-----Original Message----- From: NIPC Watch [mailto:nipc.watch@private] Sent: Thursday, May 22, 2003 7:01 AM To: Information Technology Subject: [Information_technology] Daily News 5/22/03 May 20, Government Computer News Government IT security gets an advisory board. Thirteen senior government information security professionals will serve on an advisory board to help define certification needs for IT security professionals. The board was created by the International Information Systems Security Certification Consortium (ISC2), which provides training and testing for the Certified Information Systems Security Professional (CISSP) certification. The board will advise ISC2 on certification and training needs specific to government, and will be co-chaired by Bruce A. Brody, associate deputy assistant secretary for cyber and information security at the Veterans Affairs Department, and ISC2 director of government affairs Lynn McNulty. "For the last couple of years, there has been a lot of talk about how the government needs to lead by example in cybersecurity," said McNulty. "We think increasing the professionalism of the government IT security work force is key to leading by example." Source: http://www.gcn.com/vol1_no1/daily-updates/22140-1.html May 20, New Scientist GPS data could stop wireless network attacks. U.S. computer researchers Yi-Chin Hu and Adrian Perrig of Carnegie Mellon University, PA, and David Johnson at Rice University, TX have revealed that a "wormhole attack" could be used to knock a vulnerable network out of action or defeat a wireless authentication system. "Ad-hoc" wireless computer networks, which are used to extend the range of wireless LAN networks, and are used by the military and emergency services, could be severely disrupted using the technique. But the same researchers have also devised a radical scheme designed to counter it. The researchers propose defending networks against the attack by attaching identifying tags to each packet. They suggest tagging packets with GPS information or a timestamp based on a synchronized network clock. Both could be used to verify that a packet genuinely comes from another nearby node and not one intercepted much further away. The threat and countermeasure are outlined in the paper "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks" presented at the Twelfth World Wide Web conference in Bucharest, Romania. Source: http://www.newscientist.com/news/news.jsp?id=ns99993747 Internet Security Systems - AlertCon: 1 out of 4 https://gtoc.iss.net/ Last Changed 8 April 2003 Security Focus ThreatCon: 1 out of 4 www.securityfocus.com Last Changed 18 April 2003 Current Virus and Port Attacks Virus: #1 Virus in USA: WORM_LOVGATE.F Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports: 80 (www), 137 (netbios-ns), 445 (microsoft-ds), 1434 (ms-sql-m), 113 (ident), 139 (netbios-ssn), 17300 (Kuang2TheVirus), 25 (smtp), 53 (domain), 0 (---) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Thu May 22 2003 - 10:26:32 PDT