"Digital technologies today touch nearly every aspect of American life. The openness and connection enabled by a access to the internet are game-changes for communities everywhere, as we have all experienced throughout the COVID-19 pandemic. That's why, thanks to the Bipartisan Infrastructure Law, my administration is investing $65 billion to make sure every American has access to reliable, high-speed Internet. And when we pick up our smart p;hones to keep in touch with loved ones, log on to social media to share our ides with one another, or connect to the internet to do business or take care of any of our basic needs, we need to be able to trust that the underlying digital ecosystem is safe, reliable, and secure. This National Cybersecurity Strategy details the comprehensive approach my Administration is taking to better secure cyberspace and ensure the United States is in the strongest possible position to realize all the benefits and potential of our digital future..."
cybersecurity
Saturday, March 4, 2023
National Cybersecurity Strategy
Thursday, August 5, 2021
Federal Cybersecurity: America's Data Still at Risk
"In June 2019, the Permanent Subcommittee on Investigations (Subcommittee) issued a bipartisan report titled: Federal Cybersecurity: America’s Data at Risk (the 2019 Report). That report highlighted systemic failures of eight key Federal agencies to comply with Federal cybersecurity
standards identified by agencies’ inspectors general. The 2019 Report documented how none of these eight agencies met basic cybersecurity standards and protocols, including properly protecting Americans’ personally identifiable information (PII); maintaining a list of the
equipment and programs on agency networks; and promptly installing security patches to remediate vulnerabilities that hackers could exploit. The 2019 Report also highlighted that all eight agencies were operating legacy computer systems, which are costly to maintain and difficult to secure. Based on those findings, the Subcommittee determined that these eight
Federal agencies were failing to protect the sensitive data they stored and maintained.
This report revisits those same eight agencies two years later. What this report finds is stark. Inspectors general identified many of the same issues that have plagued Federal agencies for more than a decade. Seven agencies made minimal improvements, and only DHS managed to
employ an effective cybersecurity regime for 2020. As such, this report finds that these seven Federal agencies still have not met the basic cybersecurity standards necessary to protect America’s sensitive data.
* * * * * * * * * * *
The current state of cyber espionage. In the past two years, state-sponsored hackers have perpetrated some of the largest and most damaging cyber-attacks in our history. In December
2020, we learned that the Russian Foreign Intelligence Service used a sophisticated supply chain vulnerability to corrupt a security patch for SolarWinds network management software. This allowed hackers to infiltrate nine Federal agencies, including DHS, State, Energy, and Treasury. Russia’s cyber-spies remained undetected in those Federal agencies’ systems for at least nine months. The Federal Government only became aware of the attack after it was discovered by a private cybersecurity firm, FireEye, which was also breached. The Federal Government is still working to understand exactly what information and data Russia accessed during those nine months..."
Federal Cybersecurity
Thursday, July 29, 2021
National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems
"Protection of our Nation’s critical infrastructure is a responsibility of the government at the Federal, State, local, Tribal, and territorial levels and of the owners and operators of that infrastructure. The cybersecurity threats posed to the systems that control and operate the critical infrastructure on which we all depend are among the most significant and growing issues confronting our Nation. The degradation, destruction, or malfunction of systems that control this infrastructure could cause significant harm to the national and economic security of the United States.
Section 1. Policy. It is the policy of my Administration to safeguard the critical infrastructure of the Nation, with a particular focus on the cybersecurity and resilience of systems supporting National Critical Functions, defined as the functions of Government and the private sector so vital to the United States that their disruption, corruption, or dysfunction would have a debilitating effect on national security, economic security, public health or safety, or any combination thereof.
Sec. 2. Industrial Control Systems Cybersecurity Initiative. Accordingly, I have established an Industrial Control Systems Cybersecurity Initiative (Initiative), a voluntary, collaborative effort between the Federal Government and the critical infrastructure community to significantly improve the cybersecurity of these critical systems. The primary objective of this Initiative is to defend the United States’ critical infrastructure by encouraging and facilitating deployment of technologies and systems that provide threat visibility, indications, detection, and warnings, and that facilitate response capabilities for cybersecurity in essential control system and operational technology networks. The goal of the Initiative is to greatly expand deployment of these technologies across priority critical infrastructure..."
Cybersecurity and infrastructure
Friday, May 14, 2021
Executive Order on Improving the Nation’s Cybersecurity
"By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:
Section 1. Policy. The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy. The Federal Government must improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors. The Federal Government must also carefully examine what occurred during any major cyber incident and apply lessons learned. But cybersecurity requires more than government action. Protecting our Nation from malicious cyber actors requires the Federal Government to partner with the private sector. The private sector must adapt to the continuously changing threat environment, ensure its products are built and operate securely, and partner with the Federal Government to foster a more secure cyberspace. In the end, the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced.
Incremental improvements will not give us the security we need; instead, the Federal Government needs to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life. The Federal Government must bring to bear the full scope of its authorities and resources to protect and secure its computer systems, whether they are cloud-based, on-premises, or hybrid. The scope of protection and security must include systems that process data (information technology (IT)) and those that run the vital machinery that ensures our safety (operational technology (OT)).
It is the policy of my Administration that the prevention, detection, assessment, and remediation of cyber incidents is a top priority and essential to national and economic security. The Federal Government must lead by example. All Federal Information Systems should meet or exceed the standards and requirements for cybersecurity set forth in and issued pursuant to this order..."
Nation's Cybersecurity
Friday, December 18, 2020
SolarWinds Attack—No Easy Fix
"On December 13, 2020, the cybersecurity firm FireEye published research that a malicious actor was
exploiting a supply chain vulnerability in SolarWinds products to hack into government and private sector
information technology (IT) networks. SolarWinds confirmed the security incident. The Cybersecurity
and Infrastructure Security Agency (CISA) issued an emergency directive requiring federal agencies to
remove certain SolarWinds products from agency networks.
Media initially reported that the U.S. Treasury and Commerce departments were susceptible to this attack;
subsequent reports added additional agencies. The list of compromised agencies and companies is
expected to expand.
As private sector and government researchers continue investigating this incident, the cybersecurity
community expects to learn more about the attack, the adversary, their targets, compromised data and
systems, and ways to recover from the incident. This Insight provides an overview of the incident, federal
response, and policy considerations.
The Attack
SolarWinds (Austin, TX) makes IT management products for business customers. These products allow
chief information officers (CIOs) to automate certain activities such as managing internet protocol (IP)
addresses, monitoring devices, and deploying updates.
A critical element to any software application or platform is the mechanism by which the vendor pushes
updates and patches to users. SolarWinds built functions into their products which push update files to
users (as is common practice).
A malicious actor discovered a way to compromise SolarWinds’ software update service for the Orion IT
management platform (a SolarWinds suite of products). The actor was able to compromise the update
channel used by Orion to distribute malware. When run, the code executed the Sunburst malware in the
SolarWinds IT management platform. Once executed, Sunburst would go dormant for a period of time (to
avoid detection) before fetching additional instructions from its command-and-control (C2) server. The
additional instructions allowed the actors to exfiltrate files, execute new commands, profile the system,
and manipulate the machine. The actors sought to hide their presence by manipulating files and disguising
their activity as normal network traffic. SolarWinds stated that of their 300,000-plus customers, roughly
18,000 are susceptible to this attack. Known vulnerable versions of the platform were released in spring
2020 and were still vulnerable through mid-December 2020.."
Solar Winds Attack
Wednesday, October 30, 2019
Social Media Cybersecurity
- 3.48 billion people worldwide now use social media worldwide. That’s an increase of 9% from 2018. Put another way: 45% of the total world population are using social networks.1
- Digital consumers spend nearly 2.5 hours on social networks and social messaging every day.2
- 69% of U.S. adults use at least one social media site3 and the average American has 7.1 social media accounts.4
Social media cybersecurity
Friday, October 11, 2019
Cybersecurity While Traveling
- If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software.
- Back up your information. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory settings.
- Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
- Keep it locked. Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords.
- Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring..."
Cybersecurity
Tuesday, July 24, 2018
Cybersecurity: Data, Statistics, and Glossaries
Cybersecurity
Saturday, November 25, 2017
Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources
Much is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources:
Table 1—cybercrime, data breaches and security, including hacking, real-time attack maps, and statistics (such as economic estimates)
Table 2—national security, cyber espionage, and cyberwar, including Stuxnet,
Table 3—cloud computing, the Internet of Things (IoT), and FedRAMP..."
Cybercrime and national security
Thursday, September 14, 2017
Justice Department’s Role in Cyber Incident Response
"Criminals and other malicious actors increasingly rely on the Internet and rapidly evolving technology to further their operations. In cyberspace, criminals can compromise financial assets, hacktivists can flood websites with traffic—effectively shutting them down, and spies can steal intellectual property and government secrets. When such cyber incidents occur, a number of questions arise, including how the federal government will react and which agencies will respond.
The Obama Administration, through Presidential Policy Directive/PPD-41, outlined how the government responds to significant cyber incidents. Responding to cyber incidents involves (1) threat response, (2) asset response, and (3) intelligence support. The Department of Justice (DOJ), through the Federal Bureau of Investigation (FBI, or the bureau) and National Cyber Investigative Joint Task Force (NCIJTF), is the designated lead on threat response, which involves investigating and attributing specific cyber activities to particular individuals or entities as well as facilitating intelligence and information sharing..."
Justice Dept. and cybersecurity
Thursday, May 18, 2017
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
Despite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:
codifying the role of the National Institute of Standards and Technology (NIST) in developing a “voluntary, industry-led set of standards” to reduce cyber risk;
codifying the Department of Homeland Security’s (DHS’s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;
updating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to “eliminate ... inefficient and wasteful reports”; and
requiring DHS to develop a “comprehensive workforce strategy” within a year and giving DHS new authorities for cybersecurity hiring..."
Cybersecurity
Thursday, April 27, 2017
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources
Presidential Decision Directive 63, or PDD-63, identified activities whose critical infrastructures should be protected: information and communications; banking and finance; water supply; aviation, highways, mass transit, pipelines, rail, and waterborne commerce; emergency and law enforcement services; emergency, fire, and continuity of government services; public health services; electric power, oil and gas production; and storage. In addition, the PDD identified four activities in which the federal government controls the critical infrastructure: (1) internal security and federal law enforcement; (2) foreign intelligence; (3) foreign affairs; and (4) national defense..."
Cybersecurity
Thursday, October 27, 2016
Protecting Personal Information: A Guide for Business
Data breach
Thursday, October 6, 2016
Encryption: Frequently Asked Questions
Encryption
Friday, April 8, 2016
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
Despite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, in the last days of the 113th Congress, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:
codifying the role of the National Institute of Standards and Technology (NIST) in developing a “voluntary, industry-led set of standards” to reduce cyber risk;
codifying the Department of Homeland Security’s (DHS’s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;
updating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to “eliminate ... inefficient and wasteful reports”;
and requiring DHS to develop a “comprehensive workforce strategy” within a year and giving DHS new authorities for cybersecurity hiring..."
Cybersecurity
Thursday, March 24, 2016
Iranians Charged with Hacking U.S. Financial Sector
Iranian Hacking
Friday, March 11, 2016
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources
Presidential Decision Directive 63, or PDD-63, identified activities whose critical infrastructures should be protected: information and communications; banking and finance; water supply; aviation, highways, mass transit, pipelines, rail, and waterborne commerce; emergency and law enforcement services; emergency, fire, and continuity of government services; public health services; electric power, oil and gas production; and storage. In addition, the PDD identified four activities in which the federal government controls the critical infrastructure: (1) internal security and federal law enforcement; (2) foreign intelligence; (3) foreign affairs; and (4) national defense..."
Cybersecurity
Thursday, March 10, 2016
FDIC Highlights New Resources for Bank Customers on Precautions When Using Computers and the Internet Cybersecurity publications announced as part of National Consumer Protection Week
Cybersecurity
Wednesday, February 10, 2016
Commission on Enhancing National Cybersecurity
Cybersecurity
Tuesday, February 9, 2016
Strengthening Our Nation's Cybersecurity
Cybersecurity