Code Red? White House Unveils Color-Coded Cyber-Attack Scale


The White House this week released new ground rules for handling cyber attacks, complete with a color-coded "cyber incident severity schema" reminiscent of the Bush-era Homeland Security Advisory System.

The Presidential Policy Directive (PPD) on United States Cyber Incident Coordination aims to clarify how and when government agencies handle incidents.

"The schema describes a cyber incident's severity from a national perspective, defining six levels, zero through five, in ascending order of severity," the White House explained. "Each level describes the incident's potential to affect public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence."

Level one (green), for instance, means a hack is "unlikely" to make much impact, level two (yellow) suggests the possibility, and level three (orange) means is is likely.

The real trouble starts once you enter level four (red), when a hack will cause "a significant impact." The country would surely enter a state of emergency once we reach level five (black), which means the attack "poses an imminent threat."

Anything at level three or higher is considered "significant," and triggers a coordinated effort to address the threat.

For more than seven years, the Obama Administration has worked to boost cyber security among public, private, and consumer sectors and deter malicious activity aimed at the US and its allies. But the US continues to suffer increasingly significant cyber attacks affecting the private sector and the federal government, according to the White House.

This week's PPD, however, is "one more crucial step" to improve the nation's cyber security, Secretary of Homeland Security Jeh Johnson said in a statement.

"It not only clarifies the roles of the various government actors involved in cybersecurity," he continued. "It re-enforces the reality that cybersecurity must be a partnership between the government and the private sector, and among the law enforcement, homeland security, and intelligence components of the government."

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    Google Home's Conversation Actions are Open for Developers to Make Magic Happen

    During Google’s unveiling of Google Home, the Pixel phones, and Google Assistant a couple of months ago, they showed off a preview of the future of Assistant on both devices.Today, Google has opened up one of those two pieces on Google Home, which could lead to the third party, conversational action magic you’ve been dreaming of.
  • 5300c769af79e

    Microsoft Launches Teams to Foil Office 365 Poachers

    It's trying to take that behemoth that's Microsoft and make it more responsive to the marketplace.The full gamut of Office tools is integrated into Teams, including Word, Excel, PowerPoint, SharePoint, OneNote, Planner, Power BI and Delve.
  • 5300c769af79e

    China Subjects Tech Imports to Heavy Security Scrutiny

    They might be used to block the import of products or to extract trade secrets in exchange for access to China's market.Tech knowledge so obtained might be passed on to Chinese companies competing with foreign ones, or expose vulnerabilities that could be exploited by hackers in China.
  • 5300c769af79e

    Poll: Using Official Twitter App or Something Else?

    Now that Fenix, one of the better 3rd party Twitter apps, is more than likely dead after reaching Twitter’s 100K token limit, today seems like the perfect day to ask you all how you go about consuming the Tweets.Have you given up buying Twitter apps that will one day be left for dead and instead gone with the official Twitter app?