Russian News  
OMB Issues Report Of US Federal Govt IT Security

disclaimer: image is for illustration purposes only
by Shaun Waterman
Washington DC (UPI) Mar 05, 2008
The White House Office of Management and Budget says that the number of computer security incidents reported by federal network managers more than doubled last year, largely due to big increases in the disclosure or loss of personal data and intrusions of an as-yet undetermined character.

Officials said the increase was at least in part due to improved reporting of incidents by departments and agencies, and touted other figures in the report to lawmakers, released quietly at the weekend, that showed that the number of federal computer systems certified secure had finally reached a 90-percent government-wide goal set in 2002.

But other observers said the rise was likely in part attributable to an increase in the number and severity of attacks. "The level of malicious activity accelerated sharply in 2007" on the public and private sector networks we know about, Tim Bennett, president of the Cyber-Security Industry Alliance, told United Press International.

Bennett said it was likely federal networks had experienced a similar rise in malicious activities.

The report says the threat to U.S. government computer systems was "shifting from opportunistic hacking to targeted, dynamically adapting attacks" and acknowledged that "a long-term architectural roadmap is necessary to provide a consistent strategy for mitigating malicious cyber activity."

The total number of security incidents reported in 2007 by departments and agencies to the U.S. Computer Emergency Readiness Team, or US-CERT -- the monitoring center based at the Department of Homeland Security -- rose to 12,986, compared with 5,146 in 2006.

The two categories of incidents that grew the fastest were "improper usage" -- which soared five-fold from 638 to 3,305 -- and "under investigation" -- which rose four-fold from 912 to 4,056.

The report said two-thirds of the improper usage incidents were the result of the accidental loss or disclosure of personally identifiable information, or PII, by the Department of Veterans Affairs, while the other third consisted of "similar cases of PII disclosure reported by other agencies."

Incidents under investigation, which were more than 30 percent of the total, "are deemed �� as unconfirmed and warranting further review as they are potentially malicious or anomalous," said the report.

"That's another way of saying, 'We have no idea what it is,'" blogged GovernmentExecutive.com's Allan Holmes. Holmes pointed out the figure is consistent with data from a recent survey of the private sector -- where about a third of respondents "said they couldn't identify the type of cyberattack that hit them."

The OMB report said the reason for the "massive increase" in the under investigation category was "intensive analysis of suspicious traffic picked up by the Einstein program sensors."

Einstein is a security program operated by the Department of Homeland Security that monitors traffic into and out of federal networks, looking for anomalous or suspicious patterns of activity that might be a computer virus propagating or a hacker trying to gain entry.

"There are better tools and processes for reporting, and more importantly, there's better awareness of the need to report" incidents, former Bush White House senior cybersecurity official Howard Schmidt told UPI.

The report says agencies certified and accredited 92 percent of their computer systems in 2007, compared with 88 percent the previous year -- meeting after five years a government-wide goal of 90 percent.

But lawmakers have recently complained that so-called process metrics -- like measuring the numbers of systems certified -- are self-serving and should be replaced with output metrics, like measuring the number of intrusions detected and prevented.

Schmidt said those metrics would be harder to show progress on. "We will continue to see increases" in the numbers of security incidents, he said, adding that from one point of view that was a good thing -- the more sophisticated an intrusion or other effort was, the greater the chances of it occurring undetected.

Schmidt, now a private-sector IT security consultant, said Einstein and the Trusted Internet Connections initiative with which it is linked would yield "significant improvements" in the security of federal networks but that new security metrics would likely not reflect that for some time.

"It will take time to turn that ship around," he said, blaming a legacy of inherited, un-patched and inconsistently configured systems throughout the federal government.

"We still have to get beyond that legacy," he said.

Officials defend measuring certification and accreditation but say that they are looking hard at new, more output-oriented metrics they might be able to introduce down the road.

Community
Email This Article
Comment On This Article

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

Analysis: Einstein and U.S. cybersecurity
Washington (UPI) Mar 03, 2008
The Einstein program -- the most significant element yet unveiled of the classified multibillion-dollar cybersecurity initiative President Bush signed last month -- will still leave the U.S. government's IT security lagging the private sector, say lawmakers and industry experts.







  • Germany Wants New Strategic Partnership With Russia
  • Taiwan boosts military spending amid China increase
  • China announces big rise in military spending, amid US tensions
  • Pentagon voices concern over China's military power

  • North Korea Blames US For Impasse In Nuclear Talks
  • Iran Rejects More Talks As Sanctions Move Faces Hostile Reaction
  • US needs nuclear weapons for rest of century: general
  • Israel has power to defend against Iran: Olmert

  • Process On For Establishing Aerospace Command
  • Cisco plans to turn India into global hub, triple workforce
  • India's Biotech Baby Elephant

  • Hijacker shot after taking Australians hostage in China
  • EU, US file WTO complaint over Chinese media restrictions
  • Workers' rights a tough battle for history-making Chinese MP
  • China warns West against scrutiny of sovereign investment funds

  • China's biggest oil producer in talks with Qatar: report
  • 21 grants awarded for biomass research
  • Latin America could become biofuel player
  • CeBIT tech fair presents gadgets both hot and weird

  • Space Station Orbit Raised Five Clicks
  • Unique Three-Way Partnership For ATV Ground Control
  • Europe Sets A Course For The ISS
  • Joint ESA And Russian Team In Moscow Ready To Support Jules Verne

  • Northrop Grumman Delivers Payload Module For Second Advanced EHF Military Communications Satellite
  • Orbital Awarded Contract For System F6 Satellite Program By DARPA
  • Lockheed Martin Completes Rigorous Test Of First Advanced Military Communications Satellite
  • Northrop Grumman And Harris Demonstrate Airborne Networking

  • Tank Warfare And Doctrine Part Six
  • URI Selected By DHS To Co-lead New Center Of Excellence For Explosives Detection
  • Betting On Tanks To Control The Battlefield Part Two
  • Lockheed Martin's DAGR Continues Successful Test Program

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement