Attacks/Breaches
8/28/2013
12:31 PM
W. Hord Tipton
W. Hord Tipton
Commentary
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

New Security Trend: Bring Your Own Attorney

BYOA is not a security joke anymore. There is clearly a need for a cybersecurity community that is well-versed in legal and ethical principles.

10 Top Password Managers
10 Top Password Managers
(click image for slideshow)
Acronyms have an amusing way of characterizing moments in time. For some of us, BYOB (bring your own beverage) became a familiar and festive part of college. Now, later in life, those of us in the government professional environment have learned to use a similar acronym -- BYOD.

BYOD sums up the ability to use our own mobile device -- laptop, tablet, smart phone -- to access agency or company information and applications. It also suggests an approach that makes our job easier, makes us more productive and creates an overall more satisfying work-life balance.

I see a similar acronym being tossed around that could likely define the next decade in government IT, however. This one gives off a not-so-festive and certainly not-so-productive vibe -- BYOA or bring your own attorney.

While BYOA is mostly used tongue-in-cheek in government security circles, the era of BYOA is quickly evolving from jest to reality, given the nature of today's cyber conflicts and murky data privacy policies.

[ Beginning of a new hacking wave? Read NY Times Caught In Syrian Hacker Attack. ]

Reuters, based on interviews with U.S. intelligence officials, recently reported the U.S. government is now believed to be the "biggest buyer" of malware, as part of an offensive strategy that experts believe leaves business and consumer systems/data vulnerable.

This and countless other complex security considerations only reinforce the fact that whether a breach is caused by a questionable offensive measure or a faulty defensive measure, cyber represents the next biggest legal battlefield for government organizations.

In the area of cyber, legal issues almost always result in a need for the specialty of digital forensics in an effort to find out what happened, who did it and how to prove it. On a global scale, digital forensics is considered among the fastest growing fields in technology because there are simply not enough resources to adequately investigate the number and complexity of crimes occurring. Consider that 20% of nearly 12,400 respondents in an (ISC)² 2013 Global Information Security Study said there were not enough forensic analysts within their organization.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
benjimurphy
50%
50%
benjimurphy,
User Rank: Apprentice
9/12/2013 | 12:12:21 PM
re: New Security Trend: Bring Your Own Attorney
BYOA - LOL! Possible legal issues or not, BYOD is being used and BYOD policies are being signed by employees. Yes, you have to be careful, but the best secureity is not to have the data on the device. We use Tigertext messaging to send text, images and attachments, since they auto-delete after a set period of time and therefore don't remain on the phone/device which is more secure for everyone. Here is a link to a good BYOD policy that deals with this: http://www.hipaatext.com/wp-co...
WKash
50%
50%
WKash,
User Rank: Apprentice
8/29/2013 | 8:14:42 PM
re: New Security Trend: Bring Your Own Attorney
Given that we probably don't need any more lawyers, let's hope more folks pursue an education in digital forensics to meet the growing demand.
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
8/29/2013 | 6:24:27 PM
re: New Security Trend: Bring Your Own Attorney
The jokes almost write themselves. Q: How many lawyers does it take to hunt down attribution for a breach? A: How many can you afford? Q: What do they call the new virus written by a lawyer? A: Sosumi
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
8/29/2013 | 1:58:13 PM
re: New Security Trend: Bring Your Own Attorney
We hear that the hottest IT-related professions are data scientists and security technologists, but anecdotally I'm hearing a lot lately about another one: lawyers. One top CIO recently told me that most of his hires in the past year were lawyers and other compliance experts. And he wasn't happy about it.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.