Agencies warned to beef up Web security

Experts from three government agencies heavily devoted to information technology testified Thursday that in order to keep hackers from breaking into federal government Web sites, agencies need to rely more upon skilled security precautions than legal statutes against computerized breaking-and-entering.

Testifying before a House Science subcommittee Thursday about the vulnerability of federal government Web sites to hackers, representatives from the National Security Agency, the National Institutes of Standards and Technology, and the technical director of the Office of the Chief Scientist at the General Accounting Office agreed that the government needed to get its act together before seeking stiffer penalties against hackers.

"As a result of listening to this testimony, I would like to have some kind of evaluative system within agencies" that report to Congress, Technology Subcommittee Chairwoman Connie Morella, R-Md., said in an interview after the hearing. She said the system could be analogous to current oversights regarding progress made on stamping out problems emanating from the Y2K computer bug.

"We must do something to make sure that agencies must do this," said Morella, saying that previous government directives from the Office of Management and Budget and NIST have been repeatedly ignored. Many agencies have responded to the OMB's directive to create a Y2K preparedness framework, by simply making a plan to make a plan, she said.

Panel members largely agreed. "As a government, we are falling short in implementation," said Raymond Kammer, director of NIST. "The policies are reasonable, but the big issue is getting the federal government to implement the procedures that are already there."

"Make it a requirement that people talk with NSA and NIST, not a recommendation," said the GAO's Keith Rhodes, when asked for recommendations to improve the government's information security execution. "People's aversion to ignoring standards developed by NSA has to be overcome."

Rhodes also emphasized the need for clear definitions of what constitutes data authentication and validation at a time when government is beginning to conduct more of its business online. But he questioned Morella's idea of creating an information security "czar" for the whole federal government, saying the job was too big for a single person, as well as important differences between computer security for civilian and national security agencies.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.