[iwar] [fc:Shoring.up.Cyberspace]

From: Fred Cohen (fc@all.net)
Date: 2001-11-04 20:47:02


Return-Path: <sentto-279987-3777-1004935591-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 04 Nov 2001 20:48:07 -0800 (PST)
Received: (qmail 2951 invoked by uid 510); 5 Nov 2001 04:45:37 -0000
Received: from n11.groups.yahoo.com (216.115.96.61) by 204.181.12.215 with SMTP; 5 Nov 2001 04:45:37 -0000
X-eGroups-Return: sentto-279987-3777-1004935591-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.1.223] by n11.groups.yahoo.com with NNFMP; 05 Nov 2001 04:46:31 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 5 Nov 2001 04:46:31 -0000
Received: (qmail 37126 invoked from network); 5 Nov 2001 04:46:31 -0000
Received: from unknown (216.115.97.171) by m5.grp.snv.yahoo.com with QMQP; 5 Nov 2001 04:46:31 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 5 Nov 2001 04:46:31 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA54l2X02689 for iwar@onelist.com; Sun, 4 Nov 2001 20:47:02 -0800
Message-Id: <200111050447.fA54l2X02689@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 4 Nov 2001 20:47:02 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Shoring.up.Cyberspace]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Shoring up Cyberspace 
The Christian Science Monitor, 11/2/2001
No URL available.

Cyberspace may still seem an abstraction to some, but it underpins much
of daily life - from families keeping in touch via e-mail, to airplanes
staying on course through computerized traffic control, to maintaining
power grids, to shopping on the Internet. 
In the rush to defend against terrorism, the federal government rightly
has put "cyber-security" high on its list of priorities. President Bush
recently appointed a special adviser on the subject, Richard Clarke, who
will be an integral part of the homeland defense effort. 
Mr. Clarke, who's been working in this field for years, will have plenty
to do. From the proliferation of destructive computer viruses in recent
years to reports that the Sept. 11 hijackers used e-mail and encrypted
messages, evidence abounds that cyberspace is all too open to nefarious
doings. 
A major part of the problem is the vulnerability of most computer
systems in commercial and government use to sabotage. The security holes
and unlocked "backdoors" in systems can easily be exploited. The main
result, so far, has been mischiefmaking, such as defacing websites. But
the possibility exists of far more harmful intrusions by committed
terrorists. 
Last year, a Pakistani hacker cracked the computers of the
American-Israel Public Affairs Committee, leaving anti-Israel messages
and stealing credit-card numbers and e-mail addresses. Four years ago, a
Swedish hacker broke into the 911 emergency phone system in central
Florida, causing it to shut down temporarily. Government and military
secrets have been snatched from computers. 
Among Clarke's first tasks will be closing security weaknesses in
federal computers - weaknesses already documented by the General
Accounting Office. That job alone covers a vast amount of ground, such
as the huge, vital systems operated by the Social Security
Administration and the Internal Revenue Service.

But homeland defense of cyberspace also will require close looks at
state and local systems that coordinate emergency services such as fire
and police. Utility power grids have to be protected. Companies that
rely on networked computers to conduct business must be encouraged to
create backup systems. 
Not least, Clarke will have to enlist computer makers and software
designers who can do more to build in better security - for the sake of
good business and good citizenship. 
(c) Copyright 2001. The Christian Science Monitor

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST