CRIME FW: [Information_technology] Daily News 5/22/03

From: George Heuston (GeorgeH@private)
Date: Thu May 22 2003 - 09:47:11 PDT

  • Next message: George Heuston: "CRIME FW: [Information_technology] Daily News 5/23/03"

    -----Original Message-----
    From: NIPC Watch [mailto:nipc.watch@private] 
    Sent: Thursday, May 22, 2003 7:01 AM
    To: Information Technology
    Subject: [Information_technology] Daily News 5/22/03
    
    May 20, Government Computer News
    Government IT security gets an advisory board. Thirteen senior
    government
    information security professionals will serve on an advisory board to
    help
    define certification needs for IT security professionals. The board was
    created by the International Information Systems Security Certification
    Consortium (ISC2), which provides training and testing for the Certified
    Information Systems Security Professional (CISSP) certification. The
    board
    will advise ISC2 on certification and training needs specific to
    government,
    and will be co-chaired by Bruce A. Brody, associate deputy assistant
    secretary for cyber and information security at the Veterans Affairs
    Department, and ISC2 director of government affairs Lynn McNulty. "For
    the
    last couple of years, there has been a lot of talk about how the
    government
    needs to lead by example in cybersecurity," said McNulty. "We think
    increasing the professionalism of the government IT security work force
    is
    key to leading by example." Source:
    http://www.gcn.com/vol1_no1/daily-updates/22140-1.html
    
    May 20, New Scientist
    GPS data could stop wireless network attacks. U.S. computer researchers
    Yi-Chin Hu and Adrian Perrig of Carnegie Mellon University, PA, and
    David
    Johnson at Rice University, TX have revealed that a "wormhole attack"
    could
    be used to knock a vulnerable network out of action or defeat a wireless
    authentication system. "Ad-hoc" wireless computer networks, which are
    used
    to extend the range of wireless LAN networks, and are used by the
    military
    and emergency services, could be severely disrupted using the technique.
    But
    the same researchers have also devised a radical scheme designed to
    counter
    it. The researchers propose defending networks against the attack by
    attaching identifying tags to each packet. They suggest tagging packets
    with
    GPS information or a timestamp based on a synchronized network clock.
    Both
    could be used to verify that a packet genuinely comes from another
    nearby
    node and not one intercepted much further away. The threat and
    countermeasure are outlined in the paper "Packet Leashes: A Defense
    Against
    Wormhole Attacks in Wireless Networks" presented at the Twelfth World
    Wide
    Web conference in Bucharest, Romania. Source:
    http://www.newscientist.com/news/news.jsp?id=ns99993747
    
    
    
    Internet Security Systems - AlertCon: 1 out of 4
    https://gtoc.iss.net/
    Last Changed 8 April 2003
    
    Security Focus ThreatCon: 1 out of 4
    www.securityfocus.com
    Last Changed 18 April 2003
    
    Current Virus and Port Attacks
    Virus: #1 Virus in USA: WORM_LOVGATE.F
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
    United States]
    
    Top 10 Target Ports:
    80 (www), 137 (netbios-ns), 445 (microsoft-ds), 1434 (ms-sql-m), 113
    (ident), 139 (netbios-ssn), 17300 (Kuang2TheVirus), 25 (smtp), 53
    (domain),
    0 (---)
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    _______________________________________________
    Information_technology mailing list
    Information_technology@listserv
    



    This archive was generated by hypermail 2b30 : Thu May 22 2003 - 10:26:32 PDT