Amazines Free Article Archive
www.amazines.com - Friday, August 22, 2025
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133577)
 Advice (161673)
 Affiliate Programs (34799)
 Art and Culture (73858)
 Automotive (145730)
 Blogs (75623)
 Boating (9851)
 Books (17224)
 Buddhism (4130)
 Business (1331090)
 Business News (426461)
 Business Opportunities (366526)
 Camping (10974)
 Career (72796)
 Christianity (15854)
 Collecting (11638)
 Communication (115089)
 Computers (241958)
 Construction (38977)
 Consumer (49954)
 Cooking (17080)
 Copywriting (6734)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20323)
 Dating (45910)
 EBooks (19704)
 E-Commerce (48279)
 Education (185537)
 Electronics (83525)
 Email (6438)
 Entertainment (159864)
 Environment (29004)
 Ezine (3040)
 Ezine Publishing (5454)
 Ezine Sites (1551)
 Family & Parenting (111012)
 Fashion & Cosmetics (196612)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310640)
 Fitness (106493)
 Food & Beverages (63058)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25207)
 Government (10519)
 Health (630195)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91754)
 Home Improvement (251317)
 Home Repair (46263)
 Humor (4729)
 Import - Export (5462)
 Insurance (45105)
 Interior Design (29640)
 International Property (3488)
 Internet (191035)
 Internet Marketing (146690)
 Investment (22864)
 Islam (1161)
 Judaism (1352)
 Law (80500)
 Link Popularity (4596)
 Manufacturing (20934)
 Marketing (99329)
 MLM (14140)
 Motivation (18237)
 Music (27000)
 New to the Internet (9498)
 Non-Profit Organizations (4049)
 Online Shopping (129743)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12691)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126921)
 Recreation & Leisure (95497)
 Relationships (87678)
 Research (16182)
 Sales (80370)
 Science & Technology (110301)
 Search Engines (23525)
 Self Improvement (153317)
 Seniors (6224)
 Sexuality (36012)
 Small Business (49405)
 Software (83054)
 Spiritual (23539)
 Sports (116156)
 Tax (7664)
 Telecommuting (34070)
 Travel & Tourism (308305)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11803)
 Website Design (56951)
 Website Promotion (36673)
 World News (1000+)
 Writing (35853)
Author Spotlight
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
LINDA HOLLAND

I am a passionate article and blog writer based in South Africa. With a love for life and a strong d...more
JOSEPH ZHOU

China Care Medical has been exporting out Chinese medical equipment for many different countries. We...more
HEINZ RAINER

Thirty years Africa, Asia, Europe | Worked in Industry, Trade | preferred Nations : China, Thailand,...more
AREESH ISHTIAQ

Areesh Ishtiaq a Top Rated SEO and Digital Marketing Guru on Upwork, working as a project manager fo...more


Will voluntary cyber threat sharing plan cast doubt over cispa? - Waterproof Fluorescent Light Fixt by wang dong





Article Author Biography
Will voluntary cyber threat sharing plan cast doubt over cispa? - Waterproof Fluorescent Light Fixt by
Article Posted: 07/22/2012
Article Views: 87
Articles Written: 1102
Word Count: 826
Article Votes: 0
AddThis Social Bookmark Button

Will voluntary cyber threat sharing plan cast doubt over cispa? - Waterproof Fluorescent Light Fixt


 
Business,Business News,Business Opportunities
The Cyber Intelligence Sharing and Protection Act (CISPA) might becast into doubt in the wake of a Department of Defense announcementlast week that as many as 1,000 defense contractors -- and possiblythousands more -- may voluntarily join an expanded program ofsharing classified information on cyber threats with the federalgovernment. The program, known as the Defense Industrial Base CyberSecurity/Information Assurance, or DIB CS/IA, has been in a pilotphase for the past four years with only 37 contractors. Theexpansion, recently approved by the Obama administration, meansabout 8,000 contractors cleared to work with DoD intellectualproperty are being invited to participate. Bloomberg BusinessWeek reports that if this expansion "proves successful in safeguarding defensecontractors from cyber attacks, the administration may enlarge theprogram to companies in 15 other critical infrastructure categoriesthrough the Department of Homeland Security," Eric Rosenbach,deputy assistant secretary of defense for cyber policy, said.

This, if it works as expected, could prompt those arguing overCISPA, recently passed by the U.S. House , along with other similar pending legislation in Congress, towonder how necessary it all is. Why mandate information sharingwith the government if it can happen voluntarily? [See also: CISPA enjoys wide backing from enterprises ] Jason Healey, director of the Cyber Statecraft Initiative of theWashington, D.C. think tank Atlantic Council, says while "thereabsolutely are similarities" between DIB and the variouslegislative efforts, that there are "lots of other bits" in thosebills -- such as mandatory security standards.

"Some legislation isnecessary," he says. Dan Philpott, an expert in federal cybersecurity and editor of FISMApedia , says DIB CS/IA is "a much lighter version" of CISPA. He saysanother reason the program could not replace cybersecurity law isbecause it is unlikely that anything close to 8,000 contractorswill volunteer to enter it. He believes the DoD is being optimisticeven with an estimate of 1,000. "I think they'd be happy with 500,"he says.

Beyond that, there is debate over how worthwhile and effective DIBCS/IA has been and will be. There is broad agreement that thethreat of cyberattacks is increasing at "a rapid and acceleratingrate," in the words of Rear Admiral Samuel Cox, director ofintelligence for the military's Cyber Command, at a forum lastmonth. And the goal of the DIB expansion is for more sharing of databetween private defense contractors and the DoD'sintelligence-gathering arm, the National Security Agency. RichardA.

Hale, deputy chief information officer for cybersecurity, told the American Forces Press Service, "We started the program in anattempt to share cyber-threat data with these companies in a waythat allowed the companies to act on that information immediately,"and called it, "an important step forward in our ability to catchup with widespread cyber threats." But Healey, speaking to Reuters last week, expressed some skepticism about whether the benefits ofDIB CS/IA would be worth the cost to contractors. "The DIB pilotprobably increases the defenders' work factor much more than itincreases the attackers," he said. "This is a lot of work and a lotof taxpayer dollars for something that has apparently not proven itcan increase security more than on the margins." Healey says he is "very pleased to see DoD saying they could scalethis to 8,000 companies." But he still thinks the department couldbe much more efficient in its dealings with private industry. In an article in The Atlantic , Healey argues that the NSA should simply declassify much of its database ofmalware "signatures." While he acknowledges that critics will argue that such actionwould, "compromise our sensitive collection sources and methods.[But] in truth, the extreme classification surrounding most ofthese signatures protect little but bureaucratic inertia. GeneralMichael Hayden, a past NSA director, made this case best, saying,'Let me be clear: This stuff is overprotected.'" "More importantly, the Internet is an open network and anyadversary that uses novel malicious software knows it willeventually be discovered," he said.

Philpott adds that in the information security community,"signature-based security is becoming kind of looked down on. It'sinherently weak because only identifies things that have alreadyhappened." Healey writes in The Atlantic that NSA's signature database, while "considered among the crownjewels of the U.S. government's defense capabilities ... may not beas awe-inspiring as advertised." He adds: "And independent reviewfound only marginal benefit" to contractors like Northrop Grummanor Lockheed Martin. "Only 1% of the attacks were detected using NSA threat data thatthe companies did not already have themselves," Healey says.

He argues that a more effective system would be an "independentclearinghouse for signatures. NSA might anonymously add itssignatures ... and further wash their source by mixing them withsignatures from security companies and even with other nations'intelligence agencies." "This option would create the world's best-ever signature database... and any organization that contributes their signaturecollection would then able to use the full database," Healey says. Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.

We are high quality suppliers, our products such as Waterproof Fluorescent Light Fixtures , Flat Panel Led Lights for oversee buyer. To know more, please visits Flat Panel Led Lights.

Related Articles - Waterproof Fluorescent Light Fixtures, Flat Panel Led Lights,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
STEPHEN BYE

Stephen Bye is a fiction writer. His most recent novels are a 5-book “The Developer” series which be...more
PAUL PHILIPS

For more articles, blog messages & videos and a free e-book download go to www.NewParadigm.ws your p...more
LEVAL AINAH

I am an internet marketer and also an educator. My goal is to help others who are looking to improve...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
MICHAEL BRESCIANI

Rev Bresciani is the author of two Christian books. One book is an important and concisely written b...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2025, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license