Return-Path: <sentto-279987-4024-1007566204-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 05 Dec 2001 07:31:08 -0800 (PST) Received: (qmail 20837 invoked by uid 510); 5 Dec 2001 15:30:30 -0000 Received: from n28.groups.yahoo.com (216.115.96.78) by all.net with SMTP; 5 Dec 2001 15:30:30 -0000 X-eGroups-Return: sentto-279987-4024-1007566204-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.163] by n28.groups.yahoo.com with NNFMP; 05 Dec 2001 15:30:06 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_2); 5 Dec 2001 15:30:04 -0000 Received: (qmail 47574 invoked from network); 5 Dec 2001 15:30:04 -0000 Received: from unknown (216.115.97.172) by m9.grp.snv.yahoo.com with QMQP; 5 Dec 2001 15:30:04 -0000 Received: from unknown (HELO red.all.net) (12.232.125.69) by mta2.grp.snv.yahoo.com with SMTP; 5 Dec 2001 15:30:05 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fB5FU8I13259 for iwar@onelist.com; Wed, 5 Dec 2001 07:30:08 -0800 Message-Id: <200112051530.fB5FU8I13259@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 5 Dec 2001 07:30:08 -0800 (PST) Subject: [iwar] [fc:U.S..Cyber.Chief.to.Map.Infrastructure.for.Security] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit U.S. Cyber Chief to Map Infrastructure for Security By Andy Sullivan, Reuters, 12/5/2001 <a href="http://dailynews.yahoo.com/h/nm/20011204/tc/tech_security_dc_1.html">http://dailynews.yahoo.com/h/nm/20011204/tc/tech_security_dc_1.html> The U.S. government plans to develop a model of the nation's railroads, gas pipelines, telecommunications networks and other ``critical infrastructures'' to better understand how they affect each other, the nation's top cybersecurity chief said on Tuesday. As part of its efforts to beef up homeland security, the federal government will set up a national center for infrastructure simulation and analysis in January, said Richard Clarke, chairman of President Bush (news - web sites)'s Critical Infrastructure Protection Board. ``The center will create, if you will, an acupuncture map of the country, so that if there is a fire in a railroad tunnel in Baltimore, we know the Internet slows down in Chicago,'' Clarke told a gathering of high-tech executives at the Business Software Alliance's first Global Tech Summit. The simulation is another attempt by the federal government to secure the nation's sprawling telecommunications networks in the wake of the Sept. 11 hijacking attacks that killed 3,600 in New York and Washington. ``We have migrated function after function into the IT (information technology) cloud without thinking about security,'' he said. One way to do that, Clarke suggested in October, would be to build a secure computer network for government agencies completely separated from the Internet, dubbed ``Govnet.'' While his idea has received a mixed reception from the high-tech community, Clarke said Tuesday that the government had received 167 private-sector proposals on how to build Govnet. The ideas were being reviewed by the government and a separate team at Carnegie Mellon University, he said. Govnet would not necessarily be built entirely from scratch, he said, but assembled from existing agency-specific networks. It could use fingerprint scanners, iris scanners or other ``biometric'' devices to screen users, he said. ``With all these things, we might be able to set an example with Govnet,'' he said. Clarke also appealed to the private sector, which controls the vast majority of the Internet's infrastructure, to beef up its security practices as well. ``We need to decide that IT security functionality will be built into what we do. It's not an afterthought anymore,'' he said. Software products should be shipped with security settings at their highest level, he said, and high-speed Internet providers should require individual users to install ''firewalls'' to protect against damaging viruses. Software companies should not just make ``patches'' available to fix vulnerabilities in their products, but automatically update users' software for them, he said. ``It's not beyond the wit of this industry to figure out a way of forcing down these patches,'' he said. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Stop Smoking Now Nicotrol will help http://us.click.yahoo.com/2vN8tD/_pSDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 21:00:00 PST