Cybersecurity Policy
Cybersecurity Policy
Cybersecurity
Policy
Lecture by: Dan Wendlandt
MS&E 91SI
Autumn 2004
Stanford University
1998:
Clinton administration issued Presidential Decision Directive 63
(PDD63). Creates :
- National Infrastructure Protection Center (NIPC) in FBI
– Critical Infrastructure Assurance Office (CIAO) in
Dept. of Commerce
2001:
After 9/11 Bush creates:
- Office of Cyberspace Security (Richard Clarke)
- President’s Critical Infrastructure Protection Board (PCIPB)
Nov. 2002:
Cybersecurity duties consolidated under DHS ->
Information Analysis and Infrastructure
Protection Division (IAIP) . Exact role of
cybersecurity unclear?
June 2003:
National Cyber Security Division (NCSD) created
under IAIP. Headed by Amit Yoran from
Symantec, the role of the NCSD is to conducting
cyberspace analysis, issue alerts and warning,
improve information sharing, respond to major
incidents, and aid in national-level recovery
efforts .
Sept. 2003:
The United States-Computer Emergency
Readiness Team (US-CERT) is the United
States government coordination point for bridging
public and private sector institutions.
Oct. 2004:
Yoran steps down citing frustration with a
perceived lack of attention and funding given to
cybersecurity issues. He is replace by deputy
Andy Purdy and the debate over the position of
cybersecurity within DHS Continues.
In Congress:
Funding is major issue.
Support is often bi-partisan
House:
- Select Committee on Homeland Security -> Subcommittee on
Cybersecurity, Science, Research & Development (Adam
Putnam, R-FL)
- Science Committee (Sherwood Boehlert, R-NY)
Senate:
- Committee on Government Affairs (Susan Collins, R-ME )
Office of Management
FCC Dept. of Treasury
And Budget (OMB)
and more...
Goal:
Secure protected health information (PHI),
What it is:
- Not specific to computer security at all, but set forth
standards governing much of which is on computers.
- Insure confidentiality, integrity and availability of all
electronic protected health care information
- Comprehensive: ALL employees must be trained.
- Does not mandate specific technologies, but makes all
“covered entities” potentially subject to litigation.
U.S. National Cybersecurity October 21, 2004
Recent Legislation: SOX
Goal:
Verify the integrity of financial statements and
information of publicly traded companies.
What it is:
- Since information systems support most corporate
finance systems, this translates to requirements for
maintaining sufficient info security.
- Threat of jail time for executives has spurred a
significant investment in corporate info security.
U.S. National Cybersecurity October 21, 2004
The National Strategy to
Secure Cyberspace
“Cyberspace is composed of
hundreds of thousands of
interconnected computers, servers,
routers, switches and fiber optic
cables that allow our critical
infrastructure to work”
[ NSSC: p. vii ]
Peacetime:
- gov’t and corporate espionage
- mapping to prepare for an attack
Wartime:
In practice:
Look at use of “encourage”, “voluntary” and
“public-private” in text of document.
• raising awareness
Goals:
Goal:
Coordinate defense against and response to cyber
attacks and promote information sharing.
What is does:
- CERT = Computer Emergency Readiness Team
- Contact point for industry and ISACs into the DHS
and other gov’t cybersecurity offices.
- National Cyber Alert System
- Still new, role not clearly defined
What is does:
Allows the DHS to receive and protect voluntarily
submitted information about vulnerabilities or
security attacks involving privately owned critical
infrastructure. The Act protects qualifying
information from disclosure under the Freedom of
Information Act.
Goals:
What is does:
What is does:
What is it:
Mandates that CIO of each federal agency develop and maintain an
agency-wide information security program that includes: