will be the networks, information systems and IT services of public administrations, national and public bodies and operators, on which the exercise of an essential function of the State, or the provision of an essential service depends. for the maintenance of civil, social or economic activities fundamental to the interests of the State.

The economic and social system depends on the functionality of networks and electronic tools and attacks on networks and systems are an attack on national security. Technological dependence requires a security system of the same nature. The decree sets the four-month deadline for drawing up the security perimeter. The mapping must be constantly updated, but it is only the first step. The urgent provision in question sets a deadline for an equally decisive fulfillment, namely the definition of notification procedures for incidents impacting networks, information systems and IT services to a task force, called the IT Security Intervention Group in the event of accident (Csirt) Italian. The notification triggers the circulation of the incident report to the other authorities involved: the cyber security core; Ministry of the Interior, Presidency of the Council of Ministers. The measures to be adopted for the security of networks and systems must also be written. The measures will contain security policies, disaster recovery measures and measures for physical and logical protection and data.

Foreign tenders under control. The procedure for technological purchases (goods, systems and ICT services) on foreign markets must be regulated. The Ministry of Economic Development will be able to impose conditions and tests on hardware and software to be included in the tender specifications.

Administrative sanctions. Both the notification obligations and those relating to tenders are assisted by the provision of administrative sanctions in the event of non-compliance.

5G technology. An article of the law decree deals specifically with 5G technology in order to affirm the need for monitoring of vulnerability factors that could compromise the integrity and security of the networks and data passing through them. A deadline is set to adapt goods and services purchased by the state to high safety standards. Without excluding the replacement of equipment or products if seriously affected by security.

Cybernetic crisis. The law decree writes the protocol to be followed in the event of a cyber crisis. The main protagonist is the head of the government invested with the power-duty, if indispensable and for the time strictly necessary to eliminate the specific risk factor or to mitigate it, according to a proportionality criterion, to totally or partially deactivate one or more more equipment or products used in networks, systems or for the performance of the services concerned.

Comments

  1. These rules really look genuine and must be implemented may be they will help.
    mcafee.com/activate

    ReplyDelete
  2. Cyber World can secured through multiple security and solutions.

    Must Visit for office Solutions:
    office.com/setup

    ReplyDelete
  3. Wow, what an extra ordinary blog about the rules of engagement to win the cyber war . i got much knowledge about cyber war from your blog. cyber war can be secured through multiple security solutions.
    office.com/setup

    ReplyDelete
  4. You provided Rules of engagement to win the cyber war. As we know in today's world now everything is online, all the services provided to the community, whatever sector they belong to, and administrations, schools, hospitals, media, transport, and so on everything and everyone is depend on the network and information systems and IT services. So i would like to say Thanks to you for giving us such a useful information regarding Cyber War.
    office.com/setup

    ReplyDelete
  5. You given Rules of engagement to win the cyber war. As we know in today's world presently everything is online, all the administrations given to the community, anything segment they have a place to, and organizations, schools, healing centers, media, transport, and so on everything and everybody is depend on the organize and data frameworks and IT administrations.office.com/setup

    ReplyDelete

Post a Comment

Popular posts from this blog

different types of engineering

Multiple network switches