Return-Path: <sentto-279987-5068-1027793446-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 27 Jul 2002 11:15:07 -0700 (PDT) Received: (qmail 19436 invoked by uid 510); 27 Jul 2002 18:09:47 -0000 Received: from n37.grp.scd.yahoo.com (66.218.66.105) by all.net with SMTP; 27 Jul 2002 18:09:47 -0000 X-eGroups-Return: sentto-279987-5068-1027793446-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.193] by n37.grp.scd.yahoo.com with NNFMP; 27 Jul 2002 18:10:46 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 27 Jul 2002 18:10:46 -0000 Received: (qmail 99090 invoked from network); 27 Jul 2002 18:10:45 -0000 Received: from unknown (66.218.66.217) by m11.grp.scd.yahoo.com with QMQP; 27 Jul 2002 18:10:45 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 27 Jul 2002 18:10:45 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6RICwj16362 for iwar@onelist.com; Sat, 27 Jul 2002 11:12:58 -0700 Message-Id: <200207271812.g6RICwj16362@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 27 Jul 2002 11:12:58 -0700 (PDT) Subject: [iwar] [fc:Cybersecurity.Strategy.Released] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: *** Cybersecurity Strategy Released Date: Friday, 26 July 2002 <a href="http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8593">http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8593> Source: Computerworld Story: The Bush administration today unveiled the nation's first homeland and cybersecurity strategy, which calls for an unprecedented partnership between federal, state and local governments and the private sector to battle terrorism. The strategy was released at a White House-sponsored briefing in Washington. The cybersecurity portion of the strategy, the National Plan for Protecting Cyberspace, builds upon work started by the Clinton administration to enlist the help of the private sector, which owns and operates the bulk of the nation's critical infrastructure. More than a year in the making, the new plan calls for the use of a wide array of information technologies to help battle terrorism at home. For example, it calls for the establishment of "smart borders" through the use of IT-enabled sensors and monitoring equipment. It also calls for: port authorities to make use of IT to secure shipping containers entering U.S. ports; biometric authentication systems to secure buildings, airports and other critical infrastructure facilities; the deployment of "red teams" to test the security of critical systems, networks and facilities; and an overhaul of IT systems to support better information sharing among federal law enforcement and intelligence agencies. "The plan is extraordinarily dependent on information technology," said French Caldwell, an analyst at Stamford, Conn.-based Gartner Inc. "This administration was perceived originally as being ambivalent to the technology sector. But contrary to that perception, its strategy for homeland defense calls for more IT spending and a heavy dependence upon the smart use of IT in homeland defense," he said. Protecting critical infrastructures such as telecommunications networks, electrical power grids and transportation systems, as well as the systems used by the financial services industry and other key economic sectors, from physical and cyberattacks is one of the six mission-critical areas outlined in the new strategy. Regarding cybersecurity strategy, Richard Clarke, chairman of the president's Critical Infrastructure Protection Board, has said repeatedly that private-sector companies that own and operate the nation's critical infrastructure will be the primary authors of the new plan. Companies from each economic sector were directed to come up with a road map for their respective industries on how to improve cybersecurity and share information on cyberthreats and attacks with the federal government. Much of the proposed spending for cybersecurity, which amounts to more than 8% of the federal government's IT budget, will go toward securing federal systems, said Caldwell. Still, the challenge of cybersecurity will likely only get tougher as the proposed Department of Homeland Security attempts to consolidate and integrate 177,000 employees from 22 different agencies. "This type of collaboration is notoriously hard to secure, so expect cybersecurity spending could go even higher than projected," Caldwell said. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Free $5 Love Reading Risk Free! http://us.click.yahoo.com/NsdPZD/PfREAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT