Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/22/2020
11:35 AM
50%
50%

Security & Trust Ratings Proliferate: Is That a Good Thing?

Phishing ratings, security ratings, human-ness ratings -- we are looking at a future filled with grades of security and trustworthiness. But there is a downside.

Rating systems to help businesses make decisions are everywhere — credit scores determine whether a person can get a loan and at what interest rate, scores on standardized exams can determine what college a student can attend, and a variety of consumer scores can determine a product's success or failure.

The information security world is rapidly gaining its own sets of scoring systems. Last week, NortonLifeLock announced a research project that will score whether Twitter accounts are likely to belong to a human or a bot. Security awareness companies such as KnowBe4 and Infosec assign workers grades for how well they perform on phishing simulations and the risk that they may pose to their employer. And companies such as BitSight and SecurityScorecard rate companies using external indicators of security and potential breaches.

Businesses will increasingly look to scores to evaluate the risk of partnering with another firm or even employing a worker. A business's cyber-insurance security score could determine its cyber-insurance premium or whether a larger client will work with the firm, says Stephen Boyer, CEO at BitSight, a security ratings firm.

"A lot of our customers will not engage with a vendor below a certain threshold because they have a certain risk tolerance," he says. "Business decisions are absolutely being made on this."

As companies search for ways to limit breach risk, security scores that combine many factors and sources into a single score — or set of scores — are increasingly becoming common, not just as a way to track internal security, but as a way to quantify the risk to which third parties may expose a business and to rate the trustworthiness of information found online. Security and trust ratings promise to give people and companies an easy way to quickly gauge the risk or efficacy of just about anything, from products to people and from services to information.

Last week, for example, two researchers from cybersecurity firm NortonLifeLock released a tool called BotSight (not to be confused with BitSight) that rates Twitter accounts on whether they are likely to belong to an actual human or are run by an automated program, or bot. A great deal of research went into the best ways to boil down more than 20 different indicators into a single score, says Petros Efstathopoulos, global head of the NortonLifeLock Research Group (NRG).

"We often need to simplify complex data or information, in order to make it accessible to consumers and help them make the right decisions — this is a challenging task," he says. "Simplified metrics and ratings are possible, but one needs to exercise extreme caution in crafting them, so as to avoid misleading and oversimplified statements that will harm — rather than improve — one's overall security posture."

Of course, boiling down a plethora of complex factors to a single number or letter grade can miss significant details. In some cases, the scoring system may not capture the environment in which workers find themselves. In one example, KnowBe4 had a client with one department that always ended up opening malicious attachments. When the company looked at why, it found that the group had lost a handful of people and found themselves understaffed, so it was recruiting. And that meant opening up resume attachments. 

"The worst thing that someone can do is to look at a score … in isolation or in ignorance," says Perry Carpenter, chief evangelist and strategy officer for KnowBe4. "Because one of the interesting things that comes to light when people do what they do, is whether they are placed in a no-win situation."

Other problems may arise as well. Any time something is scored, humans and businesses will attempt to improve their score with as little effort as possible. Numerous courses exist to help college applicants improve their SAT or ACT scores. Makers of graphics chips tweaked their drivers to do better on benchmark tests. And antivirus firms kept old definitions in their products to score well on security benchmark tests. 

The creator of such scoring systems needs to focus on ensuring that higher scores actually mean, for example, better security, says BitSight's Boyer.

"One of the critiques of our space is that companies will spend time on the 50% of security issues that we [BitSight] can see, while the other 50% maybe more critical," he says. "And that's a very fair criticism, which is why we talk about it being a security score, not a risk score, because only they understand the risk."

Such an approach can sometimes plague security teams that address vulnerabilities based on the Common Vulnerability Scoring System (CVSS) rank. Depending on the IT asset involved, a high scoring flaw may not be exploitable and a low scoring vulnerability might be a critical weakness.

As long as the user of any particular scoring system takes into account the potential issues with the system, then they can be very beneficial especially as a way to compare relatively improvements in security or emerging weaknesses, says KnowBe4's Carpenter. 

"I do think that scores can be interesting, especially if you use them to see what your averages are across different parts of the organization," he says. "If the marketing team has a consistently higher risk score, for example, than there is a conversation that you probably need to have."

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "The Entertainment Biz Is Changing, but the Cybersecurity Script Is One We've Read Before."

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Navigating the Asia-Pacific Threat Landscape: Experts Dive In
Kelly Sheridan, Staff Editor, Dark Reading,  9/25/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26120
PUBLISHED: 2020-09-27
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even witho...
CVE-2020-26121
PUBLISHED: 2020-09-27
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an uploa...
CVE-2020-25812
PUBLISHED: 2020-09-27
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
CVE-2020-25813
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
CVE-2020-25814
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> ...