[INFOCON] - News 12/02/02

2002-12-03 Thread Wanja Eric Naef \(IWS\)

_

  London, Monday, December 02, 2002  
_

INFOCON News
_

IWS - The Information Warfare Site
http://www.iwar.org.uk

_


-

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with
"unsubscribe infocon" in the body

-

_

  
[CURRENT THREAT LEVELS]
  

Electricity Sector Physical: Elevated (Yellow) 

Electricity Sector Cyber: Elevated (Yellow) 

Homeland Security Elevated (Yellow) 
DOE Security Condition: 3, modified  

NRC Security Level: III (Yellow) (3 of 5) 


  
  [News Index]
  

[1] B2-ORM Mailing List
[2] Homeland department could transform tech industry
[3] Pentagon distributes software for modeling effects of attacks
[4] Schneier: No "magic security dust"
[5] Total Info System Totally Touchy  

[6] Lax Security: ID Theft Made Easy  
[7] Net security: Steady as she goes
[8] Cisco backtracks on security functionality
[9] S Koreans launch cyber attack on US over schoolgirls' deaths
[10] Ten more tips for safe xmas e-tail

[11] Intercepts
[12] Computer virus insults victims
[13] The Insecurity of Computer Security
[14] Tech industry speculates about candidates for security jobs
[15] WLAN security is still work in progress

[16] Irish ISP blocks web site over dispute
[17] Bugbear remains top virus threat
[18] 'Critical' MS server flaw may affect few sites
[19] First hackers sighted in high speed mobile phone arena

_

News
_


[1] B2-ORM Mailing List

is an international email user group focused on the sharing of
information on the implementation of Basel II compliant Operational Risk
Management solutions in the Financial Services industry.

Why not join today? Simply send an email to :

mailto:[EMAIL PROTECTED]

The next three years will place enormous strain on the resources of
Operational Risk staff in the worlds Financial Services organisations.
Why not learn from others and share information?  Good practice guides,
white papers and other essential information may be found on the groups
web site and downloaded to your own system.

Topics to be discussed include:

Business Continuity Management (new International Standard)
The role of Information Security, Audit and Compliance
Interfaces with Outsource and other service providers.
Six Sigma errors and defects management
Money Laundering and Fraud Risk
Interfaces to Credit and Market Risk

 

[2] Homeland department could transform tech industry
By William New, National Journal's Technology Daily 

The creation of a Homeland Security Department may presage more than
better domestic security. It could mark the transformation of the
technology industry from an economically flat maker of consumer-oriented
products into a thriving, but more secretive, machine that creates
security-oriented products and services. 

"The homeland security opportunity [for tech companies] is unprecedented
in the civilian side of government," said Bruce McConnell, a
Washington-based technology consultant. "The art form is to build
relationships early on with the most influential component agencies ...
who will define the architecture for years to come. 

President Bush signed the legislation, H.R. 5005, on Nov. 25. It will
take effect in 60 days, but fundamental questions such as funding
remain. New jobs in the department also must be filled and congressional
oversight of the Cabinet-level agency defined. 

http://www.govexec.com/dailyfed/1102/112702td1.htm

 

[3] Pentagon distributes software for modeling effects of attacks
By Bryan Bender, Global Security Newswire 

The Defense Department has licensed to a few select nongovernmental
organizations previously unavailable software that can model the effects
of releases of nuclear, chemical, biological or radiological weapons and
materials. 

The Heritage Foundation, Nat

[INFOCON] - News 12/02/02

2002-12-03 Thread Wanja Eric Naef \(IWS\)


-Original Message-
From: Wanja Eric Naef (IWS) 
Sent: 02 December 2002 20:07
To: 'Infocon'
Subject: News 12/02/02


_

  London, Monday, December 02, 2002  
_

INFOCON News
_

IWS - The Information Warfare Site
http://www.iwar.org.uk

_


-

To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe
infocon" in the body

To unsubscribe - send an email to "[EMAIL PROTECTED]" with
"unsubscribe infocon" in the body

-

_

  
[CURRENT THREAT LEVELS]
  

Electricity Sector Physical: Elevated (Yellow) 

Electricity Sector Cyber: Elevated (Yellow) 

Homeland Security Elevated (Yellow) 
DOE Security Condition: 3, modified  

NRC Security Level: III (Yellow) (3 of 5) 


  
  [News Index]
  

[1] B2-ORM Mailing List
[2] Homeland department could transform tech industry
[3] Pentagon distributes software for modeling effects of attacks
[4] Schneier: No "magic security dust"
[5] Total Info System Totally Touchy  

[6] Lax Security: ID Theft Made Easy  
[7] Net security: Steady as she goes
[8] Cisco backtracks on security functionality
[9] S Koreans launch cyber attack on US over schoolgirls' deaths
[10] Ten more tips for safe xmas e-tail

[11] Intercepts
[12] Computer virus insults victims
[13] The Insecurity of Computer Security
[14] Tech industry speculates about candidates for security jobs
[15] WLAN security is still work in progress

[16] Irish ISP blocks web site over dispute
[17] Bugbear remains top virus threat
[18] 'Critical' MS server flaw may affect few sites
[19] First hackers sighted in high speed mobile phone arena

_

News
_


[1] B2-ORM Mailing List

is an international email user group focused on the sharing of
information on the implementation of Basel II compliant Operational Risk
Management solutions in the Financial Services industry.

Why not join today? Simply send an email to :

mailto:[EMAIL PROTECTED]

The next three years will place enormous strain on the resources of
Operational Risk staff in the worlds Financial Services organisations.
Why not learn from others and share information?  Good practice guides,
white papers and other essential information may be found on the groups
web site and downloaded to your own system.

Topics to be discussed include:

Business Continuity Management (new International Standard)
The role of Information Security, Audit and Compliance
Interfaces with Outsource and other service providers.
Six Sigma errors and defects management
Money Laundering and Fraud Risk
Interfaces to Credit and Market Risk

 

[2] Homeland department could transform tech industry
By William New, National Journal's Technology Daily 

The creation of a Homeland Security Department may presage more than
better domestic security. It could mark the transformation of the
technology industry from an economically flat maker of consumer-oriented
products into a thriving, but more secretive, machine that creates
security-oriented products and services. 

"The homeland security opportunity [for tech companies] is unprecedented
in the civilian side of government," said Bruce McConnell, a
Washington-based technology consultant. "The art form is to build
relationships early on with the most influential component agencies ...
who will define the architecture for years to come. 

President Bush signed the legislation, H.R. 5005, on Nov. 25. It will
take effect in 60 days, but fundamental questions such as funding
remain. New jobs in the department also must be filled and congressional
oversight of the Cabinet-level agency defined. 

http://www.govexec.com/dailyfed/1102/112702td1.htm

 

[3] Pentagon distributes software for modeling effects of attacks
By Bryan Bender, Global Security Newswire 

The Defense Department has licensed to a few select nongovernmental
organizations previously unavailable software that can model t