U.S. Calls for Global Cybersecurity Strategy

SHARE:




WASHINGTON — The Obama administration on Monday proposed creating international computer security standards with penalties for countries and organizations that fell short.
While administration officials did not single out any countries in announcing the strategy, several officials said privately that the hope was that the initiative would prod China and Russia into allowing more Internet freedom, cracking down on intellectual property theft and enacting stricter laws to protect computer users’ privacy.


“The effort to build trust in the cyberspace realm is one which should be pushed in capitals around the world,” said Commerce Secretary Gary Locke, who will soon be taking over as President Obama’s ambassador to China.


The strategy calls for officials from the State Department, the Pentagon, the Justice Department, the Commerce Department and the Department of Homeland Security to work with their counterparts around the world to come up with standards aimed at preventing theft of private information and ensuring Internet freedom. A fact sheet released by the White House also promised that the United States would respond to attempted hacking “as we would to any other threat to our country.”


Attorney General Eric H. Holder Jr. called it a “historic strategy,” adding that “the 21st-century threats that we now face to both our national and international security really have no borders.”


Last week the administration released the domestic component of its new computer security strategy, increasing and clarifying the penalties for computer crimes, and giving the domestic security agency a clear mandate for the protection of the government’s own networks. That effort was intended to reverse a growing perception that penalties for attacks on government, corporate and personal computers had been relatively small.


In addition to giving the Homeland Security Department new authority over federal computer systems, the legislation calls for the agency to work with energy companies, water suppliers and financial institutions to rank the most serious threats and find ways to counter them. The law would also require each business to have an independent commercial auditor assess its plans and, in the case of financial firms, report those plans to the Security and Exchange Commission.

COMMENTS

Name

4G,1,Aerospace Engineering,2,AFP Consortium,1,amazon,2,Amazon india coupons,2,AMD,1,android,13,Anonymous,3,Antivirus,1,app,10,apple,23,apps,4,Assurance,1,Audi,2,auto,5,automation software,2,automotive technology,8,bitcoin,1,BlackBerry,5,blockchain,1,BMW,1,brands,1,browser,2,Business,1,cameraphone,3,car,11,car technology,7,CES,1,chromebook,3,Cloud computing,3,cloud Technology,1,companies,3,Consortium,1,content marketing,1,coupons,2,cyber crime,5,cyber security,21,data,3,data recovery,1,deals,1,Dell Streak,1,devices,2,digital currency,1,digital marketing,5,e commerce,1,eBay,1,ebook,1,ecommerce,3,Electric Cars,8,electronics sale,2,elon musk,2,email,1,entrepreneur,1,entrepreneurship,2,facebook,24,firefox,2,firefox os,2,Flipkart,1,future technology,18,gadget,31,gamail,1,games,6,google,18,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,hackers,14,hacking,7,hardware,3,Hosting,3,How To Guides,9,How Tos,6,icloud,2,Information Technology,11,infosec,9,innovation,34,internet,7,Internet Explorer,1,ios,5,ipad,8,iPhone,9,iWatch,1,Jabong,1,laptop,3,LinkedIn,2,Lotus Notes,3,MacBook,3,mackbook air,2,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,4,mobile app development,6,mobile apps,11,mobile broadband,1,mobile enterprise,8,mobile recharge,2,mobility,10,mobility management,5,Motorola Xoom,1,Myntra,1,network,3,nokia,1,NSA,2,Nvidia,1,Objective-C,1,online recharge,1,online shopping,2,opreating system,4,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,2,Procure,1,programming,1,programming language,2,Quality,1,Redbus,1,remote control,1,renewable energy,2,review,8,samsung,5,search engine,1,security,10,Self Driving Cars,10,SEO,2,smartphone,10,sms,1,Snapdeal,1,social media,5,social network,9,software,10,startup,2,steve jobs,3,Supercars,1,Swift,1,tablet,9,team management,1,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,tutorial,2,twitter,3,ultrabook,1,USB,1,video,1,video editor,1,Virtual Reality,1,Volvo,2,VPN,3,Wearable gadget,2,Wearable Tech,2,Web 4.0,1,web technology,2,Wi-Fi,1,wikileaks,2,windows,5,Windows 8,7,Windows 8 Preview,1,X Mountain Lion,2,xcode,1,
ltr
item
TechFond - Latest Technology News & Analysis | Innovation | Startups | Reviews: U.S. Calls for Global Cybersecurity Strategy
U.S. Calls for Global Cybersecurity Strategy
http://1.bp.blogspot.com/-lCh1HSOQKv0/TdKoPTSCMEI/AAAAAAAAAUw/BPYYLRqnncA/s1600/Cyber-Security-bill.jpg
http://1.bp.blogspot.com/-lCh1HSOQKv0/TdKoPTSCMEI/AAAAAAAAAUw/BPYYLRqnncA/s72-c/Cyber-Security-bill.jpg
TechFond - Latest Technology News & Analysis | Innovation | Startups | Reviews
http://www.techfond.in/2011/05/us-calls-for-global-cybersecurity.html
http://www.techfond.in/
http://www.techfond.in/
http://www.techfond.in/2011/05/us-calls-for-global-cybersecurity.html
true
6925568668654321940
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy