TechRepublic: Groups vie for superiority in security standards competition

TechRepublic:
Groups vie for superiority in security standards competition

Oct 8, 2001

Judith N. Mottl

  • The National Information Assurance Partnership (NIAP)
    The NIAP was created in 1997 to join the efforts of the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) to meet the security testing, evaluation, and assessment needs of both IT producers and consumers. Its long-term goal is to boost consumer confidence in their information systems and networks. Agencies such as the Federal Aviation Administration are starting to work with NIAP to better define their security requirements, and NIAP is looking for other target communities where the organization can serve as a catalyst to spur security requirements and standardization of rules.
  • Generally Accepted System Security Principles (GASSP)
    The GASSP effort began in mid-1992 in response to a 1990 recommendation from the National Research Council. The effort is sponsored by the International Information Systems Security Certification Consortium ((ISC)2), an international common criteria effort to develop IT product-related information security principles. Its objectives include promoting good practices and providing an authoritative point of reference for IT professionals and a legal reference for the rest of the world for information security principles, practices, and opinions. The GASSP Pervasive Principles have been developed, and work has begun on defining and mapping the GASSP Broad Functional Principles.
  • The Center for Internet Security
    The Center, founded in October 2000, is focused on helping organizations worldwide efficiently manage information-security risk. The group, which is vendor neutral, provides tools to measure, monitor, improve, and compare the security status of Internet-connected appliances and systems. Nearly 200 members help identify the top security threats and participate in creating practical methods to reduce those threats.
  • British Standard (BS) 7799
    This enterprise security policy standard is popular in several European countries. BS 7799 has two main parts: a code of practice for information security management and a specification for information security management systems. It prescribes a specific process to determine what policies should be in place, how to document them, and how to develop those that are not specifically identified in the model. It hasn’t been widely adopted within the U.S. IT community, as the International Organization for Standardization (ISO) community considers it incomplete and too restrictive. The ISO, established in 1947, is a non-government, worldwide federation of national standards bodies from some 140 countries.
  • Commonly Accepted Security Practices & Recommendations (CASPR)
    The CASPR project, launched in August 2001, focuses on distilling expert information through a series of free papers available via the Internet. With the open source movement as a guide, CASPR has nearly 100 certified security professionals involved and is actively recruiting subject matter experts in all areas of information security.

Dave Winer on Java strategy, Microsoft .NET strategy

Buyers guide: Network-based intrusion-detection systems

Network World Fusion:
Buyers guide: Network-based intrusion-detection systems. IDG Oct 8 2001 3:38AM ET [via Computer security news]

Web Services: It’s So Crazy, It Just Might Not Work

Clay Shirky: Web Services: It’s So Crazy, It Just Might Not Work

That high-pitched sound you hear is the Web Services hype machine revving up, as words like “revolution’ and “paradigm” begin making their regularly scheduled appearance in the press and white papers, where we are promised a Shiny New World of on-the-fly software creation.

The hype is happening just as practical applications for XML-structured data beginning to appear. Web Services can reduce the effort and quicken the process of creating standards between developers or businesses which want to work together, an important if somewhat modest improvement in the Internet’s plumbing.

Unfortunately, though, Web Services are being sold not only as improved plumbing but also as a way to create fantastic new software, seamlessly and automatically connecting any two business processes or applications anywhere on the network as if by magic.

[Scripting News]

iDisk security issues discussed

BEA under attack from IBM

BEA under attack from IBM. What firepower has it got? [The Register]

SANS/FBI: Twenty Most Critical Internet Security Vulnerabilities

Carnivore substitute keeps Feds honest

Carnivore substitute keeps Feds honest. NetWitness, a commercial alternative to Carnivore. [The Register]

Brief: Security firm issues warning about fake Nimda fix

Spherical Mobile Military Robot

Spherical Mobile Military Robot. The NY Times has an article
on a new military robot proposed by Ranjan Mukherjee of
Michigan State University. Mukherjee has just received a patent for a
spherical mobile robot design that he has been researching for several
years. When in motion, the robot is a
featureless metal ball. When it comes to rest, it stablizes itself on
three legs and extends sensor and weapon arrays. [robots.net]