Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Take A Deep Breath

In the midst of the recent surge of security hype and angst, a dose of perspective

The past few weeks in the information security world have been some of the most visible, if not interesting, we've seen in a long time. From China's BGP routing incident, to WikiLeaks, to McDonalds, to Gawker, we've seen a spate of high-visibility incidents thrusting security to the forefront of the public consciousness. In the midst of this feeding frenzy we, the security industry, seem as likely to eat our own as we struggle to balance truth and context with the inevitable media hype.

Watching and reading the articles, tweets, and blog posts in highlights a problem I think we often struggle with as a collective group perspective. It's not an issue that's even exclusive to our industry; it's so common it's known as a standard cognitive bias called dformation professionnelle. The tendency to see the world through the eyes of your profession and forget the broader context.

This isn't an accusation; trust me, I struggle with career-induced bias on a daily basis. But it's important to take a step back sometimes, review our reactions, examine the context, and reset our perspective. There are a few specific examples from the past weeks I think well-highlight what I mean:

* Weak passwords on a throw-away site aren't a big deal. Who cares if 83 percent of Gawker readers use 123456 as their password? Unless they are using the same password for their email or financial accounts it doesn't matter. At all. The users aren't all stupid, they just don't consider Gizmodo comments something worth dedicating any mental resources to protect. Yes, some percentage of the users are really exposed due to password reuse, but in the end I suspect the number of people detrimentally affected will be fairly limited.

* No, 15 percent of Internet traffic wasn't routed through China, and the overall security exposure to the US was likely minimal. And yes, BGP routing mistakes happen all the time. But when such an error originates in a nation that we know for a fact is actively penetrating our systems, it's okay to be suspicious. And if a little hype gets us funding to secure our routing, so much the better.

* The preface "cyber" isn't evil, even when it's overused. It's cool, people like it, and it's part of the common lexicon. That said, a group of dedicated prankster activists executing a distributed denial of service attack against some businesses doesn't meet any definition of war.

* Someone always has a network that is bigger, more complex, or with different business/mission requirements than yours. It's easy to shoot from the sidelines, I do it all the time, but never assume even a "Security 101" control will work everywhere, for everyone. Not that we should excuse stupid mistakes, but especially in larger environments the issues around even seemingly minor changes are nearly seizure-inducing. (That might seem hypocritical coming from an analyst, but there's a difference between my writing for a broad audience and direct advice to individuals).

* You can't eliminate incidents like WikiLeaks. Yes, the DoD made Bradley Manning's crime easier than it should have been due to some lax controls, but even with all the best security in place leaks like this will happen. I don't care how much DLP or portable media blocking tools you put in place.

* Losing real names and a bunch of emails in a big phishing attack like the one against McDonalds' provider isn't great, but it isn't like not having that info ever slowed the bad guys down.

Security isn't failing. Banks are still in business (despite their best efforts), we can still shop on Amazon, and at least a few computers out there aren't pwned zombies selling Viagra. The real question we need to ask ourselves isn't if we've "won", but whether the percentage of the aggregate of fraud (online and off, financial and otherwise) is demonstrably bigger? If it's historically been at 2 percent and now it's at 5 percent, then we are failing. If it's about the same, perhaps we just have a migration from offline fraud to online. But at the end of the day the bad guys are going to get their 2 percent, like they always have.

Yes, it's a drag on the system and yes, we all collectively pay for that and it would be great to reduce it. But ultimately although the tactics have changed, the outcome remains the same, regardless of what the punditry tries to tell you.

Rich Mogull is founder of Securosis LLC and a former security industry analyst for Gartner Inc. Special to Dark Reading. Rich has twenty years experience in information security, physical security, and risk management. He specializes in cloud security, data security, application security, emerging security technologies, and security management. He is also the principle course designer of the ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.