CargoAdmin, Bureaucrats, Moderators (CommentStreams), fileuploaders, Interface administrators, newuser, Push subscription managers, Suppressors, Administrators
14,662
edits
| m (Text replacement - "September 11 attacks" to "September 11 attacks") | m (Text replacement - "The Wall Street Journal" to "The Wall Street Journal") | ||
| Line 423: | Line 423: | ||
| === Perfect Citizen === | === Perfect Citizen === | ||
| {{Main|Perfect Citizen}} | {{Main|Perfect Citizen}} | ||
| Perfect Citizen is a program to perform [[Vulnerability assessment (computing)|vulnerability assessment]] by the NSA in the American [[critical infrastructure]].<ref>[https://www.wired.com/threatlevel/2010/07/nsa-perfect-citizen-denial/ NSA Denies It Will Spy on Utilities] {{Webarchive|url=https://web.archive.org/web/20140209204445/http://www.wired.com/threatlevel/2010/07/nsa-perfect-citizen-denial/ |date=2014-02-09 }}, Threat Level, Wired.com</ref><ref name="dt1">{{cite news|url=http://www.dailytech.com/NSAs+Perfect+Citizen+Program++Big+Brother+or+Cybersecurity+Savior/article18969.htm|title=DailyTech – NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity Savior?|last=Mick|first=Jason|date=July 8, 2010|work=DailyTech|access-date=July 8, 2010|url-status=dead|archive-url=https://web.archive.org/web/20100711071346/http://www.dailytech.com/NSAs+Perfect+Citizen+Program++Big+Brother+or+Cybersecurity+Savior/article18969.htm|archive-date=July 11, 2010}}</ref> It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a [[network monitoring]] system named ''Einstein''.<ref name="cn1">{{cite news|url=http://news.cnet.com/8301-1009_3-20009952-83.html|title=Report: NSA initiating program to detect cyberattacks|last=Whitney|first=Lance|date=July 8, 2010|work=[[CNET.com]]|access-date=July 8, 2010|archive-date=June 17, 2011|archive-url=https://web.archive.org/web/20110617035918/http://news.cnet.com/8301-1009_3-20009952-83.html|url-status=dead}}</ref><ref>{{cite news |title=U.S. Program to Detect Cyber Attacks on Infrastructure |url=https://www.wsj.com/articles/SB10001424052748704545004575352983850463108?mod=WSJ_hpp_MIDDLETopStories |newspaper= | Perfect Citizen is a program to perform [[Vulnerability assessment (computing)|vulnerability assessment]] by the NSA in the American [[critical infrastructure]].<ref>[https://www.wired.com/threatlevel/2010/07/nsa-perfect-citizen-denial/ NSA Denies It Will Spy on Utilities] {{Webarchive|url=https://web.archive.org/web/20140209204445/http://www.wired.com/threatlevel/2010/07/nsa-perfect-citizen-denial/ |date=2014-02-09 }}, Threat Level, Wired.com</ref><ref name="dt1">{{cite news|url=http://www.dailytech.com/NSAs+Perfect+Citizen+Program++Big+Brother+or+Cybersecurity+Savior/article18969.htm|title=DailyTech – NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity Savior?|last=Mick|first=Jason|date=July 8, 2010|work=DailyTech|access-date=July 8, 2010|url-status=dead|archive-url=https://web.archive.org/web/20100711071346/http://www.dailytech.com/NSAs+Perfect+Citizen+Program++Big+Brother+or+Cybersecurity+Savior/article18969.htm|archive-date=July 11, 2010}}</ref> It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a [[network monitoring]] system named ''Einstein''.<ref name="cn1">{{cite news|url=http://news.cnet.com/8301-1009_3-20009952-83.html|title=Report: NSA initiating program to detect cyberattacks|last=Whitney|first=Lance|date=July 8, 2010|work=[[CNET.com]]|access-date=July 8, 2010|archive-date=June 17, 2011|archive-url=https://web.archive.org/web/20110617035918/http://news.cnet.com/8301-1009_3-20009952-83.html|url-status=dead}}</ref><ref>{{cite news |title=U.S. Program to Detect Cyber Attacks on Infrastructure |url=https://www.wsj.com/articles/SB10001424052748704545004575352983850463108?mod=WSJ_hpp_MIDDLETopStories |newspaper=The Wall Street Journal |date=July 7, 2010 |access-date=July 7, 2010 |first=Siobhan |last=Gorman |archive-date=May 7, 2018 |archive-url=https://web.archive.org/web/20180507085839/https://www.wsj.com/articles/SB10001424052748704545004575352983850463108?mod=WSJ_hpp_MIDDLETopStories |url-status=live }}</ref> It is funded by the [[Comprehensive National Cybersecurity Initiative]] and thus far [[Raytheon Technologies|Raytheon]] has received a contract for up to $100 million for the initial stage. | ||
| === Academic research === | === Academic research === | ||
edits