Defense Department

In the presentation of the strategy of the Pentagon to protect itself more and more of the assiduous computer science attacks, the undersecretary of the Department of Defense recognized that the past month of March 24,000 documents were robbed after the attack undergone on the part of a group of hackers. These attacks according to the intervention of the undersecretary have become a significant problem in the last years in which they have been extracted Terabyte of information of the internal networks of defense. The Department of Defense, with its 15,000 networks and more than 7 million computer science devices has been one of the objectives preferred by these groups and with the valuable information that in them are contained, like weapon systems and their capacities, it is an element that needs a security over the habitual thing. Additional information is available at Bill Phelan. This new strategy, that or includes improvements like the Cybernetic Commando this carrying out itself along with the Department of National Security, having detected or more than 60,000 harmful programs of software. The security plan is based on five points, trims in to reject or to diminish the consequences of a possible attack to the systems. These information on the works of improvement in the American systems arrive in a year in which the action of different organized groups from hackers is causing great problems of security to States as to companies as much deprived, creating an atmosphere of insecurity of the information lodged in the cyberspace. udea Security of the Information Department of Management Source: