|
But cyber security experts also argued that the technologies for creating such identifiers already exist and are already used in different ways by businesses, particularly banks. "The vision they put forth is already realized and commercially available," said Roger Thornton, a cyber security expert and chief technology officer for California-based Fortify Software. He noted that banks already use sophisticated fingerprinting processes to identify a customer who signs in. The system knows if a customer is using a different computer and will often require additional identification if that computer has not been used for the banking website before. But many companies don't bother with the more expensive or complex identification systems. So, said Thornton, "the opportunity is there to make things more interoperable and more uniform." The draft plan is part of an administration effort to promote cyber security both within the government and among society as a whole. Lawmakers have introduced a number of bills aimed at furthering those goals, and the White House plan was met with initial support from one of the authors of Senate computer security legislation. ___ Online: Draft report: http://www.nstic.ideascale.com/ White House blog: http://tinyurl.com/34qtu4c
[Associated
Press;
Copyright 2010 The Associated Press. All rights reserved. This
material may not be published, broadcast, rewritten or
redistributed.
News | Sports | Business | Rural Review | Teaching & Learning | Home and Family | Tourism | Obituaries
Community |
Perspectives
|
Law & Courts |
Leisure Time
|
Spiritual Life |
Health & Fitness |
Teen Scene
Calendar
|
Letters to the Editor