Showing posts with label reports. Show all posts
Showing posts with label reports. Show all posts

Wednesday, October 24, 2007

Microsoft, Explain Threats to Microsoft

The Microsoft Malware Protection Center recently published cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir third Security Intelligence Report. The front page of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 report says

An in-depth perspective on software vulnerabilities and exploits, malicious code threats, and potentially unwanted software, focusing on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first half of 2007

Inside it continues:

This report provides an in-depth perspective on software vulnerabilities (both in Microsoft software and third-party software), software exploits (for which cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re is a related MSRC bulletin), malicious software, and potentially unwanted software. The lists below summarize cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 key points from each section of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 report...

The number of disclosures of new software vulnerabilities across cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 industry continues to be in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 thousands...


Contrast that proper use of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 word vulnerabilities in those excerpts with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 incorrect use of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 word threat in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 quotes I noted in Someone Please Explain Threats to Microsoft:

As you go about filling in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 threat model threat list, it’s important to consider cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 consequences of entering threats and mitigations. While it can be easy to find threats, it is important to realize that all threats have real-world consequences for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 development team...

When we’re threat modeling, we should ensure that we’ve identified as many of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 potential threats as possible (even if you think cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y’re trivial). At a minimum, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 threats we list that we chose to ignore will remain in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 document to provide guidance for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 future.


In that excerpt, all uses of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 word threat should be replaced with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 word vulnerability, with possible exception of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 term "threat modeling." In reality it should be "attack modeling," but in all ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r cases Microsoft is clearly talking about discovering holes/flaws/problems in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir software, i.e., vulnerabilities.

So, it seems that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 people who have cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 big security picture -- those who write cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Microsoft Security Intelligence Reports -- know cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 difference between a threat and a vulnerability. The developers who focus on Microsoft's software -- those exercising cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Microsoft Security Development Lifecycle -- are using "threat" when cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y should be saying "vulnerability."

It would be good for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 SIR people to talk to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 SDLC people. Without that coordination Microsoft's developers will continue to view cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 security problem incorrectly, and by extension, so will cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 customers who look to Microsoft for intellectual guidance.

On a related note, I was happy to see cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 latest SIR available as a .pdf.

Monday, September 25, 2006

Symantec Internet Security Threat Report Volume X

Symantec has posted (for free, no registration!) cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 latest Internet Security Threat Report. I'm very pleased to see that such a high-profile report uses threat and vulnerability terms properly, and features details on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 methodology used to produce cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 report. Here's some of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Executive Summary.

In contrast to previously observed widespread, network-based attacks, attackers today tend to be more focused, often targeting client-side applications... The current threat landscape is populated by lower profile, more targeted attacks, attacks that propagate at a slower rate in order to avoid detection and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365reby increase cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 likelihood of successful compromise.

Instead of exploiting vulnerabilities in servers, as traditional attacks often did, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se threats tend to exploit vulnerabilities in client-side applications that require a degree of user interaction, such as word processing and spreadsheet programs.

A number of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se have been zero-day vulnerabilities. These types of threats also attempt to escape detection in order to remain on host systems for longer periods so that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y can steal information or provide remote access.


Do you see how important it is to differentiate between threats and vulnerabilities when cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 terms are used in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same sentence? Bravo Symantec.

This volume of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet Security Threat Report will offer an analysis and discussion of threat activity that took place between January 1 and June 30, 2006. This brief summary will offer a synopsis of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 data and trends discussed in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 main report. Symantec will continue to monitor and assess threat activity in order to best prepare consumers and enterprises for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 complex Internet security issues to come.

How does Symantec "monitor and assess threat activity"? By watching, of course.

The Symantec™ Global Intelligence Network comprehensively tracks attack activity across cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 entire Internet. The Global Intelligence Network, which includes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Symantec DeepSight™ Threat Management System and Symantec™ Managed Security Services, consists of over 40,000 sensors monitoring network activity in over 180 countries. As well, Symantec gacá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365rs malicious code data along with spyware and adware reports from over 120 million client, server, and gateway systems that have deployed Symantec’s antivirus products.

They're not using counts of vulnerabilities announced on mailing lists. They're watching exploitation of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir customer base.

Their Vulnerability Trend Highlights are fascinating:

  • Symantec documented 2,249 new vulnerabilities, up 18% over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 second half of
    2005. This is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 highest number ever recorded for a six-month period.

  • Web application vulnerabilities made up 69% of all vulnerabilities this period.

  • Mozilla browsers had cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most vulnerabilities, 47, compared to 38 in Microsoft Internet Explorer.

  • In cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first six months of 2006, 80% of vulnerabilities were considered easily exploitable, up from 79%.

  • Seventy-eight percent of easily exploitable vulnerabilities affected Web applications.

  • The window of exposure for enterprise vulnerabilities was 28 days.

  • Internet Explorer had an average window of exposure of nine days, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 largest of any Web browser. Apple Safari averaged five days, followed by Opera with two days and Mozilla with one day.

  • In cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first half of 2006, Sun operating systems had cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 highest average patch development time, with 89 days, followed by Hewlett Packard with 53 days, Apple with 37 days and Microsoft and Red Hat with 13 days.


I think it's interesting that Mozilla had more vulnerabilities, but a far smaller vulnerability window, than Internet Explorer.

I recommend reading cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 whole report, or at least cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 executive summary.

Monday, September 18, 2006

Insider Threat Study

I received a copy of a study announced by ArcSight and conducted by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Ponemon Institute. I mention this for two reasons. One, it highlights issues regarding cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 meaning of security terms. Two, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 content is worth a look.

First, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 email I received bore cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 subject "Are Executives cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Cause of Insider Threats?". I wondered if cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 study examined if executives were cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 parties with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 intentions and capabilities to exploit weaknesses in assets. That's what a threat is, and a study that implied executives (and not corporate minions or IT staff) were cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 real problem would be noteworthy in its own right.

Near cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 beginning of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 report I read cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 following:

The survey was sponsored by ArcSight, an enterprise security management company, and queried 461 respondents who are employed in corporate IT departments within U.S.-based organizations.

For purposes of this survey, we define cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 "insider threat" as cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 misuse or destruction of sensitive or confidential information, as well as IT equipment that houses this data, by employees, contractors and ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365rs.


They're actually talking about attacks caused by insiders, not "insider threats." Working with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir language, an insider threat would be "those who misuse or destroy sensitive or confidential information, as well as IT equipment that houses this data."

The report continues:

"Insider threats occur because of human error such as mistakes, negligence, reckless behavior, and sometimes even corporate sabotage."

Not really. Insider threats take advantage of vulnerabilities caused by mistakes and negligence. Insider threats employ reckles behavior (if not truly intending to cause harm) or corporate sabotage (if intending to cause harm) as attack methods.

Our survey sought to answer cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 following three questions.

1. What are cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 root causes of insider threats and how do information security practitioners respond to this pervasive IT and business risk?


They actually mean "what are cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 root causes of vulnerabilities that are exploited by insider threats, and how to infosec practitioners mitigate risks?" To truly address root causes of insider threats, one would analyze cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 motivations of threats cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365mselves, like greed, malice, etc.

2. What technologies, practices and procedures are employed by organizations to reduce or mitigate insider-related risks?

That's great. Risks is used appropriately.

3. What are cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 issues, challenges and possible impediments to effectively detecting and preventing insider threats?

I would say "detecting and preventing attacks by insider threats."

The following are cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most salient findings in our study: Data breaches go unreported. While we seem to be inundated with reports of data breaches, we may not know cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 full extent of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 problem. More than 78% of respondents said that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re has been at least one and possibly more unreported insider-related security breaches within cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir company.

Wow, that's a lot. Let's look for evidence in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 report.

Table 11 reports that over 78% of respondents know of an insider-related security incident that was not publicly disclosed.



Notice Table 11 asks "Do you know of an insider-related incident in your organization (or any ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r organization in your industry) which was not disclosed to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 public or to law enforcement?" (emphasis added)

That 78% figure doesn't mean that "more than 78% of respondents said that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re has been at least one and possibly more unreported insider-related security breaches within cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir company" at all! In fact, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re could be zero unreported breaches in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 surveyed companies, and all respondents answering "yes" could be pointing to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same incident at someone else's company.

This idea is backed up by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 following finding:

Table 7 shows that over 59% of respondents believe that insider-related problems are more likely to occur outside of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir departments or organizational units.

So almost 60% of respondents think problems are likely to happen someplace else. That reminds me of surveys that say parents think schools in general are poor, but cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 school cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir child attends is fine.

While I think cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re is some interesting data in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 survey report, I would keep my analysis in mind while reading it.

Monday, September 26, 2005

Webroot State of Spyware Report

On a flight from San Franciso to Washington Dulles I managed to read cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 latest State of Spyware report from Webroot Software. I'm not sure how I got cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 heavy printed version. Maybe it was sent courtesy of Richard Stiennon, who is Vice President of Threat Research. (That's an interesting title.)

I thought cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 report was useful. It provides a broad look at spyware, and specifics on several examples. It contains an excellent section on spyware-related legislation. The report provides plenty of background for management who need justification to spend money on spyware defenses. I even bought into cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 idea that automated spyware defenses are required.

>On a related note, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Symantec Internet Security Threat Report Volume VIII is available for download. I have not read this one yet. It is a huge .pdf though. I believe a report like that complements material from organizations like Webroot. Symantec takes a broader look at Internet threats. It also examines vulnerabilities (which we know are not threats).

Wednesday, March 30, 2005

Thoughts on New Cyber Security Report

Today I skimmed cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 latest report from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 President's Information Technology Advisory Committee (PITAC) titled Cyber Security: A Crisis of Prioritization (.pdf). This Government Computer News Story summarizes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 reports findings. Briefly, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y are cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 nation's critical infrastructures remain vulnerable to attack, and federal security research and development funding is misallocated. PITAC estimates "cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re are fewer than 250 active cyber security or cyber assurance specialists, many of whom lack eicá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r formal training or extensive professional experience in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 field." I agree with this claim; it is very difficult to find anyone with deep and broad security degrees and experience I would trust to teach future practitioners.

I was pleased to see cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 report list cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 following as some of its ten research priorities, as cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y are near to my own interests:

- Monitoring and Detection. Regardless of progress made in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 preceding research areas, unanticipated events will still occur. When cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y do, tools to monitor and understand what is happening are needed to enable cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 proper deployment of appropriate defensive measures. The ability of current tools that monitor irregular network activity to rapidly identify cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 underlying cause is primitive. The current advantage that adversaries enjoy will increase as cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y become more knowledgeable and as cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet becomes larger and more complex. Research subtopics include:

-- Dynamic protection that can react when attacks are detected, possibly by increasing monitoring activities
-- Global scale monitoring and intrusion detection
-- Monitoring of systems to ensure that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y meet declared security policies
-- Better tools based on improved models that characterize "normal" behavior
-- Real-time data collection, storage, mining, and analysis during a crisis
-- Usable presentation interfaces that allow operators to better understand incidents in progress

- Cyber Forensics: Catching Criminals and Deterring Criminal Activities. The rapid arrest and conviction of criminals is a primary goal of law enforcement and also serves as a deterrent. When potential criminals believe cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re is a strong chance that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y will be caught and convicted, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y are more reluctant to commit crimes. Current capabilities to investigate cyber crime, identify perpetrators, gacá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r and present evidence, and convict criminals are woefully inadequate. Compounding cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 problem, we do not really know how to deter cyber crime. Very few of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 thousands of cyber criminals active today are being caught. There is a pressing need to develop new tools and techniques to investigate cyber crimes and prosecute criminals. Robust cyber forensic methods are also needed that will prove capable of withstanding cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 burden of proof in court, whecá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r employed to prosecute criminals or exonerate cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 innocent. Research subtopics include:

-- Identifying cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 origin of cyber attacks, including traceback of network traffic
-- Identifying attackers based on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir behavior
-- Collecting evidence in uncooperative network environments
-- Tracing stolen information used in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 growing traffic in fraud, identity cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ft, and intellectual property cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ft, including tools and protocols for recovering trace evidence from volatile and incompletely-erased computing media, disks, cell phones, PDAs, and embedded systems
-- Tools and protocols to search massive data stores for specific information and indicators, possibly while cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 data stores are in use
-- Fundamental research to develop forensic-friendly system architectures that are more amenable to investigation when incidents occur

I intend to keep my eyes open for institutions looking for researchers to pursue cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se areas.

Friday, September 24, 2004

Security Reports Everywhere

The latest Symantec Internet Security Threat Report (volume VI) was released this week, along with Six Secrets of Highly Secure Organizations by CIO, CSO, and PricewaterhouseCoopers. The Symantec report requires "registration," but in return you receive a hefty 50 pages or so of data (ignoring cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 blank pages, covers, etc.) Here are a few excerpts I found interesting:


"Over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 past six months, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 average time between cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 announcement of a vulnerability and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 appearance of associated exploit code was 5.8 days... This means that, on average, organizations have less than a week to patch all cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir systems on which cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 vulnerable application is running.

Over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first six months of 2004, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 number of monitored bots rose from well under 2,000 computers to more than 30,000.

Over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first six months of 2004, Symantec observed worm traffic originating from Fortune 100 corporations. This data was gacá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365red not by monitoring cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Fortune 100 companies cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365mselves, but by analyzing attack data that revealed cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 source IP addresses of attack activity. The purpose of this analysis was to determine how many of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se systems were infected by worms and actively being used to propagate worms. More than 40% of Fortune 100 companies controlled IP addresses from which worm-related attacks propagated.

In cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first half of 2004, 39% of disclosed vulnerabilities were associated with Web application technologies.

Symantec expects that recent Linux and BSD vulnerabilities that have been discovered and used in proof-of-concept exploits will be used as exploit-based worms in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 near future.

[Regarding appliances like SOHO routers, firewalls, and VPN endpoints,] as technical details of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se devices have become public, attackers have modified cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 firmware to provide internal access and even allow attackers to monitor traffic on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 network."

I recommend downloading and perusing cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 whole report.

The Six Secrets report confirmed a few of my opinions. For example, it seems cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 idea of a "return on investment" (ROI) for security still doesn't convince managers to pay for security:

"Negative factors (such as fear of litigation) remained cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 primary drivers of security spending. Positive factors (such as contributing to business objectives) were less common."

Paying for security is like buying insurance. Security is an exercise in cost avoidance. There is little or no "return" on an "investment" in security. Paying to prevent or mitigate intrusions as cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 money spent is not an "investment."

In short, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 "six secrets" were:

1. Spend more
2. Separate information security from IT
3. Conduct a penetration test
4. Create a comprehensive risk assessment process
5. Define your overall security architecture
6. Establish a quarterly review process

CIO should have included a seventh step:

7. Maintain network and threat awareness

The risk equation is:

Risk = Threats X Vulnerabilities X Asset Value

Currently security folks spend time on vulnerabilities and assets, but hardly any on threats. How did this happen?

Organizations began cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir security evolution by looking at vulnerabilities, which launched cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 "vulnerability management" craze. At first every piece of infrastructure was considered "critical," which meant nothing was truly important. Once asset value was taken into account, assets were prioritized and vulnerabilities in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most critical assets were addressed first via patch management, access control, and ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r countermeasures. This process encompasses steps 3-6 above.

Unfortunately, far too many security experts ignore cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 third element of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 risk equation -- threats. Of course cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re are vendors who sell "Threat Correlation Modules," but cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se have nothing to do with true threats. Remember a threat is a party with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 capabilities and intentions to exploit a vulnerability. An intruder in Denmark with a hatred of Shell Oil and a zero day exploit for Apache is a threat to Shell Oil. A buffer overflow condition in Apache is a vulnerability for Shell Oil if it's running cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 affected software. A product which offers information on a vulnerability in Apache while identifying cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Apache Web servers in an organization with that vulnerability is a vulnerability correlation product, not a "threat correlation module."

So how does an organization acquire cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 third piece of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 risk equation -- threats? The answer is monitoring. I advocate network security monitoring, which is "cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 collection, analysis, and escalation of indications and warnings to detect and respond to intrusions." Only by acquiring network awareness, primarily through monitoring for suspicious and malicious activity, can one identify and assess threats. Why spend time, people, and equipment securing a vulnerability in SNMP, for example, if hardly anyone is seeking to exploit it?

Until more of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 security world realizes that network awareness is just as important as enumerating vulnerabilities and prioritizing assets, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 adversary will have cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 upper hand.

If you'd like to know more about this sort of thinking, chapter 1 of The Tao of Network Security Monitoring addresses cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 threat equation, defines its components, and offers ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r commentary.