Risk
12/13/2010
03:11 PM
50%
50%

Senator Proposes Cybersecurity Standards

The Internet and Cybersecurity Safety Standards Act calls for minimum requirements to protect any device connecting to the Internet.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
A U.S. senator has introduced a bill that would require the government and the private sector to require minimum cybsersecurity standards for devices that connect to the Internet.

Introduced by Sen. Benjamin Cardin, D-Md., the Internet and Cybersecurity Safety Standards Act would require top government officials to determine the cost-effectiveness of requiring Internet service providers and others to develop and enforce cybersecurity safety standards, according to a press statement from Cardin's office. Cardin is chairman of the Senate Judiciary Terrorism and Homeland Security Subcommittee.

The bill also requires officials -- including Department of Homeland Security secretary Janet Napolitano, attorney general Eric Holder, and Commerce secretary Gary Locke -- to consider the effect the standards would have on homeland security, the global economy, innovation, individual liberty, and privacy.

If the legislation is passed, officials must collaborate with private-sector organizations, such as companies affected by the standards and various technology experts, before finalizing the standards.

Officials would then have one year from the bill's passage to report to Congress their recommendations for standards that will cover any device that can connect to the Internet, including computers and mobile phones.

Cardin unveiled the proposed legislation at the launch of the new Maryland Cybersecurity Center last week. The U.S. Cyber Command, established last June as the military command in charge of the U.S. effort against cyber warfare, is located in Maryland's Fort Meade. The state also is home to more than 50 of the federal government's security and intelligence facilities.

"We live in a digital world and we need to arm ourselves with the right tools to prevent a digital 9/11 before it occurs," Cardin said in comments to launch attendees. "Failure to take such steps to protect our nation's infrastructure and its key resources could wreak untold havoc for millions of Americans and businesses, as well as our national security."

Cybersecurity is a priority for the Obama administration, and government agencies are working on various initiatives to bolster the security of federal domains as well as U.S. critical infrastructure.

Lawmakers, however, have been dragging their feet on the issue. Though there are a host of cybersecurity bills before Congress in various stages of process, a comprehensive cybersecurity law has yet to be passed.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.