Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

6/29/2017
09:00 AM
Dawn Kawamoto
Dawn Kawamoto
Slideshows
50%
50%

How To (And Not To) Make the Online Trust Honor Roll

Five websites generated the highest score in their sector for the 2017 Online Trust Audit & Honor Roll. Here is what it takes to get there and be listed among the Online Trust Alliance's Top 50
Previous
1 of 7
Next

(Image Source: Shutterstock)
(Image Source: Shutterstock)

With consumer and enterprise sites getting slammed with attacks, the Online Trust Alliance recently unveiled its 2017 Online Trust Audit & Honor Roll to highlight those sites that engage in the best security and privacy practices.

The audit analyzed up to 1,000 consumer-related websites, Internet service providers, mobile carriers, email box providers, government agencies, and media sites, based on three key criteria: privacy, consumer protection, and security and resiliency. The total base points possible stood at 300, excluding bonus points, and a website needed to score at least 80% overall to be included in the honor roll.

"It's all about following the basics," says Craig Spiezle, executive director and president of the Online Trust Alliance (OTA).

In the security and resiliency category those "basics" include not only patching, but also: having a Secure Socket Layer (SSL) infrastructure; providing a link on the home page to report bugs and search for such common terms like "vulnerability disclosures"; a means to protect against web scraping, vulnerability scanning, and other common bot-driven actions; and an option for multi-factor authentication on the site.

Privacy criteria encompass policies and practices around user anonymity, data retention, and third-party data sharing.

Consumer protection was rated based upon measures like email authentication, anti-phishing technologies and domain security. 

Given these criteria, the five websites that received the highest score for their sector included: LifeLock, for the consumer category; US Bank, for the FDIC or bank category, Microsoft Azure, for the ISPs, mobile carriers, and hosters section; Google News for the news and media category; and the Online Trust Alliance for the OTA members section.

The issue of which websites scored the highest for their respective category or made it onto the OTA honor roll is only part of the story. The overall trends for success and failure of achieving security and privacy on a website is the other important part of the picture that will be revealed in the following pages.

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
7/31/2017 | 2:46:22 PM
Re: impersonization, forgery, and fakes
100% behind you here, mack.  There is room for the Public Key Model to improve, of course.  Read an interesting paper "Soundness in the Public-Key Model" by Silvio Micali and Leonid Reyzin.  From the ABSTRACT:

The public-key model for interactive proofs has proved to be quite effective in improving protocol efficiency (see Canetti, Goldreich, Goldwasser, Micali, STOC 2001). We argue, however, that its soundness notion is more subtle and complex than in the classical model, and that it should be better understood to avoid designing erroneous protocols. Specifically, for the public-key model, we:

 
  • identify four meaningful notions of soundness;
  • prove that, under minimal complexity assumptions, these four notions are distinct;
  • identify the exact soundness notions satisfied by prior interactive protocols; and
  • identify the round complexity of some of the new notions.
macker490
100%
0%
macker490,
User Rank: Ninja
7/18/2017 | 8:21:33 AM
impersonization, forgery, and fakes
what do the sites do to prevent the "Bad Guys" from impersonating them -- or transmitting fakes and forgeries?

sites focus tons of effort on identifying their customers.    but what do customers do in order to authenticate sites?

we rely on a large list of x.509 certificates -- published by our web browsers  -- and most of us -- have no clue what's in that list.

For Critical Sites Only:    we all need to COUNTERSIGN trusted certificates using our own PGP/GnuPG key

in the Public Key Model this step is required in order to validate a key.   Keys must be validated before a trust level can be assigned.

give this some thought.   "They" want to authenticate you -- but -- you need to authenticate them -- and the model we use today -- fails.   That's an F
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
CVE-2020-10817
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
CVE-2020-10952
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.