Big Brother Awards
quintessenz search  /  subscribe  /  upload  /  contact  
/q/depesche *
/kampaigns
/topiqs
/doquments
/contaqt
/about
/handheld
/subscribe
RSS-Feed Depeschen RSS
Hosted by NESSUS
<<   ^   >>
Date: 2002-04-15

US: Der Feind im eigenen Netz


-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-

Auch so genannte "key holder" der zweiten Klasse - bei den "prime
contractors" geschieht dies ohnehin - sollen in Hinkunft genau überprüft
werden, fordert die National Infrastructure Protection Agency [NIPC].
Nachdem Osama Bin & Co den so genannten "Cyberterror" partout links
liegen läßt, wird der Feind zunehmend im Inneren gesucht.

-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
A computer scientist from the National Infrastructure Protection Center
yesterday urged agency officials to return to the basics of security and guard
against cyberattacks by IT insiders.

Robert M. Wright, on loan to NIPC's Special Technology Application Unit
from the Army, said today's insiders are the people who are allowed onto an
agency's network. Such insiders bring in tools ranging from hard drives the
size of key chains to anonymous remailers, steganography - hiding
messages within digital images - peer-to-peer applications, and infrared and
radio wireless devices.

Speaking at the National High-Performance Computing and Communications
Council's annual conference in Newport, R.I., Wright emphasized the need to
investigate the so-called key holders - subcontractors and service providers
who haven't undergone the same level of background checking as prime
contractors.

Finally, agencies should provide continual training in and enforcement of
security policies and procedures, even if they seem obvious. Wright likened
this to the hundreds of hours that football players spend doing basic drills at
training camp.

"The idea is repetition, and the pro football players know it," Wright said.
"That's how you get good at it."

"If most people would take and employ the technology we have today, most
of the intrusions wouldn't take place," Wright said. Criminals generally will
give up on a well-protected system and find an easier system to hack. The
conference continues through Thursday

Source
http://www.gcn.com/vol1_no1/daily-updates/18327-1.html


-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
q/depesche is powered by
http://www.ewave.at

subscribe/unsubscribe
http://www.quintessenz.at/q/depesche/

- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
edited by
published on: 2002-04-15
comments to office@quintessenz.at
subscribe Newsletter
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
<<   ^   >>
Druck mich

BigBrotherAwards


Eintritt zur Gala
sichern ...



25. Oktober 2023
#BBA23
Big Brother Awards Austria
 CURRENTLY RUNNING
q/Talk 1.Juli: The Danger of Software Users Don't Control
Dr.h.c. Richard Stallman live in Wien, dem Begründer der GPL und des Free-Software-Movements
 
 !WATCH OUT!
bits4free 14.Juli 2011: OpenStreetMap Erfinder Steve Coast live in Wien
Wie OpenStreetMaps die Welt abbildet und was ein erfolgreiches Crowdsourcing Projekt ausmacht.