Analytics

4/14/2010
05:44 PM
50%
50%

Perceptions Of Security Vary Widely Between IT Management, Security Staff

Survey of federal government IT organizations could be indicative of many other large enterprises, Ponemon says

When it comes to important security issues, you'd think the perceptions of security professionals and their bosses -- the top-level IT managers -- would be in lockstep. Not so, according to a study published today.

The study of federal government IT departments, which was conducted by research firm Ponemon Institute and sponsored by CA, suggests there are significant differences between the concerns and priorities assigned to security issues by top IT executives and those seen by line-level security technical staff.

For example, the survey showed a marked difference in the two groups' perception of security training, according to the study. Nearly two-thirds of IT security staffers see training of end users (62 percent) and security experts (63 percent) as "very important," but only 41 percent of IT executives cited user training as very important, and only 43 percent gave the same rating to training of security staff.

Federal IT staffers also are significantly less confident than IT executives that their agency is compliant with all applicable regulatory security requirements, such as FISMA, the study says. Of those IT staff who thought their agency was not compliant, 30 percent thought it was due to lack of accountability and senior leadership, or support from senior management. Forty-six percent of IT executives who thought they didn't meet requirements cited lack of enforcement as the primary reason.

The study showed a 31 percent gap in the importance of privileged user password management (PUPM). Sixty-two percent of IT staff-level respondents deemed PUPM very important, while just 31 percent of executives thought it was very important.

The results of the federal survey are not necessarily an indictment of the government IT sector, but are probably indicative of the gaps in perception that occur in many large enterprises, says Larry Ponemon, founder and CEO of the Ponemon Institute.

"My gut tells me that if we did this same survey in, say, financial services, we'd get pretty much the same results," Ponemon says.

The growing discrepancy of viewpoints within the IT organization occurs partly because information about the corporate security posture is often "sanitized" as it moves up the chain, Ponemon states.

"What we found in this study and others is that organizations have filters for passing information upward, and that bad news has a way of disappearing as it moves toward the executive office suite," Ponemon says. "There's also a problem when technical people have difficulty communicating the extent of a threat or situation. Some of these problems are cultural, not technical."

The question of privileged passwords -- those that are used for higher-level administration of IT systems and typically limited to use by IT staff -- is a good example of how the gap between staff and management is created, according to Phil Kenney, director of information assurance and identity and access management in CA's public sector business unit.

"The people in the trenches know how those passwords are being used -- how much damage can be caused by misuse and also how much those passwords might be shared or left in the clear," Kenney says. "Senior management feels like it's doing a good job maintaining those [passwords], but the line-level folks know what's really going on."

"In my mind, it conjures up an image of World War I," Ponemon says. "The generals are looking at the overall battle strategy of security, but the guys in the trenches are the ones who really understand the dangers of the mustard gas."

Gilda Carle, a relationship expert who has worked with large organizations, such as the U.S. Army, the Internal Revenue Service, and IBM, agrees. "Executives tend to see the big picture, whereas the IT staff-level sees a more focused view. The difference in viewpoints can greatly affect how well an organization achieves its objectives. CBS has even created a No. 1 hit based on this principle called 'Undercover Boss,' where bosses become part of the rank and file, and everyone learns what life is like from the other side."

Shoring up the discrepancy will mean building more consistent metrics for measuring the effectiveness of security and for prioritizing security measures, the experts say.

"It's not a matter of using the same metrics -- obviously, technical people have a different view that's more detailed -- but the metrics that the technical people see need to support the metrics that the top management gets," Kenney says. "If they're using radically different benchmarks, they're going to have different views about what's working and what isn't."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kaspersky Lab Seeks Injunction Against US Government Ban
Jai Vijayan, Freelance writer,  1/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.