[iwar] [fc:Cyber-Preparedness]

From: Fred Cohen (fc@all.net)
Date: 2002-05-15 17:46:34


Return-Path: <sentto-279987-4664-1021509917-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 15 May 2002 17:49:07 -0700 (PDT)
Received: (qmail 2946 invoked by uid 510); 16 May 2002 00:45:22 -0000
Received: from n23.grp.scd.yahoo.com (66.218.66.79) by all.net with SMTP; 16 May 2002 00:45:22 -0000
X-eGroups-Return: sentto-279987-4664-1021509917-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.194] by n23.grp.scd.yahoo.com with NNFMP; 16 May 2002 00:45:18 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 16 May 2002 00:45:17 -0000
Received: (qmail 80130 invoked from network); 16 May 2002 00:45:17 -0000
Received: from unknown (66.218.66.218) by m12.grp.scd.yahoo.com with QMQP; 16 May 2002 00:45:17 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 16 May 2002 00:45:16 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g4G0kZx14853 for iwar@onelist.com; Wed, 15 May 2002 17:46:35 -0700
Message-Id: <200205160046.g4G0kZx14853@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 15 May 2002 17:46:34 -0700 (PDT)
Subject: [iwar] [fc:Cyber-Preparedness]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Cyber-Preparedness

Ref:  Christian Science Monitor, 13 May 2002

<a href="http://www.csmonitor.com/2002/0513/p10s01-comv.html">http://www.csmonitor.com/2002/0513/p10s01-comv.html>

One area of vulnerability that received attention after last fall's terrorist attacks 
was computer networks, especially those that run major public and private services, 
such as water supplies.

While terrorists have launched no cyber-assaults in the months since 9/11, experts 
caution that the danger remains high. Is enough being done to prevent or fend off 
such attacks?

Reassuringly, various levels of government, as well as industry, are taking protective 
action. Harris County, Texas, for instance, has done a number of tests of its ability 
to bring its systems back up if they were ever knocked out by an attack. Using unaffected 
computers at a remote location, the county's technology officers regularly practice 
their revival techniques.

Many states were on computer-security alerts long before the attacks, since attempted 
intrusions by hackers can be a regular occurrence. At least 10 states have pending 
legislation to fight cyberterrorism. California, Georgia, and Pennsylvania have passed 
laws to more clearly define such terrorism and strengthen penalties for attacks on 
computer networks.

A challenge for governments, as well as businesses, is to stay on top of the software 
fixes issued by companies such as Microsoft and others to patch vulnerable spots 
in networks.

Software developers are at work, meanwhile, crafting programs that can anticipate 
attacks, or even give would-be intruders misleading data that thwart their efforts.

There can't be too much vigilance on this front. Recent computer-security problems 
of the US Interior Department - with government sleuths demonstrating how easy it 
was to break into sensitive areas like the Indian trust fund - illustrate how far 
even big government units have to go. The move toward greater preparedness must be 
sustained.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tied to your PC? Cut Loose and
Stay connected with Yahoo! Mobile
http://us.click.yahoo.com/QBCcSD/o1CEAA/sXBHAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT