Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Feds Unveil Cyber-Security Plan

    Written by

    Chris Gonsalves
    Published February 14, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      With little fanfare, the White House Friday afternoon released the much debated National Strategy to Secure Cyberspace, which calls on industry to show unprecedented cooperation with goverment agencies in the name of network security.

      The plan depends heavily on network operators and industry groups sharing with the government information on network attacks, security threats and widespread vulnerabilities. While similar efforts in the past have failed, some industry insiders say there is reason to believe that this time may be different. Meanwhile, President Bush in his introduction of the plan, called the effort “a framework for protecting this infrastructure that is essential to our economy, security, and way of life.”

      “The cornerstone of Americas cyberspace security strategy is and will remain a public-private partnership. The federal government invites the creation of, and participation in, public-private partnerships to implement this strategy,” Bush wrote. “Only by acting together can we build a more secure future in cyberspace.”

      Those who had seen earlier versions of the plan expressed support. “The strategy is being accepted within the government,” said Pete Morrison, director of the public sector at security vendor Netegrity Inc., in Waltham, Mass. “Ive seen a new awareness inside the government, and I think when people see that, they [will be] more willing to take it seriously and help with information.”

      The centerpiece of the strategy is a comprehensive cyber-security response system that relies on contributions from the private sector. The system would utilize a broad information-sharing program both inside and outside the federal government, facilitated by a separate office within the Department of Homeland Security, which the plan also calls for.

      The “infrastructure protection program office,” as referred to in the plan, would handle the flow of data between the private sector and the government. The office would also be responsible for determining how to store information regarding critical infrastructure protection that is voluntarily submitted by nongovernment organizations.

      The strategy also recommends that the private sector develop a centralized network operations center to assess Internet health and complement the DHSs centralized capability and the overall National Cyberspace Security Response System.

      This final plan differs greatly from the preliminary draft released for comment by the Presidents Critical Infrastructure Protection Board in September under the direction of outgoing PCIPB Chairman Richard Clarke.

      That original draft was divided into five sections—covering home users and small businesses, large enterprises, critical sectors, national priorities, and global issues. The final version is organized along five priorities—a national cyberspace security response system, a national cyberspace security threat and vulnerability reduction program, a national cyberspace security awareness and training program, securing governments cyberspace, and international cyberspace security cooperation.

      And where the original draft was heavy on recommendations and suggestions, the approved plan uses much stronger language, in many cases issuing directives to various government agencies.

      Page Two

      : With Little Fanfare, Feds Unveil Cyber Plan”>

      Still, the core of the new plan is cooperation and information sharing—both sensitive subjects for the private sector. Past information-sharing concepts, not sponsored by the government, have centered on organizations such as the industry-specific Information Sharing and Analysis Centers and the FBIs InfraGard. However, these and other plans have lacked a good definition of the kind of data the government needs and how its going to be handled once its submitted. As such, security experts say this time around, the government would do well to make such distinctions.

      “Sharing information [on vulnerabilities] reveals nothing that would make a company look bad in front of its customers,” said Stuart Schechter, a security researcher at Harvard University, in Cambridge, Mass., and co-author of a paper on the benefits of information sharing. “Even revealing that youve seen a vulnerability exploited doesnt reveal that this has resulted in a successful attack. Better statistics on just how many systems are broken into because systems arent patched would be nice to know—but most of us know where these systems fail. Better numbers on losses from attacks would certainly be useful.”

      However, some security experts are pessimistic about the chances for widespread cooperation.

      “History has shown that unless theyre forced to, people wont reveal any information, for obvious reasons,” said Avi Rubin, associate professor of computer science and technical director of the Information Security Institute at Johns Hopkins University, in Baltimore. “On the other hand, we still dont have good protective measures yet. They need to allocate more funding to research. They should let those of us who know what were doing do it.”

      Referring to the contentious history of the plan, Bush today said, “Securing cyberspace is an extraordinarily difficult strategic challenge that requires a coordinated and focused effort from our entire society—the federal government, state and local governments, the private sector, and the American people.”

      “To engage Americans in securing cyberspace, a draft version of this strategy was released for public comment, and ten town hall meetings were held around the Nation to gather input on the development of a national strategy,” the president added. “Thousands of people and numerous organizations participated in these town hall meetings and responded with comments. I thank them all for their continuing participation.

      Safety in numbers

      The national strategy focuses on five areas deemed crucial to network security:

      • Priority 1: Build a national security response system
      • Priority 2: Create a threat and vulnerability reduction program
      • Priority 3: Develop a national security training program
      • Priority 4: Secure governments cyberspace
      • Priority 5: Enhance international cooperation
      • eWEEK Special Report: Bushs Cyber-Security Plan
      • National Strategy to Secure Cyberspace
      Chris Gonsalves
      Chris Gonsalves

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.