Internet Security Faces Chronic Problems
Loren B. Thompson writes for UPI:
U.S. network software and procedures must be continually updated to eliminate weaknesses, and tested to assure gaps have been successfully closed.More here.
Also, there must be a mechanism among network administrators across the United States for sharing information about threats that provides timely and useful warnings of danger.
Finally, defensive measures carried out by the U.S. government and its relevant agencies must be sensitive to the missions of users, so that they do not impair network functionality in the process of providing protections.
The respected SANS Institute uses a six-step framework for explaining how cyber incidents should be addressed that begins with being prepared, and then proceeds through identification of danger, containment of the threat, eradication of the threat, system recovery and follow-up.