[LINK] security myths

stephen at melbpc.org.au stephen at melbpc.org.au
Sat Feb 16 18:02:03 AEDT 2013


"Thirteen IT security myths debunked"

By Ellen Messmer (Network World) 15 February, 2013 23:19
<http://www.arnnet.com.au/article/453966/13_it_security_myths_debunked/>


They're security myths ... oft-repeated and generally accepted notions 
about IT security ... that simply aren't true. 

As we did a year ago, we've asked security professionals to share their 
favorite "security myths" with us. Here are thirteen of them.


Security Myth #1: "Anti-virus is protecting you against malware in an 
efficient way."

Raimund Genes, Trend Micro CTO, says businesses use anti-virus because 
otherwise, "your auditors would kill you if you didn't run A/V." But A/V 
can't reliably protect against a targeted attack because before it's 
launched, attackers have checked to make sure it won't be caught by A/V 
software.

Security Myth #2: "Governments create the most powerful cyberattacks."

John Pescatore, director of emerging security trends at SANS, says most 
government attacks are simply re-using criminal-owned attack resources. 
And the U.S. Department of Defense likes to hype the threat from nation 
states to boost its budget. The sad truth is that denial-of-service 
attacks against banking Web sites such as Citibank can be stopped but 
there hasn't been enough effort to do that. And governments going after 
other governments for espionage is nothing new, with China, the U.S., 
France, Russia and others at it for decades. 

Pescatore also has two other favorite myths that concern cloud security 
that put together are contradictions in themselves: that "cloud services 
can never be secure" because they're shared services that can change 
whenever they want to, and the second that "the cloud is more secure 
because the providers do it for a living." About these two contradictory 
myths, Pescatore points out, "Many of the providers, like Google, Amazon, 
etc. did not build their clouds to provide enterprise class services or 
protect other people's information. In fact, Google built a very powerful 
cloud expressly to collect and expose other people's information via its 
search services." 

But Pescatore also points out that e-mail-based cloud services from 
Google and Microsoft, for example, have so far shown that when customer 
data was exposed, it was very rarely the fault of the provider and could 
mostly be ascribed to phishing attacks on customers. But the enterprise 
customer is still grappling with how to appropriately change its 
processes to match the cloud service providers in terms of incident 
response.

Security Myth #3: "All our accounts are in Active Directory and under 
control."

Tatu Ylonen, inventor of SSH and CEO of SSH Communications Security, says 
this misconception is common, but most organizations have set up and 
largely forgotten functional accounts used by applications and automated 
processes, often managed by encryption keys and never audited. "Many 
large organizations have more keys configured to access their production 
servers than they have user accounts in Active Directory," Ylonen points 
out. "And these keys are never changed, never audited and not controlled. 
The whole identity and access managed field generally manages interactive 
user accounts, and consistently ignores automated access by machines." 
But these keys intended for automated access can be used for attacks and 
virus spread if not properly managed.

Security Myth #4: "Risk management techniques are needed for IT security."

Richard Stiennon, chief research analyst at IT-Harvest, says although 
risk management "has become the accepted managerial technique," in 
reality "it focuses on an impossible task: identifying IT assets and 
ranking their value." No matter how this is attempted, it "will not 
reflect the value that attackers place on intellectual property." 
Stiennon argues "the only practice that will actually improve an 
enterprise's ability to counter targeted attacks is threat management 
which entails deep understanding of adversaries and their targets and 
methodologies."

Security Myth #5: "There are 'best practices' for application security."

Jeremiah Grossman, CTO at WhiteHat Security, says security professionals 
commonly advocate for "best practices" thought to be "universally 
effective" and worthy of investment since they're "essential for 
everyone." These include software training, security testing, threat 
modeling, web application firewalls, and a "hundred other activities." 
But he thinks this typically overlooks the uniqueness of each operational 
environment.

Security Myth #6: "Zero-day exploits are a factor of life and impossible 
to predict or effectively respond to."

Zero-day exploits are those targeting network vulnerabilities not yet 
generally known. But H.D. Moore, CSO at Rapid7 and creator of the 
Metasploit penetration-testing tool, thinks to the contrary, 
that "security professionals can actually do a good job of predicting and 
avoiding problematic software. "If the organization depends on any 
software that is 'impossible' to function without, there should be a plan 
in place for what to do if that software becomes a security risk. 
Selective enablement and limiting the privileges that the software 
receives are both good strategies." He also says another favorite 
security myth is that "You can tell how secure a product or service is 
based on the number of publicly disclosed vulnerabilities." He says a 
good example is the notion that "WordPress is terrible, look at how many 
vulnerabilities have been found so far!" But he says "the deep history of 
software flaws can be the natural result of a piece of software becoming 
popular." Moore concludes, "By contrast, there are dozens of products 
with no published flaws that are often much less secure than a better-
known and more widely audited application. In short, the number of 
security flaws published for a piece of software is a terrible metric for 
how secure the latest version of that software is."

Security Myth #7: "The U.S. electric grid is well-protected under the 
North American Electric Reliability Corp.'s "Critical Infrastructure 
Protection" (CIP) requirements."

Joe Weiss, managing partner at Applied Control Solutions, argues that's a 
myth because CIP, drawn up by the industry itself, applies only to bulk 
distribution of power, not the entire distribution system, and also 
specifies only a certain size of power generation. "80% of the generation 
in the U.S. doesn't have to be looked at under CIP."

Security Myth #8: "I am compliant, therefore I am secure."

Bob Russo, general manager at the PCI Security Standards Council, says 
it's a common notion that businesses think once they get compliant with 
the data-security rules for payment cards, they're "secure once and for 
all." But checking the box for compliance only represents a "snapshot in 
time" while security is a continual process related to people, technology 
and processes.

Security Myth #9: "Security is the chief information security officer's 
problem."

Phil Dunkelberger, president and CEO at start-up Nok Nok Labs, says the 
CISO is going to get the blame for a data breach, mainly because their 
job has them setting a policy or technical course. But many others in the 
organization, especially the IT operations people, also "own security" 
and they need to shoulder more responsibility for it.

Security Myth #10: "You're safer on your mobile device than on the 
computer."

Dr. Hugh Thompson, RSA Conference Program Committee Chair, contends that 
while this "frequent assumption" has some merit, it underestimates how 
some traditional safeguards for computers, such as masked passwords and 
URL previewing, don't apply to mobile devices today. "So while mobile 
devices still offer more security safeguards than laptops or desktops, 
several traditional security practices that are broken can leave you just 
as vulnerable."

Security Myth #11: "You can be 100% secure but you need to give up 
personal freedoms."

Stuart McClure, CEO and president of start-up Cylance, says don't buy the 
argument that to combat the bad guys online, we have to "submit all our 
traffic to the government to do it." Better to get to know the bad guys 
really well and "predict their moves, their tools," and "get into their 
skin."

Security Myth #12: "Point-in-time security is all you need to stop 
malware."

Martin Roesch, founder of Sourcefire and inventor of the Snort intrusion-
detection system, says security defense too often is limited to catching 
or not catching any type of attack, and if it's missed, that 
defense "practically ceases to be a factor in the unfolding follow-on 
activities of an attacker." A newer model of security operates 
continuously to update information even if the initial attack on the 
network is missed in order to understand the scope of the attack and 
contain it.

Security Myth #13: "With the right protection, attackers can be kept out."

Scott Charney, Microsoft corporate vice president Trustworthy Computing, 
says, "We often associate security with keeping people out; locks on our 
doors, firewalls on our computers. But the reality is that even with 
sophisticated security strategies and excellent operations, a persistent 
and determined attacker will eventually find a way to break in. 
Acknowledging that with reality, we should think differently about 
security." For the entire security community, that means a "protect, 
contain and recover" approach to combat threats today and in the future.


Ellen Messmer is senior editor at Network World, an IDG publication and 
website, where she covers news and technology trends related to 
information security. Twitter: MessmerE. E-mail: emessmer at nww.com.
--

Cheers,
Stephen



More information about the Link mailing list