[iwar] [fc:White.House.official.outlines.cybersecurity.initiatives]

From: Fred Cohen (fc@all.net)
Date: 2002-01-28 15:11:54


Return-Path: <sentto-279987-4390-1012259459-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 28 Jan 2002 15:13:07 -0800 (PST)
Received: (qmail 7914 invoked by uid 510); 28 Jan 2002 23:10:46 -0000
Received: from n32.groups.yahoo.com (216.115.96.82) by all.net with SMTP; 28 Jan 2002 23:10:46 -0000
X-eGroups-Return: sentto-279987-4390-1012259459-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.189] by n32.groups.yahoo.com with NNFMP; 28 Jan 2002 23:10:59 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 28 Jan 2002 23:10:59 -0000
Received: (qmail 58493 invoked from network); 28 Jan 2002 23:10:58 -0000
Received: from unknown (216.115.97.172) by m3.grp.snv.yahoo.com with QMQP; 28 Jan 2002 23:10:58 -0000
Received: from unknown (HELO red.all.net) (12.232.72.98) by mta2.grp.snv.yahoo.com with SMTP; 28 Jan 2002 23:10:58 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g0SNBsO11960 for iwar@onelist.com; Mon, 28 Jan 2002 15:11:54 -0800
Message-Id: <200201282311.g0SNBsO11960@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 28 Jan 2002 15:11:54 -0800 (PST)
Subject: [iwar] [fc:White.House.official.outlines.cybersecurity.initiatives]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

White House official outlines cybersecurity initiatives 
By Maureen Sirhal, National Journal's Technology Daily, 1/27/2002
<a href="http://www.govexec.com/dailyfed/0102/012502td1.htm">http://www.govexec.com/dailyfed/0102/012502td1.htm>

A key White House official on Friday outlined the Bush administration's
strategy for protecting the national critical infrastructure, including
expanding partnerships with the private sector and encouraging
information sharing among companies to avoid cyberattacks.

Paul Kurtz, director of Critical Infrastructure Protection for the White
House, told attendees at a conference hosted by MicroStrategy that the
administration is making progress with initiatives to protect systems
like banking and financial networks, and transportation and utilities
grids.

He said the plan would be outlined in a guide designed to better
establish strong security in the private and public sectors. The plan
will likely be unveiled this summer, possibly as early as June.

"First and foremost ... we must form a partnership with the private
sector," he said. To that end, Kurtz said the administration aims to
"avoid regulation" and encourage market-driven solutions. As private
companies own 80 percent to 90 percent of the country's critical
infrastructure, their cooperation is essential, he said.

"We want to work to break down barriers to share information," he said,
adding that the administration supports the concepts underlying
proposals on Capitol Hill to loosen restrictions under the Freedom of
Information Act. Such legislation would ease liability and encourage
companies to share IT security information, including the latest
security and types of attacks a company suffers.

Continuing work started by the Clinton administration, Kurtz said the
White House cybersecurity team is looking to establish a dialogue with
private industries to assure that security is being built into the next
generation of computer systems. The administration also is formulating a
tool called the Cyber Warning and Information Network to warn public and
private sector businesses of impending cyber attacks, such as computer
viruses that can hijack critical systems.

Kurtz said the national plan will be available on the Web, covering a
broad scope of issues, including national, consumer and international
topics. 
Kurtz also mentioned similar efforts, such as developing GovNet, a
government intranet designed to protect "critical communications ...
that are on all the time." More than 160 GovNet proposals currently are
being reviewed and await a decision from cybersecurity chief Richard
Clarke, who will decide in February if the project will proceed.

The Bush administration also is working toward creating a
priority-access system for cell phones to enable critical-response
teams, for example, to circumvent the problem of jammed connections
during emergencies. 
Kurtz also touted the federal Cybercorps program, which allocates
scholarships to students who choose to study technology security issues.
The White House intends to expand the program, Kurtz said, to shore up
the "great deficit of people looking at cybersecurity issues."

Despite the push from the executive branch and initiatives on Capitol
Hill aimed at improving cybersecurity, Kurtz emphasized that the problem
remains largely one of the private sector. 
He urged companies to identify their critical infrastructures and the
vulnerabilities associated with those systems, and to create programs to
mitigate threats. He also said that companies need to create policies to
aid security and that there needs to be a process within firms to
educate and train workers on security risks.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sponsored by VeriSign - The Value of Trust
Do you need to encrypt all your online transactions? Find
the perfect solution in this FREE Guide from VeriSign.
http://us.click.yahoo.com/vCuuSA/UdiDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST