U.S. Calls for Global Cybersecurity Strategy

SHARE:




WASHINGTON — The Obama administration on Monday proposed creating international computer security standards with penalties for countries and organizations that fell short.
While administration officials did not single out any countries in announcing the strategy, several officials said privately that the hope was that the initiative would prod China and Russia into allowing more Internet freedom, cracking down on intellectual property theft and enacting stricter laws to protect computer users’ privacy.


“The effort to build trust in the cyberspace realm is one which should be pushed in capitals around the world,” said Commerce Secretary Gary Locke, who will soon be taking over as President Obama’s ambassador to China.


The strategy calls for officials from the State Department, the Pentagon, the Justice Department, the Commerce Department and the Department of Homeland Security to work with their counterparts around the world to come up with standards aimed at preventing theft of private information and ensuring Internet freedom. A fact sheet released by the White House also promised that the United States would respond to attempted hacking “as we would to any other threat to our country.”


Attorney General Eric H. Holder Jr. called it a “historic strategy,” adding that “the 21st-century threats that we now face to both our national and international security really have no borders.”


Last week the administration released the domestic component of its new computer security strategy, increasing and clarifying the penalties for computer crimes, and giving the domestic security agency a clear mandate for the protection of the government’s own networks. That effort was intended to reverse a growing perception that penalties for attacks on government, corporate and personal computers had been relatively small.


In addition to giving the Homeland Security Department new authority over federal computer systems, the legislation calls for the agency to work with energy companies, water suppliers and financial institutions to rank the most serious threats and find ways to counter them. The law would also require each business to have an independent commercial auditor assess its plans and, in the case of financial firms, report those plans to the Security and Exchange Commission.

COMMENTS

Name

4G,1,A/B Testing,2,Aerospace Engineering,2,AFP Consortium,1,Agile,2,AI,5,amazon,4,Amazon india coupons,3,AMD,1,Analytics,2,android,28,android phones,2,Anonymous,3,Antivirus,1,app,24,App Development,6,apple,32,apps,5,Artificial Intelligence,8,Assurance,1,asus,1,Audi,2,auto,7,automation,2,automation software,11,automotive technology,11,banking,1,Big data,2,bitcoin,3,BlackBerry,5,blockchain,4,blogging,1,BMW,1,branding,1,brands,2,browser,2,Business,18,Business Analytics,2,Business Intelligence,1,Business lesson,18,Business models,6,business strategy,24,Business Strategy Model,16,Business Success Story,7,business techniques,24,cameraphone,5,car,15,car technology,11,CES,1,chromebook,3,Cloud computing,6,cloud Technology,5,CMS,1,coding,1,companies,3,Consortium,1,consulting,1,content marketing,9,corporate,1,coupons,3,CRM,2,CRM Software,3,cryptocurrency,2,Customer experience,8,Customer Service,7,customer support,4,cyber crime,5,cyber security,27,data,3,data recovery,1,deals,1,Dell Streak,1,development,9,devices,2,DevOps,1,digital currency,1,digital marketing,23,Digital Transformation,2,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,8,Electric Cars,11,electronics sale,2,elon musk,2,email,1,energy,1,enterprise,11,Enterprise Security,2,enterprise technology,9,entrepreneur,3,entrepreneurship,7,ERP,2,facebook,24,file conversion,1,financial tech,1,fintech,1,firefox,2,firefox os,2,Flipkart,2,Front-end Development,3,future business,10,future technology,34,gadget,33,gamail,1,games,6,Games.,1,google,20,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,Green energy,1,hackers,18,hacking,14,hardware,5,Healthcare,1,HealthTech,1,Home Automation,1,Hosting,3,How To Guides,22,How Tos,17,icloud,3,IDE,1,Infographic,2,Information Technology,19,infosec,14,innovation,52,internet,8,Internet Explorer,1,Internet of Things,8,Inventory Management,1,ios,18,IoT,10,ipad,8,iPhone,14,iPhone 8,1,IT certification,1,IT Operation,1,IT Service,2,IT services management,3,ITSM,2,iWatch,1,Jabong,1,JavaScript,4,JS,1,Kubernetes,1,laptop,3,LinkedIn,2,local business,1,Lotus Notes,3,MacBook,3,mackbook air,2,Magento,1,Managed IT Services,3,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,6,mobile app development,28,mobile apps,30,mobile broadband,1,mobile enterprise,15,mobile recharge,2,mobility,18,mobility management,11,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,Omnichannel,1,OnePlus Smartphones,1,online course,1,online education,2,online recharge,1,online shopping,4,open source,1,opreating system,5,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,4,Procure,1,programming,4,programming language,5,Python,1,Quality,2,Redbus,1,remote control,1,renewable energy,3,review,10,SAAS,4,sales,2,Sales Funnel,2,samsung,7,scrum,1,search engine,4,Search Engine Optimization,2,security,15,Self Driving Cars,11,SEO,9,smartphone,14,SmartTech,1,SME,1,sms,1,Snapdeal,2,social media,12,social network,11,software,14,Software as a service (SaaS),5,software development,17,software methodology,8,Software Outsourcing,2,software review,4,Solar,1,Solar energy,1,Solar power,1,startup,10,steve jobs,3,storage,1,strategy,1,Supercars,1,sustainability,1,Swift,1,tablet,9,team management,3,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,The Internet Of Things,2,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,2,video editor,2,virtual phone,1,Virtual Reality,4,Volvo,2,VPN,3,VR,2,Wearable gadget,2,Wearable Tech,2,Web 4.0,3,Web Development,9,web technology,12,Wi-Fi,1,wikileaks,2,windows,7,windows 10,1,Windows 8,8,Windows 8 Preview,1,Wordpress,3,workplace,2,X Mountain Lion,2,xcode,1,xp,1,
ltr
item
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos: U.S. Calls for Global Cybersecurity Strategy
U.S. Calls for Global Cybersecurity Strategy
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl8_Guif8e7Jmh94iKON1mxopjJmah_A01tJM4oMXUaWFLesCnabGKBfQ8ryDxnt01QHzfNP2fOaVY9DPZzEY_TF_U6YDcs9UYykDoWjROS9KChwPt5DJo4R12oylMYRFeTUxX-fvyxpU/s1600/Cyber-Security-bill.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl8_Guif8e7Jmh94iKON1mxopjJmah_A01tJM4oMXUaWFLesCnabGKBfQ8ryDxnt01QHzfNP2fOaVY9DPZzEY_TF_U6YDcs9UYykDoWjROS9KChwPt5DJo4R12oylMYRFeTUxX-fvyxpU/s72-c/Cyber-Security-bill.jpg
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos
https://www.techfond.in/2011/05/us-calls-for-global-cybersecurity.html
https://www.techfond.in/
https://www.techfond.in/
https://www.techfond.in/2011/05/us-calls-for-global-cybersecurity.html
true
6925568668654321940
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy