White House releases strategy to secure cyberspace

Washington, D.C.—Using input and advice from "tens of thousands" of experts and concerned citizens the White House recently released "The National Strategy to Secure Cyberspace."


Washington, D.C.— Using input and advice from "tens of thousands" of experts and concerned citizens the White House recently released " The National Strategy to Secure Cyberspace ."

This 76-page document is part of the Bush Administration's effort to protect public and private institutions in agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemicals and hazardous materials, and postal and shipping.

The document is an implementing component of the "National Strategy for Homeland Security" that is complemented by a "National Strategy for the Physical Protection of Critical Infrastructures and Key Assets." The purpose of the strategy document is to engage and empower Americans to secure the portions of cyberspace they own, operate, control, or with which they interact. The strategy states that securing cyberspace is a difficult strategic challenge that requires coordinated and focused effort from the nation's entire society, including the federal government, state and local governments, the private sector, and the American people.

The strategy's strategic objectives are:

  • Prevent cyber attacks against America's critical infrastructure;

  • Reduce national vulnerability to cyber attacks; and

  • Minimize damage and recovery time from cyber attacks that do occur.

The strategy further defines threats and vulnerabilities; the government's role in securing cybersecurity; the Department of Homeland Security's responsibilities, and:

  • A national cyberspace security response system;

  • A national cyberspace security threat and vulnerability reduction program;

  • A national cyberspace security awareness and training program;

  • Securing governments' cyberspace; and

  • National security and international cyberspace security cooperation.

For more information and to read the entire strategy, visit www.whitehouse.gov/pcipb/cyberspace_strategy.pdf .

Also, be sure to read Control Engineering's March 2003 cover story, which outlines the key steps necessary to secure control and automation systems, and was developed with input from and review by several recognized experts.

Control Engineering Daily News Desk
Dave Harrold, senior editor

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
Mobile HMI; PID tuning tips; Mechatronics; Intelligent project management; Cybersecurity in Russia; Engineering education; Road to IANA
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me