When cyber becomes a political lever: Government and Federal
Federal government cyber security concerns a very unique threat. Not only do they operate as any large enterprise and consequently needs the processes, people and technology to protect against threats, but they face a whole raft of other threats simply because they are a government or federal institution.
The severity of this threat changes by government and the various political and societal factors that are surrounding it. From nation state attacks to individual hacker groups targeting the government, the motivation could be to steal data or even tap into government secrets.
A real threat for governments and federal institutions is the impact of a cyber breach. By compromising security, authority and integrity can be undermined, having not only technology, data and security implications, but also political.
When you combine the threat of nation state hackers with the opportunity to destabilize governments through cyber attacks, cyber warfare doesn’t seem to far-fetched.
A specialist in Federal Government cyber security
Due to the level of sensitivity, securing government networks is complex. However, Nominet’s cyber security solution provides crucial protection for the national critical infrastructure in the UK, currently protecting the UK Government and over 250 additional UK public sector agencies. Our strong relationship with the UK Government, along with our solution’s ability to work in classified/non-classified environments, makes Nominet NTX the perfect solution for government institutions worldwide.
The NTX solution delivers significantly elevated cyber security for public sector entities by analyzing the DNS layer to remove threats. Using intelligence threat feeds to identify the known threats, combined with Nominet’s patented algorithms to predict, detect and block the unknown threats, NTX reduces threats to an organization’s network and reduces the window of compromise for malware, phishing and data theft.
Case in point: Active Cyber Defence – The Second Year
Active Cyber Defence – the program which aims to improve the security of the UK public sector and the wider UK cyber ecosystem – is now in its second year. Ian Levy, NCSC’s technical director, summarized the outcome of the second year of operation and it was great to see the importance of the DNS and the work of the Nominet team.
Key stats from the report:
- In 2018, the Protected DNS (PDNS) Service provided by Nominet was protecting an estimated 1.4 million employees across the UK public sector
- 68.7 billion queries were answered, with a peak query rate of 27,109 queries per second in November
- Of the 68.7 billion queries, 57.4 million were blocked for 117,527 unique reasons
- 28 million of the queries blocked were for Domain Generation Algorithms (DGAs) including 15 known DGAs. Including Ramnit, Suppobox, TinyBanker, Matsnu, Bedep, Fobber, Conficker19
- 13,800 queries were blocked for at least 20 named botnet command and control systems, including Betabot, Graybird, Katrina, Lokibot, StealRat and Godzilla
- A number of exploit kit related indicators were blocked, including 796,000 queries for 16 unique indicators of exploit kits including Magnitude, RIG, SweetOrange and Neutrino
- 450,000 WannaCry related queries were blocked from 15 different PDNS customers and more than 230,000 queries related to the BadRabbit ransomware
Read more about how Nominet has delivered the Protective DNS service on behalf of the UK’s National Cyber Security Centre’s (NCSC) Active Cyber Defence program since its inception in 2016, improving national resilience by protecting the UK government’s internet traffic.