Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/13/2010
12:45 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Accepting The Inevitability Of Attack

Attacks will shift from targeting devices to targeting people, expert say

Protecting against attacks should not be the sole focus of an enterprise's security strategy, especially because attacks are a given today, according to experts who will debate the future of security tomorrow at the Forrester Security Forum in Boston.

"Security has been sold a bill of goods by vendors that protection is what we need. But protection is only one part of it," says Andrew Jaquith, senior analyst for Forrester Research, who will chair the "Looking Forward to Getting Attacked" panel at the Forrester event.

Jaquith says security has three elements: prevention, detection, and response. "If you put all of your eggs in the prevention basket, you find a surprise when those protections fail," says Jaquith, who, along with panelists Herbert H. "Hugh" Thompson, chief security strategist for People Security, and Daniel Geer, chief scientist emeritus at Verdasys, spoke with Dark Reading in advance of the conference.

Instead of just trying to stop everything at the "front door," he says, survivability and recoverability should be what's emphasized. "These things matter a lot," Jaquith says. "Customers tell us endpoint security doesn't work like it used to. But when you set the bar at absolute perfection, of course you're going to be disappointed."

People Security's Thompson says it's not a question of how the security industry has gone wrong, but instead that this is where it's going. "When it comes to security, we're used to thinking in absolutes: We're secure, we're not secure," Thompson says. "But those of us who've worked in security for a long time know it's a continuum. We know attackers are so sophisticated and are evolving techniques faster than we can because their business model is more efficient than ours.

"So how do we focus on recovery and survivability? How do we first notice we've been attacked, and how do we take reasonable precautions?" he says. It's more about mitigating an attack that's likely to happen, he says.

Verdasys' Geer points to this year's Verizon Business breach report, which showed that the big breaches didn't target patchable vulnerabilities in software, a shift from its report last year. "So if big breaches are unpatchable, why do we care about patching?" Geer says.

The underlying problem in security is its lack of agility in shifting with the threats, according to Geer. "Our problem is a lack of agility and the absence of demand for it," he says.

With the mobile revolution and social networking, more security decisions are being placed in the end user's hands; at the same time, social engineering is becoming more of a problem for organizations.

Forrester's Jaquith predicts that attacks will target people more than devices: "A lot of traditional vectors don't work as well other than the odd exploit," he says. "So attackers will have to rely more on social engineering techniques than a buffer overflow to take over an entire system ... The challenge is getting users to do the right thing."

That's a tall order, Thompson maintains. "Users have shown consistently that they make bad security choices with technology," he says. "You've got to wonder if the real threat in two or five years is the personalized targeted attack -- not the viruses out there with a defined signature that my AV can catch."

Attackers could glean enough information from a user's social networking posts to fool that person into opening a file or clicking on a link, or to simulate that person, Thompson says. "At a point, I would fall for something if someone had set up the right context -- if the email came at the right time with the right key words and references," he says.

Thompson says he'd like to see tools that help users make better decisions in these situations -- to provide warning signals, for instance: "You posted this information on Facebook, LinkedIn" so that information about a dinner, for example, was available on those sites. That way the email citing meeting with someone you don't remember could be suspicious.

Mobile vendors will do a better job building security into their operating systems and shielding users from basic attacks, notes Forrester's Jaquith. "There have been shrill blog posts [warning] about mobile security threats. But most of those threats are about what you [the user] decide ... and are social" engineering-type attacks, he says.

Jaquith says a new breed of mobile security vendors will provide different kinds of products and services than we have today in security. "Today's model is on the endpoint, with an agent piece of software that provides services on your behalf. But new platforms are much closer to sealed boxes, more like toasters than PCs ... no one wants a PC AV model replicated on mobile devices."

Security tools for mobile devices will center around theft and data loss prevention, data resiliency, and backup, he says.

But Thompson says he wonders if anyone really knows what threats mobile devices eventually will face. "The smartphone is more and more of a gateway into the enterprise than it was in the past. We're also seeing a convergence of platforms, and as these devices manage more and more sensitive information, it seems the economics of an attack would be easier ... through a mobile device," he says. "There's going to be a new type of threat that evolves out there, and I don't think mobile security vendors know what that threat is going to look like [yet]," he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7914
PUBLISHED: 2020-02-21
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
CVE-2016-4606
PUBLISHED: 2020-02-21
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
CVE-2020-5243
PUBLISHED: 2020-02-21
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent hea...
CVE-2019-14688
PUBLISHED: 2020-02-20
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produc...
CVE-2019-19694
PUBLISHED: 2020-02-20
The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the ...