Cybertelecom
Cybertelecom
Federal Internet Law & Policy
An Educational Project

Network Protection

- DNSSEC
Cybersecurity
- Agencies
- - White House
- - DHS
- - NIST
- - NTIA
- - FCC
- Reference
- Cryptography

Crimes Against Network
- Worms, Viruses, Attacks
- Hackers
- DOS
- WiFi Security
- Cyberwar
- Network Reliability
- Infrastructure Protection

Crimes Over Network
- CyberStalking
- Fraud
- - Auctions
- - Phishing
- Gambling
- ID Theft
- Offensive Words
- Sex Offenders
- Child Protection

Info Gathering
- Wiretaps
- CALEA
- ECPA
- FISA
- Forensics
- Carnivore
- Patriot Act
- Data Retention

Emergency
- EAS
- Assessment
- Reliability
- Vulnerabilities

Federal Activity

Laws

Presidential Documents

PITAC

  • PITAC Cyber Security Report
    "In Cyber Security: A Crisis of Prioritization, the February 2005 PITAC report to the President, the independent Presidential advisory panel warns that the Nation’s IT infrastructure is highly vulnerable to attacks that could damage not only the economy but national defense and national security systems as well. Noting that “market forces direct privatesector investment away from research and toward the application of existing technologies to develop marketable products,” the report calls on the Federal government to fundamentally improve its approach to cyber security R&D by increasing investments in unclassified cyber security R&D; intensifying its efforts to expand the size of today’s small cyber security research community; improving technology transfer to the private sector; and increasing the focus and efficiency of Federal R&D through better coordination and oversight. The report lists 10 areas as R&D priorities, based on a PITAC analysis of more than 30 documents and reports on cyber security R&D. The report concludes that the Nation will not be able to secure its IT infrastructure without significant advances in the following areas:
    ❖ Authentication technologies
    ❖ Secure fundamental protocols
    ❖ Secure software engineering and software
    assurance
    ❖ Holistic system security
    ❖ Monitoring and detection
    Mitigation and recovery methodologies
    ❖ Cyber forensics
    ❖ Modeling and testbeds for new technologies
    ❖ Metrics, benchmarks, and best practices
    ❖ Non-technology issues that can compromise
    cyber security
    Federal Plan for Cyber Security and Information Assurance: Research and Development, NSTC p. 14 (April 2006)
  • NIST

    SP 800-41 Revision 1 -- NIST announces the release of Special Publication 800-41 Revision 1, Guidelines on Firewalls and Firewall Policy. It provides recommendations on developing firewall policies and on selecting, configuring, testing, deploying, and managing firewalls. The publication covers a number of firewall technologies, including packet filtering, stateful inspection, application-proxy gateways, host-based, and personal firewalls. SP 800-41 Revision 1 updates the original publication, which was released in 2002.

    GAO

  • GAO Testimony: Critical Infrastructure Protection: Challenges in Addressing Cybersecurity, GAO 7/22/2005
  • Cybersecurity for Critical Infrastructure Protection. Technology Assessment, GAO-04-321.
  • GAO, Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July 9, 2004).
  • GAO, Critical Infrastructure Protection: Significant Challenges in Developing National Capabilities, GAO-01-323 (Washington, D.C.: Apr. 25, 2001).
  • Hearings

    Other Government Activity

    Requests for Comment

    White House Draft National Strategy to Secure Cyberspace  Comments can be submitted for 60 days (reportedly Nov 18 ) to feedback@who.eop.gov.

    The February 2003 National Strategy to Secure Cyberspace calls for Federal R&D leadership in certain circumstances, such as to address an
    increasing number of vulnerabilities and to provide continuity of government. In the latter situation, the document states, the role of the Federal government is to ensure the safety of its cyber infrastructure and those assets required for essential missions and services. Cyber security R&D areas that support this goal include: forensics and attack attribution; protection of systems, networks, and information critical to national security; indications and warnings; and protection against organized attacks capable of inflicting debilitating damage to the economy. - Federal Plan for Cyber Security and Information Assurance: Research and Development, NSTC p. 14 (April 2006)

    White House Draft National Strategy to Secure Cyberspace (Sept 2002) Draft for Comment. There will be a series of Town Meetings. WH Announcement.

    Draft Cybersecurity Plan, WH 9/18/02

    National Strategy for Combating Terrorism, White House 2/14/03

    DRAFT Special Publication 800-30 Rev A, Risk Management Guide for Information Technology Systems
    January 22, 2004 -- NIST has completed Revision A of NIST Special Publication 800-30, Risk Management Guide for Information Technology Systems. This revision updates SP 800-30 to reflect the results of the FISMA Implementation Project (http://csrc.nist.gov/sec-cert/), to improve internal consistency within the document, and generally improve the document readability.  URL of the CSRC Drafts Publication page: http://csrc.nist.gov/publications/drafts.html NIST requests comments on the draft revisio
    n by March 20, 2004. Comments should be addressed to: gary.stoneburner@nist.gov.

    Economics of Cyber Security

    Webcasts & Podcasts

    FBI: Internet SafetyPapers

    ISACs

    Links

    Security at Home

  • Stay Safe Online
  • The NetSmartz Workshop
    Educational resource material for children and teens
  • protectionprotection

    News

  • News Archive Continued
  • Web services provided by
    Wyoming.com
    < size="-1">: Home : About Us : Contact Us : Sitemap : Discussion : Search : Newsletter : RSS :
    : ADA : Broadband : Crime : Copyright : DNS : ECommerce : EGovt : First Amendment : Digital Divide :
    : Network Neutrality : Intl : Privacy : Security : SPAM : Statistics : VoIP : Vote : And Much More! :
    :: Feedback : Disclaimer ::
    © Cybertelecom.