CRIME FW: [Information_technology] Daily News 5/19/03

From: George Heuston (GeorgeH@private)
Date: Mon May 19 2003 - 08:39:49 PDT

  • Next message: Klotz, Brian: "CRIME Korean hackers"

    -----Original Message-----
    From: NIPC Watch [mailto:nipc.watch@private] 
    Sent: Monday, May 19, 2003 7:45 AM
    To: Information Technology
    Subject: [Information_technology] Daily News 5/19/03
    
    May 16, Reuters
    South Korea fortifying computer security. North Korea is training around
    100
    computer hackers each year to boost its cyber-warfare capabilities,
    pushing
    the South to fortify its own computer security, a South Korean military
    official said Friday. South Korea is one of the world's most wired
    countries, making it vulnerable to cyber attacks, Song Young-keun,
    commanding general of Seoul's Defense Security Command, was quoted as
    saying. 70 percent of households in South Korea have Internet access.
    Song
    said the military would also need the combined efforts of research
    institutions and private sector businesses to strengthen cyber security,
    the
    report added. Source:
    http://www.reuters.com/newsArticle.jhtml?storyID=2757209
    
    May 16, Federal Computer Week
    NIST releases draft security standard. The National Institute of
    Standards
    and Technology's (NIST) Computer Security Division Friday released the
    draft
    of a new Federal Information Processing Standard, FIPS 199, which
    dictates
    how agencies should categorize their systems based on the security risk
    faced by each. The standard is the first step in several requirements
    generated by NIST under the Federal Information Security Management Act
    (FISMA) of 2002, all aimed at setting minimum security requirements for
    all
    government systems not related to national security. The draft outlines
    three categories of risk, which are based on the potential impact of a
    breach in three areas: the confidentiality, integrity and availability
    of
    the information in the system. Comments on the draft are due within 90
    days.
    The draft is available on the NIST Website:
    http://csrc.nist.gov/publications/drafts.html Source:
    http://www.fcw.com/fcw/articles/2003/0512/web-nist-05-16-03.asp
    
    May 15, Federal Computer Week
    DHS setting cybersecurity priorities. Now that responsibility for the
    National Strategy to Secure Cyberspace has shifted to the Department of
    Homeland Security (DHS), officials are developing a list of priorities
    for
    implementation within the next 180 days. Among the areas being examined
    are
    education and certification, metrics and benchmarks for the private
    sector,
    and research and development, said Andy Purdy, cybersecurity adviser for
    the
    Information Analysis and Infrastructure Protection (IAIP) Directorate at
    DHS. Purdy was speaking May 14 at a symposium sponsored by the Computing
    Technology Industry Association in Washington, D.C. DHS officials also
    are
    looking at a more comprehensive method to share security vulnerability
    and
    incident information between government and the private sector, Purdy
    said.
    Source:
    http://www.fcw.com/fcw/articles/2003/0512/web-strategy-05-15-03.asp
    
    May 15, New York Times
    U.S. moves to allow trading of radio spectrum licenses. The Federal
    Communications Commission (FCC) voted Thursday to permit companies to
    lease
    and trade radio spectrum licenses. Officials and industry analysts say
    that
    by allowing license holders to lease underused slivers of the spectrum,
    consumers will benefit from reduced instances of cellphone calls being
    dropped. More efficient use of the spectrum would make it easier to
    connect
    to the Internet with hand-held computers in crowded areas and it should
    help
    extend wireless services in rural areas. The commission extinguished a
    40-year-old rule that required the holder of a spectrum license to also
    control the physical infrastructure needed to use that piece of the
    spectrum
    and thus be responsible for fixing signal interference and other
    problems.
    Under the new rules, the holder of a license who is not making use of
    the
    spectrum will be able to lease it to another company that would provide
    the
    equipment and personnel. Source:
    http://www.nytimes.com/2003/05/16/technology/16SPEC.html
    
    
    
    Internet Security Systems - AlertCon: 1 out of 4
    https://gtoc.iss.net/
    Last Changed 8 April 2003
    
    Security Focus ThreatCon: 1 out of 4
    www.securityfocus.com
    Last Changed 18 April 2003
    
    Current Virus and Port Attacks
    Virus: #1 Virus in USA: PE_FUNLOVE.4099
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
    United States]
    Top 10 Target Ports:
    80 (www), 137 (netbios-ns), 445 (microsoft-ds), 1434 (ms-sql-m), 6670
    (BackWebServer), 139 (netbios-ssn), 4662 (eDonkey2000), 4665
    (eDonkey2000),
    25 (smtp), 113 (ident)
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    _______________________________________________
    Information_technology mailing list
    Information_technology@listserv
    



    This archive was generated by hypermail 2b30 : Mon May 19 2003 - 09:28:05 PDT