Letter: Information security effort same as previous efforts
A reader writes to say plans to publish the most effective protections against the vulnerabilities most often exploited in cyberattacks is not new.
Regarding "Experts tackle guidance to stop cyberattacks"
This effort, which is no different from previous efforts in the area of information assurance, is primarily looking at securing the network in order to secure the data objects within the network. Failure always occurs when the network security is penetrated and all the data objects are then vulnerable since security is not on the data objects but on the network.
The United States Special Operations Command at MacDill Air Force Base in Tampa, Fla., has a development effort that concentrates security on the data object while manitaining security on the network. The project is called Classification Stateless Technology Environment (CSTE). And although it it not fully mature, portions where demonstrated in CWID 08 (June 08) and additional capabilities will be demonstrated in CWID 09 (June 09). I'd recommend contacting Lt. Col. Scott Rutherford in the Science
Advisors Office at U.S. SOCOM for further information.
Francis J. Adamouski Jr.
InfoAssure, Inc.
What do you think? Paste a comment in the box below (registration required), or send your comment to letters@fcw.com (subject line: Blog comment) and we'll post it.