Identify and disseminate information about computer systems security holes, with CERT and the U.S. Federal Bureau of Investigation (FBI) National Infrastructure Protection Center serving as clearing houses.
"This is first case where I've heard of someone leaking stuff to Anonymous to have a site defaced, instead of defacing it himself, " said Clifford Neuman, director of University of Southern California Center for Computer Systems Security.
Kevin Mitnicks crime was to thumb his nose at the costly computer security systems employed by large corporations.
The director of Nicaragua's National Police described him as an expert at violating computer security systems.
To comply, doctors and hospitals must make patients fill out countless forms and install elaborate computer security systems.
In it the White House's former counterterrorism chief, Richard Clarke, urged a wholesale reboot of government computer systems and new security rules for electric utilities and Internet access providers.
These products are used in telecommunications networks, computer-controlled systems, security systems, emergency lighting, electric utilities and switchgear, medical equipment, rail signaling, renewable energy, and military and aviation equipment.
Such classified computer systems are protected by multiple levels of security and are among the most "hardened" systems against digital attack.
Advanced systems to enforce computer security can help.
FORBES: Can You Keep a Secret? Protecting Your Business's Most Valuable Asset
The irony is that the legislation is based on fear, uncertainty, and doubt (FUD) versus facts, and it will do little to solve the security problems facing computer systems.
FORBES: URGENT: Businesses Must Act to Stop Congress on Cyber Legislation
Perfect Citizen will look at large, typically older computer control systems that were often designed without Internet connectivity or security in mind.
Lead by example through making certain government computer systems and networks are secure and that the best information security measures are used.
Courts often find banks aren't liable in cybercrime cases in which a business client's computer systems were breached, according to George Tubin, senior security strategist for Trusteer Inc.
In an era of interactive television cables, the growth of computer checking and check-out counters, of security systems and telephones, all lodged together in computers, it would be relatively easy at some point to give a profile of a person and tell what they buy in a store, what kind of food they like, what sort of television programs they watch.
FORBES: Court Case Spells Trouble for Frictionless Sharing of Videos on Facebook
In March, unknown intruders broke into the computer systems of database giant LexisNexis, gaining access to the Social Security numbers and personal data of hundreds of thousands of people.
Now that the new standard is ratified, Wi-Fi equipment makers, such as Cisco Systems , Netgear , Apple Computer and others will incorporate the new security features into new Wi-Fi products, and in some cases, may be able to update them with a simple firmware upgrade available from a Web site.
The greatest threat to global cyber security today, according to Internet Security Systems researcher Josh Corman, may be your mother's computer.
Nasdaq OMX reported a security breach that took place in October last year when computer hackers penetrated its systems and may have planted some malicious software to pilfer sensitive data.
FORBES: Intelligence Agencies Interested In Nasdaq Cyber Attack
Earlier this month, Iain Lobban, the head of GCHQ, told a cyber security conference in London that a "significant" attempt was made to target the computer systems of the Foreign Office and other government departments over the summer.
After months of investigation by the computer security firm Mandiant, experts are still unsure how the hackers initially infiltrated the Times's computer systems, the report said.
应用推荐