<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://obamawhitehouse.archives.gov/blog-daily-listings-rss/108921/posts" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>Blog Daily Listings RSS</title>
    <link>https://obamawhitehouse.archives.gov/blog-daily-listings-rss/108921/posts</link>
    <description></description>
    <language>en</language>
     <atom:link href="https://obamawhitehouse.archives.gov/feed/blog/author/108921/posts" rel="self" type="application/rss+xml" />
    <item>
  <title>Cybersecurity Awareness Month Part V</title>
  <link>https://obamawhitehouse.archives.gov/blog/2009/11/03/cybersecurity-awareness-month-part-v</link>
  <description><![CDATA[<p>With <a href="/blog/National-Cybersecurity-Awareness-Month/">National Cybersecurity Awareness Month</a> now finished, I would like to remind everyone that cybersecurity is not an issue that requires our attention only one month a year. Instead, we need to be thinking about cybersecurity every time we turn on a computer. Further, as the <a href="/blog/Cybersecurity-Awareness-Month-Part-II">threat of cyber attacks </a>continues to increase, the U.S. Government and the nation as a whole need to continue to develop and identify the young cybersecurity experts who will keep our computers and digital networks secure and resilient.</p>
<p>One of the ways the U.S. Government cultivates future cyber defenders is through competitions such as the <a href="/files/documents/cyber/The United States Cyber Challenge 1.1 (updated 5-8-09).pdf">U.S. Cyber Challenge</a>. This program, which is comprised of three separate cybersecurity challenges, has the goal of identifying 10,000 young Americans with the skills to fill the ranks of cybersecurity practitioners, researchers, and leaders. The program nurtures and develops their skills, gives them access to advanced education and exercises, and where appropriate, enables them to be recognized by colleges, companies, and government departments and agencies where their skills can be of the greatest value to the nation.</p>
<p>One of the amazing stories from this year&rsquo;s U.S. Cyber Challenge is Michael Coppola.&nbsp; Michael is a high school senior and is the leading point scorer through two rounds of the Netwars challenge. Despite not having much formal cybersecurity training, Michael is beating teams of adults and cybersecurity professionals, and, as you can see in the <a href="http://www.sans.org/netwars/talent/michael.php">interview excerpt</a> below, remains humble and grounded. Keep up the good work, Michael!</p>
<blockquote>
	<p><em>Q. So, Michael, what we&#39;d really like to hear about is what it was like to participate in the NetWars competition. But for starters, how did you even find out about it?</em></p>
	<p>A. In May, a news collective, Digg, pointed me to an article on Forbes.com that described the NetWars contest but didn&#39;t provide any information on how to actually participate. About a month later, a link to the contest surfaced on the 2600 news feed, and the rest is history</p>
	<p><em>Q. And just out of curiosity, you&#39;re in your senior year in high school - had you already taken computer science courses at school? </em></p>
	<p>A. Yes, I&#39;ve taken a few, but they don&#39;t offer computer security classes. I&#39;ve taken Graphic Design, Web Design and Animation, and Computer Networking and Repair. I enrolled to take Introduction to Programming this year, but they cancelled it, because they couldn&#39;t find a suitable teacher.</p>
	<p><em>Q. Did you ever wonder about what you might &quot;win&quot; or get out of it?</em></p>
	<p>A. The original flyer said something about &quot;cyber camps,&quot; but I didn&#39;t really know what that meant. I played just to play, and if I won anything from it, then all the better.</p>
	<p><em>Q. Were you surprised when you won? Did you know that the second highest score came from a TEAM of five (?) players working together?</em></p>
	<p>A. I was actually very surprised to be honest. I didn&#39;t expect to win, because I assumed that the people I was competing against would be in college with formal educations. Also, I had no idea the second place contestant was in fact a team of five until you asked me!</p>
</blockquote>
<p><em>John Brennan is Assistant to the President for Homeland Security and Counterterrorism</em></p>
]]></description>
   <pubDate>Tue, 03 Nov 2009 16:21:21 -0500</pubDate>
 <dc:creator>&lt;a href=&quot;/blog/author/john-brennan&quot;&gt;John Brennan&lt;/a&gt;</dc:creator>
 <guid isPermaLink="false">whr-226166</guid>
</item>
<item>
  <title>Cybersecurity Awareness Month Part IV</title>
  <link>https://obamawhitehouse.archives.gov/blog/2009/10/26/cybersecurity-awareness-month-part-iv</link>
  <description><![CDATA[<p>During <a href="/blog/National-Cybersecurity-Awareness-Month/">National Cybersecurity Awareness Month</a> I have discussed the types of <a href="/blog/Cybersecurity-Awareness-Month-Part-II/">cyber threats</a> that we face and some of the <a href="/blog/Cybersecurity-Awareness-Month-Part-III/">basic steps</a> that all computer users can take to better protect themselves. This week, I&rsquo;d like to address another important dimension of this shared responsibility &ndash; the role of America&rsquo;s small businesses.</p>
<p>As the President said in <a href="/blog/Protecting-yourself-online/">his remarks</a> for National Cybersecurity Awareness Month, the cyber threat has become one of the most serious economic and national security challenges we face as a nation. America&rsquo;s competitiveness and our economic prosperity in the 21st century will depend on effective cybersecurity. This is especially true for the millions of small businesses that form the backbone of our economy. For this reason, the <a href="http://www.itl.nist.gov/">National Institute of Standards and Technology</a> (NIST) at the Department of Commerce recently released a <a href="http://csrc.nist.gov/publications/nistir/ir7621/nistir-7621.pdf">guidebook</a>, <em>Small Business Information Security: The Fundamentals</em>, on cybersecurity fundamentals for small business owners. A video related to the guidebook is provided below.</p>
<p><object height="344" width="425"><param name="movie" value="http://www.youtube-nocookie.com/v/ajwX-7jVLo0&amp;color1=0x6699&amp;color2=0x54abd6&amp;hl=en&amp;feature=player_embedded&amp;fs=1" /><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always" /><embed allowfullscreen="true" allowscriptaccess="always" height="344" src="//www.youtube-nocookie.com/v/ajwX-7jVLo0&amp;color1=0x6699&amp;color2=0x54abd6&amp;hl=en&amp;feature=player_embedded&amp;fs=1" type="application/x-shockwave-flash" width="425"></embed></object></p>
<p>As the guidebook states, &ldquo;in the United States, the number of small businesses totals to over 95% of all businesses. The small business community produces around 50% of our nation&rsquo;s Gross National Product (GNP) and creates around 50% of all new jobs in our country. Small businesses, therefore, are a very important part of our nation&rsquo;s economy.&rdquo;</p>
<p>However, these small businesses often do not have sufficient resources to effectively secure their cyber infrastructure. Criminals recognize this, and small businesses are more and more often becoming targets of cyber crime. The NIST guidebook helps to mitigate these risks by providing small business owners with detailed (but easy-to-understand) instructions on how to improve their cybersecurity posture.</p>
<p>The guidebook is divided into three sections: absolutely necessary cybersecurity practices, highly recommended practices, and other planning considerations. It includes instructions on topics such as activating and installing firewalls, securing wireless access points, and conducting online banking more securely. I recommend all business owners read this guidebook. Home users may also find many of the cybersecurity instructions useful.</p>
<p>To learn more about cybersecurity tips please also visit <a href="http://www.onguardonline.gov/">www.onguardonline.gov</a> and <a href="http://www.dhs.gov/cyber">www.dhs.gov/cyber</a>.&nbsp;&nbsp;&nbsp;</p>
<p><em>John Brennan is Assistant to the President for Homeland Security and Counterterrorism</em></p>
<p>&nbsp;</p>
]]></description>
   <pubDate>Mon, 26 Oct 2009 18:59:01 -0400</pubDate>
 <dc:creator>&lt;a href=&quot;/blog/author/john-brennan&quot;&gt;John Brennan&lt;/a&gt;</dc:creator>
 <guid isPermaLink="false">whr-226171</guid>
</item>
<item>
  <title>Cybersecurity Awareness Month Part III</title>
  <link>https://obamawhitehouse.archives.gov/blog/Cybersecurity-Awareness-Month-Part-III</link>
  <description><![CDATA[<p>To help raise awareness among all Americans, the President has designated October as <a href="/blog/National-Cybersecurity-Awareness-Month/">National Cybersecurity Awareness Month</a>.&nbsp; Last week, I wrote about some of the <a href="/blog/Cybersecurity-Awareness-Month-Part-II/">specific threats</a> we face every time we use a computer.&nbsp;&nbsp; However, we are not helpless against these threats.&nbsp; In a <a href="/blog/Protecting-yourself-online/">video</a> released last week, President Obama identified some basic things that all computer users can do to improve their cybersecurity and better protect themselves online.&nbsp; In this post, I would like to expand further on these tips that computer users can adopt to improve their &quot;cyber hygiene.&quot;&nbsp;<br />
	<br />
	<strong>Keep your security software and operating system up-to-date.</strong>&nbsp; At a minimum, your computer should have current anti-virus and anti-spyware software and a firewall to protect yourself from hackers and malicious software that can steal sensitive personal information.&nbsp; Hackers also take advantage of Web browsers and operating system software that do not have the latest security updates. Operating system companies issue security patches for flaws that they find in their systems, so it is important to set your operating system and web browser software to download and install security patches automatically.<br />
	<br />
	<strong>Protect your personal information online.</strong>&nbsp; Millions of people become victims of identity theft each year.&nbsp; One way that cyber criminals convince computer users to divulge their confidential personal information is through <a href="http://www.onguardonline.gov/topics/phishing.aspx">fake &quot;phishing&quot; emails</a>, which are often cleverly disguised to look like authentic emails.&nbsp; Be wary of clicking on links in emails that are unfamiliar and be very cautious about providing personal information online, such as your password, financial information, or social security number.<br />
	<br />
	<strong>Know who you are dealing with.</strong>&nbsp; It is remarkably simple for online scammers to impersonate a legitimate business, so you need to know who you are dealing with.&nbsp; If you are thinking about shopping on an unfamiliar website, do some independent research before you buy.&nbsp; Similarly, before you download software, be sure that the software developer is trustworthy.&nbsp; Cyber criminals will often embed the capability to steal passwords and files into free software.&nbsp;<br />
	<br />
	<strong>Learn what to do if something goes wrong.</strong>&nbsp; If your computer gets hacked, the effects may be obvious (e.g., deleted or corrupted files), or they may be subtle (e.g., slow computing performance).&nbsp; As a first step, you should scan your computer with updated anti-virus software.&nbsp; You may wish to get professional assistance through your computer&rsquo;s manufacturer, computer retail store, or local computer technician.&nbsp; You can also alert the appropriate authorities by contacting your Internet Service Provider or the <a href="http://www.ic3.gov/">Internet Crime Complaint Center</a>.&nbsp; The Federal Trade Commission (FTC) can assist if you are subject to <a href="http://www.ftc.gov/bcp/edu/microsites/idtheft/">identity theft</a>.&nbsp; You can also forward spam or phishing emails to the FTC at <a href="http://mailto:spam@uce.gov">spam@uce.gov</a>.<br />
	<br />
	To learn more about cybersecurity tips please visit <a href="http://www.onguardonline.gov/">www.onguardonline.gov</a> and <a href="http://www.dhs.gov/cyber">www.dhs.gov/cyber</a>.&nbsp;<br />
	<br />
	<em>John Brennan is Assistant to the President for Homeland Security and Counterterrorism.</em></p>
]]></description>
   <pubDate>Mon, 19 Oct 2009 16:39:00 -0400</pubDate>
 <dc:creator>&lt;a href=&quot;/blog/author/john-brennan&quot;&gt;John Brennan&lt;/a&gt;</dc:creator>
 <guid isPermaLink="false">whr-226176</guid>
</item>
<item>
  <title>Cybersecurity Awareness Month Part II</title>
  <link>https://obamawhitehouse.archives.gov/blog/2009/10/12/cybersecurity-awareness-month-part-ii</link>
  <description><![CDATA[<div class="legacy-content">
	<div class="legacy-para">
		In <a href="/blog/National-Cybersecurity-Awareness-Month/">my last blog post</a>, I linked to President Obama&rsquo;s <a href="/the_press_office/Presidential-Proclamation-National-Cybersecurity-Awareness-Month/">proclamation</a> announcing the start of National Cybersecurity Awareness Month.&nbsp; This week, I would like to discuss in more detail the cyber threats that we are facing as a Nation and as individuals.&nbsp; A key theme for this month is that cybersecurity is &quot;our shared responsibility.&quot;&nbsp; Each one of us must take the time to increase our awareness of the cyber risks that are present every time we turn on our computers.</div>
	<div class="legacy-para">
		Just the other day, the media was breaking a story about the latest generation of malicious software designed to steal money from bank accounts.&nbsp; This &quot;bank Trojan,&quot; called <a href="http://www.wired.com/threatlevel/2009/09/rogue-bank-statements/">URLzone</a> provides a sophisticated interface for managing theft from numerous accounts and deceives the account owner with false statements.</div>
	<div class="legacy-para">
		For years, research institutions have noted a steady increase in number of malicious programs that are being used to exploit the vulnerabilities of our computers.&nbsp; A vast percentage of all e-mail is <a href="http://www.onguardonline.gov/topics/email-scams.aspx">spam</a>, which tries to lure us into downloading software, visiting an infected <a href="http://www.us-cert.gov/current/index.html#fraudulent_9_11_web_sites">website</a> or <a href="http://www.fbi.gov/pressrel/pressrel09/networking_100109.htm">social networking</a> account, or even making a phone call in order to get us to reveal information useful for identity theft or to steal money.&nbsp; Many of these malicious actors are now sending out <a href="http://www.irs.gov/newsroom/article/0,,id=213862,00.html?portlet=6">fake emails from the Internal Revenue Service</a>.</div>
	<div class="legacy-para">
		Sophisticated cyber criminals are bypassing individual computer users and are attacking financial institutions. To them, the motivation is simple.&nbsp; Why steal one bank account record when you can steal millions?&nbsp; Fortunately, our law enforcement agencies have had some remarkable successes against key groups responsible for cyber attacks.&nbsp; Just last week, nearly <a href="http://www.fbi.gov/page2/oct09/phishphry_100709.html">100 people</a> were arrested in the United States and Egypt on charges of computer fraud, conspiracy to commit bank fraud, money laundering, and aggravated identify theft.&nbsp; Last month the U.S. Government convicted the individual responsible for the theft and sale of more than <a href="http://www.secretservice.gov/press/GPA12-09_TJXPlea.pdf">40 million credit and debit card numbers</a> from numerous U.S. retailers with losses of more than $21 billion. You can learn more about federal law enforcement efforts in combating cyber crime <a href="http://www.cybercrime.gov/">here</a>, <a href="http://www.fbi.gov/cyberinvest/cyberhome.htm">here</a>, and <a href="http://www.secretservice.gov/ectf.shtml">here</a>.</div>
	<div class="legacy-para">
		And then there are the botnets, which are large numbers of compromised computers that are controlled remotely by criminals or other malicious actors.&nbsp; Some computer experts have estimated that <a href="http://news.bbc.co.uk/2/hi/business/6298641.stm">one quarter</a> of all personal computers are part of a botnet.&nbsp; The <a href="http://www.us-cert.gov/cas/alerts/SA09-088A.html">Conficker worm</a> has been around for about a year and has managed to spread into millions of machines through network connections and portable media such as thumb drives.&nbsp; These botnets appear to be used primarily for supporting criminal activities such as spam, but we worry that such large botnets could be used to launch unprecedented denial-of-service attacks against banking, government, or other important websites.</div>
	<div class="legacy-para">
		As you can see, the cyber threat is quite real.&nbsp; Every day dozens of Federal departments and agencies work with their industry partners to help mitigate these threats.&nbsp; And while we have made great strides thwarting the efforts of cyber criminals, more needs to be done.&nbsp; Next week, I will write more about the basic cybersecurity tips that every computer user should know and adopt.</div>
	<div class="legacy-para">
		<em>John Brennan is Assistant to the President for Homeland Security and Counterterrorism</em></div>
</div>
]]></description>
   <pubDate>Mon, 12 Oct 2009 15:45:00 -0400</pubDate>
 <dc:creator>&lt;a href=&quot;/blog/author/john-brennan&quot;&gt;John Brennan&lt;/a&gt;</dc:creator>
 <guid isPermaLink="false">whr-226181</guid>
</item>
<item>
  <title>National Cybersecurity Awareness Month</title>
  <link>https://obamawhitehouse.archives.gov/blog/2009/10/01/national-cybersecurity-awareness-month</link>
  <description><![CDATA[<div class="legacy-content">
	<div class="legacy-para">
		Today, per a <a href="/the_press_office/Presidential-Proclamation-National-Cybersecurity-Awareness-Month/">Presidential Proclamation</a> and a <a href="http://thomas.loc.gov/cgi-bin/query/z?c111:S.RES.285:">Senate Resolution</a>, marks the start of the sixth annual National Cybersecurity Awareness Month. As stated in the <a href="/assets/documents/Cyberspace_Policy_Review_final.pdf">President&rsquo;s Cyberspace Policy Review</a>, cybersecurity is a national priority and is vital to our economy and the security of our nation. The financial industry, our government networks, and your home computers are under continual attack from a variety of malicious actors, including domestic hackers, international organized crime rings, and foreign intelligence agencies. They are stealing your identities and financial information, sensitive government data, and proprietary industry information. As President Obama stated in his <a href="/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/">May 29th speech</a>, &quot;America&#39;s economic prosperity in the 21st century will depend on cybersecurity.&quot;</div>
	<div class="legacy-para">
		However, there is much that we can do to reduce our vulnerability and improve our resilience to cyber attacks, and we call on all Americans this month to recognize their role in improving the nation&rsquo;s cybersecurity. One of the themes for this year&rsquo;s National Cybersecurity Awareness Month is that cybersecurity is a shared responsibility. This refers to the fact that government, industry, and the individual computer user must all play a role in securing our information networks and data.&nbsp; Public-private partnerships are critical to these efforts, and one example of this partnership is the National Cybersecurity Alliance. This joint industry and government organization provides a variety of <a href="http://staysafeonline.org/ncsam">information on National Cybersecurity Awareness Month activities</a>. Further, the National Association of State Chief Information Officers (NASCIO) provides i<a href="http://www.nascio.org/advocacy/cybersecurity/">nformation on cybersecurity efforts </a>happening within your state.</div>
	<div class="legacy-para">
		During the month of October, I will be posting additional information on this blog regarding a variety of cybersecurity topics, including Cyber Threat, Cybersecurity Tips for the Home User, and Cybersecurity Careers.</div>
	<div class="legacy-para">
		Please check back here weekly for additional cybersecurity information.</div>
	<div class="legacy-para">
		<em>John Brennan is the Deputy National Security Advisor and Assistant to the President for Homeland Security and Counterterrorism</em></div>
</div>
]]></description>
   <pubDate>Thu, 01 Oct 2009 15:20:00 -0400</pubDate>
 <dc:creator>&lt;a href=&quot;/blog/author/john-brennan&quot;&gt;John Brennan&lt;/a&gt;</dc:creator>
 <guid isPermaLink="false">whr-226186</guid>
</item>
  </channel>
</rss>
