Create an Account
username: password:
 
  MemeStreams Logo

The National Strategy for Trusted Identities in Cyberspace

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
The National Strategy for Trusted Identities in Cyberspace
Topic: Computer Security 9:46 am EDT, Jun 26, 2010

Howard Schmidt:

Today, I am pleased to announce the latest step in moving our Nation forward in securing our cyberspace with the release of the draft National Strategy for Trusted Identities in Cyberspace (NSTIC). This first draft of NSTIC was developed in collaboration with key government agencies, business leaders and privacy advocates. What has emerged is a blueprint to reduce cybersecurity vulnerabilities and improve online privacy protections through the use of trusted digital identities.

No longer should individuals have to remember an ever-expanding and potentially insecure list of usernames and passwords to login into various online services.

We seek to enable a future where individuals can voluntarily choose to obtain a secure, interoperable, and privacy-enhancing credential (e.g., a smart identity card, a digital certificate on their cell phone, etc) from a variety of service providers -- both public and private -- to authenticate themselves online ...

From the Loose Tweets Sink Fleets Department:

What in the world is going on? Oh, it's a hacker causing all of this chaos. A hacker has gotten into the U.S. Federal payroll system and electronically issued paychecks ... to himself! totaling billions of dollars!

Paul Ferguson:

We are all responsible.

And we are all failing.

Andrew Keen:

In the future, I think there will be pockets of outrageously irresponsible, anonymous people ... but for the most part, we will have cleansed ourselves of the anonymous.

Bruce Schneier:

Will not wearing a life recorder be used as evidence that someone is up to no good?

New Scientist:

The US Department of Homeland Security is developing a system designed to detect "hostile thoughts" in people walking through border posts, airports and public places ...

Decius:

Unless there is some detail that I'm missing, this sounds positively Orwellian.

Eric Schmidt:

If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.

The National Strategy for Trusted Identities in Cyberspace



 
 
Powered By Industrial Memetics
RSS2.0