Data Breach Study Spanning 500 Break-Ins Released 71
Dr. Jim Anderson writes "The good folks over at Verizon Business have released a report that summarizes what they've found after looking through 500 forensic investigations involving 230 million records, and analyzes hundreds of corporate breaches including three of the five largest ones ever reported. What did they find? How about (1) Nearly nine in 10 corporate data breaches could have been prevented had reasonable security measures been in place, (2) Fewer than 25 percent of attacks took advantage of a known or unknown vulnerability and (3) attacks from Asia, particularly in China and Vietnam, often involve application exploits leading to data compromise, while defacements frequently originate from the Middle East."
Aarrgghhh!!! (Score:5, Funny)
How the hell are we supposed to defend ourselves against the 75% of attacks that are immune to the laws of logic???
Re:Aarrgghhh!!! (Score:5, Informative)
I assume they mean "software/hardware vulnerability", and that the other 75% are people doing stupid things - "human vulnerabilities" or even "policy vulnerabilities". It's interesting in itself though that 75% of the attacks are due to, presumably, direct human error and nothing to do with the data being on computer.
So when you're bank next releases your details, don't accept an explanation. Most probably, someone who works there did something incredibly stupid and deliberate, rather than they got hacked or outwitted.
Re: (Score:2, Funny)
Re: (Score:2)
So it is logical, if taken in context.
Re: (Score:1)
How the hell are we supposed to defend ourselves against the 75% of attacks that are immune to the laws of logic???
I took that to mean they did nothing clever and tried a directory attack on passwords.
Re: (Score:1)
There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. [brainyquote.com]
Re:Aarrgghhh!!! (Score:5, Insightful)
Apparently, someone is trying to make Rumsfeld out to be an idiot. Though that he may be, IMO this quote is actually fairly insightful, if somewhat poorly worded. I've had a similar saying (is it a saying if I'm the only one saying it?): "There are three types of people in the world. Those who don't know what they're doing and know they don't; those who know what they're doing and know they do; and those who don't know what they're doing but think they do. It's the last group that screws everything up for the other two groups." The thing to realise is that everyone falls into all three categories for different aspects of our lives, and the challenge is to tell the difference for each situation to try to avoid being in the last group.
In Rumsfeld's quote, "known knowns" are the areas where we are in the middle group: knowing what we're doing, and knowing that. "Known unknowns" are the areas where we don't know what we're doing and know we don't. And "unknown unknowns" are the last group: things we think we know, but don't. (Ok, that's not quite precisely what he's talking about, but it's analogous.) And that last group is the most dangerous one.
Re: (Score:2)
| Has a clue | Has no clue
Is not arrogant | ideal | acceptable
Is arrogant | acceptable | unacceptable
(Sorry the graph isn't turning out very clear;
The best person to hire or work with is the "not arrogant/has a clue person". You can work with a person who has a
Re: (Score:2)
Yeah, it's weird that a 55-word saying never caught on.
Schroedinger's Vulnerability (Score:4, Funny)
Re: (Score:2)
Re: (Score:2, Informative)
Re:Fewer than 25 percent... (Score:5, Interesting)
Re:Fewer than 25 percent... (Score:5, Funny)
password: password
Re:Fewer than 25 percent... (Score:4, Funny)
Re: (Score:2)
That's the combination for my luggage!
Re: (Score:2)
um... (Score:2)
So, 75% of attacks didn't take advantage of a vulnerability at all?
Re: (Score:1)
lack of security (open systems / trivial, or written down passwords) doesn't immediately mean a problem with the software.
Equally possible (if not more likely) for the problem to be with the user(s) use of the software
Re: (Score:2, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Insightful)
Re:um... (Score:4, Insightful)
Re: (Score:2)
No, that means that there were patches available but they were never applied...
To me, that sounds like a known vulnerability. I think one of the posts above is probably a better answer to the question "what makes up the other 75%, if not a known or unknown vulnerability":
Username: admin
Password: password
Leaving the system in a default state isn't a flaw in the software so it isn't a software vulnerability. It's a lazy/sloppy sys admin. Unfortunately, this leads to playing semantic games -- "what exactly is a vulnerability?"
Business Partners?? (Score:5, Funny)
Some Partners!!
Watch your backs guys.
PS. How can 39% rise 5 fold?
Re: (Score:3, Informative)
Here's an example to make some sense of it:
Say there were 200 cases, 100 each over two years. During year 1, there were 13 cases due to business partners. During year two, there were 65 cases due to business partners.
The percentage went up five-fold between year 1 and year 2, but the total percentage over the study is 39%.
Actual report (Score:5, Informative)
Here is a link to the actual report (PDF): http://www.verizonbusiness.com/resources/security/databreachreport.pdf [verizonbusiness.com]
I quickly scanned the report and it appears to be quite detailed. Definitely required reading for any CxO!
Re:Actual report (Score:5, Insightful)
That's why 9/10 attacks involved totally preventable breaches -- if reasonable security had been in place.
Re:Actual report (Score:4, Insightful)
The only way it works is to get the CEO/Chairman/Lord High Muckety-Muck to sign off on a policy that applies to EVERYONE, and then firing an executive for breach of policy as a demonstration of how serious the company takes security. (This assumes that a CxO breaches policy at some point, which is pretty much inevitable.) The attitude of "security policy is for little people" reminds me of Leona Helmsley's 'taxes are for little people' attitude.
Data transaction zones (Score:5, Interesting)
Re: (Score:2, Funny)
"Running NT4 also made sure USB sticks weren't an issue, though I believe they managed to upgrade to XP a few years ago, but testing was extensive."
The security dudes at my previous place of employment managed to devise a more portable solution to the USB stick problem: they simply glued shut the USB ports on all computers. No kidding.
Re: (Score:1, Informative)
save the glue.
Re: (Score:3, Informative)
Some time back I was a consultant at a (largish) bank. They too had 'locked out' USB devices that way. And hold & behold, it worked on any randomly available USB-stick, no external drives were mounted.
Some days later I was 'confused' and tried to copy something using my (very) old 64Mb stick. Worked like a charm. Realizing that this was 'impossible', we tried with other USB sticks, but mine was the only one that
Re: (Score:1)
Proper permissions should stop this and has always in my networks.
But, as I am a Linux guy, and we are talking windows.... Maybe it really only works sometimes.
After all, who has read the windows code?
"I believe everyone should create their own standards."
Re: (Score:1)
Re: (Score:2)
Also, working without Internet access can be a real pain. It obviously depends on what you are doing, but many things grind to a halt when there is no web access.
Fortunately, there is WWW over SMTP. And seakernet. And ad-hoc networks.
I guess if you try to lock down the place too much, you'll have a plethora of access vectors beyond your control in no time.
Sometimes, better
Re: (Score:2)
Schools, for instance, generally run a "curriculum" and an "admin" network - one for the kids, one for the staff. Joining both is seen as an extremely bad thing. But there's usually absolutely nothing stopping people from connecting to random websites from the admin (even in the finance offices etc.).
Bring back the old days of text menus:
1. Pay in
2. Pay out
3. Print
Reduce the interface, reduce the capabilities, reduce the vulnerabilities.
Those aren't vulnerabilities... (Score:5, Funny)
Re: (Score:1, Funny)
Re: (Score:2)
In fact, I've seen far more attacks coming from Pakistan, Egypt and Yemen (?!) than Israel. But yes, people are racially biased... whether it's pro-racism or anti-racism, very few people have the discipline to be right down the middle.
I think what a lot of people neglect to do is to filter access by country. If you're operating a U.S. bank, why in the world would you want Vietnamese a
Re: (Score:2)
If you're operating a U.S. bank, why in the world would you want Vietnamese and Chinese IPs visiting your site or hammering your firewall ?
As a U.S. bank are you really going to tell your customers, "By the way, if you ever need to access your account while on vacation outside the country, you're out of luck?"
Web access isn't spared, either. If you don't offer services outside your country, I strongly suggest serving up a different, nerfed site to those people - something with no sign-up forms or dynamic content of any kind.
Most of your customers assume that World Wide Web means just that: world wide. If I were a business owner, I'd certainly think twice before potentially driving away customers by telling them, in essence, "I can't trust you because you're not from the same country I am."
Re: (Score:2)
As a U.S. bank are you really going to tell your customers, "By the way, if you ever need to access your account while on vacation outside the country, you're out of luck?"
The full text from the grandparent post:
If you're operating a U.S. bank, why in the world would you want Vietnamese and Chinese IPs visiting your site or hammering your firewall ? Do you have an admin over there, SSHing in ?
If you are a bank, do you have your users signing in via SSH???
No, you probably don't want to block access to HTTPS (you ARE using HTTPS, right?) or SMTP from Vietnam or China (I would add Korea to this list based on the SSH and spam mails I've seen from Korean networks), and yes, I am aware that this implies that it would be possible to brute force your customers' passwords if you don't do something sensible like lock out their accounts after x invalid password
Re: (Score:2)
I was speaking to the following quote (perhaps I should have been more clear in my original post):
Web access isn't spared, either. If you don't offer services outside your country, I strongly suggest serving up a different, nerfed site to those people - something with no sign-up forms or dynamic content of any kind.
If your customers are overseas and they get the nerfed version of your site that doesn't allow for logins on any sort of interaction they'll certainly take their business to someone who does allow that sort of thing.
Re: (Score:2)
Re: (Score:2)
Corporate security breach cause (4) (Score:1)
http://yro.slashdot.org/article.pl?sid=07/05/08/1222239 [slashdot.org]
Indeed (Score:1, Troll)
Shall I tag this 'badsummary', or do we have an 'oxymoron' tag we can use?
A
Re: (Score:2)
Names of the Breached? (Score:1)
But I've also had other account information stolen, and I knew where it came from. I use a different email address for EVERY website I give any inf
Re: (Score:2)
I'm not really into passing laws against this sort of thing, becau
what is reasonable security in law? (Score:1)
What a surprise. (Score:2)
Stating the Obvious (Score:1)
Some clarification on 'vulnerabilities' (Score:2, Informative)