[INFOCON] - News 12/02/02
_ London, Monday, December 02, 2002 _ INFOCON News _ IWS - The Information Warfare Site http://www.iwar.org.uk _ - To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe infocon" in the body To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe infocon" in the body - _ [CURRENT THREAT LEVELS] Electricity Sector Physical: Elevated (Yellow) Electricity Sector Cyber: Elevated (Yellow) Homeland Security Elevated (Yellow) DOE Security Condition: 3, modified NRC Security Level: III (Yellow) (3 of 5) [News Index] [1] B2-ORM Mailing List [2] Homeland department could transform tech industry [3] Pentagon distributes software for modeling effects of attacks [4] Schneier: No "magic security dust" [5] Total Info System Totally Touchy [6] Lax Security: ID Theft Made Easy [7] Net security: Steady as she goes [8] Cisco backtracks on security functionality [9] S Koreans launch cyber attack on US over schoolgirls' deaths [10] Ten more tips for safe xmas e-tail [11] Intercepts [12] Computer virus insults victims [13] The Insecurity of Computer Security [14] Tech industry speculates about candidates for security jobs [15] WLAN security is still work in progress [16] Irish ISP blocks web site over dispute [17] Bugbear remains top virus threat [18] 'Critical' MS server flaw may affect few sites [19] First hackers sighted in high speed mobile phone arena _ News _ [1] B2-ORM Mailing List is an international email user group focused on the sharing of information on the implementation of Basel II compliant Operational Risk Management solutions in the Financial Services industry. Why not join today? Simply send an email to : mailto:[EMAIL PROTECTED] The next three years will place enormous strain on the resources of Operational Risk staff in the worlds Financial Services organisations. Why not learn from others and share information? Good practice guides, white papers and other essential information may be found on the groups web site and downloaded to your own system. Topics to be discussed include: Business Continuity Management (new International Standard) The role of Information Security, Audit and Compliance Interfaces with Outsource and other service providers. Six Sigma errors and defects management Money Laundering and Fraud Risk Interfaces to Credit and Market Risk [2] Homeland department could transform tech industry By William New, National Journal's Technology Daily The creation of a Homeland Security Department may presage more than better domestic security. It could mark the transformation of the technology industry from an economically flat maker of consumer-oriented products into a thriving, but more secretive, machine that creates security-oriented products and services. "The homeland security opportunity [for tech companies] is unprecedented in the civilian side of government," said Bruce McConnell, a Washington-based technology consultant. "The art form is to build relationships early on with the most influential component agencies ... who will define the architecture for years to come. President Bush signed the legislation, H.R. 5005, on Nov. 25. It will take effect in 60 days, but fundamental questions such as funding remain. New jobs in the department also must be filled and congressional oversight of the Cabinet-level agency defined. http://www.govexec.com/dailyfed/1102/112702td1.htm [3] Pentagon distributes software for modeling effects of attacks By Bryan Bender, Global Security Newswire The Defense Department has licensed to a few select nongovernmental organizations previously unavailable software that can model the effects of releases of nuclear, chemical, biological or radiological weapons and materials. The Heritage Foundation, Nat
[INFOCON] - News 12/02/02
-Original Message- From: Wanja Eric Naef (IWS) Sent: 02 December 2002 20:07 To: 'Infocon' Subject: News 12/02/02 _ London, Monday, December 02, 2002 _ INFOCON News _ IWS - The Information Warfare Site http://www.iwar.org.uk _ - To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe infocon" in the body To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe infocon" in the body - _ [CURRENT THREAT LEVELS] Electricity Sector Physical: Elevated (Yellow) Electricity Sector Cyber: Elevated (Yellow) Homeland Security Elevated (Yellow) DOE Security Condition: 3, modified NRC Security Level: III (Yellow) (3 of 5) [News Index] [1] B2-ORM Mailing List [2] Homeland department could transform tech industry [3] Pentagon distributes software for modeling effects of attacks [4] Schneier: No "magic security dust" [5] Total Info System Totally Touchy [6] Lax Security: ID Theft Made Easy [7] Net security: Steady as she goes [8] Cisco backtracks on security functionality [9] S Koreans launch cyber attack on US over schoolgirls' deaths [10] Ten more tips for safe xmas e-tail [11] Intercepts [12] Computer virus insults victims [13] The Insecurity of Computer Security [14] Tech industry speculates about candidates for security jobs [15] WLAN security is still work in progress [16] Irish ISP blocks web site over dispute [17] Bugbear remains top virus threat [18] 'Critical' MS server flaw may affect few sites [19] First hackers sighted in high speed mobile phone arena _ News _ [1] B2-ORM Mailing List is an international email user group focused on the sharing of information on the implementation of Basel II compliant Operational Risk Management solutions in the Financial Services industry. Why not join today? Simply send an email to : mailto:[EMAIL PROTECTED] The next three years will place enormous strain on the resources of Operational Risk staff in the worlds Financial Services organisations. Why not learn from others and share information? Good practice guides, white papers and other essential information may be found on the groups web site and downloaded to your own system. Topics to be discussed include: Business Continuity Management (new International Standard) The role of Information Security, Audit and Compliance Interfaces with Outsource and other service providers. Six Sigma errors and defects management Money Laundering and Fraud Risk Interfaces to Credit and Market Risk [2] Homeland department could transform tech industry By William New, National Journal's Technology Daily The creation of a Homeland Security Department may presage more than better domestic security. It could mark the transformation of the technology industry from an economically flat maker of consumer-oriented products into a thriving, but more secretive, machine that creates security-oriented products and services. "The homeland security opportunity [for tech companies] is unprecedented in the civilian side of government," said Bruce McConnell, a Washington-based technology consultant. "The art form is to build relationships early on with the most influential component agencies ... who will define the architecture for years to come. President Bush signed the legislation, H.R. 5005, on Nov. 25. It will take effect in 60 days, but fundamental questions such as funding remain. New jobs in the department also must be filled and congressional oversight of the Cabinet-level agency defined. http://www.govexec.com/dailyfed/1102/112702td1.htm [3] Pentagon distributes software for modeling effects of attacks By Bryan Bender, Global Security Newswire The Defense Department has licensed to a few select nongovernmental organizations previously unavailable software that can model t