Partner Perspectives  Connecting marketers to our tech communities.
10/26/2016
02:55 PM
David O'Berry
David O'Berry
Partner Perspectives
50%
50%

Lets Clean Up The Internet By Taking Responsibility For Our Actions

Imagine an Internet with multiple levels of security that users need to earn.

Someone has to clean the house, shovel the walk, and mow the lawn. As we grow to adulthood, we realize that this person is us. We either do it ourselves, or we have to earn enough to pay someone else to do it. The Internet has reached a point where we need to take responsibility for our own actions to clean it up.

Many aspects of life present this onus of individual responsibility; there are benefits when we do our part, and consequences when we don’t. Drive responsibly and you can get a discount on your car insurance. Don’t mow your lawn, and in many communities you will get billed when the municipality does it for you.

The Internet if full of opportunities for us to affect others by our actions. Unsecured computers can be used as bots for spam and denial-of-service attacks. Downloaded malware can infect other systems nearby because we are inside a trusted environment. We have tried to educate people on the importance of protecting devices, not clicking on shiny but suspicious links, and other responsible behaviors, with limited effect. What if we took a different approach?

Imagine an Internet with multiple levels of security that users need to earn. Level zero means a person does nothing, and so has limited access to services because their computer is probably infected. Many corporations work this way on their internal networks, restricting access of devices that are unknown or do not have a minimum set of security defenses. Restrictions could be based on inexperience -- akin to what many countries do with driver’s licenses -- or personal habits, which often affect life insurance premiums.

The intriguing part is how do people earn their way to higher levels of trust and access? What mix of incentives and consequences will produce the best results?

Education is always a good start. Discounts on car insurance are commonly offered to people who take a certain amount of driver’s education, and driving a motorcycle, bus, or large truck requires additional tests and licensing. Similarly, gaining access to more secure levels of the Internet could require minimum levels of education and certification.

The downside of the education approach is it is either elitist, available only to those who can afford it, or it must be provided as a public service. Another option is behavioral, based on automated monitoring of your Internet habits. Huge potential privacy issues exist here, but most browsers are already monitoring where we go, so done carefully this could work.

Finally, there is the approach we take with personal health, which relies heavily on public service messages, advertising, and peer pressure to encourage healthy lifestyles, while still providing care for those who are ill. This is most similar to the model we use today.

What do you think? Should the Internet remain a Wild West, with few restrictions and enforcement? Or is it time to take some additional responsibility and accept the benefits and consequences that come with it?

David O'Berry is a reformed CxO/CIO currently working for the "Dark Side" in Worldwide Strategic Technologies within Intel Security Group's Office of the CTO. He spent 19 years on the enterprise side as a network manager, director of information technology systems and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
david.oberry@gmail.com
50%
50%
[email protected],
User Rank: Apprentice
11/3/2016 | 4:05:30 PM
Re: A bit like this you mean?
Hi James. I like that construct a lot. I believe that we have to start rebuilding the foundation of what we do in a way that utilizes the various mechanisms like the one you linked instead of trying to inefficiently re-invent the wheel. Thanks for the reply! D
jamesmcgeexerox
100%
0%
jamesmcgeexerox,
User Rank: Apprentice
10/26/2016 | 6:16:47 PM
A bit like this you mean?
https://www.nccgroup.trust/uk/our-services/domain-services/.trust-domains/ 

 

A .trust domain protects an organisation's brand, reputation and sensitive customer information with the highest level of security and reliability. For consumers, .trust gives a clear signal that a site is a safe place to do business and interact with.

 

.trust domains won't be given out to everyone. Those who wish to join this online gated community must commit to rigorous security policies and we'll work with applicants to help them achieve these standards.

The policies have been developed by our industry leading experts, and adhering to them provides comprehensive protection from both major and minor web vulnerabilities.

A continual process of security review and improvement ensures sites are in compliance with .trust requirements.

 

Note, I'm not affiliated with them (NCC Group), I just recall reading about this a while back, and saw them somewhat harrassed for it in various forums.
Why Cybersecurity Must Be an International Effort
Kelly Sheridan, Associate Editor, Dark Reading,  12/6/2017
NIST Releases New Cybersecurity Framework Draft
Jai Vijayan, Freelance writer,  12/6/2017
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.