Friday, December 23, 2011

December 23, 2011

[next update 1/6/12]

National Cybersecurity

Feds indict 55 people in New York cybercrime ring. (2011, December 20). Infosecurity. Retrieved from http://www.infosecurity-magazine.com/view/22803/feds-indict-55-people-in-new-york-cybercrime-ring/
The Manhattan District Attorney has indicted 55 individuals for operating a $2 million organized cybercrime ring that relied on corrupt employees at companies and institutions to steal personal information of victims.  The indicted individuals allegedly used the stolen information in a variety of schemes to defraud the victims who had their personal information stolen. The information included names, dates of birth, addresses, social security numbers, and financial account information. [More from the New York Times.]

Gorman, C. (2011, December 21). Chinese hackers hit U.S. Chamber. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052970204058404577110541568535300.html
A group of hackers in China breached the computer defenses of America's top business-lobbying group and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter. The break-in at the U.S. Chamber of Commerce is one of the boldest known infiltrations in what has become a regular confrontation between U.S. companies and Chinese hackers. The complex operation, which involved at least 300 Internet addresses, was discovered and quietly shut down in May 2010. [More from the New York Times.]

Hawalt, S. (2011, December 21.) Rethinking DoD cybersecurity in a post-WikiLeaks world (G00218054). [Full text available in the Gartner database.]
WikiLeaks data breaches of classified and sensitive documents spurred the formation of a plethora of spinoff hacker groups. The U.S. Department of Defense (DoD) has improved data-handling processes and information security technologies. However, defense CIOs, military leaders and chief information security officers (CISOs) must now focus on finding the right level of sharing data in an improved classified security program in cyberspace.

Heilbraun, M. R., &  Brown, I. (2011). Cybersecurity policy and legislation in the 112th Congress. Intellectual Property and Technology Law Journal, 23(12), 14-20. [Full text available via UMUC Library OneSearch.] 
This article reviews current cybersecurity policy proposalsintended to enhance our nation’s security from a cyberattack and punish wrongdoing and recent proposals intended to set national data breach notification standards and develop public / private voluntary security standards.

Nationwide cybersecurity education initiative launched. (2011, December 22). Government Security News. Retrieved from http://www.gsnmagazine.com/node/25305
The Global Institute for Cybersecurity + Research announced on December 22 the planned launch next month of the National Critical Infrastructure Cybersecurity Education Initiative, a nationally coordinated public/private collaborative partnership aimed at developing cybersecurity education programs. The effort will involve the NIST National Initiative for Cybersecurity Education (NICE), DHS, the National Council of Information Sharing & Analysis Centers (ISACs), critical infrastructure owner/operators, federal sector-specific agencies, academia, security certification and technology organizations.

Pilkington, E., & Williams, M. (2011, December 18). Bradley Manning hearing told of security failings at Iraq base. Guardian. Retrieved from http://www.guardian.co.uk/world/2011/dec/18/bradley-manning-security-failings-iraq
The person in charge of ensuring the security of the computer network that Bradley Manning worked on in Iraq was officially admonished earlier this year for failing to accredit and certify the system.  Capt. Thomas Cherepko confirmed to Manning's pre-trial hearing in Fort Meade, Maryland, that he received a letter of admonishment in March. He was censured for having failed to submit a package of documents to his superiors – known as a Diacap – that would have verified the network met the defence department's minimum standards on computer security and was designed to have exposed any vulnerabilities. [Detailed liveblog of the Manning trial from the Guardian.]

United States. Senate. Committee on Appropriations. (2011, December 16). Summary: FY12 Homeland Security appropriations. Retrieved from http://goo.gl/ERf62
Department of Homeland Security receives $888 million for cybersecurity and infrastructure protection. [More from Infosecurity.]

Enterprise Cybersecurity

Enterprise security market to reach $23 billion worldwide in 2012. (2011, December 21). Infosecurity. Retrieved from http://www.infosecurity-magazine.com/view/22815/enterprise-security-market-to-reach-23-billion-worldwide-in-2012/
Total investment in enterprise security is expected to grow 8.7% year-on-year in 2012 to reach a market value of $22.9 billion worldwide, predicts market analysis firm Canalys. The anti-virus software market segment is expected to grow 6.8% year-on-year, accounting for 11.3% of the total enterprise security market in 2012, according to a Canalys forecast. Anti-virus software continues to drive revenue for resellers because it is the first step that most small and medium-sized businesses (SMBs) take to secure their infrastructure.

Global Cybersecurity
& broadly applicable items

Halpert, B. (2011). Auditing cloud computing: A security and privacy guide. Hoboken, NJ: John Wiley & Sons. [Full text e-book available in the Books 24x7 database.]
Provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers.

Michaels, D. (2011, December 19). Defense firms bid on NATO cyberwar. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052970203733304577102171947782202.html
The North Atlantic Treaty Organization on Monday will collect bids from some of the world's top defense companies, including Lockheed Martin Co. and Northrop Grumman Corp., to update and expand the alliance's cybersecurity abilities. The €32 million ($42 million) contract, although valued at less than the price of one fighter jet, holds great significance because it cements the alliance's role in protecting cutting-edge infrastructure, say NATO officials.

Perloth, N. (2011, December 23). Insurance against cyber attacks expected to boom. New York Times. Retrieved from http://bits.blogs.nytimes.com/2011/12/23/insurance-against-cyber-attacks-expected-to-boom/
Experts say that more companies will buy policies in the coming year because of new Security and Exchange Commission requirements. Last October, the S.E.C. issued a new guidance requiring that companies disclose “material” cyber attacks and their costs to shareholders. The guidance specifically requires companies to disclose a “description of relevant insurance coverage.”

Thursday, December 15, 2011

December 16, 2011

National Cybersecurity

FBI says hackers hit key services in three US cities. (2011, December 13). BBC News.  Retrieved from http://www.bbc.co.uk/news/technology-16157883
The infrastructure systems of three US cities have been attacked, according to the Federal Bureau of Investigation.  At a recent cybersecurity conference, Michael Welch, deputy assistant director of the FBI's cyber division, said hackers had accessed crucial water and power services. The hackers could theoretically have dumped sewage into a lake or shut off the power to a shopping mall, he said.  Industrial control systems are becoming an increasing target for hackers.

Kravets, D. (2011, December 14). Carrier IQ explains secret monitoring software to FTC, FCC. Wired. Retrieved from http://www.wired.com/threatlevel/2011/12/carrieriq-ftc-fcc/
Carrier IQ, the embattled phone-monitoring software maker, said Wednesday it had met this week with officials from the Federal Communications Commission and the Federal Trade Commission “to educate the two agencies about the functionality of its software and answer any and all questions."

Nagesh, G. (2011, December 16). House cybersecurity bill would establish federal overseer. The Hill. Retrieved from http://thehill.com/blogs/hillicon-valley/technology/199929-house-members-introduce-cybersecurity-bill
Members of the House Homeland Security Committee introduced a cybersecurity bill on Thursday that would establish a quasi-governmental entity to oversee information-sharing with the private sector.  Like the other cybersecurity bills offered by the House GOP, the Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness (PrECISE Act) encourages private firms to share information on cyber threats but stops short of mandating new security standards for sectors deemed critical to national security.

Peterson, S., & Faramarzi, P. (2011, December 15).  Iran hijacked US drone, says Iranian engineer. Christian Science Monitor. Retrieved from http://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer
Iran guided the CIA's "lost" stealth drone to an intact landing inside hostile territory by exploiting a navigational weakness long-known to the US military, according to an Iranian engineer now working on the captured drone's systems inside Iran. Iranian electronic warfare specialists were able to cut off communications links of the American bat-wing RQ-170 Sentinel, says the engineer, who works for one of many Iranian military and civilian teams currently trying to unravel the drone’s stealth and intelligence secrets, and who could not be named for his safety.

Singel, R. (2011, December 14). Congress authorizes Pentagon to wage internet war. Wired. Retrieved from http://www.wired.com/threatlevel/2011/12/internet-war-2/
The House and Senate agreed to give the U.S. military the power to conduct “offensive” strikes online — including clandestine attacks, via a little-noticed provision in the military’s 2012 funding bill.  The power, which was included in the House version but not the Senate version, was included in the final “reconciled” bill that is all but guaranteed to pass into law. 

Smith, D. F. (2011, December 14). AACC expanding cybersecurity training to new location in Severn. Broadneck Patch. Retrieved from http://broadneck.patch.com/articles/aacc-expanding-cybersecurity-training-to-new-location-in-severn
Anne Arundel Community College (AACC) will be expanding to a new facility next year near Arundel Mills, with classrooms that will focus on training in the burgeoning cybersecurity field.  The AACC Board of Trustees met on Tuesday to review and approve the lease for the new location in the third-story office at 7556 Teague Rd. in Severn. After hunting for two years, school officials said they determined this location was the best fit for the college . . . 

Trustee Walter Hall said even if the college had to lose some money over this initiative, he considered it a strategic investment in a growing industry.  “I think the issue is positioning the college to be at the forefront of a discipline that clearly the government is focusing on in Maryland,” Hall said. “This is exactly the kind of opportunity we should be allocating our resources in.” 

United States. Department of Homeland Security. (2011, November). Blueprint for a secure cyber future: The cybersecurity strategy for the homeland security enterprise. Retrieved from http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf
The Blueprint for a Secure Cyber Future builds on the Department of Homeland Security Quadrennial Homeland Security Review Report’s strategic framework by providing a clear path to create a safe, secure, and resilient cyber environment for the homeland security enterprise. With this guide, stakeholders at all levels of government, the private sector, and our international partners can work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. The Blueprint describes two areas of action: Protecting our Critical Information Infrastructure Today and Building a Stronger Cyber Ecosystem for Tomorrow. The Blueprint is designed to protect our most vital systems and assets and, over time, drive fundamental change in the way people and devices work together to secure cyberspace. The integration of privacy and civil liberties protections into the Department’s cybersecurity activities is fundamental to safeguarding and securing cyberspace. [Related article from Government Computer News.  More from Federal Computer Week.]

Enterprise Cybersecurity

Wheatman, J. (2011, December 15). Ten reasons security is overlooked in information governance, and how to fix it (G00226989). [Full text available in the Gartner database.]
Information governance and other business-driven data initiatives continue to advance; however, the management of the associated security continues to be disconnected. This research highlights common reasons for the lack of convergence, as well as 10 things enterprises can try to do to close the gap as swiftly as possible.


Global Cybersecurity
& broadly applicable items

National Institute of Standards and Technology. (2011, December). Electronic authentication guideline (Special Publication 800-63-1). Retrieved from http://csrc.nist.gov/publications/nistpubs/800-63-1/SP-800-63-1.pdf
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use o standards outside of this purpose. The recommendation covers remote authentication of users (such as employees, contractors, or private individuals) interacting with government IT systems over open networks. It defines technical requirements for each of four levels of assurance in the areas of identity proofing, registration, tokens, management processes, authentication protocols and related assertions.
  
Risky business: 70% of young employees ignore IT security policies. (2011, December 14). Infosecurity. Retrieved from http://www.infosecurity-magazine.com/view/22690/risky-business-70-of-young-employees-ignore-it-security-policies/
A disturbing 70% of young employees said they often ignore the company’s IT security policies, according to a survey sponsored by Cisco.  The most common reason for ignoring IT security policies was the belief that employees were not doing anything wrong (33%). One in five (22%) cited the need to access unauthorized programs and applications to get their job done, while 19% admitted the policies are not enforced, according to a survey of 2,800 young people (age 21–29) in 14 countries conducted by InsightExpress on behalf of Cisco.

Friday, December 9, 2011

December 9, 2011

National Cybersecurity


Kravets, D. (2011, December 6). Senator demands telcos & HTC come clean on Carrier IQ. Wired. Retrieved from http://www.wired.com/threatlevel/2011/12/carrier-iq-franken/
Sen. Al Franken (D-Minnesota) wants handset manufacturers and mobile carriers to explain what user data is being vacuumed to Carrier IQ, whose software is secretly installed on about 150 million mobile phones in the United States.  Franken is demanding that Sprint, HTC and AT&T cough up some answers, though the senator should also consider asking T-Mobile as well, because it uses Carrier IQ.  Carrier IQ, which records [information] so that carriers can troubleshoot their networks, came under intense scrutiny the past week after a Connecticut-based Android developer posted a YouTube video showing the software has enormous access to usage information.

MIT Energy Initiative. (2011, December 5). The future of the electric grid: An interdisciplinary MIT study.  Retrieved from http://web.mit.edu/mitei/research/studies/documents/electric-grid-2011/Electric_Grid_Full_Report.pdf [Chapter 9: Data Communications, Cybersecurity, and Information Privacy]
This report aims to provide a comprehensive, objective portrait of the U.S. electric grid and the challenges and opportunities it is likely to face over the next two decades. It also highlights a number of areas in which policy changes, focused research and demonstration, and the collection and sharing of important data can facilitate meeting the challenges and seizing the opportunities that the grid will face. [Related article from Information Week].

Nakashima, E. (2011, December 8). Cyber-intruder sparks massive federal response — and debate over dealing with threats. Washington Post. Retrieved from http://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html
The first sign of trouble was a mysterious signal emanating from deep within the U.S. military’s classified computer network. Like a human spy, a piece of covert software in the supposedly secure system was “beaconing” — trying to send coded messages back to its creator.  An elite team working in a windowless room at the National Security Agency soon determined that a rogue program had infected a classified network, kept separate from the public Internet, that harbored some of the military’s most important secrets, including battle plans used by commanders in Afghanistan and Iraq. 

United States. Department of Defense. (2011, November). Department of Defense cyberspace policy reportRetrieved from http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf
Report responding to questions posed RE: in 2010's Senate Report 111-201. [Related article from the Washington Post.]

United States. Executive Office of the President. (2011, December). Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program. Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf
This report . . . was developed by the Networking and Information Technology Research and Development agencies and directly responds to the need for a new cybersecurity R&D strategy. As recommended in the Cyberspace Policy Review’s near-term action plan, Trustworthy Cyberspace replaces the piecemeal approaches of the past with a set of coordinated research priorities whose promise is to “change the game,” resulting in a trustworthy cyberspace. As called for in the policy review’s mid-term action plan, this plan identifies opportunities to engage the private sector in activities for transitioning promising R&D into practice. In addition, and consistent with the PCAST recommendations, it prioritizes the development of a “science of security” to derive first principles and the fundamental building blocks of security and trustworthiness. [Related article from Information Week.]

Enterprise Cybersecurity

Batteau, A. W. (2011). Creating a culture of enterprise cybersecurity. International Journal of Business Anthropology, 2(2), 36-47. Retrieved from http://na-businesspress.homestead.com/IJBA/BatteauAWWeb2_2_.pdf
In this article I describe the fundamental dimensions of a security culture, a concept that builds on the experience of “safety culture” in several high-hazard industries. After outlining the concept and subtleties of corporate culture, I apply these concepts to issues of security, focusing on issues of trust, identification and authentication in complex environments. These issues become more challenging in virtual environments, as familiar tokens of identity such as face-to-face recognition are absent, and where trust becomes a weakest-link problem. I conclude with a description of the challenges of “managing” the emergent phenomenon of culture, and how trust can be cultivated.

Global Cybersecurity
& broadly applicable items 

Cyber attack adds pressure on GNP leaders. (2011, December 6). Korea Herald. Retrieved from http://www.koreaherald.com/national/Detail.jsp?newsMLId=20111206000814
The ruling [Korean] Grand National Party’s decision-making body is once again being pressed to resign en masse, amid mounting criticism over a cyber attack on the national election watchdog by an aide to one of its lawmakers.  Even members of the Supreme Council suggested that the party should rebuild itself from scratch if it is to stand a chance in the upcoming elections.  Council member Rep. Won Hee-ryong and nine other lawmakers issued a statement Tuesday, demanding that the GNP disband itself and start as a new political party. [More from the Los Angeles Times.]
 
Cyberattacks try to silence Russian dissenters. (2011, December 6). Deutsche Welle. Retrieved from http://www.dw-world.de/dw/article/0,,15582220,00.html
Two days after parliamentary elections in Russia, incumbent Prime Minister Vladimir Putin's party, United Russia, has emerged with a narrow victory, but allegations of denial of service attacks have led to calls of foul play. Organizations critical of United Russia party say they came under sustained online attack during the parliamentary ballot over the weekend. In addition, prominent online critics have been arrested, including Alexei Navalny, a well-known anti-corruption blogger. He was taken into custody late Monday night, as he was leading an unauthorized rally. After appearing before a Moscow court on Tuesday, on charges of obstructing traffic, he will likely face up to 15 days in prison.

Cyber warfare market worth US$15.9 billion in 2012. (2011, December 7). defenceWeb. Retrieved from http://www.defenceweb.co.za/index.php?option=com_content&view=article&id=21910
Global spending on cyber warfare will reach US$15.9 billion next year, up from an estimated US$12.5 billion this year as governments respond to a range of cyber threats, a new report says.  Visiongain’s Cyberwarfare Market 2012-2022 report says that governments around the world will continue to invest in a range of cyber warfare systems and solutions designed to offer protection against a wide range of cyber threats including protecting information and infrastructure from hostile states, as well as non-state actors both at home and abroad.

European Network and Information Security Agency. (2011, December 7). Proactive detection of network security incidents. Retrieved from http://www.enisa.europa.eu/act/cert/support/proactive-detection/proactive-detection-report/at_download/fullReport
This document is the final report of the "Proactive Detection of Network Security Incidents" study. The goal of the study was to investigate ways in which CERTs [Computer Emergency Response Teams] – national and governmental ones in particular – proactively detect incidents concerning their constituencies, identify good practice and recommended measures for new and already established CERTs, analyse problems they face and offer recommendations to relevant stakeholders on what can be done to further this process. It is important to note that the results of the study are largely community driven. That is, they are based not just on research and the experience of the experts who conducted the study, but to a large extent on the results of a survey carried out amongst 105 different CERTs (which resulted in 45 responses overall) and external expert group input. The outcome is thus a work by the community for the CERT community.

Grace, M., Zhou, Y., Wang, Z., & Jiang, X. (2012, February). Systematic detection of capability leaks in stock Android smartphones. Paper to be presented at the 19th Network and Distributed System Security Symposium, San Diego, CA.  Retrieved from http://www.csc.ncsu.edu/faculty/jiang/pubs/NDSS12_WOODPECKER.pdf
Recent years have witnessed a meteoric increase in the adoption of smartphones. To manage information and features on such phones, Android provides a permission-based security model that requires each application to explicitly request permissions before it can be installed to run. In this paper, we analyze eight popular Android smartphones and discover that the stock phone images do not properly enforce the permission model. Several privileged permissions are unsafely exposed to other applications which do not need to request them for the actual use. To identify these leaked permissions or capabilities, we have developed a tool called Woodpecker. Our results with eight phone images show that among 13 privileged permissions examined so far, 11 were leaked, with individual phones leaking up to eight permissions. By exploiting them, an untrusted application can manage to wipe out the user data, send out SMS messages, or record user conversation on the affected phones – all without asking for any permission. [Related article from Ars Technica.]

Graham, A. (2011, December 6). Canada's critical infrastructure: When is safe safe enough? (National Security for Canada Series 2). Retrieved from http://www.macdonaldlaurier.ca/files/pdf/Canadas-Critical-Infrastructure-When-is-safe-enough-safe-enough-December-2011.pdf
In a new study published by the Macdonald-Laurier Institute . . . author Andrew Graham stresses the need for a cohesive plan to protect Canada’s vulnerable infrastructure before it is too late. Included in the list of such CI are vital systems most Canadians never think about: energy generation and distribution, financial institutions, our food supply system, information and communications technology and health care institutions. CI vulnerability, in other words, extends to every aspect of Canadians’ lives.  What are the serious threats to Canada’s CI? The author identifies a number, including natural disasters, terrorism, theft, hackers and vandals and simple neglect and underinvestment by infrastructure owners. Increasing integration of information technology into all forms of infrastructure mean that cyber threats, including cyber attacks by foreign governments and others, is adding a whole new layer of vulnerability. Professor Graham assesses current efforts to address those threats and suggests themes for moving forward and building on the work already done in government and the private sector. 

Keizer, G. (2011, December 7). Symantec confirms Flash exploits targeted defense companies. Computerworld.  Retrieved from http://www.computerworld.com/s/article/9222496/Symantec_confirms_Flash_exploits_targeted_defense_companies
Security researchers at Symantec today confirmed that exploits of an unpatched Adobe Reader vulnerability targeted defense contractors, among other businesses.  "We've seen [this targeting] people at telecommunications, manufacturing, computer hardware and chemical companies, as well as those in the defense sector," said Joshua Talbot, senior security manager in Symantec's security response group, in an interview Wednesday.

Leavitt, N. (2011, December). Internet security under attack: The undermining of digital certificates. Computer, 44(12), 17-20. doi:10.1109/MC.2011.367 [Full text available in IEEE Computer Science Digital Library database.]
Several attacks this year against organizations issuing digital certificates are creating doubts about the system. 

Lockheed, other defense firms targeted by hackers. (2011, December 8). Reuters. Retrieved from http://www.reuters.com/article/2011/12/08/lockheed-cyber-idUSN1E7B707920111208
Lockheed Martin Corp. and other U.S. defense firms were targeted by hackers using a previously unknown vulnerability in Adobe Reader, the latest in a series of increasingly persistent attacks against U.S. weapons makers, security experts said on Wednesday. Lockheed, the Pentagon's biggest supplier, said it detected the attempted attack through normal monitoring activities and immediately notified Adobe, but its information systems were never breached. [Related article from Computerworld, more from Ars Technica.]

Serious security flaws identified in cloud systems. (2011, December). Computer, 44(12), 21. doi:10.1109/MC.2011.379 [Full text available in IEEE Computer Science Digital Library database.]
German researchers report finding serious problems with two cloud systems and say these flaws probably exist in other cloud architectures. The Ruhr University Bochum team said the vulnerabilities could let attackers gain administrative rights to host systems.  The investigators found flaws with Amazon Web Services (AWS) and informed Amazon, which has since patched the problems. They also discovered vulnerabilities with the open source Eucalyptus private-cloud software framework.

Storm, D. (2011, December 7).  Mobile security at TakeDownCon: Hackers handing out a healthy dose of paranoia. Computerworld.  Retrieved from http://blogs.computerworld.com/19391/mobile_security_at_takedowncon_hackers_handing_out_a_healthy_dose_of_paranoia
Smartphones are mini-computers packed with financial and personal [information] . . . to ignore the need for mobile security is a bit like choosing to run a computer without any regard to security precautions. Not wise at all. Even without any malicious intent by app developers, many are not concerned about security; their apps may ask for overreaching access permissions.  Mobile and wireless security news is pouring out of TakeDownCon in Las Vegas. [Related article from Ars Technica.]

Tarzey, B., Nicholds, D., & Gold, S. (2011, December 6). Defending mobile devices against the rising avalanche of security threats [recorded Webinar].  Retrieved from http://www.infosecurity-magazine.com/webinar/278/defending-mobile-devices-against-the-rising-avalanche-of-security-threats/
Welcome to the world of mobile device security – but where do you start? This 60-minute webinar will help – our team of experts will guide you through the jungle that is mobile security, allowing you to better understand the risks involved with using mobile devices in a business environment. Armed with this information, you can plan your defense strategies, adapting and re-tasking your existing security defenses – and augmenting them with leading-edge security policies. [NOTE: The next Infosecurity webinar, "Understanding the Need for Consolidated Security in the Modern Business" will be held on 12/13/11.  Registration is free.]

Wagner, R., Nicolett, M., Orans, L., Pescatore, J., Kavanagh, K. M., Firstbrook, P. . . . Feiman, J. (2011, November 29). Gartner predicts 2012: Sophisticated attacks, complex IT environments and increased risks demand new approaches to infrastructure protection (G00223301). [Full text available in the Gartner database.]
Sophisticated new threats – especially targeted attacks – the financial and reputational damage from attacks, and the growing "consumerization" of IT are among the factors increasing the complexity, difficulty and criticality of protecting enterprise IT infrastructure.

Zetter, K. (2011, December 7). Eight out of ten software apps fail security test. Wired. Retrieved from http://www.wired.com/threatlevel/2011/12/veracode-report/
Desktop and web applications remain a wasteland of bugs and holes that only a hacker could love, according to a report released Wednesday by a company that conducts independent security audits of code.  In fact, eight out of ten software applications fail to meet a security assessment, according to a State of Software Security report by Veracode. That’s based on automated analysis of 9,910 applications submitted to Veracode’s online security testing platform in the last 18 months. The applications are submitted by both developers – in the government and commercial sectors – as well as companies and government agencies wanting an assessment of software they plan to purchase. [Full report available with free registration.]

Friday, December 2, 2011

December 2, 2011

National Cybersecurity

Cybersecurity bill approved by house panel. (2011, December 1). Reuters.  Retrieved from http://www.reuters.com/article/2011/12/02/us-cybersecurity-usa-congress-idUSTRE7B100E20111202
In a 17-1 vote, the Permanent Select Committee on Intelligence approved the legislation that would expand a pilot Pentagon program for sharing classified and sensitive threat information with defense contractors and their Internet service providers.  Under the measure, a longer list of companies would be eligible for access to classified data from the National Security Agency and other agencies.
 
Jackson, W. (2011, November 30). Cyber bill strong on info sharing, light on privacy protections. Government Computer News. Retrieved from http://gcn.com/articles/2011/12/01/cybersecurity-bill-info-sharing-no-privacy.aspx
The Cyber Intelligence Sharing and Protection Act of 2011 (HR 3523) was introduced Nov. 30 by committee Chairman Mike Rogers (R-Mich.) and Ranking Member Dutch Ruppersberger (D-Md.) and would require the intelligence community to establish procedures for sharing classified cybersecurity intelligence with the private sector, and would provide incentives for private entities to share information with the government. But for the moment at least, it contains no privacy safeguards for personal information.

Rockwell, M. (2011, November 28). IL water system pump failure not a cyber attack. Government Security News.  Retrieved from http://www.gsnmagazine.com/node/25092
New reports on Nov. 28 backed initial DHS skepticism that the failure of a pump at an Illinois water utility was a foreign cyber attack on the system’s supervisory control and acquisition system.  The Washington Post reported on Nov. 28 that the failure of a water pump was the result of an error by one of the utility’s contractors who was travelling in Russia at the time and accessing the SCADA system remotely. The report backs earlier conclusions by DHS cyber security teams that the failure of the pump at Curran-Gardner Public Water District in Springfield, IL, wasn’t the work of Russian cyber criminals or agents. [Related article from Infosecurity.  More from Wired.] 

United States. Government Accountability Office. (2011, November). Cybersecurity human capital: Initiatives need better planning and coordination.  (GAO 12-8). Retrieved from http://www.gao.gov/new.items/d128.pdf 
Federal agencies have taken varied steps to implement workforce planning practices for cybersecurity personnel. Five of eight agencies, including the largest, the Department of Defense, have established cybersecurity workforce plans or other agencywide activities addressing cybersecurity workforce planning. However, all of the agencies GAO reviewed faced challenges determining the size of their cybersecurity workforce because of variations in how work is defined and the lack of an occupational series specific to cybersecurity.  With respect to other workforce planning practices, all agencies had defined roles and responsibilities for their cybersecurity workforce, but these roles did not always align with guidelines issued by the federal Chief Information Officers Council and National Institute of Standards and Technology (NIST). Agencies reported challenges in filling highly technical positions, challenges due to the length and complexity of the federal hiring process, and discrepancies in compensation across agencies. Although most agencies used some form of incentives to support their cybersecurity workforce, none of the eight agencies had metrics to measure the effectiveness of these incentives. Finally, the robustness and availability of cybersecurity training and development programs varied significantly among the agencies. For example, the Departments of Commerce and Defense required cybersecurity personnel to obtain certifications and fulfill continuing education requirements. Other agencies used an informal or ad hoc approach to identifying required training. [Related article from Government Computer News.]


Enterprise Cybersecurity

Boldea, C. (2012). SCADA security in the context of corporate network integration. Constanta Maritime University Annals,12(15), 159-164 [in press]. Retrieved from http://www.cmu-edu.eu/anale/anale_engleza/anale.html [Full text available via UMUC Library OneSearch.] 
The paper presents some considerations regarding security management of Supervisory Control and Data Acquisition (SCADA) networks. Control systems are potential targets of attack from hackers, cyber terrorists, others who want to disrupt the critical infrastructure, disgruntled or former employees and various collaborators which have worked within the organization. SCADA networks are usually seen as industrial equipment, not affected by cyber threats. Starting from the design of such a network the focus is on functionality, seldom the security not even being taken into consideration. Since the SCADA networks tends to became more and more integrated with enterprise business networks the risks are more and more similar and this paper empathies the idea to have a unified perspective over the security. There is presented a software solution for security monitoring and management integration.

Global Cybersecurity
& broadly applicable items  
  
Abeyratne, R. (2011). Cyber terrorism and aviation: National and international responses. Journal of Transportation Security, 4(4), 337-349. Retrieved from http://www.aviationdevelopment.org/eng/2011070102_publication 
Cyber crimes and Cyber terrorism are becoming increasingly menacing and the latter has been identified as a distinct threat requiring attention. At the 21st Aviation Security Panel Meeting of ICAO (AVSECP/21, 22 to 26 March 2010) a new Recommended Practice related to cyber threats was proposed for adoption by the Council as part of amendment 12 to Annex 17 (Security) to the Convention on International Civil Aviation (Chicago Convention). It was adopted on 17 November 2010, will become effective on 26 March 2011 and applicable on 1 July 2011. This Recommended Practice suggests that each Contracting State develop measures in order to protect information and communication technology systems used for civil aviation purposes from interference that may jeopardize the safety of civil aviation At the 22nd Meeting of the Panel, conducted by ICAO from 21 to 25 March 2011, the Panel noted the value of vulnerability assessments pertaining to cyber security in aviation whose objectives are to evaluate the efficiency of existing mitigation measures and identify any vulnerabilities from a threat-based perspective and further noted that better understanding of residual risks will support a State’s efforts to refine its risk response. This article contains an analysis of what cyber crimes are as against cyber terrorism, measures taken to counter the threat along with a legal analysis of the threat as it affects aviation and addresses several issues, including a discussion on some national efforts at curbing the problem in some prominent jurisdictions.
  
Ryan, P. (2011, December 1). Wikileaks docs reveal that governments use malware for surveillance. ArsTechnica. Retrieved from http://arstechnica.com/business/news/2011/12/wikileaks-docs-reveal-that-governments-use-malware-for-surveillance.ars
The latest round of documents published by Wikileaks offers a rare glimpse into the world of surveillance products. The collection — which Wikileaks calls the Spy Files — includes confidential brochures and slide presentations that companies use to market intrusive surveillance tools to governments and law enforcement agencies.  A report that Wikileaks published alongside the documents raises concern about the growing use of mass surveillance tools that indiscriminately monitor and analyze entire populations. The group also points out that some of the products described in the documents are sold to authoritarian regimes, which use them to hunt and track political dissidents.  The details revealed by Wikileaks echo a recent report by The Wall Street Journal (WSJ) that discussed the surveillance industry. The publication analyzed approximately 200 documents from 36 separate companies as part of a special investigative project called The Surveillance Catalog. The material released by Wikileaks corroborates much of what the WSJ reported, but includes a broader range of material. [Related article from Infosecurity.]

Vinograd, C. (2011, December 2). UK spy agency asks hackers to crack code. Associated Press. Retrieved from http://www.newsday.com/news/uk-spy-agency-asks-hackers-to-crack-code-1.3361527 
Can you crack the code?  That's the question Britain's electronic listening agency, GCHQ, is asking in an online campaign to find the next generation of cyber specialists. GCHQ quietly launched a cryptic website last month featuring a box of code made up of numbers and letters. There is no branding on the site, only the phrase "Can you crack it?"  The agency has now revealed it is behind the campaign, and said Friday it's trying to reach individuals with "a keen interest in code breaking and ethical hacking" for careers at GCHQ. [http://www.canyoucrackit.co.uk/]

Wednesday, November 23, 2011

November 23, 2011

National Cybersecurity
Mills, E. (2011, November 22). DHS denies report of water utility hack. CNET. Retrieved from http://news.cnet.com/8301-27080_3-57330029-245/dhs-denies-report-of-water-utility-hack/
The Department of Homeland Security and FBI today dismissed the conclusions of a report that a cyber intrusion caused a pump at an Illinois water utility to burn out. But the statement doesn't explain why an Illinois state terrorism intelligence center would say it was a hacker when it wasn't.  In the meantime, the DHS is investigating a claim by a hacker who goes by "pr0f" who claimed to have compromised a Texas water utility last week. 
 
Global Cybersecurity
& broadly applicable items 

Cyberwar explodes in Syria. (2011, November 22). CNN. Retrieved from http://www.cnn.com/2011/11/22/world/meast/syria-cyberwar/index.html
For the past eight months, Syria has been locked in a bloody cycle of anti-regime protests and violent crackdown. The United Nations accuses government security forces of systematic torture, disappearances and the use of deadly force to crush dissent. More than 3,500 people have been killed since March. The UN's top human rights monitoring commission has repeatedly accused the Syrian regime of carrying out crimes against humanity.  But this bloody test of wills is not only being fought in the streets. Activists, diplomats and IT specialists say there is also a high-stakes war of information being waged in cyberspace. [Related article: "Senators ask for investigation of U.S. companies’ surveillance technology in Syria" (Government Security News).]

Khakkar, M. (2011, November 22). Indian govt. servers compromised and used against China.  ZDNet. Retrieved from http://www.zdnet.com/blog/india/indian-govt-servers-compromised-and-used-against-china/767
Sources within Indian government’s IT arm – the National Informatics Center (NIC) have raised some really dangerous concerns. According to them the government’s IT infrastructure has been used by black hat hackers to attack China. Talking to the Times of India a source said that the government servers have been compromised and used by foreign perpetrators. 

NIST expands database designed to help programmers improve software security. (2011, November 23). Infosecurity. Retrieved from http://www.infosecurity-magazine.com/view/22201/nist-expands-database-designed-to-help-programmers-improve-software-security/
The National Institute of Standards and Technology has dramatically enlarged a databases intended to improve applications that help programmers identify security weaknesses in software, the agency announced this week.  The database, known as the Software Assurance Metrics and Tool Evaluation Reference Dataset (SRD) version 4.0 . . . encompasses more than 60,000 specific cases of code errors, and addition of 100 more categories and 30 times the number of cases in SRD version 3.0.

Swerdlove, H. (2011, November 21). The most vulnerable smartphones of 2011. Retrieved from http://www.bit9.com/file /Bit9Report_SmartPhones2011.pdf
In this report, we analyzed the mobile market and identified the most vulnerable smartphones of 2011. What we found is that Android phones, which account for the majority of all new smartphones purchased in 2011, have the most complex software distribution model. Phone manufacturers and the phone carriers are responsible for distributing important updates, instead of Google, the makers of the Android operating system. The result is that Android phones are most likely to run for long periods of time with known security flaws. All 12 of the top most vulnerable phones in our report are Android models.

Friday, November 18, 2011

November 18, 2011

National Cybersecurity

Cybersecurity: Assessment and outlook: Hearing before the House Judiciary Subcommittee on Crime, Terrorism, and Homeland Security, 112th Cong. (2011). [Full text available via UMUC Library OneSearch: 1, 2, 3, 4].
Testimony from James A. Baker, Michael Chertoff, and others.

Engleman, E. (2011, November 18). Reid to move on Senate cybersecurity measure in early 2012. BusinessWeek. Retrieved from http://www.businessweek.com/news/2011-11-18/reid-to-move-on-senate-cybersecurity-measure-in-early-2012.html
Senate Majority Leader Harry Reid intends to bring comprehensive cybersecurity legislation to the Senate floor for debate early next year.  Cyber attacks and espionage are “causing billions of dollars of damage to our economy and are severely compromising critical national security capabilities,” Reid, a Nevada Democrat, wrote in a letter yesterday to Senate Minority Leader Mitch McConnell, a Kentucky Republican. The letter was released today by Reid’s office.

McCullagh, D. (2011, November 17). Sandia Labs: SOPA will "negatively impact" U.S. cybersecurity. CNET. Retrieved from http://news.cnet.com/8301-31921_3-57326956-281/sandia-labs-sopa-will-negatively-impact-u.s-cybersecurity/
Leonard Napolitano, Sandia's director of computer sciences and information systems, warned in a letter that the legislation is "unlikely to be effective" and will "negatively impact U.S. and global cybersecurity and Internet functionality." Napolitano sent a letter in response to a request for a critique of the Stop Online Piracy Act, or SOPA, from Rep. Zoe Lofgren, a California Democrat who represents the heart of Silicon Valley. Lofgren is leading opposition in the House of Representatives to SOPA. 

Mills, E. (2011, November 17). Was U.S. water utility hacked last week? CNET. Retrieved from http://news.cnet.com/8301-27080_3-57327030-245/was-u.s-water-utility-hacked-last-week
Intruders compromised a water utility network last week and destroyed a pump, according to a state government report cited by a critical infrastructure security expert today.  It appears that hackers breached the network of a company that makes SCADA (supervisory control and data acquisition) and stole customer usernames and passwords, said Joe Weiss, managing partner of Applied Control Solutions. "There was damage--the SCADA system was powered on and off, burning out a water pump," he wrote in a brief blog post.  The report did not identify the water utility attacked or the SCADA software vendor compromised, Weiss said in an interview with CNET.

Rockwell, M. (2011, November 16). DOJ wants to prosecute cyber criminal activity under racketeering law. Government Security News. Retrieved from http://www.gsnmagazine.com/node/24997
The set of laws that has allowed federal prosecutors to bring down traditional organized crime gangs should be applied to international cyber crime rings, a top Department of Justice official told a congressional committee on Nov. 15. The recommendation was one of several DoJ Deputy Section Chief Richard Downing said should be made to the Computer Fraud and Abuse Act (CFAA) during a House Judiciary Subcommittee on Crime, Terrorism and Homeland Security hearing on cyber security’s new frontiers. The committee is considering updating the law. 

Thaw, D. B. (2011). Characterizing, classifying, and understanding information security laws and regulations: Considerations for policymakers and organizations protecting sensitive information assets. (Doctoral dissertation). [Full text available in the Dissertations and Theses database.]
Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis. Perhaps of even greater concern, the pace at which technology and threats change far outpaces the abilities of even the most sophisticated regulators.  My Ph.D. dissertation focuses on understanding these laws - how we can classify them, what effects they have, and what are the implications of these effects for organizations and professionals. I explore these concepts through a mixed methods approach, utilizing both qualitative semi-structured interviews and quantitative data on breach incidence. 

Enterprise Cybersecurity

Wright, A. (2011). Hacking cars. Communications of the ACM, 54(11), 18-19. doi:10.1145/2018396.2018403 [Full text available in the IEEE Computer Society Digital Library database.]
Researchers have discovered important security flaws in modern automobile systems. Will car thieves learn to pick locks with their laptops?

Norway's oil, gas and defense industries hit by major data theft. (2011, November 18). Infosecurity. Retrieved from http://www.infosecurity-magazine.com/view/22125/norways-oil-gas-and-defense-industries-hit-by-major-data-theft/
The Norwegian National Security Authority, the NSN, said in a press statement late yesterday that a number of industrial secrets had been stolen and sent out digitally from Norway, but not further information on the data thefts have been revealed.  The Associated Press, meanwhile, quotes the NSN agency as saying that more than 10 different cyber attacks were discovered in the last year, but that the agency feels that the number may have been much higher because other victims might not have yet realised that their computers have been targeted. The case, notes the newswire, may be significant as Norway's oil and gas industry is ranked the third largest in the world, where 2.8 million barrels are produced every day.   

Global Cybersecurity
& broadly applicable items

Felt, A. P., Finifter, M., Chin, E., Hanna, S., & Wagner, D. (2011, October). A survey of mobile malware in the wild. Paper presented at the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Device, Chicago, IL. [Full text available in the IEEE Computer Society Digital Library database.]
Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS, Android, and Symbian malware that spread in the wild from 2009 to 2011. We also use this data set to evaluate the effectiveness of techniques for preventing and identifying mobile malware. After observing that 4 pieces of malware use root exploits to mount sophisticated attacks on Android phones, we also examine the incentives that cause non-malicious smartphone tinkerers to publish root exploits and survey the availability of root exploits.

Hoffman, L. J., Burley, D., & Toregas, C. (2011, November 1). Thinking across stovepipes: Using a holistic development strategy to build the cybersecurity workforce. (Report GW-CSPRI-2011-8). Retrieved from http://www.cspri.seas.gwu.edu/Publications, Papers, and Research/Stovepipes GW CSPRI Report 2011 8.pdf
This article proposes a holistic approach to developing the cybersecurity workforce based on careful integration of workforce development strategies into a plan that involves educators, career professionals, employers, and policymakers. First, it motivates this by describing how other fields such as medicine have successfully done this and arguing that cyber security is, like medicine, inherently cross-disciplinary at multiple levels of expertise and performance, making it similar in complexity to the medical profession and thus a good candidate for some of the solutions developed there. The article then focuses on one element of a holistic strategy – education -- and discusses the findings of a recent workshop on cybersecurity education. It then places those findings in the context of the broader discussion and suggests some practical steps. They encourage computer science educators, human resources professionals, and the functional experts from disciplines that will attract computer science graduates to think beyond their “stovepiped” fields and collaborate so that holistic, integrated solutions can be developed, accepted, and implemented.

Horwath, J. (2011, November 11). iPad security settings and risk review for iOS 4.X. Retrieved from http://www.sans.org/reading_room/whitepapers/apple/ipad-security-settings-risk-review-ios-4x_33826
Many corporations are starting to investigate the us of mobile computing devices by staff and field agents. The introduction of consumer devices such as the iPad into the business world, brings a new set of risks and concerns to a corporation. The settings defined in this document try to balance a corporation’s regulatory and customer obligations to reduce risk while still allowing the user population an enjoyable user experience. The paper will investigate this problem from a deployment in an effort to give sales and marketing a business edge.

Thursday, November 10, 2011

November 10, 2011

National Cybersecurity

Baldor, L. C. (2011, November 7). Cyber weaknesses should deter US from waging war. Associated Press. Retrieved from goo.gl/uvudv
America's critical computer networks are so vulnerable to attack that it should deter U.S. leaders from going to war with other nations, a former top U.S. cybersecurity official said Monday.  Richard Clarke, a top adviser to three presidents, joined a number of U.S. military and civilian experts in offering a dire assessment of America's cybersecurity at a conference, saying the country simply can't protect its critical networks.

Donovan, F. (2011, November 9). Obstacles facing the US cybersecurity initiatives. Infosecurity Magazine.  Retrieved from http://www.infosecurity-magazine.com/view/21850/obstacles-facing-the-us-cybersecurity-initiatves-/ [Requires free registration.]

Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. Fred Donovan surveys the experts to get their take on where the nation’s cybersecurity program is heading.

Hoover, J. N. (2011, November 7). DARPA boost cybersecurity research spending 50%. InformationWeek. Retrieved from http://www.informationweek.com/news/government/security/231902495
The Defense Advanced Projects Research Agency, birthplace of the Internet, plans to increase its spending on cyber research 50% over the next five years, and will increasingly focus on offensive cyber capabilities as well as defensive capabilities, agency director Regina Dugan said Monday. "Modern warfare will demand the effective use of cyber, kinetic, and combined cyber and kinetic means," Dugan said, speaking before the DARPA Cyber Colloquium, a gathering of cyber professionals. "We need more options, we need more speed, and we need more scale. We must both protect its peaceful shared use as well as prepare for hostile cyber acts that threaten our military capabilities." DARPA sought $208 million in cyber spending in fiscal 2012, up from $120 million the year before, and that's just the start of the jump in spending.

Rockwell, M. (2011, November 9). Interagency group defines common cybersecurity language and skills. Government Security News. Retrieved from http://www.gsnmagazine.com/node/24942?c=cyber_security [Related documents from the National Initiative for Cybersecurity Education.]
An interagency cyber security group has published a document aimed at defining common terms, requirements and skill sets for those charged with guarding against cyber attacks. The National Initiative on Cybersecurity Education (NICE) published a draft document that classifies typical duties and skill requirements of cyber security workers and has posted it for public review. The document is meant to define professional requirements in cyber security, much as other professions, such as medicine and law, have done, said the group in a Nov. 8 statement.

Sternstein, A. (2011, November 3).  Briefing: Corporate intelligence. Government Executive. Retrieved from http://www.govexec.com/story_page.cfm?articleID=49189
Businesses operating critical infrastructure, such as the energy and banking sectors, want to join a new government program that would give them access to classified intelligence on cyber threats. The program, which is currently restricted to certain defense contractors, is aimed at strengthening commercial networks serving the military.  The thinking at the Pentagon is that power companies and other businesses vital to troops should be privy to malware surveillance collected by the National Security Agency, the military's spy branch. The Defense Department does not have the authority to guard civilian systems. That responsibility falls to the Homeland Security Department, which would be a key player in any such initiative.

Zhang, Z. (2011). NERC's cyber security standards: Fulfilling its reliability day job and moonlighting as a cyber security model. Environmental Practice, 13(3), 250-264 [in press]. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1622012
This article gives an overview of the eight mandatory cyber security standards by the North American Electric Reliability Corporation. As an example of how standards are evolving it discusses CIP-002 – Critical Cyber Asset Identification in depth because it establishes whether the remaining seven standards apply. This article then compares the North American Electric Reliability Corporation regulatory regime against critical information infrastructure goals. The comparison finds that, at least on a basic level, the electric industry’s mandatory cyber security standards meet the critical information infrastructure goals and work to secure information networks, resources, and systems from cyber and physical threats. The mandatory cyber security standards promote an increase in technological products, better security management, personnel and public education and trust in the industry. Even though the electric industry’s mandatory standards are imperfect, the fact it satisfies the goals of the cross sector critical information infrastructure indicates that the framework is sound. The electric industry’s experience with mandatory cyber security standards is a valuable source of information and the regulatory regime itself can be a helpful model for other industries looking to develop their own security protection systems. 

Enterprise Cybersecurity


Schwartz, M. J. (2011, November 8). Apple excommunicates iOS cracker. Information Week. Retrieved from http://www.informationweek.com/news/security/mobile/231902576
Apple has given security researcher Charlie Miller the boot from its iOS developer program after he publicly demonstrated a proof-of-concept attack that would enable an app creator to execute arbitrary code on any iPhone, iPad, or iPod Touch running iOS version 4.3 or later. Miller has been suspended from the developer program--which allows people to develop, test, and distribute iOS applications--for one year. "First they give researcher's (sic) access to developer programs, (although I paid for mine) then they kick them out.. for doing research. Me angry," said Miller in a tweet posted Tuesday. In a letter, Apple told Miller that it was kicking him out of the program for breaking its terms of service.

Global Cybersecurity

Estonia takes down massive cybercriminal net. (2011, November 10). Infosecurity Magazine. Retrieved from http://www.infosecurity-magazine.com/view/21937/estonia-takes-down-massive-cybercriminal-net/
Reports are coming in that officials in Estonia – arguably one of the most internet-savvy governments in the world – have taken down a massive DNS-changing cybercrime operation involving a click-fraud program that infected more than four million computers in over 100 countries. Security researcher Brian Krebs has observed that the police action – against the gang that raked in at least $14 million – is possibly the “biggest cybercriminal takedown in history.”

Ionnadis, C., Pym., D., & Williams, J. (2011). Information security trade-offs and optimal patching policies. European Journal of Operational Research, 216(2), 434-444. doi:10.1016/j.ejor.2011.05.050 [Full text available in the ScienceDirect database.]
We develop and simulate a basic mathematical model of the costly deployment of software patches in the presence of trade-offs between confidentiality and availability. The model incorporates representations of the key aspects of the system architecture, the managers’ preferences, and the stochastic nature of the threat environment. Using the model, we compute the optimal frequencies for regular and irregular patching, for both networks and clients, for two example types of organization, military and financial. Such examples are characterized by their constellations of parameters. Military organizations, being relatively less cost-sensitive, tend to apply network patches upon their arrival. The relatively high cost of applying irregular client patches leads both types of organization to avoid deployment upon arrival.

Melzer, N. (2011, November). Cyberwarfare and international law.  Retrieved from http://www.unidir.org/pdf/ouvrages/pdf-1-92-9045-011-L-en.pdf
It is the purpose of this paper to provide an overview: (a) of the potential restraints imposed on cyberwarfare by existing international law, (b) of the most important difficulties and controversies raised in the interpretation and application of international law to cyberwarfare, and (c) of the potential humanitarian impacts of cyberwarfare. In view of the constraints in terms of time and space, the envisaged overview cannot be exhaustive but will have to remain selective, focusing on providing a general understanding of the issues most relevant to contemporary state practice. Moreover, in view of the technical and legal complexity of the matter and the still rudimentary state of legal research, the ambition of this paper must remain limited to identifying issues and putting them into context, but cannot be to authoritatively resolve them.

Smith, J. (2011, November 7).  Unresolved questions dog international cybersecurity policies. National Journal. Retrieved from http://www.nextgov.com/nextgov/ng_20111107_6951.php [related report from the U.S. Office of the National Counterintelligence Executive.]
Cyberspace presents international security threats, many that can only be adequately met through international cooperation. But experts say countries around the world are just beginning to work out the complicated questions surrounding international responses to cybersecurity.  In the United States, businesses and government agencies have reported a growing number of sophisticated cyberattacks. In a report to Congress released on Friday, U.S. intelligence agencies said hackers in China and Russia are stealing large amounts of U.S. technological and trade secrets.