{"id":408,"date":"2006-09-16T17:23:00","date_gmt":"2006-09-16T10:23:00","guid":{"rendered":""},"modified":"2006-09-16T17:23:00","modified_gmt":"2006-09-16T10:23:00","slug":"u-s-unprepared-for-internet-attack-recovery","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2006\/09\/u-s-unprepared-for-internet-attack-recovery\/","title":{"rendered":"U.S. Unprepared for Internet Attack Recovery"},"content":{"rendered":"<p>The United States is not prepared to effectively coordinate a public\/private recovery from a major attack on the Internet, cyber security officials told Congress today.<br \/>\nThe primary problem, they explained to a sparsely attended House hearing, is leadership and clear lines of authority.<br \/>\n&#8220;Right now, no one in government is really looking at the macro level,&#8221; Paul Kurtz, the executive director of the Cyber Security Industry Association (CSIA), told the lawmakers.<br \/>\n&#8220;Currently, there is little strategic direction or leadership from the federal government in the area of information security.&#8221;<!--more--><\/p>\n<p>Before joining CSIA, Kurtz served at the Bush White House on the National Security Counsel (NSC) and the Homeland Security Council (HSC).<br \/>\n&#8220;Ensuring the resiliency and integrity of our information infrastructure and protecting the privacy of our citizens should be higher on the priority list for our government,&#8221; Kurtz said.<\/p>\n<p>Federal regulations make the Department of Homeland Defense (DHS) the primary focal point for national cyber security safety, but a General Accountability Office (GAO) study released Wednesday in conjunction with the hearing backs Kurtz&#8217; position.<\/p>\n<p>The report concludes that while the DHS has developed plans for infrastructure recovery, the component pieces of those plans that address the Internet infrastructure are incomplete.<\/p>\n<p>&#8220;DHS has started a variety of initiatives to improve the nation&#8217;s ability to recover from Internet disruptions, including working groups to facilitate coordination and exercises in which government and private industry practice responding to cyber events,&#8221; the report states.<\/p>\n<p>However, the GAO notes, progress has been limited and other initiatives lack time frames for completion.<\/p>\n<p>The GAO also singled out the private sector for the &#8220;reluctance of many&#8230; to share information on Internet disruptions with DHS.&#8221;<\/p>\n<p>Larry Clinton, the chief operating officer of the Internet Security Alliance, conceded not enough is being done by the government or the private sector to secure cyber space.<\/p>\n<p>&#8220;We cannot manage the risk of first 21st Century technology solely using regulatory models designed two centuries ago,&#8221; Clinton said.<\/p>\n<p>&#8220;While regulation has its place, a new, more creative model built on marker incentives must be developed.&#8221;<\/p>\n<p>Symantec&#8217;s Vincent Weafer added to the House panel&#8217;s concerns by stressing that the very nature of cyber threats is changing, further complicating the government&#8217;s planning.<\/p>\n<p>Large-scale, fast-moving virus or worm attacks, for instance, are on the wane.<\/p>\n<p>According to Symantec data, there were almost 100 medium-to-high-risk attacks of that sort from 2002 to 2004. In 2005, there were only five and none have been reported so far this year.<\/p>\n<p>&#8220;We&#8217;ve made significant headway in containing and repelling these sorts of threats,&#8221; Weafer said.<\/p>\n<p>&#8220;Cyber crime is the dominating security threat we&#8217;re seeing today and there&#8217;s been a marked increase in the use of &#8216;crimeware&#8217;&#8230; used to conduct cyber crime,&#8221; Weafer said.<\/p>\n<p>He added that Symantec&#8217;s tenth annual Internet Security Threat Report found that attackers are moving away from large, multiple hits against traditional security devices like firewalls and routers.<\/p>\n<p>&#8220;Instead, they are focusing their efforts on regional targets, desktops and Web applications that may allow an attacker to steal corporate, personal, financial or confidential data,&#8221; he explained.<\/p>\n<p>Or, more ominously, breaching confidential information from power an energy plants which can then be used to plan a physical attack.<\/p>\n<p>All the gloomy testimony finally prompted Rep. Cliff Stearns (R-Fla.) to ask George Foresman, the undersecretary of preparedness at the DHS, to rank the country&#8217;s preparedness to handle a major Internet attack on a scale of 1-10, with one being the most prepared.<\/p>\n<p>&#8220;I&#8217;m not going to put a number on it,&#8221; Foresman replied.<\/p>\n<p>Stearns persisted, suggesting &#8220;very unprepared?&#8221;<\/p>\n<p>Foresman reluctantly came up with, &#8220;Moderately well prepared but there is still much to do.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>U.S. Unprepared for Internet Attack Recovery<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-408","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-6A","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=408"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/408\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}