Risk
3/15/2011
03:08 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

DHS Seeks Cybersecurity Help from Engineers, Scientists

Department of Homeland Security Secretary Janet Napolitano said the agency wants to collaborate with experts in various fields to help it tackle security and managing the flow of information.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

The Department of Homeland Security (DHS) is seeking help from the private sector -- including experts from the engineering and science fields -- to help it solve a series of problems related to cybersecurity and the immense flow of information the department deals on an every-day basis.

Speaking at the Massachusetts Institute of Technology (MIT) this week, DHS Secretary Janet Napolitano said that it will take more than the work of the department and its IT team to solve the problems of the varied work the DHS is doing to secure borders and U.S. critical infrastructure, among other tasks. Her remarks are available online.

"At DHS, we are constantly asking and trying to answer some important questions: How do we keep travel and trade flowing across borders while at the same time enhancing security? How do we secure our nation's critical infrastructure when the vast majority of it is in private hands?" she said. "The answers to many of these questions involve harnessing science and technology to better meet our homeland security needs."

Perhaps more than any other agency, the DHS must work with myriad partners in both local and state governments as well as the private sector to accomplish its mission.

Particularly in the area of cybersecurity, the agency has set up partnerships through a series of fusion centers and joint terrorism task forces around the country to share intelligence information to protect critical infrastructure. The work includes collaborating with both private and public organizations.

Citing this "long tradition in our country of creating problem-solving partnerships between government and our research and development enterprise," Napolitano described some of the challenges the DHS hopes experts in a variety of fields will help it solve.

One key security challenge the DHS faces is what she called the "big data" problem. Being the linchpin for national security, the department receives data from a number of agencies -- such as the Federal Aviation Administration, the Transportation Safety Administration, the FBI, and the CIA -- about possible threats, both cyber and otherwise, and must disseminate that information quickly and efficiently to come up with a plan of action.

Napolitano said that the agency is always looking for better ways to extract meaningful information from "billions" of data points, and is seeking input on how to do that from experts across different fields.

"We therefore cannot overstate the need for software engineers and information systems designers. We need communications and data security experts," she said. "And we need this kind of talent working together to find new and faster ways to identify and separate relevant data."

Napolitano also mentioned the recent earthquake and subsequent tsunami in Japan to launch a discussion about how the DHS can improve emergency response in case of a similar disaster in the United States.

She said that FEMA Administrator Craig Fugate is exploring ways to use social media to achieve several crucial tasks during a disaster, such as reaching people during an emergency, locating necessary supplies, and moving them to the people and places that need them most. The federal government used the Web, including Twitter feeds, to share information with people who might be in need of help as part of its response to the recent disaster.

Napolitano also said that the DHS will seek help from scientists and engineers to create more resilient building materials that can withstand major earthquakes by engaging in nanotechnology research and getting that technology into widespread commercial use. Technology to detect nuclear radiation and to improve healthcare response to pandemics also is of interest to the department, she added.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3154
Published: 2014-04-17
DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

CVE-2013-2143
Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2014-0036
Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

CVE-2014-0054
Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

CVE-2014-0071
Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web