[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

 According to the White House document:
"The accompanying National Plan is the first attempt by any
national government to design a way to protect its cyberspace. "

Here is the Administration's plan [this is an excerpt, see file area
of TUS for full document] Here is URL:

http://www.onelist.com/files/tus/National_CyberSec_Plan.htm

The Plan: A Programmatic Overview

The goal of the Plan is to achieve a critical information systems
defense with an initial operating capability by December 2000,
and a full operating capability by May 2003. When that systems
defense is in place, the United States should have achieved the
capability to ensure that:

"Any interruption or manipulation of these critical functions
must be brief, infrequent, manageable, geographically isolated, and
minimally detrimental to the welfare of the United States." --
President Clinton in PDD-63

To meet the ultimate goal established by President Clinton for
defending the Nation's critical infrastructures against deliberate
attack by 2003, the current version of the Plan has been designed
around three broad objectives:

Prepare and Prevent: those steps necessary to minimize the
possibility of a significant and successful attack on our critical
information networks, and build an infrastructure that remains
effective in the face of such attacks.

Detect and Respond: those actions required identifying and
assessing an attack in a timely way, and then to contain the
attack, quickly recover from it, and reconstitute affected systems.


Build Strong Foundations: the things we must do as a Nation
to create and nourish the people, organizations, laws, and
traditions which will make us better able to Prepare and
Prevent, and Detect and Respond to attacks on our critical
information networks.

Version 1.0 of the Plan proposes 10 programs for achieving
these objectives. They include:

Prepare and Prevent

Program 1: Identify Critical Infrastructure Assets and Shared
Interdependencies and Address Vulnerabilities

Detect and Respond

Program 2: Detect Attacks and Unauthorized Intrusions

Program 3: Develop Robust Intelligence and Law Enforcement
Capabilities to Protect Critical Information Systems, Consistent
with the Law

Program 4: Share Attack Warnings and Information in a
Timely Manner

Program 5: Create Capabilities for Response, Reconstitution,
and Recovery

Build Strong Foundations

Program 6: Enhance Research and Development in Support
of Programs 1-5

Program 7: Train and Employ Adequate Numbers of Information
Security Specialists

Program 8: Outreach to Make Americans Aware of the Need
for Improved Cyber-Security

Program 9: Adopt Legislation and Appropriations in Support of
Programs 1-8

Program 10: In Every Step and Component of the Plan, Ensure
the Full Protection of American Citizens' Civil Liberties, Their Rights
to Privacy, and Their Rights to the Protection of Proprietary Data


http://www.onelist.com/files/tus/National_CyberSec_Plan.htm