Risk
4/26/2011
05:42 PM
50%
50%

Napolitano Calls Cybersecurity A Shared Responsibility

The Department of Homeland Security secretary stressed the federal government's involvement in securing cyberspace alongside private companies to mitigate threats to critical infrastructure.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
When security company RSA found itself the victim of a cyber attack recently, the Department of Homeland Security (DHS) was there working alongside the company and other law-enforcement agencies to mitigate the threat and ensure that other systems would not be threatened in the same way.

"We took our understanding of the tools, tradecraft, and techniques used by these malicious actors, and converted it into actionable information that … critical infrastructure sectors could use to employ mitigation measures that would lower their risk to the type of attack we saw at RSA," DHS Secretary Janet Napolitano said this week.

The move shows the department is ramping up its involvement with the private sector to secure cyberspace, an effort that is a "shared responsibility" of the federal government and technology companies alike, she said Monday, speaking at the University of California Berkeley College of Engineering. The text of her speech is posted online.

Likening cyberspace to a neighborhood, marketplace, or schoolyard, Napolitano said that the federal government sees it as a "civilian space." This idea informs how the DHS works to protect cyberspace by trying to keep critical infrastructure and its connections to that civilian space safe.

"This is not something we can do by ourselves," she said. "It requires a full range of partners--including other government agencies, the private sector, as well as individual users of the Internet."

To that end, Napolitano said the DHS is currently building a "technical ecosystem" based on its concept of cyberspace as a "distributed, civilian space," and also is creating a policy ecosystem to support that.

"I use the term 'ecosystem' intentionally--because cyberspace is a dynamic, constantly changing, even organic environment," she said. "We cannot treat it as static or self-contained."

The DHS is one of several federal agencies tasked with protecting not only federal cyberspace assets but also the U.S. critical infrastructure that powers the Internet against cyber attacks. To achieve the latter, the agency works closely with the private sector to share information about cyber attacks or potential threats to infrastructure.

The DHS also has been instrumental in setting guidelines for cybersecurity that organizations both inside and outside of government can follow, she said. Last month, the agency released a whitepaper setting out its "technical vision" for cybersecurity based on three principles--automation, interoperability, and authentication--showing how each can be applied to protect cyberspace.

The DHS also recently tested the inaugural National Cyber Incident Response Plan (NCIRP) it's developed during the CyberStorm III national exercise, which simulated a broadscale attack on the nation's critical infrastructure, she said. Cabinet agencies, 11 states, 12 international partners, and 60 private sector companies all participated in the exercise.

Napolitano's talk was part of a university speaking tour she's been doing to educate academia and the next generation of technology professionals on the DHS role in federal cybersecurity. Last month, she spoke at the Massachusetts Institute of Technology and urged scientists and engineers to help the DHS secure cyberspace.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

CVE-2014-9197
Published: 2015-01-27
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote attackers to obtain sensitive setup and configuration information via a direct request.

CVE-2014-9198
Published: 2015-01-27
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session.

CVE-2014-9646
Published: 2015-01-27
Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.