Security

author-image
PCQ Bureau
New Update

Today, a security threat can enter from anywhere, be it
through e-mail, a Web browser, or even an infected notebook pluging into your
network. It could also come from an unpatched machine or a disgruntled employee;
or from a seemingly innocent phone call, a technique more that comes under the
social engineering type of attack. We recall incidents of people having received
phone calls from people calling themselves ones from credit card companies, and
tried to wriggle out your credit card details. Besides social engineering, we
also saw lots of phishing and pharming scams this year, two techniques aimed at
fishing out a user's personal information. So security has definitely been on
the top of everyone's mind this year, and will continue to be that way next
year as well. As most of these attacks are aimed at stealing identities, we're
seeing a lot of action in the identity management solutions market. And as more
enterprise businesses moves online, they need better security measures. This saw
a rise in SSL based VPN solutions, and even a rise in integrated security
appliances applications.

Predictions for 2006
  • Role-based access
    control will increase in use, and identity management solutions will
    become more visible.

  • Appliance based
    security products will increase, and more players in this field likely
    to enter.

  • SSL based VPNs on
    the rise as more organizations do business online.

Security appliances
 

A lot of vendors are entering the market with security
appliances and integrated appliances that have firewalls, anti-spam, antivirus,
and even end-to-end encryption. Also included in these appliances is the ability
to demarcate DMZs and support VPN over IPSec or PPTP with either 3DES or AES
(256-bit) encryption. The IDS features on these boxes range from detecting
various kinds of known attacks including flooding, IP spoofing, DoS, etc. Such a
box can also react in case of emergencies by dropping packets from the
attacker's address. Some appliances even have network anti-virus capability.
These need to be geared to meet enterprise-class performance requirements for
availability and speed. The iForce IDS appliance from Symantec for instance is
supposed to monitor networks at speeds of upto 2 Gbps on some models.

Vulnerability stats
 

The number of vulnerabilities reported this year is up
about 500 incidents from last year and stands at 4,268. This is about 25 times
more than ten years ago when a few hundred vulnerabilities used to be reported
each year. That trend was broken between 2000-02 when it rapidly doubled each
year and went upto 4,129 at the end of that period. This year's count so far
is more than that figure. The most frequent ports under attack were reported to
be FTP, SSH, DNS, HTTP/HTTPS, SunRPC, NetBIOS and SQL Server. Thankfully, most
of these could be mitigated by upgrading to newer versions of software or
changing port numbers. CERT sees the number of Trojans and self-propagating
worms as an area of concern.

Hit or
Miss
Certification

One influencer is the BS17799 certification for security professionals and the second is an amazing number of computer forensics and ethical hacking institutes that opened up in the last one year. These institutions seek to teach IT professionals how to better secure their systems and networks by putting them first on the other side of the table (as the would-be hacker).Security and auditing also took on a lot of importance, mainly because of the number of internal documents that found their way into the public eye. It is expected that a larger number of companies of all sizes will invest in auditing their deployments and tightening security, physical and cyber, in the next year or two.
DRM and Sony

The latest in security issues to hit the headlines is the Sony DRM issue. Sony-BMG (the records label) apparently released a limited number of CDs into the market with a new kind of copy protection mechanism. They made it so you could play and copy music out of these CDs only if you used the software distributed on those CDs. However, in order to implement this, Sony-BMG used a technology called a 'rootkit'. These are programs that provide high levels of access to a computer system. As of date, several Trojans and viruses have emerged on the Net that make use of Sony's rootkit application to give their programmers backdoor access to the affected system. And to infect your system, all you need to do is play one of these CDs on your PC. 

Social engineering & ID theft
 

Social engineering attacks, like the one that happened with
a Delhi-based call center where one of the executives sold a Sun reporter
details of bank accounts, credit cards and driver's license of UK bank
customers for under $10 each. The call center worker also reportedly assured the
reporter that he could sell him 2 Lakh such account information a month. Earlier
this year, US customers of Citibank suffered thefts of $ 350,000 because of a
similar breach at another call center in

India


. The twin calamities of the Asian Tsunami and the earthquake also prompted
several websites of questionable intentions to spring up and seek donations on
behalf of the victims, only to disappear after they had collected a sizeable
fortune. This has led to the concern of managing identity securely. Two main
technologies leading ID management are devices like SecurID that have one-time
keys that you use at designated terminals or screens, and digital certificates.
With more financial and govt services going online, the need for effective
identity management only goes up.

Everything's cached
 

Nowadays, anything that's exposed to the Web has mostly
likely been stored away forever in some corner of the Internet. Internet
archival systems like The Wayback Machine and content replication systems that
provide mirroring services are but the tip of the ice-berg. To this add the
proliferation of community networks (blogs, et al) where something rumored to
have been said catches on like wild fire and gets endlessly replicated and
linked so anyone can find it with a simple keyword... only makes the problem
worse. What problem? What if your internal employee appraisal letters somehow
got onto Google? Recently, some of Papa John's-a Pizza house in

USA


-internal e-mail got onto Google accidentally (they're still there as we go
to press). The problem with the permanence of content on the Net is that even if
you act swiftly to protect your information with simple ways as password
protection or a change of URL, caching mechanisms will still preserve their own
copies for quite some time to come.

Disk space-full
 

Scientists postulate that about 23% of the Universe is
composed of dark matter. Stuff we cannot see, but their presence has direct
consequences on our Universe. Much the same is true for files and programs on
our hard disk. In order for so many things to happen when we just click onto a
Web page, our computer downloads and runs so many files and programs-large and
small. And all of it is on our computer's hard disk. Those that run may never,
in fact, leave our computer completely, no matter what tools we use. This in
fact, is the single biggest challenge for system administrators world-wide. Even
malware has its defenses, but 'dark files' have no known cure. The problem
is that most combative techniques use either black or white lists to eliminate
the unwanted. While most don't know the difference, they are more often than
not out-of-date and require constant administrative overheads to keep them
updated. Resurgent defenses now include system-wide policies that let users than
software vendors decide what's useful and what's not and discard the rest;
the term being 'gray-listing'.

Cracking for the public
 

Cracking passwords, it seems, has become commonly
accessible and fashionable to do. A site has sprung up powered by Zhu
Shuanglei's 'Rainbow Crack' engine (an open source download) that promises
to place online about 500 GB of rainbow tables (pre-computed password hashes)
readily usable by anyone who pays them for an account. RainbowCrack-Online.com
claims to be for cracking what Google is for search. A lusty claim sure, but
imagine how much more you need to protect your systems once such a database is
at the back and call of every cracker around the world! The price tag on it
should keep away most kiddie-crackers and is purportedly to be used only for
white-collar cracking for security auditing.

A turnaround?
 

Marcus Barnum (the inventor of the proxy firewall) would
have us believe that patching systems and doing security audits is the wrong way
to do things, since that means and ensures that things aren't 'secure by
default'. In his article-The Six Dumbest Ideas in Computer
Security-(http://www. ranum. com/security/computer_security /editorials/dumb/index.html),
he outlines what he thinks really needs to be done-which is basically to
disallow anything you do not know to be good, rather than attempt to create a
blacklist and block only known bad things. He also cautions his readers not to
fall into the age-old trap of implementing the 'latest' in the attempt to
stay ahead of the hacker, or trust in periodic reeducation of network users who
insist on opening attachments from strangers or believing email from banks they
don't have accounts with. Marcus agrees with Kevin (Kevin Mitnick, 'The Art
of Deception') in that security is a social as well as a technological
concern. But, contrary to Kevin's idea of user education, Marcus would like
enterprises get into proactively blocking unwanted people and software rather
than relying on users to do it.

Stay connected with us through our social media channels for the latest updates and news!

Follow us: