ad info

 
CNN.com  technology > computing
    Editions | myCNN | Video | Audio | Headline News Brief | Feedback  

 

  Search
 
 

 
TECHNOLOGY
TOP STORIES

Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

(MORE)

TOP STORIES

More than 11,000 killed in India quake

Mideast negotiators want to continue talks after Israeli elections

(MORE)

MARKETS
4:30pm ET, 4/16
144.70
8257.60
3.71
1394.72
10.90
879.91
 


WORLD

U.S.

POLITICS

LAW

ENTERTAINMENT

HEALTH

TRAVEL

FOOD

ARTS & STYLE



(MORE HEADLINES)
*
 
CNN Websites
Networks image


Global panel issues Internet security recommendations

IDG.net

May 18, 2000
Web posted at: 11:02 a.m. EDT (1502 GMT)

(IDG) -- Governments and companies must take an international approach to contending with cyber crimes, the Global Internet Project (GIP) advised in a set of recommendations released Wednesday at the G8 conference in Paris.

GIP has issued 13 recommendations for businesses and organizations to follow and nine measures for governments to consider.

  ALSO
 

The G8 conference, which ended Wednesday, was called to promote dialogue between public authorities and the private sector on security on the Net. It was organized by the G8 group of nations (the seven most industrialized nations, plus Russia) and co-chaired by France and Japan. The other attending nations are Canada, Germany, Italy, the U.K. and the U.S.

Government regulations are not, however, the answer, according to the GIP, a group of senior Internet executives that promotes industry actions aimed at curbing the need for regulation. The recommendations were outlined in a press conference with Vint Cerf, senior vice president for Internet Architecture and Technology at WorldCom and a GIP member.

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Make your PC work harder with these tips
  Download free PC software fast
  TechInformer: The Thinking Internaut's Guide to the Tech Industry
  IDG.net's products pages
  Reviews & in-depth info at IDG.net
  E-BusinessWorld
  IDG.net's Windows software page
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletters
  Search IDG.net in 12 languages
  News Radio
  * Fusion audio primers
  * Computerworld Minute

"You simply can't keep up with the technology," Cerf said of Internet regulation, "so the laws won't apply."

At issue in particular are upcoming Internet advances, including video over the Net and wireless Net-based communications. Issues related to those should be thought of now, and measures should be taken to ensure safety of users and security, GIP officials said at the press conference.

With regard to industry, companies must do whatever they can to smooth security, in the view of GIP members, and some pointed comments were made regarding what members believe Microsoft should be doing to make its software less prone to attack by viruses and worms such as the recent "ILOVEYOU" threat.

Still, there was also acknowledgment that hackers reach new levels of sophistication with each new virus that is written, creating, in Cerf's words, a "cottage industry" of cyber criminals. Prevention alone won't work, so audit trails and other measures are needed on top of the preventative approach.

This is what GIP has recommended that businesses and organizations do:

  • Identify and disseminate information about computer systems security holes, with CERT and the U.S. Federal Bureau of Investigation (FBI) National Infrastructure Protection Center serving as clearing houses. CERT is the Computer Emergency Response Team (CERT) Coordination Center at Carnegie Mellon University, in Pittsburgh.


  • Perform security audits and decide how to protect systems from external and internal threats. As Cerf noted, many attacks come from users with authorized access who bear a grudge.


  • Cooperate with law enforcement and other agencies to detect and alleviate attacks.


  • Improve physical security of critical systems, especially domain name and root servers.


  • Guarantee security tools being shipped and used are installed as they should be, and encourage administrators and users to be trained in how to use tools.


  • Make sure that workers know that security is part of their normal duties. Focus on protecting infrastructure from internal and external attacks.


  • Establish policies that require regular updates of antivirus software, and require workers to use password protection systems. Vendors, suppliers and professional associates should be encouraged to use security technology.


  • Provide advice to governments on how to protect their computer systems and track down and arrest hackers.


  • Invest in research on how to reduce Internet security vulnerability and computers that are part of the Internet.


  • Take all needed steps to secure networks, such as filtering incorrect routing information and spam and denying unauthorized access. Security alerts should be distributed, and customers should be educated about how to secure networks and offer security services.


  • Support outreach programs that will convey a code of cyber ethics to youngsters.


  • Encourage deployment of IPsec and IPv6 protocol standards.


  • Encourage and develop better authentication systems, including PKI (public key infrastructure) and CA (certificate authority) schemes.

The GIP also issued these recommendations for governments:

  • Lead by example through making certain government computer systems and networks are secure and that the best information security measures are used.


  • Arrest and prosecute computer criminals.


  • Encourage information sharing.


  • Promote open standards.


  • Remove remaining controls on civilian encryption technologies.


  • Provide better threat assessment.


  • Support research on Internet security.


  • Fund education and training of information security experts.


  • Encourage and support private-sector efforts to teach youngsters how to behave ethically in cyberspace.



RELATED STORIES:
Security firm warns of Red Hat Piranha 'back door'
April 27, 2000
Keyware to launch biometric authentication tools
April 18, 2000
China seen as a growing source of spam
April 6, 2000
Frisking computers at the door
April 6, 2000
Survey finds encryption rules loosening worldwide
April 5, 2000

RELATED IDG.net STORIES:
G8 agree to cooperate on cybercrime
(IDG.net)
France makes first move at G8 Net summit
(IDG.net)
Rich nations to team up against cyber-crime
(The Industry Standard)
Security experts say hackers have the edge
(IDG.net)
Interpol: Looking for help to fight cybercrime
(PCWorld.com)
Washington coalition attacks Internet crime
(Civic.com)
Global village needs to lay down the law
(Computerworld Australia)

RELATED SITES:
Global Internet Project (GIP)
Computer Emergency Response Team (CERT)
FBI National Infrastructure Protection Center

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

 Search   

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.