The following text is copyright 2004 by Network World, permission is hearby given for reproduction, as long as attribution is given and this notice is included.

 

If it had teeth it might bite someone

 

The National Cyber Security Partnership just released the first two of a planned five reports concerning various aspects of cyber security.  The reports are not all that bad but I'm having a hard time not dismissing the whole effort as a cynical effort to avoid facing up to reality.

 

The National Cyber Security Partnership (NCSP) (http://www.cyberpartnership.org/) is an outgrowth of the December 2003 National Cyber Security Summit that was convened in response to last year's National Strategy to Secure Cyberspace (http://www.whitehouse.gov/pcipb/).  All of the press coverage that I have seen about the two new reports says that NCSP was created to forestall governmental regulations in the area of computer and network security. It's better to voluntarily offer to do something not all that hard than to be forced to do something quite painful.  Maybe the powers that be will be satisfied, at least for a while, and forget about this particular problem.

 

The first two reports are "Awareness for Home Users and Small Businesses" from the "Awareness and Outreach Task Force, and "Cyber Security Early Warning" from the "National Early Warning Task Force." To be published late this month or early next month are reports from the "Technical Standards and Common Criteria Task Force," the "Security Across the Software Development Lifecycle Task Force" and the "Corporate Governance Task Force."

 

The "Awareness for Home Users and Small Businesses" (http://www.cyberpartnership.org/init-aware.html) report recommends a bunch of things targeted at educating and helping home Internet users, big and small businesses, schools and governments (other than the federal government) by, for example, developing a "cyber security toolkit" for home users, and designating September 2004 as "Cyber Security Month" to try to get the attention of the CEOs of large enterprises on the cyber security problem (assuming, I guess, that these CEOs have been in caves for the last few years).

 

The "National Early Warning Task Force" (http://www.cyberpartnership.org/init-early.html) reports recommends establishing yet another fail-safe "national cyber security early warning contact network" to "broaden the horizon of shared information regarding cyber security vulnerabilities, exploits and incidents, to facilitate the process of information sharing and to provide a facility for the rapid dissemination of critical information, all within the framework of a vetted  trust community."  In other words, tell some selected people when there is something wrong.

 

In and of themselves these reports are fine and seem to represent some amount of thinking on the problems.  The reports may accomplish the apparent underlying goal of the NCSP and keep congress from creating a legal requirement for vendors to pay attention to security (one of the critics of the reports compared such a requirement to the federal mandate for seat belts in cars).  Voluntary efforts are fine and often can bring positive results but there is little that would focus the corporate mind better than being told that they would be liable for any damages their customers suffer because of software failures. There is at least one place that could happen today.  If the software in a car's control computer goes wacko and the car crashes as a result I would doubt that a court would accept a shrink-wrap license liability disclaimer.  But apparently applying the same rules to computer operating systems would be too logical.

 

disclaimer: Come to think of it, I expect Harvard would not want the same rules to be applied to educating students, but I did not ask and the above ramble is mine alone.