The Bush administration released a scaled-back cybersecurity strategy outlining steps that the government, industry and citizens should take to protect computer systems from online attacks
Published:
15 February 2003 y., Saturday
The strategy, which President Bush signed on Jan. 31, has been in development since shortly after the Sept. 11, 2001, terrorist attacks.
Unlike earlier drafts that asked the private sector to take concrete steps to protect their systems, the majority of the final document directs the government to lead by example by tightening the security of federal information systems.
Omitted from the final plan were proposals to ask technology companies to contribute to a security research fund and for Internet service providers to bundle firewall and other security technology with their service.
Instead, the plan urges home and small business computer users to install firewall and anti-virus software. It also calls for the creation of a public-private dialogue to devise ways that the government can reduce the burden of security on home users and businesses.
It also encourages government contingency planning for cybersecurity attacks, including disaster recovery in the event that a major node on the Internet is disabled. Among other cybersecurity defenses, it calls for a network operating center to monitor the health of the Internet and detect attacks and virus outbreaks before they cause much damage.
Šaltinis:
washingtonpost.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
A growing number of online companies are ambushing competitors through software that puts ads where marketers want them most--in front of customers visiting rival Web sites.
more »
Internet Explorer 6 is due to go gold next week and will be released on August 15 as a standalone program, according to software development sites.
more »
Another .NET enabled product has left the stables at Redmond.
more »
The worm has kept Josef Chamberlin busy at the keyboard, operating on only snippets of sleep, many recent days and nights.
more »
If you need to reach someone at his or her office, the phone--we now know--is not the best way to do it. E-mail is easier and more popular, as evidenced by the deluge of messages with which cube dwellers are greeted each morning as they log onto their com
more »
Over a third of European Internet users are ready to buy a car on the Internet, according to a new study.
more »
Sweden must maintain the pace of its UMTS network rollout
more »
While the Federal Bureau of Investigation and network security advocates are busy mobilizing IT managers around the country for the upcoming outbreak of the Code Red Worm, one resourceful Web site operator from the Utrecht in the Netherlands stands to mak
more »
The fast-spreading ``Code Red'' Internet worm, which disrupted U.S. government Web sites last week, is likely to start multiplying again on Tuesday and could slow down the Internet, officials said on Monday.
more »
search.lt presents newest links
more »