Proceedings magazine is a communication tool for the Coast Guard's Marine Safety & Security Council. Each quarterly magazine focuses on a specific theme of interest to the marine industry.
Issue link: http://uscgproceedings.epubxp.com/i/284910
54 Proceedings Spring 2014 www.uscg.mil/proceedings Border Security and Cyber Security Traditional border security has focused on physical aspects like stopping drug and human traffcking and shipments of illegal goods, as well as facilitating lawful passage of citizens across physical or geographic borders. Security breaches can impact our quality of life, health, economy, and critical infrastructure. Moreover, unauthorized persons crossing borders can carry disease; commit terrorist acts; or impact our economy or safety by importing illegal merchan- dise or weapons. Cyber borders differ from physical borders in that they seamlessly and simultaneously create borders between nations. These borders are populated with desktop com- puters, cell phones, laptops, industrial control systems, and such, which allow almost unfettered passage for a profusion of data every day. However, like physical borders that can be breached by those who shouldn't cross, cyber borders that facilitate data passage can also allow malicious data or viruses. This can facilitate entry into our nation's cyber infrastruc- ture, where bad actors can gain access to vital national security information such as private sector trade secrets, fnancial information, health records, or other personal information. In addition to gaining access, those who use these methods can also potentially gain control of indus- trial systems and manipulate operations for nefari- ous purposes. How Do We Secure Our Cyber Borders? In an ideal world it would be great if securing our cyber borders from cyber attacks involved simply employing and maintaining the latest version of security software. Unfortunately, it's not that easy. Cyber systems are integrated into nearly every aspect of our lives, business processes, and vital government functions. Consequently, cyber security has become an increasingly popular phrase and has gained worldwide attention due to: • increased cyber threats, • the diffculty in identifying cyber vulnerabilities, • the consequences of calculated or even inadvertent exploitation. Unlike more traditional threats, cyber attacks can originate from almost anywhere in the world, reach across physical borders with ease, and are invisible to conventional border security detection methods. Moreover, the operating and communications systems that create cyber vulnerabilities are common across many indus- tries and functions so that the maritime industry cannot rely on its unique nature for protection. We must address cyber security with the same commitment and innovation that we have applied to other aspects of border security. Cyber Security The boundary without borders. CDR ulysses mullins Chief Critical Infrastructure Protection U.S. Coast Guard The Future of Border Security PN_Photo/iStock/Thinkstock Spring2014_26.indd 54 3/26/14 2:07 PM