TITLE

Efficacy of Einstein program in question

PUB. DATE
April 2008
SOURCE
InTech;Apr2008, Vol. 55 Issue 4, p10
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports on the hearing on the Einstein program for cyber security, an initiative signed by U.S. President George W. Bush in February 2008. The Einstein program is a detection system that automatically monitors and analyzes Internet traffic into and out of federal computer networks in real time and it allows officials at the Department of Homeland Security to scan anomalies. During the hearing, officials linked the Einstein program with the Trusted Internet Connections initiative of the Office of Management and Budget. According to Ken Silva, formerly a senior official with the National Security Agency, the lack of clear lines of authority delayed the policy process on launching the program.
ACCESSION #
31935410

 

Related Articles

  • DHS Issues RFI For Block 3 of Einstein Cyber Intrusion Detection System.  // Defense Daily;7/17/2009, Vol. 243 Issue 12, p6 

    The article reports on the move of the U.S. Department of Homeland Security (DHS) in releasing a Request for Information (RFI) from computer software industry for a cyber intrusion prevention service, which will be integrated into DHS' National Cybersecurity and Protection System or Einstein in...

  • Lamp software found to have fewest bugs. Savvas, Antony // Computer Weekly;3/14/2006, p30 

    The article cites a study which states that Lamp stack of open source software applications contains fewer bugs than other open source software tools. Research conducted on behalf of the U.S. Department of Homeland Security by code analysis specialist Coverity Inc. has helped establish a new...

  • Reader mail. Forslund, Dave; Hoffman, Dean // eWeek;9/26/2005, Vol. 22 Issue 38, p43 

    Presents letters to the editor referencing articles and topics discussed in previous issues of the journal "eWeek." Comment on the role of the U.S. Department of Homeland Security and its Federal Emergency Management Agency division during Hurricane Katrina. Discussion of issues related to...

  • Where Are We Today? VERTON, DAN // HS Today;Sep2013, Vol. 10 Issue 7, p40 

    The article looks into the performance review of the U.S. Department of Homeland Security (DHS). Topics include the need for the consolidation of jurisdictions for homeland security oversight by Congress, the large number of vacant top positions in DHS, and the role of the agency in the issue of...

  • Cyber Security Industry Day Planned by DHS.  // TR2: Terror Response Technology Report;11/10/2010, Vol. 6 Issue 23, p12 

    The article offers information on the U.S. Department of Homeland Security's (DHS) Cyber Security Industry Day to be held on November 17, 2010 at a hotel in Washington, D.C.

  • DHS Making Strides In Information Security, IG Finds.  // Defense Daily;10/9/2008, Vol. 240 Issue 7, p5 

    The article discusses the result of the Department of Homeland Security (DHS) Inspector General's annual report, which states that DHS is making developments regarding their compliance on federal security regulations for information security in the U.S. It cites four areas wherein progress is...

  • DHS revamp on tap. Carlson, Caron // eWeek;5/26/2003, Vol. 20 Issue 21, p33 

    After months of criticism from the information technology industry that the U.S. administration is devoting insufficient resources and attention to cyber-security, the Department of Homeland Security is already restructuring to give network safety a higher profile. Federal research officials...

  • DHS Seeks More Standardization for its Computer Systems through FirstSource II.  // TR2: Terror Response Technology Report;10/26/2011, Vol. 7 Issue 22, p3 

    The article discusses plans by the U.S. Department of Homeland Security (DHS) to acquire more standardized computers and related equipment as part of a follow-on procurement to its FirstSource program. It cites the FirstSource 2 as an acquisition strategy document that will incorporate salient...

  • WildCAT Prowls for Wireless Predators. Seffers, George I. // Signal;Aug2012, Vol. 66 Issue 12, p25 

    The article reports that the U.S. Department of Homeland Security (DHS) has developed a technology for finding unauthorized wireless devices on critical infrastructure networks. DHS reveals that the cyber access tracking technology termed WildCAT combines physical security forces and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics