U.S. Cybersecurity Report Available 187
Kaelem writes "Kevin Rose put up a copy of the report Cybersecurity for the Homeland (pdf), due to be released tomorrow. It talks about some interesting things, like expanding the US-CERT website as well as funding for colleges to develop cybersecurity curriculum."
Which department? (Score:5, Funny)
Re:Which department? (Score:5, Insightful)
More like from the U.S. Depeartment Of We're Not Going To Tell You Anything You Didn't Already Know About Security
No one cares about security until they get burned. Once burned the battle cry goes for awhile and fizzles as most don't give a rats ass about security beyond looking politically correct. It is why so many sites and users get hacked.
And here is a hint, most get hacked from the inside out, that is - some twit loads a spyware or malicious program and claims ignorance when it happens. More like carelessness but management often overlooks it.
Safe computing is like safe sex, use some precaution and don't be a slut and download everything you can click on.
Re:Which department? (Score:2, Funny)
I doubt that. (Score:5, Insightful)
A lot of companies hire admins who are actually unqualified, but who can do a "good enough" job because they don't understand what to look for in an admin.
Not all admins are this way, but a suprising number of them are.
If admins out there honestly knew everything there was to know about security, and administer their system to the CERT guide specs, then I would be impressed. Because my experience in observing everything from large university systems, health care systems, tag agency (all-you-need-for-identity-theft-agencies, more appropriately) systems, corporate systems (credit card information and personal information), is that this simply isn't so.
A lot of penetration testing reveals vulnerabilities in areas that are clearly stated in that CERT guide.
Re:I doubt that. (Score:3, Insightful)
Would you put a $50,000 alarm system in your $30,000 car?
Would you pay $300,000 a year to protect your company's data?
Answer: It depends how much the company data is worth.
For a lot of companies, especially smaller companies, the answer is no. The data might be compromised, but unless they deal with sensitive data whose loss could cause public embarrassment, they will not spend a lot of money to protect it.
Would you hire a top-notch guy for $130k plus 1 helper at $70k
Re:I doubt that. (Score:4, Insightful)
But in my examples:
-large university systems
-health care systems
-tag agencies
and such and such. Yes, the protection of that information is extremely important.
Just think about the information that someone would have on you by compromising just your local tag agency.
When companies collect and store information about their customers, they owe it to their customers to protect that information.
But you are absolutely correct in stating that, in most cases, budget is the deciding factor. But its amazing what good administration can do to counter budget issues. A lot of times, but not always, it is poor administration (again, putting things online out-of-order) and such and such that causes these compromises.
If a company doesn't want to take extra steps to protect information, they they should consider not storing that information on a system accessible to the outside.
Re:I doubt that. (Score:2)
Re:I doubt that. (Score:2)
CERT Guide to System and Network Security Practice (Score:2)
http://www.unixreview.com/documents/s=1357/urm010 8 f/ [unixreview.com]
CERT Guide to System and Network Security Practices
by Julia Allen
Addison-Wesley 2001
ISBN: 020173723X
I somehow combined the "CERT Guide to System and Network Security" with a course I was taking called "Secure System Administration and Accreditation." My mistake.
I am not sure about your comment on firewalls. Firewalls are still are and should be used.
Re:CERT Guide to System and Network Security Pract (Score:2)
Re:Which department? (Score:2)
U.S. Depeartment Of We're Not Going To Tell You Anything You Didn't Already Know
Sure enough.
But it's kind of like the stupid legal boilerplate language you find in consumer product manuals - you know the kind - don't use this hair dryer in the shower, etc.
It seems stupid and it is stupid, in the sense that most knowledgeable sysadmins know what to do and what not to do. Whether they can enforce their view upon a user base of upper management downloading spyware and given an onerous workload that preven
Re:Which department? (Score:3, Funny)
"Wingtittyaydakas", obviously.
Re:Which department? (Score:3, Funny)
I guess I'd better brush up with my Hooked On Phonics tapes.
Wide range of topics ... (Score:5, Interesting)
Definitely something worth investigating, just wondering what a few billion in research dollars is going to reveal - hopefully more than "it's a problem that's difficult to fix" report.
Re:Wide range of topics ... (Score:3, Insightful)
Re:Wide range of topics ... (Score:3, Interesting)
I could see something along the lines of mandated filters on international links, though. Time for MCI and Level3 to break out the lobbying money, else their international business may get much more expensive (can you imagine the peering complications if you have to enforce content filtering at the ISP level?)
Re:Wide range of topics ... (Score:2)
Re:Wide range of topics ... (Score:1)
Re:Wide range of topics ... (Score:2)
The cynic in me expects some 60 year old grandmother to get arrested, charged, and convicted of cyberterrorism because her computer was involved in a DDoS attack any day now.
NOTE: Many grandmothers are competent users of computers, just as many geeks shower from time to time, however a stereotype can be a useful communication device.
Re:Wide range of topics ... (Score:4, Informative)
In order for the control-freaks of the world to keep their socio-economic power, it's in their best interest to turn the open internet into a "Secure Internet" dystopia [fourmilab.ch] where only "Trusted Computing" devices are permitted to communicate.
As usual, they'll spin total-accountability as a good thing necessary for combatting the evil cyber-terrahists, economic pirates, and pedophiles. But I, for one, will NEVER bow to DRM mandated by government and/or pushed by monopoly interests.
Re:Wide range of topics ... (Score:2)
From a technical p
Re:Wide range of topics ... (Score:2)
If a
Cyber? give it a rest (Score:3, Insightful)
Re:Cyber? give it a rest (Score:2)
Re:Cyber? give it a rest (Score:2)
oh sorry, your male too!?!?!?!? damnit slashdot!
Re:Cyber? give it a rest (Score:1)
References to computer network infrastructure as "cyber" sound very amateur to me. 1995 already happened. Could we please get an adult vocabulary and start talking about serious subjects with maturity? Thank you.
This may be very true for you and me, but the majority of the folks pushing papers that make the real decisons for our country need relatable terms.
Re:Cyber? give it a rest (Score:2)
but the majority of the folks pushing papers that make the real decisons for our country need relatable terms
You're absolutely right. Dictionary.com's first three usage examples for cyber [reference.com] are cyberpunk, cyberspace (Gibson references to be sure), and cybersex. No doubt these terms are relatable to all and well covered by the document in question.
Re:Cyber? give it a rest (Score:2)
Re:Cyber? give it a rest (Score:2)
A fine and noble sentiment. Do you suppose we could make a beginning here on Slashdot?
Re:Cyber? give it a rest (Score:2)
Re:Cyber? give it a rest (Score:2)
I'd imagine that a lot of people are very interested in "cyber" security - like insuring the person they are cybering with is actually the sex they claim to be. Especially when they are using an adult vocabulary.
Re:Cyber? give it a rest (Score:2)
Do Americans realise just how patheticly childish your naming conventions/schemes look to the rest of the world? :) "PATRIOT" - hahaha!
Re:Cyber? give it a rest (Score:2)
But if you want to keep complaining that you don't like their terminology, why don't you toss in a hackers vs. crackers speech, while you're at it?
Cyber security curriculum. (Score:4, Insightful)
Re:Cyber security curriculum. (Score:2, Informative)
You talk about the coding implications when you teach common coding practices (buffer overflows, etc, belong in a C/C++ theory course), you talk about the practical implications in networking style courses, and you talk about the social and realistic implementations in computing ethics courses.
Build it into the curriculum doesn't mean making a single
Computer Science programs. (Score:4, Interesting)
But there are some colleges with offer the five major security certifications and offer network security, ecommerce security, network programming, penetration testing, operational security, forensics, enterprise security managment, and more courses which basically make up a secondary Computer Science program. Those students still have to learn all of the fundamentals, but also push themselves to learn the security aspects. These courses are also often taught by ex-government workers, ex-hackers, and such. I know of at least one that is also broadening their program to include electrical engineering and hardware aspects as well, so things like biometric sensors are covered in addition to programming databases.
I was suprised at how many programs there are in the nation which gear into this stuff; unfortunately, it is probably not enough. Most CS or IS programs focus on the theory and some practical implications, but stop at the security implications.
Re:Computer Science programs. (Score:1)
It would be one thing to have kind of Security specialization but even then you run the risk of having an expiration date on your diploma. It needn't be this way but it's important to have a good basis in the fundamentals so that you can predict (even bet
They do not disregard the fundamentals (Score:3, Interesting)
The expiration date is true of most majors. I received my bachelors degree in Electrical Engineering and had three years of Mechanical Engineering, and beyond the basics, most of the specializations which students take on during their masters study, given technology trends, will carry an expiration date. That is why most college graduate
Re:They do not disregard the fundamentals (Score:1)
This is as contrasted to professional type programs, like Berkeley's Certificate in Telecommunications and Network Engineering; this sort of thing: designed to meet an immediate industry need but certainly nowhere near the rigor of a normal Master's program, for example (intellectually).
So I guess I don't buy
Heavy workload (Score:2)
I can think of at least five students who are auditing an Operating Systems course for no credit toward their degree, although I suspect there will be many more.
My own experience with AI (although not in the strict sense) comes from a combination of a Neural Networkin
Yes, there are programs (Score:5, Informative)
And many colleges are developing Centers for Information Security (CIS), and among those, that is where you see the government encouraging these programs.
The tag line, I believe, is "Defending America's Cyberspace."
More information on the SFS program can be found here:
http://www.sfs.opm.gov/ScholarshipMain.asp [opm.gov]
Government contracts (Score:2)
Don't know what I mean? Let's say a bid is requested by government for a specific site security analysis/surveillance. If done right, it
Re:Government contracts (Score:2)
security curriculum at umich (Score:1)
then again, its better late than never...
Re:Cyber security curriculum. (Score:1, Interesting)
Re:Cyber security curriculum. (Score:2, Informative)
I know that the grad program is much more extensive. If you want to do security research, Purdue is definitely the place to persue it.
Re:Cyber security curriculum. (Score:1)
Concentration in Cyber Security (Score:2)
Although the major is still labeled as Computer Science or a variation thereof, all courses in the masters program are geared toward cyber security.
Some courses offered:
--Computer Security
--Secure Electronic Commerce
--Enterprise Security Management
--Secure System Administration and Certification
--Network Security
--Computer and Network Forensics
--Information System
Cyber (Score:2)
...due to be released tomorrow (Score:4, Insightful)
Actually, come to think of it, perhaps incompitence in a secret po^H^H^H^H^H^H^H^H^Hhomeland security department is not such a bad thing.
Re: ...due to be released tomorrow (Score:1, Funny)
Re: ...due to be released tomorrow (Score:2)
ncompitence in a secret po^H^H^H^H^H^H^H^H^Hhomeland security department is not such a bad thing.
I hope that government incompetence pervades the homeland security initiative. They are more of a danger to citizens than terrorists, although I'm sure there will be more and more terrorists in the future, since our foreign policy seems bent on enraging everyone possible. Perhaps the future will not be like 1984, maybe it will be more like Brazil, or better yet, Hogan's Heroes. "I SAW NOTHING!"
Roadmap for the future (Score:3, Insightful)
Why do I see more bureaucracy and less action?
Moderate this comment
Negative: Offtopic [mithuro.com] Flamebait [mithuro.com] Troll [mithuro.com] Redundant [mithuro.com]
Positive: Insightful [mithuro.com] Interesting [mithuro.com] Informative [mithuro.com] Funny [mithuro.com]
Roadmap for the future -- Planning is a good thing (Score:2)
A program that doesn't go through budget planning, cooperation with the private sector, risk assessment, remediation, and further research and development, as well as education about the program, is exactly why we have to problems that we do. People complain that programs are pushed and rushed from start to finish without any forethought or planning, and then are critical when that planning goes into place. I suppose people would prefer seat-of-the-
Re:Roadmap for the future -- Planning is a good th (Score:2)
Re:Roadmap for the future (Score:1)
Yeah, that'll bear fruit.
This is a somewhat unique infrastructure problem as the infrastructure is a shared responsibility and controlled mostly by corporations. Contrast that with security in the physical world: bridges, tunnels, water treatment plants...
That's probably the first area I'd like to see some progress in: coming up with a mechanism to foster meaningful info sharing b/n corporations that protects their interests within reason (doesn't p
Re:Roadmap for the future (Score:2)
Unfortunately, the level and detail of planning documents needed to manage the new cyber mission within DHS was not forthcoming. Budget paperwork throughout the fiscal year was vague. It is still unknown whether spending plans and detailed budget execution data exists.
Once in place, the Director, a well-respected cybersecurity expert with experience in both the private and government sectors, left the Department after only a year and has not been permanently replaced as
Released by... (Score:2, Funny)
is this done by the same group... (Score:1, Interesting)
The local news is sure pissed off about that. Kinda makes you wonder what their priorities are. Oh wait, Bush got re-elected, I guess the hype is over.
Re:is this done by the same group... (Score:1, Troll)
Who'd miss it if it was blown up?
Re:is this done by the same group... (Score:2)
by function (if not design) is another government
oxymoron. This is why, after 3+ years, airline
cargo and (port) container cargo are still not
inspected, and why there are more illegal border
crossings today than before 9-11-2001. Billions
(USD $$) more to be spent on a theater missile
defense system, but cut back on the Clinton
"100,000 more police on the streets" program,
and no real additional attention spent on what
container cargo comes into our ports. Any countr
Editors: (Score:2)
http://dictionary.reference.com/search?q=curricul
Doctor...? (Score:1)
Of course, the best way to do this is throw gold dust at them... lots of gold dust.
cyberia (Score:4, Insightful)
Re: (Score:2)
my 2 cents (Score:2, Insightful)
Combustible rubbish read to the torch of any one ambitious to illuminate his name.
In Dr. Johnson's famous dictionary patriotism is defined as the last resort of a scoundrel. With all due respect to an enlightened but inferior lexicographer I beg to submit that it is the first. (from The Devil's Dictionary)
Everytime I read the term "Homeland"... (Score:2, Insightful)
Re:Everytime I read the term "Homeland"... (Score:2)
Shorten the report to 2 words (Common Sense) (Score:3, Interesting)
Common Sense
My career in computing security; which consisted mainly of securing sites for small companies; taught me that much of what is going on is lack of clear policy and common sense.
Much of what I see missing can be traced back to the lack of a clear, well thought security policy.
This one document (often not more than a simple statement) is the root of all security related activities within an company or organization.
It have collaped and wet my pants while laughing at what I have seen for 'security' at some organizations.
An example: A company with some of the greatest tools and equipment; firewalls, VPN, the whole works. But with no clear documentation on how to configure what. Everything kept between the ears of the lead sysadmins. If they quit or get laid off (which happens); all this information gets lost.
Firewall set nice and tight (nothing in at all except VPN and port 80 to a machine on a security island). However, the VPN was configured with shared passphrase that was 'secret' and with no restrictions on what IP can initiate a connection.
Or VPN's that have proper certificates but with no revocation lists. Road Warrier VPN clients with the passphrase hard coded on the box and not having to be keyed in: Stolen laptop - direct acces to company VPN to inside network.
Or, nice tight firewall and VPN; but with open wireless ports inside (easily reachable from the parking lot or common building lobby or better still, the public cafe on the ground floor).
What realy keels me over laughing is how vendors are allowed free access to the company network. And how that access it not properly terminated upon conclusion of the contract.
Couple this with no clearly written and fully agreed upon (throughout the entire enterprise) security policy. Easy path to desire.
Luv you all
Re:Shorten the report to 2 words (Common Sense) (Score:2)
Common sense is far less common than is commonly believed ;-)
Re:Shorten the report to 2 words (Common Sense) (Score:2)
Are our lives really changed? (Score:5, Interesting)
Re:Are our lives really changed? (Score:2)
Read "Heart of a Soldier" [amazon.com], James B. Stewart's biography of Rick Rescorla, head of security for Morgan Stanley, who died in the collapse of the WTC, after getting everyone in the company safely out of the building. Rescorla's best friend Daniel Hill had written a paper for the US government proposing using a plane to attack a building years before. It's a great and deeply moving read.
Re:Are our lives really changed? (Score:3)
Re:Are our lives really changed? (Score:5, Insightful)
For a country that loves democracy so much, America doesn't seem to give a flying shit when their politicians lie. Unless it's about a blowjob, in which case it's TREASON, I tells ya! TREASON!
Sort it out, America. It's time for torches and pitchforks, and a nice stoll down to Washington DC... Unless you do that, the rest of the world will simply look on and laugh at the mess you've got yourself in ;)
Re:Are our lives really changed? (Score:2)
If Americans gear up with torches and pitchforks, they'll be fighting each other before they even get to Washington.
It's not that politicians are failing to give the people what they want, it's that they can't even agree on what they want.
Re:Are our lives really changed? (Score:2)
Re:Are our lives really changed? (Score:2)
It sounds like your news is guilty of the same indulgence. The situation over here is really nothing like you paint it in your first and third paragraphs. If you had decent coverage of our last election, you wouldn't say "These staunch republicans and scared de
Some answers . . . (Score:2, Troll)
Here is what I did for one of my clients:
First thing; Clear security policy. Goes something like this:
UNLV.. (Score:2)
ICE (Score:2)
RTFA - information density is very low in this... (Score:4, Insightful)
Just in case the reader forgot this fact while reading the rest of the exec summary, the next chapter, the Introduction, starts with "On a fateful day in September 2001, our lives changed forever as a handful of terrorists proved they had the means to destroy on a level equal to their hatred.".
Having grabbed the readers attention, the rest of the report goes on to do the following
a. Narrate an administrative history of the establishment of DHS and the cybersecurity divisions within it
b. Provide volkswagen loads of justification for the existence of said departments - based on various criteria, all liberally illustrated with suitably scary numbers
c. Lay the groundwork for greater control and monitoring by the departments, of all computing and telecommunication resources in the country, regardless of who owns/operates them.
d. Attempts a definition of cybersecurity - which is a good thing.
e. Provides more volksvagens full of information designed to prove that legislative and administrative machinery are acting diligently and responsibly along the road to better security. This also absolves the departments themselves from any potential blame in the event of a screw-up - "all our bases are covered"
f. Throws in some pseudo-wise statements about educating mom-n-pop about how to protect their store computers and generously mentions that it will fund education in related matters. Remains to be seen if they will just restructure existing funding, reallocate under a new head and claim a job well done there.
Not at all the level of analysis, detail or accountability information you'd expect. Of course, John Q.Public is told that his representatives are in the loop, so don't worry, sleep tight. Its almost as if the report was specifically designed to NOT reveal any information. We'd rather not tell you any more, thank you, cuz you and your neighbors might all be security risks.
The people who need it won't read it (Score:2)
At one client our basic security recommendations (get a lock for the server room. install a patch panel in the wiring closet, removing 40+ crimps) took 6 months to happen. Our most advanced recommendation? Move your mail/web servers off-site so you're not allowing inbound traffic, since we know you can't handle a DMZ.
Residentially... if people would buy a $20 router it would begin to solve problems (which residential ISP's should bundle anyways). The number of times I've
Re:Meh (Score:1, Offtopic)
Seriously, G4Techtv sucks now...except for Kevin and his hot girl friend. Even Kevin seems to have been whipped into submission for the most part. He took a lesser job, and played it off as his choice on TSS. I dunno if this is really the case, but in all honesty he should just leave and go elsewhere. He is too good for the crap that is the new TSS.
Those fags at G4 have ruined the one thing I still liked to watch on cable...I would seriously ditch cable now if it weren't for the package deal for high s
Re:Kevin's hot "girlfriend"? (Score:2)
ha! No, I was not but you have a valid point.
Re:Meh (Score:2)
Re:gotta be illegal (Score:2)
Re:gotta be illegal (Score:2)
Anyway, leaking such things is normal procedure for governemnt bodies.
What is interesting is that this just ended up on some obscure web site, when the leakers were presumably hopeing for some ``your lovable government takes steps to protect you from evil computer hackers'' headlines in the weekend media. The fact that this guy thought it interesting enough to put it up presumably means there was none.
Re:Sad news ... Stephen King dead at 59 (Score:1, Offtopic)
Re:Sad news ... Stephen King dead at 59 (Score:2, Funny)
Yes and no (Score:4, Insightful)
You would be suprised at who sits behind those computer screens and what their intention is. If the United States has an entity for electronic and cyber warfare, it seems that our enemies would have something similar. Now, back to the teenager thing... it is a sad truth that many compromises of confidential systems have been made by a teenager that is "just curious," but also some of these teens have developed an angsty hatred of the U.S. government and consider it a game to take it down.
You might not see it as terrorism... until the 911 systems go down. Until the IRS systems are compromised and your entire identity is stolen and abused. Until major systems are undergo a DDoS when you suddenly need them. That is why these preventative measures need to be in place, and why our youngest and brightest are being trained to take on this endeavor.
However, I don't think that 12 year old terrorists was the focus here. It is the damage that can be caused by even a 12 year old in context with what can be achieved by a highly trained individual who applies it for malicious purposes.
Re:Yes and no (Score:2)
Is is just me, or is there a lot of this about:
Step 1: 9/11
Step 2: ?
Step 3: Unrelated agenda
I've heard 9/11 invoked by people in power for things as trivial as noisy teenagers at parties. I think a good move back towards reality would be if people in the feild stopped calling in "cyber-terrorism", which implies robots with bombs, and move back to using terms like network security. The people we are worried about here are not terrorists - rea
Re:Yes and no (Score:2)
Real terrorist use fear(terror) as a tool to push their agenda. Death is just an effective way to incite fear.
Cyber-torrorism.. Computer/Internet-based Terrorism, if you will can certainly kill people. Those stop lights at the intersections, the 911 systems, the radio and wireless systems for police/fire systems. The banking systems, ATMs. If core systems (heaven forbid!) crash, lives most certainly could and would be lost.
More importantly, fear w
Re:Yes and no (Score:2)
Re:Yes and no (Score:2)
Try this definitition: Cyberterrorism - (1) a word used by people who work with computers who want to see some of that Homeland cash. (2) a robot with a bomb.
Re:911 dialers (Score:2)
Re:911 dialers (Score:2)
Don't let these government asshats tell you what to be scared off. Look at the evidence, be objective, and just think about what they're saying for 2 seconds. 99.99% of it makes NO sense.
Re:Yes and no (Score:4, Insightful)
If you think Al Qaida could wreak more havoc cracking some government system and stealing some personal info, than by blowing something big up, you're grossly mistaken.
Fuck. You're seeing what the US is doing, and then going "Oh, well, if they're doing that, then there must be an enemy doing the same" - no. No, no, no, no, NO. That's how governments coerce the people. If the Army erected a massive cannon and pointed it at a hill, you'd assume that hill was dangerous. That's exactly what they're doing here. They're conjouring up threats to make their policies seem essential. If the Bush/Cheney administration doesn't hype up the enemy's potential, then they're out of a job. They fought the entire election over defense. It's their only perceived strength.
Where is the evidence that any terrorist organisation around the world is targetting the US en masse? Exactly.
Please, please, PLEASE don't buy into this. Look for some third-party information from someone not selling anything, who wants nothing in return. These guys have a vested interest in hyping danger, as more danger = more budget.
I'm sorry if I sound like a dick about this one, but from Europe, it's so blatantly obvious what your government is trying to evoke from you that it tears me up inside to see so many Americans swallowing it hook, line and sinker. I guess WWI && WW2 didn't feature too heavily in history classes over there. Or, if they did, they obviously missed out a bunch!
A fair but perhaps incorrect assumption (Score:2)
You don't sound like a dick at all. In fact, you sound like a fair part of the American public.
It is true that "blowing something big up" might have a larger physical impact, but the strength of a nation is often determined by its information. When you stop or compromise the flow of information, you can really make an impact. It was not Bush or Cheney or any member of that administration that brought me to that conclusion.
I can't
Re:Yes and no (Score:2)