• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Technologies.org

Technology Trends: Follow the Money

  • Sponsored Post
    • Make a Contribution
    • Technology Job Posting
  • Technology Events 2022-2023
  • Technology Domains
  • Technology Markets
  • Venture Capital
  • Contact
    • About

National Cybersecurity Protection System (NCPS) is Still Inadequate Despite $1.2 Bln Investment

February 2, 2016 By Technologies.org Leave a Comment

The GAO report, released on Jan 28, 2016, found that the Department of Homeland Security’s (DHS) National Cybersecurity Protection System (NCPS) is far from being workable, a mild understatement of epic blunder. As of April 2015, the projected total life-cycle cost of the program was approximately $5.7 billion to be spent by 2018, with $1.2 billion already spent on the NCPS system by 2014.

NCPS’s intrusion detection capability is intended to provide DHS with the ability to scan network traffic for signs of potentially malicious activity. Effective intrusion detection provides an organization with the ability to detect abnormalities within network traffic and can be accomplished through the use of multiple types of intrusion detection methodologies. In
order to more comprehensively and accurately detect malicious activity, NIST recommends15 using a combination of three detection methodologies: signature-based, anomaly-based, and stateful purpose analysis.

  • Signature-based intrusion detection is able to detect malicious traffic by comparing current traffic to known patterns of malicious behavior, also referred to as signatures. This method is considered effective at detecting known threats and is the simplest form of intrusion detection, because it can only match against known patterns of malicious traffic.
  • The anomaly-based and stateful purpose detection methodologies are more complex approaches, which involve comparing current network activity to predefined baselines of “normal behavior” to identify deviations which could be indicative of malicious activity. These approaches to intrusion detection are more effective than signature based detection at identifying previously unknown threats, such as “zero-days, as well as variants to known threats and threats disguised by the use of evasion techniques.

NCPS uses only a signature-based methodology for detecting malicious activity.

US government literally pours money into cybersecurity market, without pausing and analyzing what works and what does not. The costly program mostly duplicates commercially available signature-based intrusion detection systems already used by federal agencies:

By employing only signature-based intrusion detection, NCPS is unable to detect intrusions for which it does not have a valid or active signature deployed. This limits the overall effectiveness of the program. Moreover, given that many federal agencies use commercially available signature based intrusion detection systems to support their information security
efforts, the addition of another signature-based intrusion detection system may do little to provide customer agencies with a baseline set of protections. DHS officials acknowledged that the intrusion detection systems used by many federal agencies likely have more signatures deployed than NCPS.

Related

Filed Under: Tech Tagged With: National Cybersecurity Protection System

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Samsung Electronics and Red Hat Announce Collaboration in the Field of Next-Generation Memory Software
  • AWS Announces General Availability of Amazon EC2 C7g Instances Powered by AWS-designed Graviton3 Processors
  • Infinitum Electric Raises $80M in Series D Funding Led by Riverstone Holdings to Scale Production of Sustainable Motors
  • Introducing IonQ Forte, Improving Quantum Performance with a Software-Configurable Dynamic Laser System
  • Cloudflare Unveils New SQL Database Offering
  • Cloudflare announces Workers for Platforms
  • Intel is rolling out new processors designed for data centers
  • EU moves to wean itself off Russian fossil fuels
  • A New Hydrogen-Powered Behemoth
  • BAE Systems to Bring Next-Generation Electric Drive System to Heavy-Duty Industrial Vehicle Market

Media Partners

  • VPNW
  • S3H
  • OPINT
  • Press Media Release
  • OSINT
  • Digital Market
  • Briefly

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • Cybersecurity Events
  • Event Calendar
  • Calendarial
  • Opinion
  • Venture Capital

Copyright © 2015 Technologies.org

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT