Heute 93

Gestern 578

Insgesamt 39431678

Mittwoch, 15.05.2024
eGovernment Forschung seit 2001 | eGovernment Research since 2001

Sicherheit

  • USA: Feds Again Score Low on IT Security

    Overall grade stays at D+; execs say complexity works against compliance

    A congressional committee last week released a report card giving the federal government an overall grade of D+ on computer security for the second year in a row -- a rating that prompted harsh words from some lawmakers but also sparked a debate over how useful the grading process is.

    At a hearing on Thursday, members of the House Committee on Government Reform lectured IT executives from the Pentagon and the U.S. Department of Homeland Security about the failing cybersecurity scores that the two agencies received as part of the panel's annual evaluation. "I don't feel comfortable that my homeland is secure," said Rep. Diane Watson (D-Calif.).

  • USA: Feds Look to Clear Hurdles in Private-Sector Cybersecurity

    The notion that the government needs to establish firm and far-reaching partnerships with the private sector has become a key focus of the debate currently raging over federal cybersecurity.

    Given that the private sector owns and operates between 80 percent and 90 percent of the nation's digital infrastructure, the military and civilian agencies realize that they can't go it alone in the face of ongoing and persistent threats from a multiplicity of attackers both at home and abroad.

    The catch phrase, a mainstay in nearly every blueprint for federal cybersecurity, is "public-private partnerships."

  • USA: Government Auditors Urge Clearer Cybersecurity R&D Strategy

    The government needs better leadership and more cohesive direction on cybersecurity R&D, according to a new report from the Government Accountability Office.

    The federal government needs to do more to come up with a comprehensive strategy for funding and carrying out research and development of new cybersecurity technologies, according to a new report by the Government Accountability Office.

    Cybersecurity R&D is currently a multi-headed set of initiatives within government. The report lists, in addition to the breadth of executive agencies, 14 different organizations involved in oversight and coordination of cybersecurity R&D, with various hands in a dizzying array of pots, and five agencies actually funding and conducting most of the government's cybersecurity R&D.

  • USA: Government Computers Still Exposed

    Agencies describe bug-patching problems that render systems vulnerable to cyberattack.

    Government agencies are spending billions on technology for homeland security, yet system vulnerabilities are increasing exponentially, agency representatives told a Congressional panel this week.

  • USA: Government IT security: Better than some, but could use work

    Security awareness is good among government workers, and security practices in government workplaces often are better than in their private-sector counterparts, according to a recent study by RSA Security.

    But there still is room for improvement, the survey found. Although 92 percent of government respondents had received security training, compared to 69 percent in the private sector, 34 percent of them reported that at times they felt they had to circumvent security policies to get their job done, a statistical dead heat with those in private enterprises.

  • USA: Government releases specs for security checklists

    The National Institute of Standards and Technology and the National Security Agency have released a specification to standardize IT security checklists.

    NIST and NSA collaborated with representatives from industry to develop the Extensible Configuration Checklist Description Format (XCCDF) as a way to provide a uniform format for security checklists, benchmarks and other configuration guidance.

  • USA: Government, Not Vendors, Must Lead In Securing Federal IT

    No doubt the IT security industry has a lot of knowledge to share with the federal government to help secure government IT systems and Web sites. With near-failure grades on IT security scorecards, the feds need the assistance.

    One approached died last week when the federal CIO Council withdrew its support from the CISO Exchange, a privately run group chaired ostensibly by senior government IT officials. The way the CISO Exchange worked, six companies willing to fork over $75,000 could join the Exchange’s exclusive advisory board comprised of leading federal CIOs and chief information security officers. Other vendors, with smaller contributions, would have had some, but more limited access to these officials. The arrangement smacked of pay to play, and the Exchange’s initial cheerleader in Congress, House Government Reform Committee chairman Tom Davis, vacated his earlier, enthusiastic endorsement.

  • USA: House Passes National Defense Authorization Act

    House Democrats have secured passage of an amendment to the defense authorization bill that would establish a formal cybersecurity office in the White House and update federal compliance requirements for securing electronic data.

    On Friday, the House passed the National Defense Authorization Act by a vote of 229 to 186, which included an amendment co-authored by Reps. Diane Watson (D-Calif.) and Jim Langevin (D-R.I.) that achieved many of the provisions outlined in separate pieces of legislation introduced earlier by the lawmakers.

  • USA: Identity Self-Defense: The Power of PIV

    Identity protection is one of the most pressing topics within our society. Over the course of the last few years, we have seen numerous stories reported where information systems have been compromised and data has been lost potentially compromising the identity of millions. While we could debate the level of security required to properly protect any information system, I believe there is a more fundamental approach to addressing this critical issue. Identity self-defense.

    In the months following the September 11 attacks on New York and Washington D.C., it was determined the issue of identity verification needed to be addressed. Homeland Security Presidential Directive 12 (HSPD12) established the requirement to verify the identity of all federal employees and issue them a secure identity credential. This has resulted in the issuance of millions of Personal Identity Verification (PIV) credentials.

  • USA: Is Government Paying Enough Attention To Application Security?

    Even as a consistent number of system vulnerabilities blemish federal agencies and departments, focus on IT security remains somewhat feeble, with few initiatives yet under way, and an expected growth in spending of less than 20 percent by 2010. But VARs inclined to set the market on the back burner for now might want to think twice, as government looks to industry for some initial education and hand-holding.

    Spending on IT security is expected to increase from $6.1 billion in 2005 to $7.3 billion in 2010, according to Input, a Reston, Va.-based research firm. Furthermore, spending on professional services associated with IT security -- the design, development and operation of security systems, as well as upgrades and maintenance -- is expected to grow from $3.7 billion in 2005 to $4.4 billion in 2010. While $1 billion increase in spending is nothing to sneeze at, it doesn't exactly present the goldmine right off the bat that some VARs might have expected.

  • USA: Military cybersecurity demands new mechanisms and training

    The Defense Department’s cyber security efforts require broader-based training and better support mechanisms for the military services, while still protecting civil liberties, said Lt. Gen. Keith Alexander, the man expected to head the military’s new Cyber Command.

    “The nation that started the Internet ought to be the first to secure it and still protect civil liberties,” he said, speaking at a cybersecurity conference in Washington Thursday. “We can and we must.”

  • USA: Minnesotas State Web sites' security in question

    Information officer says license tab site a fluke, other sites are safe

    You can buy hunting and fishing licenses. Fork over the registration fee for your boat or snowmobile. Renew a nursing or physician license. Report workplace injuries. Pay your taxes. You can do a lot of business with the state of Minnesota online.

    But how secure is the personal and financial information that people share with the state via the Web?

  • USA: New Bill Would Create Office of Cyber Policy to Protect Nation from Cyber Terrorism

    Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Federal Financial Management Subcommittee Chairman Tom Carper, D-De., on June 10th introduced comprehensive legislation to modernize, strengthen, and coordinate the security of federal civilian and select private sector critical infrastructure cyber networks.

    The Protecting Cyberspace as a National Asset Act of 2010, S.3480, would create an Office of Cyber Policy in the White House with a director accountable to the public who would lead all federal cyberspace efforts and devise national cyberspace strategy.

  • USA: New Defense wireless policy tightens security

    After more than two years of modifying and updating a 2004 wireless policy, the Defense Department has released a memorandum aimed at boosting security on wireless local area networks connected to the Global Information Grid.

    The supplemental policy, signed off on June 2 by Defense CIO John Grimes, requires the IEEE 802.11i standards to be used for wireless LANs and devices, and technologies that can store, process or transmit unclassified information. The old policy required that wireless devices use cryptographic modules validated to Federal Information Processing Standard 140-2.

  • USA: New ID solutions

    Identity and credentialing advances with PIV-1

    There is a change taking place around identity and credentialing in the enterprise and government markets. Identity is now an enterprise business requirement with its own infrastructure, policy and budget. Identity makes use of open standards to achieve interoperability and requires the highest level of assurance. The change is that physical access control and other enterprise applications no longer issue credentials. Instead, they use a common digital identity of digital certificates and the 21st century utility of the Internet as well as private networks.

  • USA: NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines

    The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats.

    The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set of guidelines is intended to facilitate organization-specific Smart Grid cyber security strategies focused on prevention, detection, response and recovery.

  • USA: Obama IT Security Plan Praised

    The initial reviews of President Obama's cybersecurity plan presented Friday, though not universal, have been favorable. Many praised the president for elevating cybersecurity as a national concern, but some expressed concerns that more details of his new IT security policy weren't revealed.

    "The fact that the president, in the first time in my memory, made a major speech about cybersecurity, talked about it as a national priority, spoke about it as being a major priority for his administration... and that he created office which would have cross organizational responsibility is significant," said Dan Chenok, chairman of the government's Information Security and Privacy Advisory Board.

  • USA: OMB names four agencies as security LOB centers

    The Office of Management and Budget today named four agencies to provide services to certify and accredit computer systems to assist agencies across government to fulfill federal information security requirements.

    As shared service centers, the agencies would aim to conduct certification and accreditation (C&A) activities more effectively than agencies currently do themselves because they will deliver the services across multiple agencies using best practices under the Information Systems Security Line of Business, said Karen Evans, OMB’s administrator for e-government and information technology, in a briefing with reporters.

  • USA: OMB to study consolidation of IT security functions

    The Office of Management and Budget expects this month to launch a six-month study of whether some federal IT security functions could be provided centrally by agencies or commercial vendors.

    Karen Evans, OMB administrator for e-government and IT, said Tuesday at the GCN Cybersecurity Conference in Washington that a task force would complete its work by September so that guidance would be available to agencies for the fiscal 2007 budget cycle. “We’re on a fast timeline,” Evans said.

  • USA: OMB, DHS outline data security best practices

    The Office of Management and Budget and the Homeland Security Department today explained 10 common mistakes agencies make when securing data and personal information and offered a host of best practices to correct each mistake.

    In a new paper, “Common Risks Impeding the Adequate Protection of Government Information,” OMB and DHS discuss common problems in areas such as training, contracting and records management.

Zum Seitenanfang