[iwar] [fc:Waging.war.on.cyberterrorism:.Network.security.tightens.up.after.attacks]

From: Fred Cohen (fc@all.net)
Date: 2001-11-06 19:02:13


Return-Path: <sentto-279987-3797-1005102139-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 06 Nov 2001 19:11:08 -0800 (PST)
Received: (qmail 29746 invoked by uid 510); 7 Nov 2001 03:08:17 -0000
Received: from n12.groups.yahoo.com (216.115.96.62) by 204.181.12.215 with SMTP; 7 Nov 2001 03:08:17 -0000
X-eGroups-Return: sentto-279987-3797-1005102139-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.53] by n12.groups.yahoo.com with NNFMP; 07 Nov 2001 03:02:19 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 7 Nov 2001 03:02:18 -0000
Received: (qmail 96403 invoked from network); 7 Nov 2001 03:02:18 -0000
Received: from unknown (216.115.97.167) by m9.grp.snv.yahoo.com with QMQP; 7 Nov 2001 03:02:18 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 7 Nov 2001 03:02:18 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA732D429479 for iwar@onelist.com; Tue, 6 Nov 2001 19:02:13 -0800
Message-Id: <200111070302.fA732D429479@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 6 Nov 2001 19:02:13 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Waging.war.on.cyberterrorism:.Network.security.tightens.up.after.attacks]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Waging war on cyberterrorism: Network security tightens up after attacks

Pamela Griner Leavy, TB Business Journal, 11/6/2001
<a href="http://tampabay.bcentral.com/tampabay/stories/2001/11/05/focus1.html">http://tampabay.bcentral.com/tampabay/stories/2001/11/05/focus1.html>

Businesses throughout the Tampa Bay area wage their own wars against
cyberterrorism. 
Ed Martin, security manager at Sykes Enterprises Inc. in Tampa, makes
data and physical security decisions for the e-commerce and customer
relationship management call center company which includes international
financial firms among its customers. 
Sykes always has been cognizant of network security needs, but plans
have been tightened up and layered since Sept. 11, said Martin, employed
at Sykes since last year. 
His previous data and security employment includes a network technician
position at Cox Target Media and a Department of Defense multiyear
information security career. 
"We have been on the ball for much longer than just the last month, not
only within our own department but the company as a whole," he said. 
"We are being a bit more vigilant than usual in how we address the
network security side of our operation and physical security side. We
receive an awful lot of information directly from clients and need to
safeguard it to be compliant with contractual agreements and industry
best practices." 
While Sykes hasn't received a cyber or physical threat, Martin heeds
global security expert warnings about malicious code viruses, data-user
access identification needs and facility security issues, he said. 
Security experts point to physical breaches -- penetrations of a
company' sticks and bricks parameter layers -- as the biggest threats.
Along with highly-publicized hazardous mail threats, intruders who could
destroy data systems by setting fires or stealing servers remain
industry concerns. 
Now other avenues for attacks exist, too. 
"The possibility of receiving a biohazardous or explosive device in the
mail is on everybody's mind," he said. "The other thing we are vigilant
about is who has access to our sites and why. We keep a close eye on
that." 
Martin advises other businesses to layer security systems. 
"Physical security, network security, personnel security, layer it all
together," he said. "When something gets through one layer of security,
it may not get through subsequent ones." 
William Cross, information systems director at Seminole Electric
Cooperative Inc., also has put his company on alert. 
The Sept. 11 events, followed by the recent reports about an off-course
Piper Arrow plane flying near the Florida Power Corp. Crystal River
nuclear plant, have led to heightened security. 
"We've added physical security at our power plants, tightened our
electronic security and our monitoring has been enhanced as well," Cross
said. "I know that industry-wide there is a heightened sense of security
and security's importance. The best example of that would be found in
the nuclear (power) plants." 
Vulnerability issues 
The vulnerability of all American businesses to cyberterrorism attacks
that could cause billions of dollars in business losses and cripple
communication systems is being analyzed at the national and state level. 
A recent survey by the public accounting firm PricewaterhouseCoopers LLP
indicates security breaches cost global corporations more than $1.39
trillion in revenue last year. 
And a 2001 Computer Crime and Security Survey of 538 U.S. data security
workers showed that 85 percent detected security breaches within the
past year and approximately $378 million was lost to online vandals and
cyber criminals. 
Florida legislators have joined federal lawmakers in drafting new
cyberterrorism laws. 
"The focus this year is on the Sept. 11 tragedies, and we have to focus
on cyberterrorism and strengthen theft laws and identify security
issues," said state Rep. Chris Hart IV, R-Tampa, at a recent Tampa
technology conference. 
On the national level, Forbes Magazine reported in its Oct. 22 issue
that a cyberterrorism attack took place six days before the attacks on
the World Trade Center and Pentagon. The target was at Richardson,
Texas-based InfoCom, a communications company offering
videoconferencing, voice mail, Web hosting and encrypted e-mail. 
The Forbes article said "an 80-man terrorism task force launched a
three-day raid, crashing 500 Internet sites, freezing bank accounts and
copying information from the company's hard drives." 
While Forbes reported that government officials hadn't tied the Infocom
intrusion to Sept. 11 events, federal government officials have
expressed concern about increased computer attacks. 
The magazine reported that Donald Rumsfeld, U.S. secretary of defense,
included cyberterrorism among the potential threats that are "front and
center to us." 
Budget priorities 
Meanwhile, budget constraints have forced companies to choose between
physical and data security, said Barry Schlossberg, founder and chief
security architect at sNet Corp., a Rocky Point-based international
cyber and physical security firm. 
"It's confusing companies as to where they allocate funds," he said.
"Budgets are tight almost everywhere now. Companies don't have the
money." 
Physical terrorism currently overrides cyberterrorism, said Schlossberg. 
"The physical terrorism starts in the mail room as CNN and other media
have reported," he said. "Then you think about the physical parameters
in the data room, the physical property line and background checks that
haven't been done on employees." 
However, Schlossberg sees corporate survival currently outweighing
security concerns. 
"Survival as a business entity, staying in business, pre-empts physical
security and cyberterrorism concerns for many small and large
businesses," he said. 
To reach Pamela Griner Leavy, call (813) 342-2479 or send your e-mail to
pleavy@bizjournals.com.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Universal Inkjet Refill Kit $29.95
Refill any ink cartridge for less!
Includes black and color ink.
http://us.click.yahoo.com/Vv.L9D/MkNDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST