-----Original Message----- From: NIPC Watch [mailto:nipc.watch@private] Sent: Monday, May 19, 2003 7:45 AM To: Information Technology Subject: [Information_technology] Daily News 5/19/03 May 16, Reuters South Korea fortifying computer security. North Korea is training around 100 computer hackers each year to boost its cyber-warfare capabilities, pushing the South to fortify its own computer security, a South Korean military official said Friday. South Korea is one of the world's most wired countries, making it vulnerable to cyber attacks, Song Young-keun, commanding general of Seoul's Defense Security Command, was quoted as saying. 70 percent of households in South Korea have Internet access. Song said the military would also need the combined efforts of research institutions and private sector businesses to strengthen cyber security, the report added. Source: http://www.reuters.com/newsArticle.jhtml?storyID=2757209 May 16, Federal Computer Week NIST releases draft security standard. The National Institute of Standards and Technology's (NIST) Computer Security Division Friday released the draft of a new Federal Information Processing Standard, FIPS 199, which dictates how agencies should categorize their systems based on the security risk faced by each. The standard is the first step in several requirements generated by NIST under the Federal Information Security Management Act (FISMA) of 2002, all aimed at setting minimum security requirements for all government systems not related to national security. The draft outlines three categories of risk, which are based on the potential impact of a breach in three areas: the confidentiality, integrity and availability of the information in the system. Comments on the draft are due within 90 days. The draft is available on the NIST Website: http://csrc.nist.gov/publications/drafts.html Source: http://www.fcw.com/fcw/articles/2003/0512/web-nist-05-16-03.asp May 15, Federal Computer Week DHS setting cybersecurity priorities. Now that responsibility for the National Strategy to Secure Cyberspace has shifted to the Department of Homeland Security (DHS), officials are developing a list of priorities for implementation within the next 180 days. Among the areas being examined are education and certification, metrics and benchmarks for the private sector, and research and development, said Andy Purdy, cybersecurity adviser for the Information Analysis and Infrastructure Protection (IAIP) Directorate at DHS. Purdy was speaking May 14 at a symposium sponsored by the Computing Technology Industry Association in Washington, D.C. DHS officials also are looking at a more comprehensive method to share security vulnerability and incident information between government and the private sector, Purdy said. Source: http://www.fcw.com/fcw/articles/2003/0512/web-strategy-05-15-03.asp May 15, New York Times U.S. moves to allow trading of radio spectrum licenses. The Federal Communications Commission (FCC) voted Thursday to permit companies to lease and trade radio spectrum licenses. Officials and industry analysts say that by allowing license holders to lease underused slivers of the spectrum, consumers will benefit from reduced instances of cellphone calls being dropped. More efficient use of the spectrum would make it easier to connect to the Internet with hand-held computers in crowded areas and it should help extend wireless services in rural areas. The commission extinguished a 40-year-old rule that required the holder of a spectrum license to also control the physical infrastructure needed to use that piece of the spectrum and thus be responsible for fixing signal interference and other problems. Under the new rules, the holder of a license who is not making use of the spectrum will be able to lease it to another company that would provide the equipment and personnel. Source: http://www.nytimes.com/2003/05/16/technology/16SPEC.html Internet Security Systems - AlertCon: 1 out of 4 https://gtoc.iss.net/ Last Changed 8 April 2003 Security Focus ThreatCon: 1 out of 4 www.securityfocus.com Last Changed 18 April 2003 Current Virus and Port Attacks Virus: #1 Virus in USA: PE_FUNLOVE.4099 Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports: 80 (www), 137 (netbios-ns), 445 (microsoft-ds), 1434 (ms-sql-m), 6670 (BackWebServer), 139 (netbios-ssn), 4662 (eDonkey2000), 4665 (eDonkey2000), 25 (smtp), 113 (ident) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Mon May 19 2003 - 09:28:05 PDT