[iwar] [fc:Cybersecurity.Strategy.Released]

From: Fred Cohen (fc@all.net)
Date: 2002-07-27 11:12:58


Return-Path: <sentto-279987-5068-1027793446-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 27 Jul 2002 11:15:07 -0700 (PDT)
Received: (qmail 19436 invoked by uid 510); 27 Jul 2002 18:09:47 -0000
Received: from n37.grp.scd.yahoo.com (66.218.66.105) by all.net with SMTP; 27 Jul 2002 18:09:47 -0000
X-eGroups-Return: sentto-279987-5068-1027793446-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.193] by n37.grp.scd.yahoo.com with NNFMP; 27 Jul 2002 18:10:46 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 27 Jul 2002 18:10:46 -0000
Received: (qmail 99090 invoked from network); 27 Jul 2002 18:10:45 -0000
Received: from unknown (66.218.66.217) by m11.grp.scd.yahoo.com with QMQP; 27 Jul 2002 18:10:45 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 27 Jul 2002 18:10:45 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6RICwj16362 for iwar@onelist.com; Sat, 27 Jul 2002 11:12:58 -0700
Message-Id: <200207271812.g6RICwj16362@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 27 Jul 2002 11:12:58 -0700 (PDT)
Subject: [iwar] [fc:Cybersecurity.Strategy.Released]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: ***

Cybersecurity Strategy Released
Date:  Friday, 26 July 2002
<a href="http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8593">http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8593>

Source:  Computerworld

Story:  The Bush administration today unveiled the nation's first
homeland and cybersecurity strategy, which calls for an unprecedented
partnership between federal, state and local governments and the private
sector to battle terrorism. The strategy was released at a White
House-sponsored briefing in Washington. The cybersecurity portion of the
strategy, the National Plan for Protecting Cyberspace, builds upon work
started by the Clinton administration to enlist the help of the private
sector, which owns and operates the bulk of the nation's critical
infrastructure.

More than a year in the making, the new plan calls for the use of a wide
array of information technologies to help battle terrorism at home. For
example, it calls for the establishment of "smart borders" through the
use of IT-enabled sensors and monitoring equipment. It also calls for:
port authorities to make use of IT to secure shipping containers
entering U.S. ports; biometric authentication systems to secure
buildings, airports and other critical infrastructure facilities; the
deployment of "red teams" to test the security of critical systems,
networks and facilities; and an overhaul of IT systems to support better
information sharing among federal law enforcement and intelligence
agencies.

"The plan is extraordinarily dependent on information technology," said
French Caldwell, an analyst at Stamford, Conn.-based Gartner Inc. "This
administration was perceived originally as being ambivalent to the
technology sector. But contrary to that perception, its strategy for
homeland defense calls for more IT spending and a heavy dependence upon
the smart use of IT in homeland defense," he said.

Protecting critical infrastructures such as telecommunications networks,
electrical power grids and transportation systems, as well as the
systems used by the financial services industry and other key economic
sectors, from physical and cyberattacks is one of the six
mission-critical areas outlined in the new strategy.

Regarding cybersecurity strategy, Richard Clarke, chairman of the
president's Critical Infrastructure Protection Board, has said
repeatedly that private-sector companies that own and operate the
nation's critical infrastructure will be the primary authors of the new
plan. Companies from each economic sector were directed to come up with
a road map for their respective industries on how to improve
cybersecurity and share information on cyberthreats and attacks with the
federal government.

Much of the proposed spending for cybersecurity, which amounts to more
than 8% of the federal government's IT budget, will go toward securing
federal systems, said Caldwell. Still, the challenge of cybersecurity
will likely only get tougher as the proposed Department of Homeland
Security attempts to consolidate and integrate 177,000 employees from 22
different agencies.

"This type of collaboration is notoriously hard to secure, so expect
cybersecurity spending could go even higher than projected," Caldwell
said.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/NsdPZD/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT