Risk
4/27/2010
01:11 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

CIA Boosting Cybersecurity Investment

Preventing and fighting cyber threats is one of three priorities in the agency's five-year plan.

The CIA has made investing in technology to prevent and fight cyber threats as one of its three main priorities in a five-year strategic plan unveiled this week.

The move is in line with a government-wide ramp-up in cybersecurity efforts across all agencies that have responsibility for protecting critical infrastructure in the United States, such as the Department of Homeland Security and the National Security Agency.

CIA 2015, released this week, is a three-pillar blueprint for the agency's next five years. The goal of the plan is to ensure that the agency remains in step with current national security challenges, such as cyber threats and so-called "dangerous technology," according to a press statement.

Indeed, industry experts agree that the threat of cyber attacks on the U.S. is on the rise, and a recent survey found that a majority of federal CIOs believe a major attack is imminent.

The federal government so far has been relatively lax on addressing the threat with policy -- no major cybersecurity legislation is yet in place -- but individual agencies are taking their own steps to invest more in cybersecurity.

In addition to helping increase security in what the agency calls a "rapidly changing global information environment," new technology investments also will extend the CIA's operational and analytic reach and help it become more efficient, the agency said.

Managing the large volume of intelligence data CIA officers and agents must deal with on a day-to-day basis will also be a priority, and the agency plans to purchase and deploy new software for data management, it said.

The other two pillars of CIA 2015 call for the agency to invest in a more highly trained, multilingual staff at home and abroad and to achieve business agility to better maintain a global presence and be better prepared for emergencies. The latter will include a transformation of global support platforms and a consolidation of some business activities, the agency said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2014-0778
Published: 2014-04-19
The TCPUploader module in Progea Movicon 11.4 before 11.4.1150 allows remote attackers to obtain potentially sensitive version information via network traffic to TCP port 10651.

CVE-2014-1974
Published: 2014-04-19
Directory traversal vulnerability in LYSESOFT AndExplorer before 20140403 and AndExplorerPro before 20140405 allows attackers to overwrite or create arbitrary files via unspecified vectors.

CVE-2014-1983
Published: 2014-04-19
Unspecified vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x before 3.1.1 allows remote attackers to cause a denial of service (CPU consumption) via unknown vectors.

Best of the Web