Home > Articles > Security > General Security and Privacy

Software [In]security: Moving U.S. Cybersecurity Beyond Cyberplatitudes

White House cybersecurity chief Melissa Hathaway recently released the results of a 60-day review of cybersecurity strategy that defines the problems faced and outlines the beginnings of a way forward. Gary McGraw, author of Software Security: Building Security In discusses how the administration needs to make some important progress on cybersecurity rather than simply offering more platitudes.
Like this article? We recommend

In an announcement from the White House on the last business day of May, President Obama unveiled the results of a 60-day review of cybersecurity strategy conducted by acting White House cybersecurity chief Melissa Hathaway. The "Cyberspace Policy Review" defines the problem and outlines the beginnings of a way forward — especially important given how late the government is in addressing the cybersecurity problem. Is the Obama plan ready for prime time?

The 60-day Review in a Nutshell

The report calls for the appointment of a cybersecurity coordinator. The coordinator is to serve as an action officer during incident response as well as a point of contact for cyber-related issues arising in government departments and agencies. The coordinator as envisioned has no operational responsibilities or authority to set policy. Instead, the coordinator is to provide informed perspective to policymakers. This includes interacting with Congress and developing a legislative agenda for cyberspace.

In the broadest of terms, the strategy includes support for both operational and developmental approaches to securing cyberspace. On the operations side, the government is tasked with creating a threat-sharing plan and a centralized organization to execute the plan. This includes a capability for cybersecurity incident response, intrusion detection and situational awareness, and the creation of public breach notification laws. On the development side, the government is to institute purchasing strategies that put pressure on vendors to properly address security in commercial (private sector) products and services. Tools to be used towards this end include tax incentives, indemnification, and regulation. International cyber cooperation should aim to agree on policy around cybercrime, cyberwarfare, and law enforcement.

Civil liberties, authentication of users, and privacy also play an important role in the document. According to the report, the government should build a digital identity management system for the country to help safeguard and protect the public's private information. The core concept seems to be to provide some basis of trust between parties in a transaction through a centralized authentication system. The government should also leverage cryptography and assurance technologies developed in the intelligence community to secure cyberspace.

In announcing the report, President Obama said, "From now on, our digital infrastructure — the networks and computers we depend on every day — will be treated as they should be: as a strategic national asset. Protecting this infrastructure will be a national security priority.”

Getting Past Platitudes

John Pescatore from Gartner convened a virtual panel on the cybersecurity issue at the 2009 Gartner Information Security Summit. I provided a video for the panel answering two questions that John posed. The two questions get to the heart of the cybersecurity issue. The video is available on the Cigital website.

Question 1: What should the US government do to drive real improvements in the security level of internet use?

We must get past talking about talking about cybersecurity. We've seen a number of reviews and a number of blue ribbon panels (including the National Strategy to Secure Cyberspace and the President's Information Technology Advisory Committee (PITAC) report), but we have yet to see any sort of tangible movement in the government space outside of the intelligence community or the Department of Defense.

I am encouraged that there has been some talk in the government about building security in (see the DHS Build Security In website and about software security. In my view, getting ahead of the problem of computer security requires that we look carefully at the way we're building systems. We need to build our future systems to be secure from the very beginning. The notion that we can patch our way into a secure state or somehow miraculously solve the problem with Band-Aids is unlikely to work. I like the idea of focusing more attention on software security. The more emphasis we place on building security in, the better.

It's also important that the government pay attention to something that corporations have not been so good at — safeguarding privacy, liberty, and individual rights. I can think of nobody in a better position to focus on liberty and individual rights than the government. The government can cause these things to be an important part of the way that we approach cybersecurity from a technical perspective. I hope that the government pays much more attention to privacy and liberty than the commercial space has.

The last thing that is important is to avoid security scare tactics. It's too easy to posit security Boogeymen (either al-Qaeda or cyber terrorists) and use them as an excuse to incorrectly balance personal liberty and individual rights against security concerns. I would like to see a much more careful, deliberate approach. I have confidence that the Obama administration will be able to do that.

Question 2: What are things that you believe the US government should specifically not do in the name of increasing cybersecurity?

The number one thing the government should not do is to put the National Security Agency (or the rest of the Intelligence Community) in charge of cybersecurity. There are two reasons for this. The first reason has to do with separation of duties and de-conflicting offense and defense. Imagine you had to spy on your adversaries. Spycraft is made much easier by problems in software that can be exploited in order to turn computers and other software-driven devices into eavesdropping devices. If you're in charge of carrying out spycraft and at the same time you are also in charge of making sure that advanced systems are secure, that's a very difficult balance to strike. This reminds me of the balance that we struck during the Cold War when it came to building nuclear weapons versus delivering nuclear weapons. Some very clever people devised a scheme of separation of duties between the Department of Energy and the Department of Defense that persists to this day. The same kind of separation of concerns should be evident in the way the government approaches cybersecurity.

An additional reason the NSA should not be put in charge of cybersecurity is that important cultural differences exist between the NSA/DoD and the rest of civilian government/corporate America. There is a very clear command and control structure in the military flowing directly from the President all the way down through the ranks in the military. It is clear who has to do what, where the chain of command goes next, and how command and control works. That's one of the things that the NSA leverages to do a very good job with their own internal cybersecurity. But it is not at all clear that the same sort of clarity exists outside of the DoD.

Number two, the government should not devolve to cyberplatitudes. We've seen too many cyberplatitudes of late. The notion of a cyber coordinator is a big problem. The idea of a cyber coordinator may appeal at first blush, but it looks too much like a cheerleader role to me. There will be very little access to the President; it's not clear the position comes with any budget; and there is no staff associated with the position. We don't really need a cheerleader (although having a cheerleader may be better than having nothing at all). I would like to see a national cyber coordinator with actual authority, power, and responsibility — and with direct access to the President.

The series of reports that I alluded to above is worth another mention. The latest in this series of reports is the 60-day cyber review carried out my Melissa Hathaway and company. It looked awfully familiar if you have seen the National Strategy to Secure Cyberspace (which I worked on) or the PITAC report. There are plenty of parallels between these things. We've become adept at putting out these reasonable pieces of armchair thinking, but we're not very good at actualizing them.

I'm optimistic that we can make some progress on the cybersecurity front if we do get past talking about talking about cybersecurity, if we do focus on building security in to the systems that we're building (especially from a software perspective), and we keep our eye on the privacy, personal liberty, individual rights ball.

We have a chance to make some important progress on cybersecurity. That's encouraging.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020