2004 Global Information Security Survey Results 77
jotok writes "CIO.com has released the results of its 2004 Global Information Security Survey, based on the responses of over 8,000 people in 62 countries, highlighting the Six Secrets of Highly Secure Organizations. The report indicates that security awareness and implementation are gradually improving, but also that information security is still not recieving the attention it requires--especially from management and IT personnel."
Re:whoamg (Score:2, Funny)
Wow! This study is really worth its 6 millions.
Six Secrets of Highly Secure Organizations (Score:4, Funny)
1) Never tell anybody everything you know.
That's pretty sad! (Score:5, Insightful)
Who then is supposed to give a shit about information security if not management and IT? It's stuff like this that makes me very unsympathetic towards companies with virus problems.
Re:That's pretty sad! (Score:5, Interesting)
We have so many cliches and maxims about this very concept, but they fall on deaf ears:
Nobody seems to care about doing things the right way until they screw up because they were done poorly. Ounce of prevention and all that..
Re:That's pretty sad! (Score:2)
In case you (or someone else reading your comment) takes that seriously - consider the hassle of security versus the hassle of explaining to customers why their data is unavailable, their accounts were compromised, or you won't be able to fulfill your promises... I'd rather spend an hour working on making sure something was done right then spend five minutes on the phone while the customer bitches me out. That's why it makes life easier.
Re:That's pretty sad! (Score:1, Insightful)
Security is *everybody's* responsibility.
Whether it be the admin configuring their IDS & firewall correctly, to the managers writing the policys & guidelines, to the users not writing down passwords and all the way through to the maintenance staff being on the lookout for stray access points, weak locks, or areas of poor CCTV coverage. Even the backup operators have a responsibility to ensure the safety of backups. Security is *not* just passwords and firewalls.
Security: Confidentiality, Integri
there are actually seven (Score:4, Funny)
Re:there are actually seven (Score:1, Funny)
Getting advice on slashdot is a sure way to an easily hackable website. While it masquerades as a "geek tech news" forum, it's populated by 12 year olds morons who think they know everything, and who's answer to everything is "Install linux because it's magically secure!".
It goes without saying, of course. What kind of a moron would take computing advice from a bunch of asshats who can't configure Windows properly?
Re:there are actually seven (Score:2)
Oh, I don't know, requiring an impossible task as a qualification is not very reasonable, don't you think?
Re:there are actually seven (Score:2)
Re:there are actually seven (Score:1)
And you're implicitly advising to install windows/IIS? nice troll
Re:there are actually seven (Score:3, Insightful)
I'm explicitly advising not to run around thinking you know the first thing about running a secure server because you read slashdot every day.
So many morons running linux powered websites incorrectly out there. While linux may not be a target for worms that just arbitrarily hit anyone, if someone actually targets the server, they can usually get root on it. These are the type of attacks you need to fear in business. Sasser wastes time and bandwidth, a dedicated hacker who's out to get yo
Re:there are actually seven (Score:1)
I agree with you.
But, my point is about the zealots who say "switch to linux because Windows is insecure" and nothing else, because they know nothing else.
Zealots seem to believe that their boxes are secure just because linux is on them, as if that was all there was to it. Then they run all the services as root, log in as root to change CD-ROMs, etc..
It's easier (more comprehensive) to lock down a linux box, b
Re:there are actually seven (Score:1)
Re:there are actually seven (Score:2)
"Seventh Secret: Most flaws occur thru "Gates" - Keep away from."
Nowhere do you see anything like "Install linux because it's magically secure!".
This is your typical troll. When CERT warns people to avoid IE and the security record of MS products is considered, warning people away from MS software is appropriate. You like to attack the people (posters) who point out things like this rather than making an honest comment. I hope MS pays you well.
Just for fun, you might like to
People just don't care. (Score:1, Redundant)
Sad state of affairs in IT security. (Score:2)
Percentages of employees that follow the security rules... "More than half" was about 75%. I'm surprised it's that high. People here go through the 9 interations of their passwords in the same day so they can keep the same one for the year. Some people just use password1 - password9... Ugh.
Re:Sad state of affairs in IT security. (Score:5, Insightful)
Since senior management doesn't care, what makes them think that employees lower than them should?
This same COO had his email account hacked because of a poor password and blamed IT for not having enough controls in place.
I'm sure you can imagine my response.
Arrgghh (Score:4, Interesting)
We need a new "random generator" type page to produce book titles of the form:
"The n secrets of highly keyword1 keyword2"
Where
n is an integer
keyword1 is empowering adjective:effective, secure, world dominating, goatsecxing
keyword2 is the empowered noun: organisations, individuals, dictatorships, tubgirls.
Maybe then we'll escape this sort of crud. I am studying an MBA, there is a lot of useful stuff in it, but I am already sick of all the goddamn management speak used to obfuscate otherwize valid observations. Its taken years to get "plain english" into academic writing and tech manuals. Lets now start hammering it into managers.
The uhmteen or so habits of highly random asshats? (Score:1)
The uhmteen or so habits of highly random asshats?
Does anyone know where asshats cams from? It's an incredibly funny descriptor but i don't know of its origin. Is it just a buttheadism?
Re:The uhmteen or so habits of highly random assha (Score:1)
Re:Arrgghh (Score:1)
Re:Arrgghh (Score:1)
Top 6 secrets.. ha ha (Score:4, Funny)
Secret 1: the password is 1.. 2.. 3.. 4.. 5!
Company XYZ somewhere, reading list: "CRAP! That's the same combination we use for root!"
Re:Top 6 secrets.. ha ha (Score:5, Interesting)
Company XYZ somewhere, reading list: "CRAP! That's the same combination we use for root!"
That would be an improvement over reality: One facility run by a subcontractor has a database that processes 50K checks/day and generates checks in excess of $1 million/day.
Last time I checked, the database had no password on the administrator account.
Nobody was interested in changing this "because we are behind a firewall" and "there's no reason why anyone would look for us or could find us".
Thus, my sig;
Re:Top 6 secrets.. ha ha (Score:4, Insightful)
Re:Top 6 secrets.. ha ha (Score:3, Interesting)
Same here, though the same admin who thought no password was a good idea also blaimed every laptop for every virus. Even had a long conversation with him on how likely my laptop (running Linux) could or could not pose a trojan/virus/... threat to his Windows client network. I still think he doesn't believe me that Linux can't spread Windows trojans (granted it
Re:Top 6 secrets.. ha ha (Score:1)
But we all know that the password IS: XYZZY! http://www.xyzzy.com/ [xyzzy.com]
trying to read about the six secrets... (Score:1)
Great dept name! (Score:2)
That's a great one. Just wanted to give a pat on the back to the person who came up with it.
Clarification (Score:5, Insightful)
From my perspective, there is a real dichotomy between IT and Security. While I have encountered quite a few IT types who take the time to learn about security issues, it seems as if they involve completely different mindsets. IT personnel are technical support--they worry about connectivity and uptime and handling the clownishness of the users. Security types are usually a lot more paranoid and consider the needs of the users a secondary concern to the integrity of the assets.
The current model seems to be to hire a few security experts (and I use the term loosely--for every Eric Cole there probably 1000 clowns who read his book and considers himself just as good) to give recommendations and train the IT staff. I think the improvement in incident response and cleanup times is the result, but do you see that in terms of prevention we're not any better off?
Some kind of integrated approach is necessary, but I think it's a ways off.
Re:Clarification (Score:2, Interesting)
Until our managers become more technically adept, how can they understand if the security ppl are doing an adequate job?
Re:Clarification (Score:1)
I noted that the article mentions negative drivers like the fe
Re:Clarification (Score:1)
Security rule #1 (Score:5, Insightful)
Join the Cyber-Corp! I did! (Score:2, Interesting)
In May I graduated from "Cyber-Corp", a Computer Science - Information Assurance master's degree (or undergrad if that's your thing) program that is funded by NSF. I took many full, real college credit classes (3 or 4 semester hours) on Penetration Testing, Systems Certification and Accreditation, Digital Forensics Secure Network Design and Implementation, Secure E-Commerce, the list goes on. And
Re:Join the Cyber-Corp! I did! (Score:1)
In support of the government's policies on Critical Infrastructure Protection, there is this outreach program between NSA and various educational institutions which is producing just really excellent security professionals. In light of corporate resistance to DHS's attempts to bring the private sector onboard, I think this and similar programs are the best shot we have at securing the civilian sector.
More information can be found here [nsa.gov].
Re:Join the Cyber-Corp! I did! (Score:2)
Looks to be a sweet deal. TOo bad i'm engineering and not compsci =\
Re:Join the Cyber-Corp! I did! (Score:1)
http://www.cics.unt.edu/
Re:Security rule #1 (Score:3, Interesting)
I believe you are wrong.
It's hard to lock a door if you have no idea what a door is.
the attacker just needs to be skilled enough to be able to defeat the security measures put in place.
Bingo!
Also the attacker gets to move around and the defense has to just sit there.
It's probably more a
Re: Physical security (Score:2)
After all, IT is just a tool, a means to an end. If you have a super-secure server, but one could throw a brick through a window and walk away with the goodies, that server isn't really secure. If you have a fire in a datacenter [slashdot.org], and your entire archive and customer files are lost, then your backup procedures were flawed, even if state-of-the-art tools were used.
exagerated (Score:4, Insightful)
Re:exagerated (Score:2)
You must be new around here. "M$" is a macro that expands to "Microsoft" when we read it...
Re:exagerated (Score:2)
And the difference is
Fundamentally it's the same thing. Spending lots of money on sham.
The Six Secrets (Score:5, Insightful)
The second secret, seperating your data security from your IT people, is a good idea only when your data security people are as competent at the regular IT people. Which is very rarely the case, because we tend to want our best talent our fixing the VP's PCs. What usually ends up happening is the company has to bring in an outside contractor to do what the data security people are not capable of, and the data security people become "go betweens" with them.
The other 4 "secrets" aren't really secrets but simply good practices in the fields of penetration testing, and documentation.
Re:The Six Secrets (Score:2)
Throwing money at the problem tends to enlarge the scope of the problem, i.e. more and bigger problems. The ones who spend least probably secure the few things that need securing and do those few rather well and do not impose unwarranted restrictions on everybody else. Easy way to check. If they lock their doors whenever they leave, they need security. Open doors when they aren't there means they do not need a
revealing study of what CIOs are REALLY like (Score:5, Insightful)
Seventh Secret (Score:2)
The "Best Practices" (hereafter BPG) group claimed 14% of their IT budget was spent on Infosecurity, while the "Average Group" (hereafter AG) spent 9%, while the difference in number of people on full time security in the BPG was approximately 430 and the AG was only around 160.
Or in numbers, a BPG company spends $140,000 of its $1,000,000 IT budget (these are fake numbers) and hires 430 people while a AG company spends
Re:Seventh Secret (Score:1)
I'm willing to bet that any member of the BGP is also a company that takes IT much more seriously, and therefore would have a much larger IT budget (in relation to the total company budget). Also, I would venture a guess that the BGP are also much larger companies, otherwise the difference in department sizes would be smaller than the current 2.5:1
--Demonspawn
..laissez-faire, maybe even lackadaisical (Score:2)
As a self-appointed representative of security professionals, I have to balk at this description. Many security professionals are under incredible pressure. If, after a harrowing incident, they take some time to frolic down by the old Mill pond, perhaps take a roll or two down Mr. Jenkin's hill, or even skip t
MS Windows Updates... (Score:2, Interesting)
"2. Separate information security from IT" - idiots! It's IT that understands this stuff. The answer is
Re:MS Windows Updates... (Score:2, Interesting)
Out of the past thousand or so incidents I have handled or observed, maybe 900 of them involved some bungle by IT regarding: failure to patch systems (often while reporting that they had), failure to remove unnecessary services, failure to properly implement network and host security features (e.g. firewalls and IDSs installed imroperly, logging not turned on, etc.) failure to conduct account audits, failure to implem
No surprises (Score:5, Interesting)
The article made a recommendation for a Security Czar (my term) to be in charge of physical security as well as info security. In my experience, physical and data security mirror each other within a given facility. Those who are sensitive to the exposure of their data are typically those with the tightest security measures for employees.
However, in an odd twist, very few companies consider the physical security of the data servers. In other words, they worry about firewalls, proxy servers, and up-to-date AV protection, but leave the servers in a location that's physically accessible to people WITHIN their organization that shouldn't have access to it.
Very, very rarely does someone manage this right. One of the few exceptions was a VA hospital. Not the tightest security, but it was consistently applied in the physical access to the servers, the access to the building in general, and the measures taken for electronic protection and isolation of critical systems.
Tim
Easy to keep files secure (Score:1)
So far, so good. In fact I'm looking at my financial statements right now and they say .$%^ WTF what the hell is a |33t 81ll|ion41r3, where the hell is my balance sheet.