[2361] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, February 22, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Feb 22 13:41:51 2011
From: Monique Yeaton <myeaton@MIT.EDU>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@MIT.EDU>
Date: Tue, 22 Feb 2011 13:40:53 -0500
Message-ID: <C9896D65.1135F%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@MIT.EDU>
Content-Type: multipart/mixed; boundary="===============2011548662=="
Errors-To: ist-security-fyi-bounces@MIT.EDU
--===============2011548662==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_C9896D651135Fmyeatonexchangemitedu_"
--_000_C9896D651135Fmyeatonexchangemitedu_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. The MIT Network Security Roadmap
2. White House Increases Cybersecurity Budget
3. Tip of the Week: Using a Smartphone Securely
--------------------------------------------------
1. The MIT Network Security Roadmap
--------------------------------------------------
The Network Security Roadmap, a critical track of the Infrastructure Roadma=
p, was reviewed and approved by the IT Governance Committee last week. Impl=
ementation of the plan will improve the department of Information Services =
& Technology's (IS&T) ability to detect and remediate intrusive activity on=
the MIT network. Tim McGovern, Mike Halsall, and Mark Silis, members of IS=
&T's Operations and Infrastructure division, prepared and led the presentat=
ion, and were on hand to answer questions posed by the IT Governance Commit=
tee members during last week's meeting. The approved IT Roadmaps can be fou=
nd on the IT Governance Committee website: <http://web.mit.edu/itgc/roadmap=
s.html>.
-------------------------------------------------------------
2. White House Increases Cybersecurity Budget
-------------------------------------------------------------
In spite of budget cuts in many other places, the White House is proposing =
a big increase in cybersecurity research and development in next year's bud=
get. The goal is to improve, in part, the government's ability to reduce th=
e risk of insider threats and to ensure the safety of control systems such =
as those used at power plants. When all cybersecurity spending plans across=
the board are added together, cybersecurity research and development spend=
ing will increase 35% to $548 million next year, according to Phillip Coyle=
, associate director for national security.
Read the story in the news:
<http://www.computerworld.com/s/article/9209461/Obama_seeks_big_boost_in_cy=
bersecurity_spending>
---------------------------------------------------------------
3. Tip of the Week: Using a Smartphone Securely
---------------------------------------------------------------
Smartphones are one of the fastest growing risks in technology. They now ha=
ve the complexity, functionality, and processing power of a low-end compute=
r, yet they lack many of the security controls you would expect in such a d=
evice. This newsletter by SANS covers the top ten ways you can help protect=
and secure your smartphone, regardless of which vendor you use: <http://ww=
w.securingthehuman.org/newsletters/ouch/issues/OUCH-201102_en.pdf> (This li=
nk requires a PDF reader.)
At MIT, the Mobile Devices team of IS&T is preparing documentation for how =
to remotely wipe smart phones. The team will send out a notice to subscribe=
rs of the mobilepartners@mit.edu email list when the information becomes av=
ailable.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
To read all current and archived articles online, visit the Security-FYI Bl=
og at <http://securityfyi.wordpress.com/>
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
The IT Security Team moved on 2/11/11: Come see us in our new location at W=
92-236.
--_000_C9896D651135Fmyeatonexchangemitedu_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"ma=
rgin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height: 16.0px"><br>=
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. The MIT=
Network Security Roadmap</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. White H=
ouse Increases Cybersecurity Budget</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Tip of =
the Week: Using a Smartphone Securely</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. The MIT=
Network Security Roadmap</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
----------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The Networ=
k Security Roadmap, a critical track of the Infrastructure Roadmap, was rev=
iewed and approved by the IT Governance Committee last week. Implementation=
of the plan will improve the department of Information Services & Tech=
nology's (IS&T) ability to detect and remediate intrusive activity on t=
he MIT network. Tim McGovern, Mike Halsall, and Mark Silis, members of IS&a=
mp;T's Operations and Infrastructure division, prepared and led the present=
ation, and were on hand to answer questions posed by the IT Governance Comm=
ittee members during last week's meeting. The approved IT Roadmaps can be f=
ound on the IT Governance Committee website: <<a href=3D"http://web.mit.=
edu/itgc/roadmaps.html"><span style=3D"text-decoration: underline ; color: =
#1e37ee">http://web.mit.edu/itgc/roadmaps.html</span></a>>. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. White H=
ouse Increases Cybersecurity Budget</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In spite o=
f budget cuts in many other places, the White House is proposing a big incr=
ease in cybersecurity research and development in next year's budget. The g=
oal is to improve, in part, the government's ability to reduce the risk of =
insider threats and to ensure the safety of control systems such as those u=
sed at power plants. When all cybersecurity spending plans across the board=
are added together, cybersecurity research and development spending will i=
ncrease 35% to $548 million next year, according to Phillip Coyle, associat=
e director for national security.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read the s=
tory in the news: </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><http:/=
/www.computerworld.com/s/article/9209461/Obama_seeks_big_boost_in_cybersecu=
rity_spending></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Tip of =
the Week: Using a Smartphone Securely</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Smartphone=
s are one of the fastest growing risks in technology. They now have the com=
plexity, functionality, and processing power of a low-end computer, yet the=
y lack many of the security controls you would expect in such a device. Thi=
s newsletter by SANS covers the top ten ways you can help protect and secur=
e your smartphone, regardless of which vendor you use: <<span style=3D"t=
ext-decoration: underline ; color: #1e37ee">http://www.securingthehuman.org=
/newsletters/ouch/issues/OUCH-201102_en.pdf</span>> (This link requires =
a PDF reader.)</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">At MIT, th=
e Mobile Devices team of IS&T is preparing documentation for how to rem=
otely wipe smart phones. The team will send out a notice to subscribers of =
the mobilepartners@mit.edu email list when the information becomes availabl=
e.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">To read al=
l current and archived articles online, visit the Security-FYI Blog at <=
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"text-decoratio=
n: underline ; color: #3369b5">http://securityfyi.wordpress.com/</span></a>=
></p></div><div><div><br></div><div><br></div><div><font class=3D"Apple-=
style-span" color=3D"rgb(0, 0, 0)"><font class=3D"Apple-style-span" face=3D=
"Calibri"><span class=3D"Apple-style-span" style=3D"font-size: 14px;"><span=
class=3D"Apple-style-span" style=3D"font-size: 12px; font-family: Helvetic=
a; "><div style=3D"font-size: 12px; ">Monique Yeaton</div><div style=3D"fon=
t-size: 12px; ">IT Security Awareness Consultant</div><div style=3D"font-si=
ze: 12px; ">MIT Information Services & Technology (IS&T)</div><div =
style=3D"font-size: 12px; ">(617) 253-2715</div><div style=3D"font-size: 12=
px; "><a href=3D"http://ist.mit.edu/security">http://ist.mit.edu/security</=
a></div><div style=3D"font-size: 12px; "><br></div><div style=3D"font-size:=
12px; "><font class=3D"Apple-style-span" color=3D"#FC2218">The IT Security=
Team moved on 2/11/11: </font>Come see us in our new location at W92-236.&=
nbsp;</div></span></span></font></font></div></div></div></div></body></htm=
l>
--_000_C9896D651135Fmyeatonexchangemitedu_--
--===============2011548662==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============2011548662==--