Misconfigured Networks Main Cause of Breaches 78
An anonymous reader writes "Responses to a survey from attendees of the DEFCON 18 conference revealed that 73% came across a misconfigured network more than three quarters of the time – which, according to 76% of the sample, was the easiest IT resource to exploit. Results revealed that 18% of professionals believe misconfigured networks are the result of insufficient time or money for audits. 14% felt that compliance audits that don't always capture security best practices are a factor and 11% felt that threat vectors that change faster than they can be addressed play a key role."
statistics overload? (Score:1)
76% of people beleive a misconfigured newtwork this is the easiest resource to exploit
18% of people beleive a misconfigured network is due to insufficient time/money
Check those facts & figures (Score:3, Funny)
73% came across a misconfigured network more than three quarters of the time – which, according to 76% of the sample, was the easiest IT resource to exploit.
So are we to believe that 73% is more than three quarters, or is this a case where 90% of IT is half-mental?
Re: (Score:3, Informative)
Presumably the other 3% thought it was the easiest IT resource to exploit, but did not actually come across them more than three quarters of the time.
This summary is an absolute nightmare.
Re: (Score:1, Funny)
I'm assuming it's part of the Da Vinci Code until proven otherwise.
Re: (Score:3, Funny)
Nonono. We had the Russian Station transmit secret numbers recently, this is clearly a response from agents in the field.
Re: (Score:3, Insightful)
This summary is an absolute nightmare.
I just assumed it was written by the marketing team for Sex Panther.
Re: (Score:2)
"a survey from attendees of the DEFCON 18 conference revealed that 73% came across a misconfigured network more than three quarters of the time – which, according to 76% of the sample, was the easiest IT resource to exploit."
Seriously, that throws my head into a god damn wall.
This is how I slowly try and rephrase the sentence. Anyone else reading it this way? "73% of respondents to the survey found the network misconfigured more than 75% of the time and 76% of those 73% of respondents said that was t
Re: (Score:1)
Re: (Score:2)
After a dozen re-reads of TFA, my head came away from the wall, and I can now understand your rewrite.
My manager, however, will have to wait for the powerpoint presentation with pie charts and bar graphs. As we all know, 73% of managers can't understand more than three quarters of the information you present to them.
Re: (Score:2)
Understanding the rewrite doesn't help if the margin of error means that 73% == 76% three-quarters of the time.
Re: (Score:2)
"a survey from attendees of the DEFCON 18 conference revealed that 73% came across a misconfigured network more than three quarters of the time – which, according to 76% of the sample, was the easiest IT resource to exploit."
Seriously, that throws my head into a god damn wall.
This is how I slowly try and rephrase the sentence. Anyone else reading it this way? "73% of respondents to the survey found the network misconfigured more than 75% of the time and 76% of those 73% of respondents said that was the easiest IT resource to exploit."
Terrible writing when you have to try and decode a simple sentence. Feels like I'm trying to figure out some legal doc.
Yeah, sounds like just the sort of thing that professional editors are supposed to clean up. Oh wait, this is Slashdot.
Another gem from the summary caught my eye:
That item is not a (mis)configuration issue. Besides, the best way to maintain the advantage in this arms race is to make sure that your systems do exactly what they are intended to do and nothing else. Default-deny is a good policy and not just for fi
Re: (Score:1, Offtopic)
"Actually they're the result of incompetence and/or apathy."
I know my trade and I know that it will cost more time/money than throwed at it. The fact that it breaks is therefor neither lack of knowledge nor apathy, at least, not at the technical level.
"The purpose of an audit is to reveal that incompetence and/or apathy has taken place so that it may be corrected in the future."
Ha! So many times that's the *declared* purpose. The real purpose is to cover managerial asses. Since that can be done with les
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Does not compute.
Re: (Score:1, Troll)
LoB
Check your reading comprehension (Score:4, Informative)
Imagine everyone was asked how often they came across a misconfigured network. One guy answered "about 80% of the time". Another guy answered "20% of the time." 73% of the respondents, when asked, gave an answer that was higher than "75% of the time".
Separately, respondents were asked what IT resource was easiest to exploit, and 76% of them said "network".
Re: (Score:1)
A recent study found that 74.23% of all statistics quoted in /. articles were invented on the spot in an effort to trick folks who only read the article summary into modding them up.
Re: (Score:2)
Suddenly this sub-thread isn't so funny now that it actually makes sense.
This is news? (Score:1, Flamebait)
Re: (Score:2)
Everyone at Cisco knows this.
Everyone in their customer list is on their own.
The other 57% (Score:2)
Ok, so what did the other 57% think that misconfigured networks are the result of?
Re: (Score:2)
Ok, so what did the other 57% think that misconfigured networks are the result of?
Obviously, too much time spent playing Facebook games.
Re: (Score:1)
Ok, so what did the other 57% think that misconfigured networks are the result of?
Incorrect / erroneous / misapplied example configurations ranking high in Google search results?
Re: (Score:2)
The statistics are amazing, just amazing (Score:1)
Wow. 57% of the security professionals at DEFCON consider themselves a .. hacker!
Wow.
Re: (Score:2)
Based on the responses what we really know is that out of the 43% who did not admit to being a Black Hat, some percentage actually does engage in such activities.
Misconfigured networks (Score:3, Interesting)
Re:Misconfigured networks (Score:4, Informative)
So, that means vulnerable ports were open to "the world" on the systems, and the "network" was supposed to be doing the firewalling? Network firewalls and system firewalls should use identical policies.
That's a bit general. Say you want to run a Samba fileserver to share files among Windows clients. You'd want the fileserver on your internal network to accept connections from the relevant ports. You would not want the firewall standing between your network and the Internet to also have that port open to the world.
While it's true that a conscientious admin would tighten up the Samba server's firewall by specifying both ports and IP addresses/ranges (or other credentials) that are acceptable, you still wouldn't have identical policies between the internal systems and the firewall controlling what can connect from outside.
Re: (Score:3)
That's a bit general. Say you want to run a Samba fileserver to share files among Windows clients. You'd want the fileserver on your internal network to accept connections from the relevant ports. You would not want the firewall standing between your network and the Internet to also have that port open to the world. While it's true that a conscientious admin would tighten up the Samba server's firewall by specifying both ports and IP addresses/ranges (or other credentials) that are acceptable, you still wouldn't have identical policies between the internal systems and the firewall controlling what can connect from outside.
Good point. I should think more often before I type.
Of those 73 percent of misconfigured networks... (Score:5, Informative)
http://monkey.org/~dugsong/dsniff/ [monkey.org]
Re: (Score:2)
Ahh, good old Dsniff, urlsnarf, etc. Had lots of good times with them.
73% of the time (Score:1)
I think hackers are responsible for (Score:2)
most of the break-ins.
Best security advice I ever got..... (Score:5, Insightful)
Simple fix? (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Simple fix? (Score:5, Funny)
Hire lesbians.
Re: (Score:2)
....and what is your solution when I come in and tell your fat receptionist that she looks nice in that moo-mu, and that I am there to fix the phones, but maybe we can go for a drink when I am done, and can I have access to the IT closet at 5:02pm?
Network audits.
It's right there in the summary.
Detection and mitigation of penetration is equally as important as trying to prevent the intrusion in the first place.
Re: (Score:2)
That way, nothing gets in OR out that is not expressly permitted, or tied to a specific user account. An internal effected machine cant send anything out the gateway if its not via 8080 with the firewall client, and with a rule naming its executable.
Re: (Score:2)
WAAAAAAAA THE NETWERK! (Score:2)
"Waaaaaa! The network's down!"
"Waaaaaa! The network's slow!"
As a real network admin, I hear this at minimum, once a week, sometimes more often.
95% of the time, it's not the network. It's almost always the endpoints.
How is the network to blame here? Someone screw up spanning tree, OSPF not using md5 authentication? DHCP mis-configuration? DNS? Wrong gateway used? What? The article gives nothing, just like most of the sysadmins and managers that come to my desk crying about how slow scp/nfs/smb copie
Re: (Score:2)
95% of the time, it's not the network. It's almost always the endpoints.
I'm guessing a new way of saying PIBCAK?
Stop crying about the network.
And start looking at where the real problem might be. The guy with an MBA from an online university and an entry-level Microsoft certification being responsible for the hiring just might have something to do with how IT is a great steaming shithole.
Re: (Score:1)
I prefer the PICNIC problem. Problem In Chair, not in Computer.
How much of that is due to old software / hardware (Score:2)
How much of that is due to old software / hardware? That needs not so much of a misconfigured setup more like a one with some open areas. That are needed to make the old software / hardware work.
Firewall the boundary - all that's needed (Score:2)
There's a lot of comments saying "use a decent firewall and you're sorted".
On any non-trivial network, if the only security in place is a firewall on the boundary then you're probably one of the 3/4 of easily exploitable networks mentioned in the article.
Viruses, social engineering, playing with applications that are allowed through (e.g. HTTPS web apps), dial-ins, wireless, abusive staff, there is a never ending list of attack vectors if you only pay attention to the perimeter. Like the article says: 43% o
Shitty study (Score:5, Informative)
I was at Defcon this year (like always), and the people conducting this study were essentially paid per response, which I'm sure is quite common. We were standing on the Riv steps, during one of our many cigarette breaks, and some girl came up and asked us to do her survey.
Us: "This question doesn't really make sense."
Her: "Just check any box, I need to get them all filled."
And that's basically how it went. The question/answers seemed a little silly, and there were a lot of excluded middles. The surveyors knew nothing of the questions, and were just trying to get out there of (can't blame 'em). The answer space was a checkbox, and if you saw it, you'd see how easy it'd be to just fill out the rest of the boxes with similar answers if you wanted to go home.