Why agencies need to consider the source (code)
By Chris Miranda, vice president of the Telecommunications Studies Center for LGS Innovations
Our work days revolve around our networks, and any interruption in our ability to access data and systems can have a crippling effect on operations. Network administrators need to ensure we have the data we need when we need it, can easily share data with colleagues regardless of location and above all make sure our networks are secure.
A 2013 annual crime report from the FBI states there has been a nearly 50 percent increase in reported monetary losses due to cybercrime since 2012, and with multiple data breaches in the news, network administrators must look to leave no stone unturned when protecting the integrity of their networks and data.
It has become widely accepted that no single technology or device can fully secure a network, but even with a defense-in-depth strategy including firewalls, demilitarized zones (DMZs), intrusion detection systems and intrusion prevention systems, can we be confident all network security issues are being addressed?
With the global nature of today’s supply chain, hardware and software are being outsourced to countries around the world. We have put our trust in equipment manufacturers who often outsource this work to the lowest bidder. This opens our networks up to a vulnerability, which if overlooked, can lead to potentially disastrous consequences.