Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

10/26/2017
06:35 PM
Curtis Franklin
Curtis Franklin
Curt Franklin
50%
50%

Is Your Security Military-Grade?

Simple civilian security won't cut it for most businesses. It's time to take your cybersecurity mil-spec.

Most companies and individuals in the developed world have very little knowledge of advanced military tactics. We don't need that knowledge in our daily lives. The rise in state-sponsored cyber crime is changing the calculus when it comes to knowing advanced hacking techniques. And most of us have a lot to learn.

Think about it: Do you know what the four F's are in small-unit tactics? If someone asked you to quickly set up a Fire Trap, could you do it? Unless you've recently served in the military or are prepared for civilian action on at a very high level, the answer is probably "no." The good news is that most of us can live happy, safe lives while remaining ignorant of those and many other tactical topics.

Even if your job involves physical security for a business the liklihood is great that you'll never be required to know vertical envelopment or the applications of motti. The differences in civilian and military needs and tactics are just too great.

In the world of cyber defense, though, there is only a small difference in the tactics used by criminal hacking groups and those used by nation-state hackers bent on economic disruption. We've seen this sort of tactical similarity in recent ransomware attacks that focused their damage in Europe and in very targeted attacks on civil infrastructure in Ukraine.

So what do you need to know if you're going to avoid becoming a casualty of this latest war? First up is figuring out how to keep up with new information. US-CERT should be on your daily update list. In addition, there are several mailing lists and bloggers that should be hitting your in-box at least once a day. Author's Note: Which security writers and lists do you look to for info? I'd love to know your favorites -- please let me know in the comments! Next, you must understand what the warnings mean.

When a researcher puts out information on a new vulnerability, dig into it and follow the code. Look at the services and apps that the vulnerability hits and immediately start the process of understanding whether your enterprise applications depend on the affected services. Talk to your best security people and get them to explain exactly what's happening. You'll probably find that most of your security folks are eager to share their knowledge with someone who comes asking genuine questions to which they really want to know the answer.

Finally, convince your executives that you're not too small, too insignificant, or too obscure to be a target. One of the things that we've seen is that many attacks use shotguns as an analogy -- their pellets of destruction spread all over the landscape. Being prepared means keeping up with backup and recovery routines, having an up-to-date business continuity plan and yes, practicing both to make sure you know that they work.

Security isn't easy and it may not be cheap. But in the second decade of the current millenium it's far cheaper than repairing the damage that can come from a military-grade exploit launched against your company.

What's your plan? Are you worried about the escalating danger? Or has your business gone back to abacus and quill pen to escape the cyber danger? Let us know -- it's a story that involves all of us.

Related posts:

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5615
PUBLISHED: 2020-08-04
Cross-site request forgery (CSRF) vulnerability in [Calendar01] free edition ver1.0.0 and [Calendar02] free edition ver1.0.0 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2020-5616
PUBLISHED: 2020-08-04
[Calendar01], [Calendar02], [PKOBO-News01], [PKOBO-vote01], [Telop01], [Gallery01], [CalendarForm01], and [Link01] [Calendar01] free edition ver1.0.0, [Calendar02] free edition ver1.0.0, [PKOBO-News01] free edition ver1.0.3 and earlier, [PKOBO-vote01] free edition ver1.0.1 and earlier, [Telop01] fre...
CVE-2020-5617
PUBLISHED: 2020-08-04
Privilege escalation vulnerability in SKYSEA Client View Ver.12.200.12n to 15.210.05f allows an attacker to obtain unauthorized privileges and modify/obtain sensitive information or perform unintended operations via unspecified vectors.
CVE-2020-11583
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
CVE-2020-11584
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.