º£½Ç´óÉñ

This page is rendered using the default Netgen Site API full view template.

4 ways US can boost cyber security

ID
653445
Location ID
670675
Current version
5
Content type
csm_list_article

Fields

1. Story Source
ID
15486735
Field definition ID
1464
Identifier
source
Field type identifier
ezobjectrelation
Description
[empty]
Contents

Commentary Contributor
2. Headline
ID
15486737
Field definition ID
1301
Identifier
title
Field type identifier
ezstring
Description
[empty]
Contents

4 ways US can boost cyber security
3. Short Headline (for entry and section pages)
ID
15486739
Field definition ID
1302
Identifier
short_title
Field type identifier
ezstring
Description
[empty]
Contents

4 ways US can boost cyber security
4. Summary
ID
15486741
Field definition ID
1303
Identifier
summary
Field type identifier
ezxmltext
Description
[empty]
Contents

The Obama administration has repeatedly and publicly named China as America’s principal cyber-espionage enemy, highlighting China’s aggressive economic cyberspying against American businesses and critical infrastructure. President Obama himself mentioned cybersecurity concerns during his congratulatory phone call with new Chinese President Xi Jinping.

Deciding to name and shame China openly is a significant step in US cybersecurity policy and has international repercussions: It forces the two countries to address the issue publicly, and shines a spotlight on the cyberactivity of other countries, including the United States. This may increase pressure on governments and companies to act more forcefully against cyber-espionage attacks.

Of course, China is not the only country that has committed, or will commit, cyber-espionage. Indeed, China has accused the US of cyberattacks and recently described itself as a leading victim of hacking attacks. The full scope of international cyberattacks is hard to define because of the challenge of identifying who launched an attack, and the absence of a coordinated, global effort to find out who the hostile cyberactors are.

To navigate this new diplomatic landscape and successfully protect its own cybersecurity interests, the US needs a proactive cyber foreign policy that goes beyond naming and shaming. Here are four steps the US can take to bolster its diplomatic efforts to address cybersecurity threats.


5. Short Summary (for entry and section pages)
ID
15486743
Field definition ID
1304
Identifier
web_sum
Field type identifier
ezxmltext
Description
[empty]
Contents

The US needs a proactive cyber foreign policy that goes beyond naming and shaming. Here are four steps the US can take to bolster its diplomatic efforts to address cybersecurity threats.


6. Bylines
ID
15486745
Field definition ID
1305
Identifier
authors
Field type identifier
ezbyline
Description
[empty]
Contents

By Emilian Papadopoulos Eli Sugarman
7. Tags
ID
15486747
Field definition ID
1314
Identifier
tags
Field type identifier
ezkeyword
Description
[empty]
Contents
[empty]
8. Internal Tags
ID
15486775
Field definition ID
1375
Identifier
internal_tags
Field type identifier
ezkeyword
Description
[empty]
Contents
[empty]
9. eZ Tags
ID
18989686
Field definition ID
1687
Identifier
eztags
Field type identifier
eztags
Description
[empty]
Contents
[empty]
10. Image
ID
15486749
Field definition ID
1307
Identifier
image
Field type identifier
ezobjectrelationlist
Description
[empty]
Contents
[empty]
11. Related links
ID
15486755
Field definition ID
1310
Identifier
related_external_links
Field type identifier
ezmatrix
Description
was missing
Contents

TypePathTitleSite Name
INTERNAL3f90451d006e7c1319907336fd6893e34 ways Chuck Hagel can improve cyber securityL634819
INTERNALa2cf649c2263d9fc791cd2b8ac9b08c1Wanted: global rules on cyberwarfareL630261
INTERNAL39ccd73aeabe314450488efb31fa0fd9China is aiming at America’s soft underbelly: the InternetA251220

12. Publish Date
ID
15486757
Field definition ID
1311
Identifier
publish_date
Field type identifier
ezdatetime
Description
[empty]
Contents


13. Updated
ID
16697817
Field definition ID
1639
Identifier
updated
Field type identifier
ezdatetime
Description
[empty]
Contents


14. Can syndicate
ID
15486761
Field definition ID
1312
Identifier
can_syndicate
Field type identifier
ezboolean
Description
[empty]
Contents

Yes
15. NYT Feed
ID
15486751
Field definition ID
1308
Identifier
can_syndicate_exclusive
Field type identifier
ezboolean
Description
Check box if CSM has exclusive syndication rights. Do not check for 90-day exclusives rights, guest bloggers, etc. If CSM doesn't own the content, don't check this box.
Contents

No
16. Keywords
ID
15486763
Field definition ID
1313
Identifier
page_keywords
Field type identifier
ezstring
Description
[empty]
Contents
[empty]
17. Page URL name
ID
15486765
Field definition ID
1315
Identifier
page_url_name
Field type identifier
ezstring
Description
[empty]
Contents
[empty]
18. Page Title
ID
15486767
Field definition ID
1316
Identifier
page_title
Field type identifier
ezstring
Description
[empty]
Contents
[empty]
19. For Sale
ID
15486769
Field definition ID
1318
Identifier
for_sale
Field type identifier
ezboolean
Description
[empty]
Contents

No
20. Title numbering
ID
15486777
Field definition ID
1376
Identifier
title_numbering
Field type identifier
ezselection
Description
[empty]
Contents

Count Up

21. Dateline
ID
15486785
Field definition ID
1306
Identifier
dateline
Field type identifier
ezstring
Description
[empty]
Contents
[empty]
22. Inform Tags
ID
15486781
Field definition ID
1438
Identifier
inform_tags
Field type identifier
ezkeyword
Description
[empty]
Contents
[empty]
23. Inform Topics
ID
15486783
Field definition ID
1443
Identifier
inform_topics
Field type identifier
ezkeyword
Description
[empty]
Contents
[empty]