Information Security Fundamentally Wrong? 35
Joep Gommers writes to share his look at why the current approach to information risk mitigation is fundamentally wrong. Detection of an intrusion (incident), consists of three stages. Information Gathering, Information Processing and Information Reporting. If we look at the way we currently put these three stages together we see that efficiency, and therefore the percentage of possible accomplished risk mitigation, is poor. He claims that if every step taken in order to detect an incident is at 50% efficient, we will end up with thousands of dollars in firewalls, ids, event correlators, and outsourced security processes and very little progress in security. The article is noted as a draft, but still some interesting food for thought.
Um... (Score:3, Insightful)
prevent breaches? (Score:2, Insightful)
On the one hand, they want you to be secure. On the other hand, they don't want you to be so secure that you no longer need their services.
Some people have a vested interest in maintaining the 'insecure' status quo.
Re:prevent breaches? (Score:2)
Sounds like drug compaines, car companies, and well, just about any profession. Even engineers make themselves needed by doing everything they're own strange way so that they can't be replaced easily.
Re:prevent breaches? (Score:1)
Re:prevent breaches? (Score:2)
I think the biggest single testament to this statement being true is the utter lack of insurance in IT security. I've never been a fan of *ANY* type of insurance (think about it, they must be making money or they wouldn't be doing it, which means that the risk is far too low) but IT insurance is one thing that just hasn't taken off. Which means that the risk is far too h
Ah, a man/woman with a brain?? wow!! (Score:2)
Yep, whether under fascism communism, or corporatism, the best and most powerful individuals in history were always undergrounders, whether mafia bosses, lone shadowy figures cloaked in fear and confusion or simp
Re:Ah, a man/woman with a brain?? wow!! (Score:2)
Re:prevent breaches? (Score:2)
That's changing fairly rapidly as the cyberinsurance offerings mature and as the actuarial metrics improve. The emergence of generally accepted standards of due care is also helping. The folks I've talked to recently in the insurance industry (at AIG and Gallagher, to name two) are selling it hand over fist.
It's also worth noting that not all IT risk is covered by specialized insurance. A fair amount of IT-related business risk can be covered by g
Re:prevent breaches? (Score:2)
What gets me is that so many services provided by the security goons should be taken care of by good sysadmins, such as maintaining up-to-date inventories of network devices, or knowing what "normal" traffic for the network is. I rarely find this to be the case, and so security consultants get hired on to do device discovery, network mapping, patch management, and traffic analysis. There WOULD be
Re:Um... (Score:3, Insightful)
1.) Make it not worth the effort. If it takes on average 10000 years, it's not worth it.
2.) Make sure you know that your system has been breached.
Re:Um... (Score:5, Insightful)
1. There is no way to formally prove in general that a program is logically correct. You can prove it formally for single programs, but then you don't have the formal proof, that your proof is formally correct (there are not only bugs in programs, there are also bugs in theorems about programs).
2. A programming environment is either primitive-recursive (and thus very simple and doesn't offer too much for programming) or it is Turing complete and thus capable (in theory) to host every conceivable program. There has been no solution yet for a set of possible programs, which is really smaller than the set of Turing computable programs and still really larger than the set of primitive-recursive programs. It's either Scylla or Charybdis.
3. There is always the problem of covert channels. As long as different entities share the same ressources, they can also communicate to each other. And communication means influence, and influence means not predicted situations which are not tested for (again there is the exception for a primitive subset of programs).
4. The solution to 3. is sandboxing: Creating a closed environment with non-shared ressources. Problem: You can't use it for much, because it is per definitionem not able to communicate to the outside.
5. The same arguments are also telling us that DRM doesn't work. DRM requires problems 1 to 4 to be solved.
Re:Um... (Score:2)
For example, a program in a secure partition can leak information to an insecure program through patterns of resource use that are detectable by traffic analysis on the insecure side. Attempting to i
Re:Um... (Score:2)
No. Actually, it's just much more restricted in HOW it can communicate with the outside.
Re:Um... (Score:1)
Let me guess: You're a CS major, or you are repeating what you heard from a CS major?
We're not anywhere close to approaching the theoretical lim
Re:Um... (Score:2)
Re:Um... (Score:5, Interesting)
As your mother used to tell you, prevention is better than cure - remember those graphs about how much coding mistakes cost to fix at various stages of the development process? Well, it's the same for prevention, detection and response, getting increasingly expensive.
Anyway, the article isn't loading right now, but the distinction between Information Gathering, Information Processing and Information Reporting is fundamentally artificial. They're all aspects of a single process, and yes, I used to do this for a living. Security's not hard - follow the lock-down guides for your host OSes and network devices. Run an IDS such as snort, and keep an eye on it. Keep abreast of current problems at isc.sans.org, frsirt and vendor's announcements. Make sure your users have good passwords and audit all logon failures. Tighten up your physical security and educate about social engineering. Then you at least have a good chance to keep the lid on things.
The real problem with security is that a lot of systems are overly complex and it's impossibly to really close off every possibile avenue of attack. Management always prefers a full feature set to the fuzzy notion of security - after all, they've never had a major incident up til now, so why change?
Re:Um... (Score:2)
Re:Um... (Score:1)
Re:Unplug (Score:1)
That would be a denial of service.....
Re:Unplug (Score:2)
>>Cheap and easy solution: unplug from the internet, shutdown the computer.
>That would be a denial of service.....
There are some instances where the air-gap firewall makes sense. I'm not personally that paranoid, but I am sure that there are isolated machines processing sensitive data where all i/o is via physical media.Re:Unplug (Score:1)
So... (Score:4, Funny)
Re:So... (Score:2)
Re:So... (Score:3, Funny)
I think your explanation might be a bit complex...
I'm not certain this is a rethink, really (Score:2)
I don't think this constitutes much change, just how things are reported, and maybe to who.
Re:I'm not certain this is a rethink, really (Score:4, Insightful)
Re:I'm not certain this is a rethink, really (Score:2)
You don't happen to work for Splunk, do you? ;) Sorry...when I read that all I could think of are those Splunk ads that have been plastered all over /. for the past few months.
Re:I'm not certain this is a rethink, really (Score:2)
Re:I'm not certain this is a rethink, really (Score:2, Insightful)
The goal of these devices is to take the data from the varying sources - syslogs, firewall logs, IDS/IPS entries, and so on and correlate it in an automated fashion. The challenge with these solutions is that it's, well, h
Re:I'm not certain this is a rethink, really (Score:2)
I don't quite understand what better proposal 'has (Score:2)
It looks like the solution would be to build an IDS from one piece. Taken to the logical conclusion, one would somehow have to throw all network traffic at some mainframe for analysis.
Obviously one reason most IDSs are not built this way is that it is insane to analyze that amount of traffic. It seems more likely that one would instead try to tune the initial filtering steps to report more events to the next stage.
Also, the non-IDS based security