Last month, National Defense University published Frank Kramer's new book, "Cyber Power and National Security." The book quickly became the top book on the desks (and night-stands) of policy makers focusing on cyber security. The technical sections of the book are deep enough to impress the top vulnerability folks, and the policy sections offer fresh and important approaches to the strategic uses of cyber power. Kramer was one of the DoD strategists widely credited with helping to "win the cold war." It's great to have him focusing on cyber security.
******************** Sponsored By Norwich University ********************
Norwich University's Master of Science in Information Assurance program allows information security professionals to integrate their technical competencies with business management skills. A comprehensive core curriculum and an individual case study project equip graduates with the skills to manage and lead an organization-wide information security program. http://www.sans.org/info/45963
Study Finds Companies Lacking Disaster Recovery Plans (July 10, 2009)
A study of 117 small and medium-sized Irish businesses found that 43 percent have not established disaster recovery plans. Of those, more than half say they do not plan to create one. Sixteen percent said their organizations were too small to merit a disaster recovery plan, while 12 percent said that implementing such a plan would be too expensive. All companies surveyed said they use backup technology. Sixteen percent of the companies said they store their backup media onsite; 26 percent said their backup storage facilities are not fireproof. Thirty-nine percent of the companies said they had experienced problems retrieving and restoring data from backup media; 31 percent of the companies have never conducted a test restore. -http://www.siliconrepublic.com/news/article/13397/cio/43pc-of-firms-have-no-disa ster-recovery-plans [Editor's Note (Schultz): There is still another reason why small and medium businesses do not have disaster recovery plans, namely the fact that disaster recovery is so difficult and complex to really do correctly. Organizations of this size thus frequently "give up in advance" rather than to invest the time and resources needed. ]
Man Jailed in China for Infecting Software with Viruses (July 13, 2009)
A court in Shanghai has sentenced a man to two-and-a-half years in jail for inserting viruses into software products made by his former employer, an IT company. In late 2007, the company's clients began complaining that the software was automatically deleting data from their computers. Pu Jiazhi had resigned from the company several months earlier; police examining his computer found evidence that he had created the malware responsible for deleting the data. Pu's actions cost the company more than 250,000 yuan (US $36,584) in compensation to its clients. -http://www.shanghaidaily.com/sp/article/2009/200907/20090713/article_407225.htm
Chinese National Indicted for Export Violations (July 9, 2009)
Chi Tong Kuok has been indicted for alleged conspiracy, money laundering, smuggling and attempting to export a defense article without a license. According to a government affidavit, Kuok told investigators that he was "acting at the direction of officials for the People's Republic of China" when he attempted to locate, purchase and send to China devices that would allow China to eavesdrop on US government and military communications. In one case, he was able to purchase a pair of restricted military radios and have them sent to an address in Macau. Most of the rest of his activity was monitored by US undercover agents who were tipped off to Kuok's intentions by someone Kuok had contacted in the defense industry. Last month, Kuok was arrested in Atlanta during a stopover on his flight from Paris to Panama. -http://www.wired.com/threatlevel/2009/07/export/ -http://www.wired.com/images_blogs/threatlevel/2009/07/kuok_indictment.pdf
GOVERNMENT SYSTEMS AND HOMELAND SECURITY
South Korea Steps Up Pace of Establishing Financial Cyber Security Center (July 13, 2009)
South Korea has moved up the date for completion of a cyber security center for financial and economic institutions in the wake of recent cyber attacks on government, news, and financial websites. The new center's system will be linked to the country's National Cyber Security Center and will be designed to detect and defend against distributed denial-of-service (DDoS) attacks. -http://www.koreaherald.co.kr/NEWKHSITE/data/html_dir/2009/07/13/200907130061.asp [Editor's Note (Honan): The UK CPNI have developed an excellent model, the Warning Advice and Reporting Point www.warp.gov.uk, to build these type of community focused cyber security centres. In fact, I used the WARP model with the support of SANS to establish Ireland's first CERT team www.iriss.ie. ]
France Creates New Cyber Security Agency (July 9, 2009)
LexisNexis Warns of Data Security Breach (July 13, 2009)
LexisNexis has sent letters to more than 13,000 people, warning them that their personal information may have been accessed by a Florida man who is allegedly involved in a mafia racketeering conspiracy. Lee Klein may have used his access to LexisNexis Seisint databases to help others commit fraud. Klein allegedly supplied other people with information that could be exploited in a fraudulent check cashing operation; he also allegedly used his access to the database to find information on extortion or assault targets. -http://www.computerworld.com/s/article/9135479/LexisNexis_warns_of_breach_after_ alleged_mafia_bust?source=rss_security
ATTACKS & ACTIVE EXPLOITS
Microsoft Warns of Zero-Day Flaw in Office Web Components ActiveX Control (July 13, 2009)
Security Control Metric Eases Consensus Process (February 26, 2009)
The process of reaching a consensus on information security documents can sometimes get mired in endless, trivial discussions. A group of experts trying to reach consensus on the Solaris Security document published by the Center for Internet Security turned to a technique described by Chris Calabrese. By assigning numeric values to factors relating to security controls and plugging them into a simple equation, the process became objective rather than subjective, and consensus was more easily achieved. -http://righteousit.wordpress.com/2009/02/26/calabreses-razor/
Eugene Schultz, Ph.D., CISM, CISSP is CTO of Emagined Security and the author/co-author of books on Unix security, Internet security, Windows NT/2000 security, incident response, and intrusion detection and prevention. He was also the co-founder and original project manager of the Department of Energy's Computer Incident Advisory Capability (CIAC).
John Pescatore is Vice President at Gartner Inc.; he has worked in computer and network security since 1978.
Ron Dick directed the National Infrastructure Protection Center (NIPC) at the FBI and is the incoming President of the InfraGard National Members Alliance - with 22,000 members.
Stephen Northcutt founded the GIAC certification and currently serves as President of the SANS Technology Institute, a post graduate level IT Security College, www.sans.edu.
Johannes Ullrich is Chief Technology Officer of the Internet Storm Center.
Ed Skoudis is co-founder of Inguardians, a security research and consulting firm, and author and lead instructor of the SANS Hacker Exploits and Incident Handling course.
Rohit Dhamankar is the Director of Security Research at TippingPoint, where he leads the Digital Vaccine and ThreatLinQ groups. His group develops protection filters to address vulnerabilities, viruses, worms, Trojans, P2P, spyware, and other applications for use in TippingPoint's Intrusion Prevention Systems.
Prof. Howard A. Schmidt is the President of the Information Security Forum (ISF) and author who has served as CSO for Microsoft and eBay and as Vice-Chair of the President's Critical Infrastructure Protection Board.
Tom Liston is a Senior Security Consultant and Malware Analyst for Inguardians, a handler for the SANS Institute's Internet Storm Center, and co-author of the book Counter Hack Reloaded.
Dr. Eric Cole is an instructor, author and fellow with The SANS Institute. He has written five books, including Insider Threat and he is a senior Lockheed Martin Fellow.
Mason Brown is one of a very small number of people in the information security field who have held a top management position in a Fortune 50 company (Alcoa). He is leading SANS' global initiative to improve application security.
David Hoelzer is the director of research & principal examiner for Enclave Forensics and a senior fellow with the SANS Technology Institute.
Mark Weatherford, CISSP, CISM, is Chief Information Security Officer of the State of California.
Alan Paller is director of research at the SANS Institute.
Marcus J. Ranum built the first firewall for the White House and is widely recognized as a security products designer and industry innovator.
Clint Kreitner is the founding President and CEO of The Center for Internet Security.
Brian Honan is an independent security consultant based in Dublin, Ireland.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit http://portal.sans.org/