[LINK] Fwd: ISPs asked to censor malware-infected PCs

Jan Whitaker jwhit at janwhitaker.com
Wed Sep 16 14:23:57 AEST 2009


><http://www.itnews.com.au/News/155673,isps-asked-to-cut-off-malware-infected-pcs.aspx>http://www.itnews.com.au/News/155673,isps-asked-to-cut-off-malware-infected-pcs.aspx
>
>>By <http://www.itnews.com.au/Author/212686,ben-grubb.aspx>Ben Grubb
>>Sep 14, 2009 2:53 PM
>><http://www.itnews.com.au/Search/malware.aspx>
>>Voluntary code of conduct puts onus on service providers.
>>
>>The Internet Industry Association (IIA) has 
>><http://iia.net.au/index.php/section-blog/90-esecurity-code-for-isps/757-esecurity-code-to-protect-australians-online.html>drafted 
>>a new code of conduct that suggests Internet Service Providers 
>>(ISPs) contact, and in some cases disconnect, customers that have 
>>malware-infected computers.
>>
>>The drafted code, which will not be mandatory, suggested ISPs take 
>>a four-step approach to protecting customers.
>>    * Identification of compromised computers
>>    * Contact affected customer
>>    * Provision of information and advice to fix the compromised system; and
>>    * A reporting function for alerting about serious scale 
>> threats, such as those, that may threaten national security.
>>
>>"Once an ISP has detected a compromised computer or malicious 
>>activity on its network, it should take action to address the 
>>problem. ISPs should therefore attempt to identify the end user 
>>whose computer has been compromised, and contact them to educate 
>>them about the problem," the new code states.
>>
>>Chief regulatory officer of ISP iiNet, Steve Dalby, said he would 
>>adhere to the code if the process could be automated and 
>>development costs weren't prohibitive.
>>
>>"Potentially it's something that we would do. If there were some 
>>costs we might consider whether government funding was available, 
>>but again it's very hypothetical," Dalby said.
>>
>>IBRS analyst James Turner welcomed the move and said ISPs should be 
>>able to find a way to fund the initiative.
>>
>>"They'll find a way of commercialising it and making it, at the 
>>very least, cost neutral if not cost positive," he said.
>>
>>Turner said it was reasonable to expect a form of "quality control" 
>>for computers connected to the internet in a similar way cars need 
>>to be roadworthy.
>>
>>"The Government make laws and regulations about what you can drive 
>>on the roads. If you're in New South Wales, after your car gets 
>>over five years old ... you've got to take it over to the pits 
>>every year. A form of quality control for computers that are on the 
>>internet seems perfectly reasonable to me," said Turner.
>>
>>Communications Minister Senator Conroy has voiced his support for 
>>the new code. In May, he said the "code will provide a consistent 
>>approach for Australian ISPs to help inform, educate and protect 
>>their clients in relation to e-security issues."
>>
>>"It will contribute to the range of efforts being made by 
>>Government and industry to raise awareness of online security and 
>>to foster digital confidence," said Conroy at the time.
>>
>>However, an IIA spokesman said that if Stephen Conroy was serious 
>>about addressing eSecurity he would fund more education 
>>initiatives. Government initiatives, such as the once a year 
>>e-security campaign that told Australians to change their password, 
>>was not enough, he said.
>>
>>"The government has spent an awful lot of money on a single 
>>website," the spokesman told iTnews. "I think there's about two or 
>>three websites doing exactly the same thing and they all assume 
>>you've got to log on to the website. It's kind of like a web 1.0 
>>style approach," he said.
>>
>>Initiatives such as the recently announced Queensland Government 
>><http://www.itnews.com.au/News/150387,queensland-police-plans-wardriving-mission.aspx>war 
>>driving mission were praised by the spokesman.
>>
>>The code of conduct was initiated on 10 June when the IIA, in 
>>association with the Government, ISPs, security vendors and 
>>consumer representatives convened a meeting to explore the merits 
>>of a new voluntary eSecurity code.
>>
>>"The meeting agreed that A Draft Code Principles with 
>>representative from all stakeholders with a final version of the 
>>voluntary code envisaged by 1 December 2009," the IIA said.
>>
>>ISPs that adhere to the code would be able to display an IIA 
>>tortoise log on their website.
>>
>>
>>
>>Members of the public are asked to respond to the draft code by 
>>posting their comments and suggestions to 
>><mailto:securitycode at iia.net.au>securitycode at iia.net.au no later 
>>than Friday 30 October 2009.
>
>
>Melbourne, Victoria, Australia
>jwhit at janwhitaker.com
>blog: http://janwhitaker.com/jansblog/
>business: http://www.janwhitaker.com
>
>Our truest response to the irrationality of the world is to paint or 
>sing or write, for only in such response do we find truth.
>~Madeline L'Engle, writer
>
>_ __________________ _




More information about the Link mailing list