- The Foundry: Conservative Policy News from The Heritage Foundation - http://blog.heritage.org -

Cybersecurity: Homeland Security Follies

Posted By David Inserra On May 30, 2013 @ 12:30 pm In Security | Comments Disabled

Newscom [1]

Newscom

The Department of Homeland Security (DHS) just found out that it had a cybersecurity vulnerability [2] for the past four years that could have led to personally identifiable information being stolen by hackers.

If the government, and specifically DHS, can’t administer its existing cyber standards, then there is no reason to believe it will do a better job when it has to regulate vast portions of the U.S. economy.

The vulnerability was discovered by another law enforcement agency that told DHS that Customs and Border Protection, an agency within DHS, was using a vendor whose systems were not entirely secure. The vulnerability would have allowed hackers to steal Social Security numbers from those DHS was conducting background checks on. While DHS does not believe that any information was lost, the fact that this vulnerability existed for almost four years is very concerning.

More concerning, however, is that some in D.C. want DHS to regulate cybersecurity efforts for whole sectors of the U.S. economy. The President issued an executive order earlier this year that charges DHS with establishing not-so-voluntary cybersecurity standards [3] for companies to comply with. Last year’s Cybersecurity Act of 2012, also known as the Lieberman–Collins bill [4], used a similar standards-based approach with DHS in charge. However, if DHS couldn’t oversee cybersecurity for its own vendors and contractors, why should we trust it with broader responsibilities?

Regulations and standards are a poor approach to cybersecurity. Regulations are too slow to keep up [5] with the rapidly changing cyber realm. By the time cyber standards are written and implemented, computers will have at least doubled in power, rendering the standards obsolete.

Cyber standards also encourage compliance over true security. A recent report [6] by Representatives Ed Markey (D–MA) and Henry Waxman (D–CA) found that utilities tend to do only the bare minimum in order to comply with regulations. Regulations create this kind of compliance-focused attitude that actually harms cybersecurity efforts. Standards are also concerning because of their potential cost, inflexibility, impact on innovation, and other toxic side [7] effects.

DHS should start improving the security of the government’s networks and work to improve collaborative efforts with the private sector, such as information sharing [8] and analysis of threats. Such efforts are cost-effective, keep up with changing threats, and don’t have the harmful shortcomings of standards.

DHS’s cyber failure, together with many other government cyber breaches and failures [9], illustrates that government standards do not lead to greater security. Only in D.C. can an approach fail [10] and then be expanded to cover huge new sections of the economy.


Article printed from The Foundry: Conservative Policy News from The Heritage Foundation: http://blog.heritage.org

URL to article: http://blog.heritage.org/2013/05/30/cybersecurity-dhss-follies/

URLs in this post:

[1] Image: http://blog.heritage.org/wp-content/uploads/cybersecurity-120706.jpg

[2] cybersecurity vulnerability: http://www.dhs.gov/pii

[3] not-so-voluntary cybersecurity standards: http://www.heritage.org/research/reports/2013/02/obama-s-cybersecurity-executive-order-falls-short

[4] Lieberman–Collins bill: http://www.heritage.org/research/reports/2012/07/cybersecurity-act-of-2012-revised-cyber-bill-still-has-problems

[5] are too slow to keep up: http://blog.heritage.org/2013/05/10/cybersecurity-government-regulations-cant-keep-up/

[6] recent report: http://www.csoonline.com/article/733872/nation-s-power-grid-under-constant-cyberattack-but-congress-lax

[7] other toxic side: http://www.heritage.org/research/reports/2012/06/cybersecurity-and-red-tape-more-regulations-not-the-answer

[8] information sharing: http://www.heritage.org/research/reports/2013/04/a-congressional-guide-seven-steps-to-us-security-prosperity-and-freedom-in-cyberspace

[9] government cyber breaches and failures: http://www.heritage.org/research/reports/2012/11/cybersecurity-breaches-and-failures-in-the-us-government-continue

[10] an approach fail: http://www.heritage.org/research/reports/2012/05/the-alarming-trend-of-cybersecurity-breaches-and-failures-in-the-us-government?ac=1

Copyright © 2011 The Heritage Foundation. All rights reserved.