Obama pledges security education from boardroom to classroom

2009-06-01

Helen Martin

Virus Bulletin, UK
Editor: Helen Martin

Abstract

President Obama announces multi-billion-dollar cybersecurity effort.


US President Barack Obama has announced a new multi-billion-dollar effort designed to bolster the security of the United States’ digital infrastructure. The plan involves the creation of a dedicated cybersecurity office at the White House and making cybersecurity ‘a national security priority’.

In his speech, Obama referred not only to the need to secure the country’s information and communication networks, but also to the ‘millions of Americans [who] have been victimized, their privacy violated, their identities stolen, their lives upended, and their wallets emptied’.

Obama pledged to work with key players including state and local governments and the private sector to ensure an organized and unified response to cyber incidents in the future; to strengthen relationships between the public and private sectors and encourage collaboration with industry to find technology solutions; to invest in research and development and to begin a national education campaign to promote cybersecurity awareness and digital literacy ‘from our boardrooms to our classrooms’.

With rumours rife of government agencies bringing in the use of ‘magic lantern’ trojans or ‘bundestrojans’ to gather intelligence on suspected criminals (see p.13), and corresponding levels of concern over the moral, legal and practical implications of such practices, Obama also made it clear that the stepping up of the country’s cybersecurity efforts would not involve the monitoring of private sector networks or Internet traffic, saying: ‘we will preserve and protect the personal privacy and civil liberties that we cherish as Americans’.

President Obama also promised an open and transparent process as the new cybersecurity strategy is developed – with the government’s 60-day cyberspace policy review available to read from the official website of the White House.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.