03:11 PM

Senator Proposes Cybersecurity Standards

The Internet and Cybersecurity Safety Standards Act calls for minimum requirements to protect any device connecting to the Internet.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
A U.S. senator has introduced a bill that would require the government and the private sector to require minimum cybsersecurity standards for devices that connect to the Internet.

Introduced by Sen. Benjamin Cardin, D-Md., the Internet and Cybersecurity Safety Standards Act would require top government officials to determine the cost-effectiveness of requiring Internet service providers and others to develop and enforce cybersecurity safety standards, according to a press statement from Cardin's office. Cardin is chairman of the Senate Judiciary Terrorism and Homeland Security Subcommittee.

The bill also requires officials -- including Department of Homeland Security secretary Janet Napolitano, attorney general Eric Holder, and Commerce secretary Gary Locke -- to consider the effect the standards would have on homeland security, the global economy, innovation, individual liberty, and privacy.

If the legislation is passed, officials must collaborate with private-sector organizations, such as companies affected by the standards and various technology experts, before finalizing the standards.

Officials would then have one year from the bill's passage to report to Congress their recommendations for standards that will cover any device that can connect to the Internet, including computers and mobile phones.

Cardin unveiled the proposed legislation at the launch of the new Maryland Cybersecurity Center last week. The U.S. Cyber Command, established last June as the military command in charge of the U.S. effort against cyber warfare, is located in Maryland's Fort Meade. The state also is home to more than 50 of the federal government's security and intelligence facilities.

"We live in a digital world and we need to arm ourselves with the right tools to prevent a digital 9/11 before it occurs," Cardin said in comments to launch attendees. "Failure to take such steps to protect our nation's infrastructure and its key resources could wreak untold havoc for millions of Americans and businesses, as well as our national security."

Cybersecurity is a priority for the Obama administration, and government agencies are working on various initiatives to bolster the security of federal domains as well as U.S. critical infrastructure.

Lawmakers, however, have been dragging their feet on the issue. Though there are a host of cybersecurity bills before Congress in various stages of process, a comprehensive cybersecurity law has yet to be passed.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.