White House Releases Cybersecurity Plan

Published: 15 February 2003 y., Saturday
The strategy, which President Bush signed on Jan. 31, has been in development since shortly after the Sept. 11, 2001, terrorist attacks. Unlike earlier drafts that asked the private sector to take concrete steps to protect their systems, the majority of the final document directs the government to lead by example by tightening the security of federal information systems. Omitted from the final plan were proposals to ask technology companies to contribute to a security research fund and for Internet service providers to bundle firewall and other security technology with their service. Instead, the plan urges home and small business computer users to install firewall and anti-virus software. It also calls for the creation of a public-private dialogue to devise ways that the government can reduce the burden of security on home users and businesses. It also encourages government contingency planning for cybersecurity attacks, including disaster recovery in the event that a major node on the Internet is disabled. Among other cybersecurity defenses, it calls for a network operating center to monitor the health of the Internet and detect attacks and virus outbreaks before they cause much damage.
Šaltinis: washingtonpost.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Hotmail Targets Web Beacons

Microsoft on Thursday announced Hotmail users could block HTML images from appearing in e-mail messages, in a move meant to foil spammers trolling for valid e-mail addresses more »

U.S. agencies defend gov't data-mining plans

Leaders of two much-criticized projects that privacy advocates fear will collect massive amounts of data on U.S. residents defended those projects before the U.S. Congress Tuesday more »

Microsoft unveils hardware partner portal

Site holds resources for hardware and driver software makers more »

search.lt news

search.lt presents newest links more »

Europe's Borderless Market: The Net

Business-to-business e-commerce is thriving more »

Poland - Lucent to expand Netia's ATM broadband network

Lucent Technologies has been executing the second phase of the ATM multiservice network for Netia, one of Poland's largest independent telecommunications service providers more »

Business Users Clearly Define Spam

The difference between spam and desired e-mail is whether the user has previously transacted business with the sender. more »

The Great IT Complexity Challenge

Technology is supposed to help simplify transactions and increase the speed of doing business, but often that is not the way it works more »

Immigration applications online

The Bureau of Citizenship and Immigration Services will start accepting immigration applications filed through the Internet on May 29 more »

search.lt news

search.lt presents newest links more »