{"id":6952,"date":"2020-12-04T10:22:40","date_gmt":"2020-12-04T13:22:40","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=6952"},"modified":"2020-12-04T10:22:40","modified_gmt":"2020-12-04T13:22:40","slug":"nuevas-herramientas-de-navegacion-por-internet-refuerzan-la-ciberseguridad","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=6952","title":{"rendered":"Nuevas herramientas de navegaci\u00f3n por internet refuerzan la ciberseguridad"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"justify\">Con una mayor probabilidad de ataque, incrementada por la gran cantidad de empleados que ahora trabajan de forma remota, los funcionarios de la Agencia de Sistemas de Informaci\u00f3n de Defensa del DoD de EE UU proponen una nueva herramienta de navegaci\u00f3n basada en la nube. El programa de aislamiento de Internet basado en la nube (CBII), aloja la navegaci\u00f3n por Internet en un entorno de nube aislado, fuera del dispositivo de escritorio o port\u00e1til del usuario.<\/p>\n<hr \/>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">WASHINGTON \u2014 With an increasingly expanding attack surface \u2013 exacerbated by droves of employees now working remotely \u2013 officials at the Defense Information Systems Agency say the organization\u2019s new cloud-based browsing tool boasts stronger security for the Department of Defense networks.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The Cloud Based Internet Isolation (CBII) program, which hosts internet browsing in an isolated cloud environment, transfers the traffic away from the user\u2019s desktop or laptop device.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">It is an especially important tool with personnel working remotely, safeguarding against potentially malicious code being downloaded to endpoints and infecting the broader network, officials said. Moreover, it works even if employees forget to connect to the virtual private network \u201cto get to the DoD-specific stuff and they just go to Google or something and click around, they\u2019re still protected,\u201d Angela Landress, chief of Defensive Cyber Operations at DISA, told C4ISRNET.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Landress explained that when browsing the internet, visiting a single website can mean communicating with an average of 31 other websites, which often include advertisers. CBII hosts that connection in a separate cloud environment, meaning there\u2019s only one line of code when looking at the source code of the website because its routed it to secure isolated vendor space.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Over the summer, DISA awarded an other transaction agreement with a ceiling of $198.9 million to By Light Professional IT Services. The program initially began with 100,000 users and is now up to 105,000 users. It is in the incremental enterprise adoption phase with plans to expand it to more users across the DoD.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Landress also outlined other measures DISA has taken to secure networks. These include increased identity management, multifactor authentication, refocusing of analysts to defend against cloud and internet threats and partnering with other federal agencies to defend against threats that aren\u2019t part of DoD but can influence the workforce.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Landress declined to specify which federal agencies they\u2019re collaborating with, but said DISA is working with those organizations and with internet access point owners to compare and contrast what has worked and what hasn\u2019t.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Many of these efforts weren\u2019t spurred on by the pandemic, Landress said, but they were accelerated as a result.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">While she also declined to discuss threats to the network and how increased telework may present unique threats, Landress did mention the intangible effect of the human element.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cWhen you\u2019re in a government facility around your co-workers you\u2019re held to a standard and your security strategy is always reinforced.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">&#8220;When you take almost 100 percent of that population and put them in their homes distracted by their families and TV and trying to be on conference calls with phones and cameras and all kinds of things nearby, the threat landscape changes because you\u2019re introducing a lot more of that human element in,\u201d she said. \u201cWhen you\u2019re in a government facility around your co-workers you\u2019re held to a standard and your security strategy is always reinforced.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">She added that there isn\u2019t any direct evidence these distractions have created a threat or lack of vigilance, but that teleworkers are opens to some distractions that don\u2019t exist in the workplace.<\/p>\n<p style=\"text-align: left;\" align=\"justify\"><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2020\/12\/02\/new-internet-browsing-tools-bolster-dod-cybersecurity\/?utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=C4ISRNET%2012.3&amp;utm_content=Final&amp;utm_term=Editorial%20-%20Daily%20Brief\" target=\"_blank\" rel=\"noopener noreferrer\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Con una mayor probabilidad de ataque, incrementada por la gran cantidad de empleados que ahora trabajan de forma remota, los funcionarios de la Agencia de&hellip; <\/p>\n","protected":false},"author":1,"featured_media":6953,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6952"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6952"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6952\/revisions"}],"predecessor-version":[{"id":6954,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6952\/revisions\/6954"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/6953"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}