[iwar] [fc:Report:.Agencies.need.to.focus.on.cybersecurity.now--or.else]

From: Fred Cohen (fc@all.net)
Date: 2002-01-14 17:50:16


Return-Path: <sentto-279987-4300-1011059354-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 14 Jan 2002 17:52:08 -0800 (PST)
Received: (qmail 3064 invoked by uid 510); 15 Jan 2002 01:49:26 -0000
Received: from n22.groups.yahoo.com (216.115.96.72) by all.net with SMTP; 15 Jan 2002 01:49:25 -0000
X-eGroups-Return: sentto-279987-4300-1011059354-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.189] by n22.groups.yahoo.com with NNFMP; 15 Jan 2002 01:49:14 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 15 Jan 2002 01:49:13 -0000
Received: (qmail 82715 invoked from network); 15 Jan 2002 01:49:13 -0000
Received: from unknown (216.115.97.171) by m3.grp.snv.yahoo.com with QMQP; 15 Jan 2002 01:49:13 -0000
Received: from unknown (HELO red.all.net) (12.232.72.98) by mta3.grp.snv.yahoo.com with SMTP; 15 Jan 2002 01:49:13 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g0F1oGl29398 for iwar@onelist.com; Mon, 14 Jan 2002 17:50:16 -0800
Message-Id: <200201150150.g0F1oGl29398@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 14 Jan 2002 17:50:16 -0800 (PST)
Subject: [iwar] [fc:Report:.Agencies.need.to.focus.on.cybersecurity.now--or.else]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Report: Agencies need to focus on cybersecurity now--or else 
By Joshua Dean, Government Executive, 1/14/2002
<a href="http://www.govexec.com/dailyfed/0102/011102j1.htm">http://www.govexec.com/dailyfed/0102/011102j1.htm>

Do something about cybersecurity now. 
That's the message for federal agencies in a new National Research
Council report, "Cybersecurity Today and Tomorrow: Pay Now or Pay
Later," which might well be considered a primer on all aspects of
cybersecurity. 
The report was written by the Computer Science and Telecommunications
Board of the National Research Council, the research arm of the National
Academy of Sciences, the National Academy of Engineering and the
Institute of Medicine. 
Herb Lin, the Computer Science and Telecommunications Board's senior
scientist, said information technology has become part of the fabric of
American life. Therefore, agencies and businesses need to recognize the
"sorry state of information security," he said. 
The report described the potency of cyberattacks and their potential to
destroy the country's critical infrastructure. Cyberattacks "could
compromise systems and networks in ways that could render communications
and electric power distribution difficult or impossible, disrupt
transportation and shipping, disable financial transactions and result
in the theft of large amounts of money," it said. 
To avoid such crises and improve cybersecurity, the report suggested
that agencies: 
Designate a security coordinator and provide this person with the
resources and authority to force agency system administrators to focus
on security matters. 
Ensure "adequate information security tools are available, that everyone
is properly trained in their use and that enough time is available to
use them properly," and that all personnel are held accountable for
their actions. 
Conduct random, unannounced penetration testing, report the results to
managers and fix the problems and vulnerabilities that are found. 
Design networks, information systems and security architectures "under
the assumption that they could be connected to a compromised network or
a network that is under attack." 
Complement a defensive strategy with a disaster recovery plan.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sponsored by VeriSign - The Value of Trust
When building an e-commerce site, you want to start with a
secure foundation. Learn how with VeriSign's FREE Guide.
http://us.click.yahoo.com/oCuuSA/XdiDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST