Cyber security expert to take GPS readers' questions
May 7th, 2013
06:44 PM ET

Cyber security expert to take GPS readers' questions

The Pentagon's claims in a new report that China is trying to extract sensitive information from U.S. government computers has put cyber security issues back in the media spotlight.

But how serious is the threat to U.S. interests? How can America respond? And what other issues should be attracting policymakers’ attention?

Cyber security expert Eugene Spafford, a professor of computer sciences at Purdue University and former member of the President’s Information Technology Advisory Committee, will be taking questions from GPS readers. Please leave your questions in the comment section below.

Post by:
Topics: China • Internet • Readers' questions • United States

« Previous entry
soundoff (13 Responses)
  1. JAL

    Is my Windows 8 machine safe from hackers, if I am using only Windows defender?

    May 7, 2013 at 6:58 pm | Reply
  2. Chukwuemeka

    Is there really a cyber war between the US and China? Also how does this affect world economy?

    May 7, 2013 at 7:16 pm | Reply
  3. Ferhat Balkan

    Cyber security is becoming a global problem. The U.S. government is expected to spend $10.5 billion a year on information security by 2015, and analysts have estimated the worldwide market to be as much as $140 billion a year. Just a couple of weeks ago, the Associated Press Twitter account was hacked and a false message was tweeted that President Obama was injured which sent stocks tumbling down within a matter of minutes. This clearly illustrates the volatility and importance of social media in today's society. In your opinion, what are some of the worst case scenarios that could potentially occur and what can be done to prevent them from happening in the future?

    May 7, 2013 at 7:23 pm | Reply
  4. Richard H

    We keep looking for the "Bad Guy"...
    Are we at risk of over-focusing on China... and potentially ignoring the threats from elsewhere around the world, including from within our own country?

    May 7, 2013 at 8:27 pm | Reply
  5. Muin

    Right now people don't have the same security in email as regular mail. Will there ever be a time when people will have same security in email as regular mail?

    May 8, 2013 at 4:19 am | Reply
  6. j. von hettlingen

    The cyber boundaries between offence and defence are blurred. How adept is the US to rapidly develope its capabilities to counter cyber attacks? How advanced is China in its cyber-Technology?

    May 8, 2013 at 6:52 am | Reply
    • wjmccartan

      To answer your question about how advanced China's cyber technology is j. von hettlingen, it is not nearly as advanced as ours. In fact, we ourselves started all this decades ago when we started hacking into China's military and economic data bases as well as those of Russia and other economically advanced nations. Now the right-wing thugs in Washington are crying "wolf" about the Chinese. This is quite ludicrous!

      May 8, 2013 at 7:45 am | Reply
      • wjm

        This is of course the same idiot that continues to use my name for his posts, please disregard any that spews out of this impostor. I ask you once again to refrain from using my handle.

        May 8, 2013 at 10:20 am |
  7. Block Them

    Take them off the internet.

    May 8, 2013 at 11:22 am | Reply
  8. Sean B.

    – Is there any 100% defense against state-funded hackers to protect our most crucial assets?
    – Have Chinese hackers been targeting state-level colleges as well as universities?

    May 8, 2013 at 1:59 pm | Reply
    • Tom

      Gee Sean B., judging by the way you're blogging in here, one would think that you're a dimwitted Tea Partier. If I were you, I'd feel embarrassed.

      May 8, 2013 at 5:37 pm | Reply
  9. Important Link

    Oh my goodness! Impressive article dude! Many thanks, However
    I am having problems with your RSS. I don't understand the reason why I cannot subscribe to it. Is there anybody having the same RSS problems? Anyone that knows the solution will you kindly respond? Thanx!!

    May 9, 2013 at 1:06 am | Reply
  10. trishtail

    Nice post about global information security
    Thanks for sharing with us .

    August 8, 2013 at 12:53 am | Reply

Post a comment


CNN welcomes a lively and courteous discussion as long as you follow the Rules of Conduct set forth in our Terms of Service. Comments are not pre-screened before they post. You agree that anything you post may be used, along with your name and profile picture, in accordance with our Privacy Policy and the license you have granted pursuant to our Terms of Service.

« Previous entry