Return-Path: <sentto-279987-3777-1004935591-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 04 Nov 2001 20:48:07 -0800 (PST) Received: (qmail 2951 invoked by uid 510); 5 Nov 2001 04:45:37 -0000 Received: from n11.groups.yahoo.com (216.115.96.61) by 204.181.12.215 with SMTP; 5 Nov 2001 04:45:37 -0000 X-eGroups-Return: sentto-279987-3777-1004935591-fc=all.net@returns.groups.yahoo.com Received: from [10.1.1.223] by n11.groups.yahoo.com with NNFMP; 05 Nov 2001 04:46:31 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 5 Nov 2001 04:46:31 -0000 Received: (qmail 37126 invoked from network); 5 Nov 2001 04:46:31 -0000 Received: from unknown (216.115.97.171) by m5.grp.snv.yahoo.com with QMQP; 5 Nov 2001 04:46:31 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 5 Nov 2001 04:46:31 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA54l2X02689 for iwar@onelist.com; Sun, 4 Nov 2001 20:47:02 -0800 Message-Id: <200111050447.fA54l2X02689@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sun, 4 Nov 2001 20:47:02 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Shoring.up.Cyberspace] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Shoring up Cyberspace The Christian Science Monitor, 11/2/2001 No URL available. Cyberspace may still seem an abstraction to some, but it underpins much of daily life - from families keeping in touch via e-mail, to airplanes staying on course through computerized traffic control, to maintaining power grids, to shopping on the Internet. In the rush to defend against terrorism, the federal government rightly has put "cyber-security" high on its list of priorities. President Bush recently appointed a special adviser on the subject, Richard Clarke, who will be an integral part of the homeland defense effort. Mr. Clarke, who's been working in this field for years, will have plenty to do. From the proliferation of destructive computer viruses in recent years to reports that the Sept. 11 hijackers used e-mail and encrypted messages, evidence abounds that cyberspace is all too open to nefarious doings. A major part of the problem is the vulnerability of most computer systems in commercial and government use to sabotage. The security holes and unlocked "backdoors" in systems can easily be exploited. The main result, so far, has been mischiefmaking, such as defacing websites. But the possibility exists of far more harmful intrusions by committed terrorists. Last year, a Pakistani hacker cracked the computers of the American-Israel Public Affairs Committee, leaving anti-Israel messages and stealing credit-card numbers and e-mail addresses. Four years ago, a Swedish hacker broke into the 911 emergency phone system in central Florida, causing it to shut down temporarily. Government and military secrets have been snatched from computers. Among Clarke's first tasks will be closing security weaknesses in federal computers - weaknesses already documented by the General Accounting Office. That job alone covers a vast amount of ground, such as the huge, vital systems operated by the Social Security Administration and the Internal Revenue Service. But homeland defense of cyberspace also will require close looks at state and local systems that coordinate emergency services such as fire and police. Utility power grids have to be protected. Companies that rely on networked computers to conduct business must be encouraged to create backup systems. Not least, Clarke will have to enlist computer makers and software designers who can do more to build in better security - for the sake of good business and good citizenship. (c) Copyright 2001. The Christian Science Monitor ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST