Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
New device will evaluate security products
by Staff Writers
San Francisco (UPI) Mar 16, 2009


Bill seeks closer public-private cybersecurity cooperation
Washington (AFP) March 17, 2010 - Two US senators introduced legislation Wednesday seeking a closer partnership between the government and the private sector on cybersecurity. "Private companies and the government must work together to protect our nation, our networks and our way of life from the growing cyber threat," said Democratic Senator Jay Rockefeller of West Virginia, a sponsor of the bill. "The networks that American families and businesses rely on for basic day-to-day activities are being hacked and attacked every day," Rockefeller said in a statement. "At this very moment, sophisticated cyber enemies are trying to steal our identities, our money, our business innovations, and our national security secrets," he said. "This 21st century threat calls for a robust 21st century response from our government, our private sector and our citizens."

The Cybersecurity Act is a new draft of a bill introduced last year and was revised to take into account the views of more cybersecurity experts in the private sector, government and civil liberties community. The bill would not allow the president to shut down the Internet unilaterally -- a revision to address critics of the prior bill who claimed it would provide that authority. The proposal would require collaboration with the private sector in responding to a "cybersecurity emergency." A "cybersecurity emergency" is defined as "a cyber event that is equivalent to an act of war, a terrorist attack, or a major natural disaster."

Another new provision in the bill would allow the president to provide security clearances to private sector officials to allow for the sharing of classified information. Republican Senator Olympia Snowe of Maine, the cosponsor, said the bill "seeks to bring new high-level governmental attention to developing a fully integrated, thoroughly coordinated public-private partnership." A companion bill to the Cybersecurity Act calls for the creation of a post of National Cybersecurity Adviser at the White House which would require Senate confirmation. President Barack Obama has cited cybersecurity as a national priority and named Howard Schmidt, a former Microsoft executive, as his cybsersecurity coordinator in December.

As competition grows for a share of the burgeoning market for security-related products, procurement agencies and decision-makers are facing increased pressure from manufacturers with new wares to market and sell.

A self-assessment tool for evaluating the effectiveness of information technology security products promises to make the job of choosing the right products easier for decision-makers.

Analysts said marketing jargon makes it tougher for decision-makers to choose the right products, often resulting in procurement errors and squandering of resources.

The Jericho Forum Self-Assessment Scheme, released by Jericho Forum, the IT security association, would help businesses choose the products that are appropriate for their needs.

SAS will allow vendors and customers to check if an IT security product would meet their needs. This has become a major issue as more organizations adopt Internet-based "cloud computing," which works like a public utility, allowing for shared resources.

SAS provides security vendors with a high-value, free-of-charge tool to assess how well a solution satisfies the requirements, Jericho Forum said.

The Jericho Forum Self-Assessment Scheme is free to download from the jerichoforum.org Web site and is designed to "raise the bar for the entire security industry" by asking the probing questions that reveal if a security product or solution meets an organization's requirements.

Jericho Forum said the tool would be valuable to security vendors wishing to self-assess products and architectures and demonstrate their effectiveness as a market differentiator.

It will also serve user organizations that are looking to compare IT security products and incorporate key SAS requirements into requests for procurement, Jericho Forum said.

User organizations that wish to self-assess the security of system implementations and architectures as well as their readiness for cloud computing also qualify for adoption of the SAS tool.

IT systems architects and designers that are looking to validate the security of their architecture designs will also find the tool invaluable.

The ultimate goal of the Self-Assessment Scheme is to influence IT product innovation and market forces to be security-driven instead of purely feature-driven, Jericho said.

Dan Blum, senior vice president and principal analyst at Burton Group/Gartner, welcomed the introduction of SAS. He said SAS will help vendors and customers give themselves "an architecture checkup and it is therefore a useful way to measure cloud-readiness."

Paul Simmonds, Jericho Forum board member, said this is "an open invitation to the IT industry to improve security design standards."

SAS asks a series of questions that are geared to exposing a product's security flaws or loopholes. It enables vendors to differentiate products on a three-tiered scoring process.

The self-policing aspect of the scheme relies on the honesty of the submitters and the knowledge that their reputation will be damaged if their scorecard is exposed as including false claims."

Philippe Courtot, chief executive officer of Qualys and Jericho Forum board member, said he hoped the tool would help greater exchange of information among buyers and sellers.

"The need for collaboration has never been greater and yet the myriad of

business models and vendor offerings" makes the job "highly challenging" for those expected to buy the products, he said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Twitter co-founder says Great Firewall of China will fall
Austin, Texas (AFP) March 15, 2010
Twitter co-founder Evan Williams told a gathering of the technology faithful on Monday that notorious censorship firewalls in countries such as China will give way to online innovations. "The Internet is a tidal wave that is going to be impossible for anyone to keep out," Williams said during an on-stage chat at the South By South West Interactive gathering here. "In places like China it ... read more


CYBER WARS
LRO Camera Releases Science Data From First Six Months

Solving A 37-Year Old Space Mystery

Space Available On Lunar Expeditions

New Lunar Images And Data Available To Public

CYBER WARS
Marsexpress Returns Phobos Flyby Images

Lost Into Space Goes The Martian Atmosphere

Opportunity Driving Away From Concepcion Crater

Russia Shortlists 11 For 520-Day Simulation Of Mars Mission

CYBER WARS
Marshall Celebrates 50 Years Of Engineering, Science And Technology

US lawmakers urge Obama to save NASA moon program

Bipartisan Legislation Introduced To Close The Space Gap

Go Into The Webb Telescope Clean Room

CYBER WARS
China To Conduct Maiden Space Docking In 2011

China chooses first women astronauts

Russian Launch Issues Delaying China's First Mars Probe

China Plans To Launch Third Unmanned Moon Probe Around 2013

CYBER WARS
Change Of Command As Expedition 22 Prepares For Return

Crew Does Science, Prepares For Undocking

World Space Agencies Confirm Serviceability Of ISS Through 2020

ISS Expedition 22 To Return To Earth On March 18

CYBER WARS
Launch Of Nimiq 6 In 2012

Shootout at Indian space facility

Arabsat-5A And COMS Begin Prep For Second Ariane 5 mission Of 2010

ILS Proton To Launch Intelsat 21 And 23

CYBER WARS
CoRoT-9b - A Temperate Exoplanet

'Cool Jupiter' widens search for exoplanets

How To Hunt For Exoplanets

Watching A Planetary Death March

CYBER WARS
Metallic Glass Yields Secrets Under Pressure

Ultra-Powerful Laser Makes Silicon Pump Liquid Uphill With No Added Energy

Raytheon, Motion Reality Ink Agreement For Virtual Applications

Shocking Recipe For Making Killer Electrons




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement