Using War Games To Make Organizations More Secure 49
wiredmikey writes "Along with budget constraints and disconnect between IT and executive management surrounding information security, results of a recent survey show that a major problem is outright lack of understanding of threats. We all know the best way to get that budget increased, is to get hacked. Unfortunately, that could also result in you losing your job. Some companies, however, are taking creative approaches to both raise awareness and identify potential vulnerabilities. A manager with a large financial services group, for example, says that his company addresses security vulnerabilities by staging a series of what it calls 'war games,' in which a user or group of users is tasked with trying to compromise a system, while another user or group of users is tasked with preventing the break-in. Management needs to understand the security threat and its impact to business, and these 'war games' are an innovative and creative way for IT departments to convince executive management on security needs."
Err (Score:1)
Comment removed (Score:4, Informative)
Re: (Score:1)
I like to think War Games is somewhat of a right of passage for geeks. There's a lot of subtle references that approach things like ethics and morality in that movie while still being interesting and funny on a technical level. Anyone that hasn't seen it and is reading this article needs to go watch it!
WOPR says:Welcome to Blast from the Past,Dr Falken (Score:2)
Such as... acoustic *cough* couplers *cough* [wikipedia.org]?
Though in stark contrast to any director (apparently all filming for a perceived tech-illiterate audience) at least ever since Colossus [imdb.com], no self-respecting sighted hacker would have needed, used or wanted a voice synthesizer.
Rumour (that spelling for a reason you'll see) has it that Commodore's sales took a
WOPR says:Welcome to Blast from the Past,Dr Falken (Score:2)
On a more serious note, "beaten by the bully of the block" would have been his more likely fate back in the day, with Jen being with the team captain (through not much of a choice of or own), and most of their educators at least implicitly defending the notion that all of this was condoned as a "perfectly natur
Re: (Score:3)
Interesting... (Score:1)
The only winning move...is not to play.
Declaration, in preparation... (Score:3)
longint WarGamesMovieReferenceCount;
Re: (Score:2)
Hmm, need an edit option. I started with int, decided that wasn't going to be enough and made it a long, and wound up submitting longint. Grr.
Re: (Score:2)
#define longint long
From inside? (Score:3)
It's the old "with physical access" argument.. except scaled up. Someone within an organization would I imagine have a pretty good chance of compromising the system. Not saying it's acceptable.. but I would guess a reality.
It's the trade off thing. You need to give people access to stuff so they can do their job. The more locked down you make things, the slower they work. Slower work is more expensive.. etc.
So it has to scale. Your new "everything is riding on this" designs... yeah.. spend a fortune protecting it. But can people afford to spend a fortune protecting everything (serious question).
Re:From inside? (Score:5, Interesting)
Most corporations "security" is theater anyways. They hire a company to do cleaning, so you can get into the whole place by being on the cleaning crew. This has been known as a attack vector for decades, yet it's still not fixed because companies are more interested in giving the CEO a 90,000USD desk than paying for their own cleaning crew that have been vetted and cleared. Plus you have maintenance people that are not a part of the company coming in to every department because the corporation is too cheap to BUY their copiers and hire a tech. so they are all rented and a random guy comes in every week to work on them. IT's trivial to get into the company and leave behind a box on the network to crack it from the inside and send the payload out, install hardware keyloggers, etc....
Until companies realize that cutting all the executives pay by 10% and increasing the IT staff's pay by 50% and using the left over from the 10% cut at the top to hire permanent cleaning crew and a single copier expert for in the building, their security will not increase. The CFO can live without buying another new Porsche this month.
Re: (Score:2)
Of course not. You don't spend a fortune protecting everything. You figure out what the various things that need protecting are worth, and then apply an appropriate amount of security to them.
What many companies don't recognize, though, is that if you use this model, you cannot have all your data in a single, flat security zone. I could require one-time passwords to access the highly-critical development application, but if that server is in the same effective security zone as the general-purpose web server
Just the same way you test hardware/software (Score:1)
After the lab shakedown, throw the unit into a real environment, and see if it breaks. Obviously security needs to be similarly tested, else you'll never know if it really works.
Kids these days.... (Score:4, Funny)
Re: (Score:2)
Re: (Score:2)
If you think that more than 15% of the stuff in Marchinko's books is actually true, I've got a bridge to sell you ...
Re: (Score:2)
It won't work. Whern I worked for Boeing, they had so many vice presidents, they considered them to be expendable.
Deal with the real problem, maybe? (Score:4, Interesting)
The main problem, as far as I can see, is that IT people are busy demanding users adopt procedures to deal with threats that don't exist, rather than threats that do exist. In all of the many scare-laden emails from our IT department, I don't believe that I have ever once seen one telling us don't use the same password on multiple systems, that's insecure. They do, however, rigorously enforce the fact that passwords must be changed every 60 days, and are specified to be complex enough that a brute-force attack will take 6E17 years, instead of the old insecure passwords that could be broken in a mere 3E9
Re: (Score:2)
When that is enforced you get monitors covered in postit notes with the passwords to multiple systems and it's even more insecure :(
It is of course insane that users tell me their internet banking passwords or even PIN numbers when I ask them to think of a new password to login - but a depressingly large number of new users do that despite never having met me before. To make things worse I'm actually talking about a si
Re: (Score:2)
Only a fool enforces rapid password changes and complex passwords.
require long pass phrases. if sally the intern uses "I like green puppies!" for her password, that is far more secure than "X652F@z" and will not be on a sticker under the keyboard for anyone to find.
How about companies stop letting retards run the IT department? at Comcast we had a username requirement that created usernames like the following...
BillZ8767 and SallyM3212 the last 4 digits were the last 4 of your SSN
If you forgot your pass
Re: (Score:1)
Only a fool enforces rapid password changes and complex passwords.
Or someone who has to follow rules like PCI DSS which requires you to change passwords at least every 90 days, be at least 7 char long, include numeric and alphabetic char, not be the same as any of the previous 4 passwords, auto lockout after 6 attempts for at least 30 minutes etc. Don't like that rule and the card companies don't want you handling card payments which makes business a bit hard.
Personally I'd prefer the option of teaching people to use a decent password and not change/share it but we do
Re: (Score:2)
Feh. I work in federal contracting. Passwords must be 14 characters long, contain at least 2 *each* of uppercase letters, lower case letters, numerals, and specials, must be changed every 60 days, and cannot be repeated for 12 changes. My friken *life* is resetting people's password. It's completely ridiculous. Add to the complexity requirements the fact that most of these people have accounts at multiple sites, all of which use the same standard, and which rarely require changes at the same time... Y
Re: (Score:1)
Re: (Score:2)
The ones you never see coming (Score:5, Insightful)
One thing to be aware of with war games is a knowledge of what they are designed to achieve. Not all of them are there to spot weakenesses, a lot could be there merely to provide assurance or arse-covering. In those cases, "winning" by succeeding in breaking in could be the worst outcome - either personally for the winner, or the people who were supposed to stop them. Often blame and punishment is a much cheaper solution than a fix.
What usually happens (Score:4, Interesting)
meatspace wargames (Score:1)
next up... Target hires people to shoplift.
oh wait, that'd be a complete and utter waste of time and money.
this is new, HOW? (Score:5, Insightful)
Re: (Score:1)
Re:this is new, HOW? (Score:5, Interesting)
Nobody knew where, or how, we'd try to get in. All the staff would know is that "sometime in the next XX weeks/months" we would be trying to get in. Sometimes, they wouldn't even know that much. Let's face it - hackers don't tend make appointments before they do their thing.
At the time, I didn't have any security training per se, but I did have a background in intelligence. The guy that headed up our Tiger Teams was a retired major from the SAS, who had spent a few years working at GCHQ before he came to Canada. It was one hellova interesting way to earn a living
The problem then becomes the untrainable (Score:3)
Outside help (Score:2)
Once the penetration exercise has been executed, you'll need more outsiders to analyse the results and recommend which o
Re: (Score:2)
And as my friend, who was also a campaign manager for one of the political parties here loved to say ..... "Grab them by the balls, and their hearts & minds WILL follow" :-)
Great idea, bad practice (Score:1)
Cyber Wargames (Score:2)
Steve Jackson games originated this [sjgames.com] almost twenty years ago.
Would it be cheating (Score:1)
This all goes well (Score:2)
When they probed, and used the techniques crackers would to obtain access, they were charged with Felony crimes. Despite that being in their effective remit.
Incidentally, Randal spent about a decade fighting Intel on this, until 2007 when the charges were quashed retrospectively (as they sh
Re: (Score:2)
I am an Oracle DBA for BagOfPucks(tm) company, and I just so happen to chum with a head software security guy at Symantec. He informs me off the cuff everytime there are undocumented zero day breaches, so that if pertinent (which they sometimes are), I can act accordingly to protect the system.
Of course, I offset this with buying pizza and beer. Its a very good bartering system, I would imagine that if they ever needed to rebuild an Oracle backend, I would be tapped
Core Wars? (Score:2)
This is a GOOD thing!!!