<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Victor Wheatman, Author at Security Current</title>
	<atom:link href="/author/victor-wheatman/feed/" rel="self" type="application/rss+xml" />
	<link>/author/victor-wheatman/</link>
	<description>Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.</description>
	<lastBuildDate>Wed, 08 Nov 2017 05:48:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>/wp-content/uploads/2020/09/cropped-Security-Current-Round-Logo-32x32.png</url>
	<title>Victor Wheatman, Author at Security Current</title>
	<link>/author/victor-wheatman/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What CISOs Must Know About Fighting Identity Theft</title>
		<link>/what-cisos-must-know-about-fighting-identity-theft/</link>
					<comments>/what-cisos-must-know-about-fighting-identity-theft/#respond</comments>
		
		<dc:creator><![CDATA[Victor Wheatman]]></dc:creator>
		<pubDate>Sun, 05 Oct 2014 23:30:53 +0000</pubDate>
				<category><![CDATA[Archived Articles]]></category>
		<guid isPermaLink="false">http://184.154.4.181/?p=16953</guid>

					<description><![CDATA[<p>High-level strategies for defending against attacks to steal identities are twofold: solutions on the back end, and what consumers and business partners can do to protect themselves. Almost daily, we&#8230;</p>
<p>The post <a href="/what-cisos-must-know-about-fighting-identity-theft/">What CISOs Must Know About Fighting Identity Theft</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fwhat-cisos-must-know-about-fighting-identity-theft%2F&amp;linkname=What%20CISOs%20Must%20Know%20About%20Fighting%20Identity%20Theft" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fwhat-cisos-must-know-about-fighting-identity-theft%2F&amp;linkname=What%20CISOs%20Must%20Know%20About%20Fighting%20Identity%20Theft" title="LinkedIn" rel="nofollow noopener" target="_blank"></a></p><p><em>High-level strategies for defending against attacks to steal identities are twofold: solutions on the back end, and what consumers and business partners can do to protect themselves.</em></p>
<p>Almost daily, we hear about security breaches with millions of personal data records compromised, requiring companies to notify those affected, and to provide free credit and identity theft monitoring services. Invariably, local newscasters finish their reports advising viewers to &#8220;change their passwords.&#8221;  Easily said.</p>
<p>There are other things both consumers and businesses can and should do to fight identity theft besides inconvenient password changes.  These mitigating measures involve both the back and front ends of transaction systems.</p>
<p>But how do breaches like those reported happen?</p>
<p>Clearly the bad guys are finding access points to sneak into databases and steal massive amounts of data &#8212; sometimes all at once, sometimes in drips and drabs least someone notice the exfiltration of data.</p>
<p>Sometimes the attackers are politically motivated.  For example, there is evidence that recent attacks on JPMorgan Chase originated in Russia in response to financial sanctions imposed on Russia for attacking Ukraine and seizing Crimea.  Other times, it&#8217;s simpler criminal activity with the perpetrators motivated to make money through identity theft.</p>
<p>Individuals can take unwise actions opening themselves to attack.  These actions include responding to spam and phishing attacks, or sharing on-line credentials with family members, friends or caregivers, leading to &#8220;friendly-fraud.&#8221;</p>
<p>Further, when small or medium sized business owners intermingle personal and business accounts, they become bigger targets than ordinary netizens because their accounts are of higher value. One of the biggest consumer vulnerabilities is created through social media behaviors.  I&#8217;ve joked about the CIA/NSA-sponsored data collection project called &#8220;Facebook&#8221; where people willing give up personal information such as full birthday or Mother&#8217;s maiden name (hey, she&#8217;s a &#8220;friend&#8221;) which can be used for brute force password attacks or spear phishing.  And then there are LinkedIn and Google+ users who have higher fraud rates than other groups, according to studies by Javelin Strategy and Research.</p>
<p>High-level strategies for defending against identity theft attacks are two fold: implementing systems on the back end, and steps consumers and business partners can and should take to protect themselves.</p>
<p>Back end strategies include Identity and Access Management programs that embrace not only internal users, but also customers and consumers.  Out of band one time passwords (OTPs) using tokens or software equivalents for high value transactions and challenge questions all help.  Biometrics also help mitigate identity theft for account takeover, new account fraud, stolen user names, or criminal payment channels such as counterfeit credit card accounts.</p>
<p>Database Activity Monitoring at the back end can alert if unauthorized inquiries are made against sensitive databases while Data Loss Prevention tools can alert and protect against the exfiltration of personal information.</p>
<p>The most direct product class for fighting identity theft at the back end are Web Fraud Detection solutions. These systems handle transaction scoring, link analysis and correlation analytics that work to verify that traffic is not coming from known threat sources.</p>
<p>These solutions work to verify the user location, what specific machine they&#8217;re using based on the endpoint&#8217;s &#8220;fingerprint,&#8221; and examine the types of inquires and transactions being initiated for policy violations. The findings are compared against expectations based on previous interactions with a specific user, or against rules about what behavior is expected.  If something appears out of range, the session can be dropped, or additional information can be requested to verify the user.  B</p>
<p>ecause credit card companies have a vested interest in fighting identity theft and fraud, some have acquired companies with relevant offerings: Accertify (American Express), Cybersource (VISA) and DataCash (MasterCard).  Other providers of Web Fraud Detection products include Silver Tail Systems (acquired by RSA, the security division of EMC), Trusteer (acquired by IBM), Oracle and ThreatMetrix.</p>
<p>So mitigating technologies at the back end can help fight identity theft.  But that&#8217;s only part of the solution. Consumers and business partners can set up credit/debit card and bank account alerts to notify about legitimate transactions, and those that are not authorized.  Surveys conducted by Javelin Strategy and Research have found consumers increasingly willing to do this, as part of taking on more responsibility for protecting their on-line activities, supplementing safeguards and loss limits covered under consumer protection rules and regulations.</p>
<p>Another individual response is to use Identity Protection Services (IDPS) such as LifeLock,  EZShield, and services offered by the larger credit bureaus.  There are also companies such as Intersections which market directly to consumers, but also support private labeled services offered by banks or affinity groups such as auto clubs to their customers. IDPS vendors provide a range of services, but some also offer consulting and other services to enterprises to support regulatory compliance both before and after an identity theft breach occurs.</p>
<p>The services provided consumers include monitoring the credit bureaus for inquiries and changes, scanning databases such as court records for errors, shifting through black market and &#8220;darknet&#8221; bulletin boards for stolen identity data such as credit card numbers, and alerting on any unauthorized change attempts made to sensitive records such as Social Security.</p>
<p>If there is a breach impacting an IDPS customer, resolution services help to recover losses and to protect identity going forward.  This includes assistance in cancelling credit cards, putting flags or freezes on credit bureau reports, aiding forensic investigations, and working with law enforcement.</p>
<p>True,  consumers can do things like cancelling their own credit cards themselves.  But for some, having a service with specialized knowledge backing them up provides a measure of peace of mind.  However none of the IDPS companies can really prevent identity theft.  They can just help make it harder for the bad guys and easier for the victim to recover &#8212; but at a cost.</p>
<p>There have been marketing and business practice controversies regarding IDPS.  Regulatory and oversight agencies have fined some providers for signing up consumers against their will and for false promises. Some financial institutions that partnered with IDPS vendors have also been fined and have stopped offering such services.</p>
<p>One common complaint is that a vendor says it will alert customers when a credit check is performed on them but there are numerous instances of IDPS customers making significant purchases, such as applying for a mortgage, buying a car, or getting a new credit card, which require a credit check but the IDPS failed to alert the customer. Accordingly, promises are being made which some of these companies do not fulfill.</p>
<p>Nevertheless, IDPS companies, and knowledgeable consumers who monitor their accounts daily for questionable transactions, are part of a back end/front end strategy for fighting ID theft and the resulting fraud.</p>
<p>CISOs should be aware of the complementary nature of these offerings, as well as Web Fraud Detection and other technologies as they work to combat the increasingly creative bad guys looking to steal identities in order to commit financial and other fraud.</p>
<p>The post <a href="/what-cisos-must-know-about-fighting-identity-theft/">What CISOs Must Know About Fighting Identity Theft</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/what-cisos-must-know-about-fighting-identity-theft/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Blending Two Cultures: Management Perspectives on Converging Physical and Information Security</title>
		<link>/blending-two-cultures-management-perspectives-on-converging-physical-and-information-security/</link>
					<comments>/blending-two-cultures-management-perspectives-on-converging-physical-and-information-security/#respond</comments>
		
		<dc:creator><![CDATA[Victor Wheatman]]></dc:creator>
		<pubDate>Mon, 27 Jan 2014 17:23:36 +0000</pubDate>
				<category><![CDATA[Archived Articles]]></category>
		<guid isPermaLink="false">http://184.154.4.181/?p=17080</guid>

					<description><![CDATA[<p>Hey, here&#8217;s a good idea: let&#8217;s have the part of facilities management that deals with the physical security of the office park, the factory, and the government facility work with&#8230;</p>
<p>The post <a href="/blending-two-cultures-management-perspectives-on-converging-physical-and-information-security/">Blending Two Cultures: Management Perspectives on Converging Physical and Information Security</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fblending-two-cultures-management-perspectives-on-converging-physical-and-information-security%2F&amp;linkname=Blending%20Two%20Cultures%3A%20Management%20Perspectives%20on%20Converging%20Physical%20and%20Information%20Security" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fblending-two-cultures-management-perspectives-on-converging-physical-and-information-security%2F&amp;linkname=Blending%20Two%20Cultures%3A%20Management%20Perspectives%20on%20Converging%20Physical%20and%20Information%20Security" title="LinkedIn" rel="nofollow noopener" target="_blank"></a></p><p>Hey, here&#8217;s a good idea: let&#8217;s have the part of facilities management that deals with the physical security of the office park, the factory, and the government facility work with the folks that handle IT Security. Let&#8217;s put those folks together in a room, see where there&#8217;s overlap, eliminate duplication of effort and maybe even save money by flattening the overall &#8220;security&#8221; management system. It&#8217;s all &#8220;Security.&#8221;   Yeah, that should work. Bring them together.</p>
<p>Oh boy.</p>
<p>Let&#8217;s take the way-back machine for some literary perspective. In 1959, novelist and scientist CP Snow delivered his <u>The Two Cultures</u> lecture.  Its central thesis was the breakdown of communication between the <a href="https://en.wikipedia.org/wiki/science">sciences</a> and the <a href="https://en.wikipedia.org/wiki/humanities">humanities</a>.  Snow said this was a major hindrance to solving the world&#8217;s problems.  He likened it to a rift, a lack of understanding, maybe tinged with hostility, between scientists and literary intellectuals.</p>
<p>Okay, it&#8217;s not an exact comparison.  Putting that aside, we hear a recurring opinion that the physical and cyber security communities need to come together, to communicate better, and to leverage what one discipline knows to the other. The problem is that the message usually comes from vendors pushing a &#8220;converged&#8221; solution.</p>
<p>Let&#8217;s face it. The former military or law enforcement types, representing those who patrol the parameter, guard the parking lot gates and supervise visitor check-in don&#8217;t have much in common with the geeks from the IT department and vice versa.  The facilities management people handle fencing, building access, foot patrols, keys and locks.  The IT security people run firewalls, intrusion protection systems, the Identity and Access Management systems and all the rest of that &#8220;stuff.&#8221;</p>
<p>They come from two different cultures, but they have a similar mindset and mission, filtered through risk analysis.</p>
<p>Despite the differences and faulty management thinking that &#8220;security is security,&#8221; organizations are putting together aspects of physical and IT security.  Good things can come from it,  IF expectations are reasonable.  The title Chief Security Officer (CSO) implies managing ALL security and some companies and agencies have recruited or promoted folks to CSO. The job can be a career stepping stone for someone with the confidence and background to handle it, but it&#8217;s a risky step for someone making a power play or for an empire builder.</p>
<p>Unless you&#8217;re in a large organization which can support a qualified CSO reporting to a Chief Risk Officer or equivalent, a better alternative is to look for projects which bridge the cultural gap to improve physical plant protection, protect IT resources, protect intellectual property and consolidate compliance and regulatory reporting &#8212; while saving money.</p>
<p>Physical and IT security projects usually converge first on access control, be it gated doors or enterprise IT systems. For example someone who hasn&#8217;t officially entered the building shouldn&#8217;t be able to log on to sensitive applications or enter sensitive locations such as the data center. That seems logical.  But there are challenges.  The directories don&#8217;t necessarily synch up with one another, and don&#8217;t necessarily identify entitlements, responsibilities and restrictions across domains, requiring directory strategies as well as connectors to consolidated management consoles and reporting systems.</p>
<p>But overcoming such challenges is possible, and the benefits can be significant.  An Identity and Access Management (IAM) system has more value when it can be leveraged, not only through a Physical Access Control System (PAC), but also in other protective projects such as data loss prevention, security incident response and business continuity planning.</p>
<p>To be sure, some organizations need correlation between physical and information technology security more than others. For example, pharmaceutical researchers need to prevent cross-contamination between human and animal research.  Food processing and other manufacturing plants also need tight application and physical access policies due to regulations or separation of duty concerns.</p>
<p>A number of IT security vendors sell PACs themselves or work with partners to bridge the physical and IT access divide through policy-based management and shared directories. We&#8217;ve also seen vendor mergers in access control  One company sold electronic locks and bought another bringing identity management solutions to the party.</p>
<p>A number of niche vendors have appeared over the last few years bringing industry sector-specific knowledge of required regulations and reporting mandates along with consolidated management consoles.  Examples include Alert Enterprise (Fremont, CA) and Quantum Secure (San Jose, CA).</p>
<p>But the fundamental problem facing organizations remains bridging the two cultures and getting everyone to get along for the betterment of the company.</p>
<p>Rather than force-fit a CSO on top of the physical and IT parts of security, a federated approach is a better strategy to encourage collaboration to leverage the skills, knowledge and disciplines of both sides of the house for mutual benefit. Collaboration benefits include improved overall security through better communications and cross-training among those responsible, streamlined processes, and better information sharing.</p>
<p>Cost savings are possible by leveraging common infrastructure, policies and staff. Considering both physical and IT security requirements as appropriate can lower procurement costs.  For example, IP-connected surveillance cameras can carry images on the existing corporate network rather than deploy separate cabling or wireless links.</p>
<p>There are challenges based on corporate tendencies to decentralize functions,  diluting the potential value of joint projects.  Vendor selection may be problematic because the market has limited vision in this context.  There are issues in checks and balances: if a theft occurs, will an IT security department &#8220;perp&#8221; be able to cover up digital forensic tracks?</p>
<p>But the biggest challenges are inertia and overcoming the cultural differences on a personal level. Distrust, fears of being devalued under another department, and other concerns may prevent meaningful discussions and project movement in the first place.</p>
<p>Yet building stronger relationships through joint security projects can bring beneficial results, and the conversation should take place. We should all be able to get along when it comes to securing the workplace.</p>
<p>CP Snow reconsidered the two cultures problem a few years later after his original 1959 lecture.  Contemporaries introduced the idea of the Third Culture, essentially a coming together to reconcile or mediate differences.  The idea of two cultures in security can lead to unnecessary fence building and turf protection.</p>
<p>But just as scientists and literary intellectuals still have differences, today physical security and cyber security remain two cultures – two cultures that  can learn from one another if those differences can be appreciated and the commonality be co-joined to create a third culture which has scope and vision to make good things happen in the realm of converged security.</p>
<div class="links"></div>
<div id="disqusWrapper">
<div id="disqus_thread"><iframe id="dsq-app5063" tabindex="0" title="Disqus" src="https://disqus.com/embed/comments/?base=default&amp;f=securitycurrent&amp;t_u=http%3A%2F%2Fwww.securitycurrent.com%2Fen%2Fanalysis%2Fac_analysis%2Fblending-two-cultures-physical-and-information-security-convergence&amp;t_d=Blending%20Two%20Cultures%3A%20Management%20Perspectives%20on%20Converging%20Physical%20and%20Information%20Security&amp;t_t=Blending%20Two%20Cultures%3A%20Management%20Perspectives%20on%20Converging%20Physical%20and%20Information%20Security&amp;s_o=default#version=0f0a865317e99ed65c3b6704321fb8c2" name="dsq-app5063" width="100%" height="150" frameborder="0" scrolling="no" data-mce-fragment="1"></iframe></div>
</div>
<p>The post <a href="/blending-two-cultures-management-perspectives-on-converging-physical-and-information-security/">Blending Two Cultures: Management Perspectives on Converging Physical and Information Security</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/blending-two-cultures-management-perspectives-on-converging-physical-and-information-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Scared of SCADA? Maybe It&#8217;s Cultural. Read a Children&#8217;s Book</title>
		<link>/scared-of-scada-maybe-its-cultural-read-a-childrens-book/</link>
					<comments>/scared-of-scada-maybe-its-cultural-read-a-childrens-book/#respond</comments>
		
		<dc:creator><![CDATA[Victor Wheatman]]></dc:creator>
		<pubDate>Tue, 14 Jan 2014 17:51:12 +0000</pubDate>
				<category><![CDATA[Archived Articles]]></category>
		<guid isPermaLink="false">http://184.154.4.181/?p=17100</guid>

					<description><![CDATA[<p>There is growing concern over the security of SCADA (supervisory control and data acquisition systems), one of the Internet of Things topics discussed at the Amphion Forum conference recently held&#8230;</p>
<p>The post <a href="/scared-of-scada-maybe-its-cultural-read-a-childrens-book/">Scared of SCADA? Maybe It&#8217;s Cultural. Read a Children&#8217;s Book</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fscared-of-scada-maybe-its-cultural-read-a-childrens-book%2F&amp;linkname=Scared%20of%20SCADA%3F%20Maybe%20It%E2%80%99s%20Cultural.%20Read%20a%20Children%E2%80%99s%20Book" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fscared-of-scada-maybe-its-cultural-read-a-childrens-book%2F&amp;linkname=Scared%20of%20SCADA%3F%20Maybe%20It%E2%80%99s%20Cultural.%20Read%20a%20Children%E2%80%99s%20Book" title="LinkedIn" rel="nofollow noopener" target="_blank"></a></p><p>There is growing concern over the security of SCADA (<em>supervisory control and data acquisition </em>systems), one of the Internet of Things topics discussed at the Amphion Forum conference recently held in San Francisco.</p>
<p>Once upon a time, SCADA systems were based on proprietary operating systems, proprietary protocols and limited connectivity.  Now, many of the controls on critical infrastructure such as power plants, water treatment facilities, process manufacturing and other infrastructure have been migrated onto commercial operating systems,  and are Internet-enabled so they can be monitored and tuned remotely.</p>
<p>Internet connectivity of both newer and legacy platforms has made these systems vulnerable.   The scary scenarios include bad actors causing widespread damage by opening a dams flood gates or causing sewage discharges into drinking water supplies.  It also has been speculated that related  Programmable Logic Controls (PLCs) handling prison doors might be attacked with disturbing consequences.</p>
<p>The most famous SCADA attack to date was the Stuxnet worm which entered the controls of Iranian nuclear fuel processing centrifuges.  They were not connected to the Internet.  Instead, someone plugged an infected USB drive into a controlling PC on the internal network near these devices. The worm searched for specific software running PLCs not only at the nuclear facility, but also at industrial facilities such as power plants.  Aided by updates, Stuxnet morphed into Flame and Duqu and spread and spread and spread, causing fun and games throughout the world.    Stuxnet started in SCADA and grew to create havoc throughout the rest of the IT security world.</p>
<p><strong>Who is responsible?</strong></p>
<p>So  who is responsible for anticipating and mitigating the implied risks at critical infrastructure facilities?   Is it the IT Security manager?  Doesn&#8217;t SCADA security belong in the realm of Operational Technology (OT)?  After all, IT Security is busy enough with locking things down in the continuing onslaught of attacks on computing facilities.   Besides,  the folks over in Operations don&#8217;t necessarily welcome IT Security encroaching on their domain.  According to Joe Weiss, Managing Partner of <a href="http://realtimeacs.com/">Applied Control Solutions</a> (Cupertino, CA), who spoke at the Amphion conference: &#8220;The IT world and the OT worlds  hate each other.  And they hate each other more than they hate an attacker.&#8221;</p>
<p>Weiss also notes that the cultures of OT and IT Security are different.  &#8220;You can&#8217;t have someone [from IT security] walk in at 4PM Friday afternoon saying  &#8216;I need you to shut down now&#8217; without realizing that the lights may go out, or that the refinery may go down.  It&#8217;s a completely different mindset  between mission assurance and information assurance.&#8221;   Further,  says Weiss, &#8220;until you can relate back to why security has impact on what it means to keep the lights on,  or the water flowing,  or the trains running,  they&#8217;re not going to do it.  Right now it goes directly against what they&#8217;re trying to do.  You&#8217;re making life difficult. You&#8217;re making it more cumbersome. You&#8217;re creating problems.  None of it is linked back to <em>why</em> they should be doing it.&#8221;</p>
<p>And so the charter of OT is different than that of IT Security.  What&#8217;s their motivation for looking after the security of the systems they manage?   Weiss says that OT staff compensation has nothing to do with security, and security is not compensated for being concerned about  OT security.  Regarding IT security, he says, &#8220;they get compensated if they have a firewall up and running.  The fact it could bring down a SCADA system is irrelevant to them. &#8221;  And for operations?  &#8220;They just want to keep the lights on. They don&#8217;t care who tries to get in.&#8221;  Weiss says &#8220;Until both sides have compensation  partially tied to the overall outlook, you won&#8217;t get cooperation.&#8221;</p>
<p>Well, there&#8217;s no reason for the two cultures to be antagonistic.   As someone once asked, &#8220;Can&#8217;t we all get along?&#8221;</p>
<p><strong>So what&#8217;s the solution?  </strong></p>
<p>Well, you can start by having the security people read a children&#8217;s book.  US Air Force Air Force Cyberspace Operations Officer, Adjunct Professor at Utica College, and Director and Founder of the non-profit educational organization hackINT. Robert M. Lee&#8217;s illustrated <u><a href="http://www.scadaandme.com/">SCADA and Me: A Book for Children and Management</a></u>  will explain it as simply as is implied in the title.  And then upper management should take responsibility for bringing representatives of OT and IT Security together.  Sure, OT is really responsible for the industrial processes and controls that keep the lights on, the water running and all the rest, but IT Security has that responsibility as well.</p>
<p>That message needs to be re-enforced and turf wars overcome. The two teams need to  identify and codify this as the common mission, assigning staff first in task forces and study groups to scope and prioritize the tasks necessary to mitigate the risks, and work on the cultural and compensation issues, and then to build out as cooperating entities, properly resourced and chartered to keep the lights on,  and to do so safely.</p>
<p>The post <a href="/scared-of-scada-maybe-its-cultural-read-a-childrens-book/">Scared of SCADA? Maybe It&#8217;s Cultural. Read a Children&#8217;s Book</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/scared-of-scada-maybe-its-cultural-read-a-childrens-book/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How You Should Be Thinking About the Information Security Budget</title>
		<link>/how-you-should-be-thinking-about-the-information-security-budget/</link>
					<comments>/how-you-should-be-thinking-about-the-information-security-budget/#respond</comments>
		
		<dc:creator><![CDATA[Victor Wheatman]]></dc:creator>
		<pubDate>Mon, 25 Nov 2013 18:51:52 +0000</pubDate>
				<category><![CDATA[Archived Articles]]></category>
		<guid isPermaLink="false">http://184.154.4.181/?p=17147</guid>

					<description><![CDATA[<p>So, how did you do this year with your security budget requests?  And how does the plan look for next year?  With information security representing a competitive arms race with&#8230;</p>
<p>The post <a href="/how-you-should-be-thinking-about-the-information-security-budget/">How You Should Be Thinking About the Information Security Budget</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fhow-you-should-be-thinking-about-the-information-security-budget%2F&amp;linkname=How%20You%20Should%20Be%20Thinking%20About%20the%20Information%20Security%20Budget" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fhow-you-should-be-thinking-about-the-information-security-budget%2F&amp;linkname=How%20You%20Should%20Be%20Thinking%20About%20the%20Information%20Security%20Budget" title="LinkedIn" rel="nofollow noopener" target="_blank"></a></p><p>So, how did you do this year with your security budget requests?  And how does the plan look for next year?  With information security representing a competitive arms race with the bad guys, you want enough funding to insure you are practicing commercially reasonable security, and to support mission critical business strategies.</p>
<p>Many organizations don&#8217;t know what a &#8220;normal&#8221; security budget really is. Some budgets draw down from the overall IT budget on an as-needed basis, while others fund security separately from the IT budget.  Most consultants recommend that the security budget be evaluated as a percentage of the overall IT budget, which may mean massaging the numbers a bit. Generally, the surveys have shown averages in the 1-7% range. However,  security spending varies widely by industry, geography, organizational size and security maturity level, so comparisons to other organizations usually are inexact.  Also, political and cultural differences are factors.  Some organizations are conservative in their approach, and may only buy proven, market-leading solutions through a primary vendor; others maintain &#8220;skunk works&#8221; where early-stage solutions can be tested.</p>
<p>Identifying the true pro forma security budget for planning purposes is difficult for a number of reasons. What&#8217;s included? Is business continuity planning for disaster recovery? How about security compliance and reporting? And how about IT-based physical security such as video surveillance or building access systems?</p>
<p>IT functions, including information security, may be highly distributed and owned by various departments or business units. For example, firewalls may be part of the networking budget. Managed security service provider fees are sometimes woven into the HR budget because outsourcing is seen as personnel additions. Security capital expenses are captured separately from operational expenses. And some security functions, such as desktop anti-malware, are bought by subscription, and may be paid out of the desktop support budget. IT staffers often work on security activities on an as-needed basis, making it difficult to accurately account for security personnel expenses and headcount.</p>
<p>Justifying a security budget may also be tricky. Information security covers three general and overlapping categories. First, there&#8217;s the protective and defensive tools such as firewalls, vulnerability management and anti-malware. Second, projects such as identity and access management and secure web development for e-commerce are business enabling and tend to be inclusive rather than defensive. Third are routine security operations such as security performance monitoring, business continuity planning and security patch management. The easiest to justify is protection because no one wants to be blamed for allowing the organization to be put out of business for even a short time, due to a denial of service attack. The best way to justify business enablement security elements is to link the project to cost savings or business initiatives that will increase customer satisfaction and user productivity. Operational expenses can be pitched as the cost of responsibly doing business.</p>
<p>Business units should include specific funding for security evaluation, testing and risk mitigation in all IT project requests rather than assume the security department will take care of it. Finally, when making budget requests, it&#8217;s a good idea to estimate the projected value for cost in terms of reduced risk, more efficient compliance reporting, or using projected measurable metrics such as reducing downtime by being able to mitigate attacks faster than before.</p>
<p>There are published surveys from Gartner and others on how much organizations spend on security as a percentage of the IT budget, in terms of cost per employee, by industry, company size and geography. There are also industry forums where CISOs can collegially gather peer expenditures. Projected spending outside surveyed findings may be reasonable, but should be evaluated to determine the reasons for the variance.</p>
<p>Many CISOs face pressure to cut spending. This leads to the game of asking for more than you need. But the more powerful way of justifying a budget request is to articulate that security represents a risk trade-off. When you cut back security, risk increases. Make sure that your organization&#8217;s business leaders understand and approve the risk trade-offs inherent in your budget, especially if you are asked to cut essential security processes or tools.</p>
<p>The post <a href="/how-you-should-be-thinking-about-the-information-security-budget/">How You Should Be Thinking About the Information Security Budget</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/how-you-should-be-thinking-about-the-information-security-budget/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Does the NSA Use Quantum Computing to Break Things?</title>
		<link>/does-the-nsa-use-quantum-computing-to-break-things/</link>
					<comments>/does-the-nsa-use-quantum-computing-to-break-things/#respond</comments>
		
		<dc:creator><![CDATA[Victor Wheatman]]></dc:creator>
		<pubDate>Wed, 20 Nov 2013 05:41:24 +0000</pubDate>
				<category><![CDATA[Archived Articles]]></category>
		<guid isPermaLink="false">http://184.154.4.181/?p=18048</guid>

					<description><![CDATA[<p>In the continuing stream of revelations about reported NSA hacking to protect national interests comes more news. Data moving between data centers operated by the world&#8217;s largest Internet email companies allegedly&#8230;</p>
<p>The post <a href="/does-the-nsa-use-quantum-computing-to-break-things/">Does the NSA Use Quantum Computing to Break Things?</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fdoes-the-nsa-use-quantum-computing-to-break-things%2F&amp;linkname=Does%20the%20NSA%20Use%20Quantum%20Computing%20to%20Break%20Things%3F" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fdoes-the-nsa-use-quantum-computing-to-break-things%2F&amp;linkname=Does%20the%20NSA%20Use%20Quantum%20Computing%20to%20Break%20Things%3F" title="LinkedIn" rel="nofollow noopener" target="_blank"></a></p><p>In the continuing stream of revelations about reported NSA hacking to protect national interests comes more news. Data moving between data centers operated by the world&#8217;s largest Internet email companies allegedly was intercepted and collected for analysis because the encryption protections on the data was bypassed.</p>
<p>The prevailing theories about how the NSA apparently did this varies. Did the NSA receive the decryption keys from the email providers themselves, perhaps under court order? Did the NSA steal the keys? Did the agency use custom built supercomputers to break the keys? Did the NSA use backdoors in encryption chips that they managed to get inserted earlier (remember the Clipper Chip?). Or, did the NSA grab the data before it was encrypted and send it on its way? I offer another theory: the NSA used experimental quantum computers (QCs) to break the keys.  But as with so many theories, there is no proof.</p>
<p>Nevertheless, this leads to a question about the state of the technology when it comes to quantum computing, and more specifically, quantum cryptoanalysis.</p>
<p>Messages or transactions protected with “weak” key encryption can sometimes be broken by brute force attacks. In order to do this, powerful computers, sometimes networked to multiply computing power, jointly work through the key space until the right number or key is found. Increasing key length leads to exponential increases in key strength. “Factoring” is the ability to detect repetitions in vast amounts of ciphertext as clues to the large prime numbers used to encrypt the data. Factoring very large integers isn’t a feasible code cracking technique. Today, this would take multiple lifetimes of the universe to break the protection provided by commercially used algorithms employing recommended key lengths.</p>
<p>Ever faster computers means the key space can be searched more quickly  and the cryptography broken more easily. But because increasing key length strengthens cryptographic protections exponentially, something new is needed, a proverbial quantum leap from today’s computers to those exploiting the strange laws of quantum physics. Researchers first demonstrated that quantum computers could factor numbers far faster than digital computers in 1994. But building a QC isn&#8217;t easy.</p>
<p>Quantum computers exploit the counter-intuitive world of the very, very, very small, down to the photon level. They use molecules to represent qubic bits of data, or “qubits” that weirdly can represent a one and a zero simultaneously. A pair of qubits can be 00, 01, 10, and 11 at the same time. This capacity increases exponentially: n qubits can be in 2^n simultaneous states. While a conventional computer can represent 1024 individual numbers with 32 bits of information, a QC can represent over 4 billion numbers with 32 qubits.</p>
<p>Furthermore, any operation performed on a number of qubits is performed on all encoded numbers simultaneously, generating a massive parallel computation in one QC. In a single computational step, a quantum computer with 32 qubits can perform the same mathematical operation on over four billion different numbers. A conventional computer would do this by repeating the same computation over four billion times or using over four billion different processors in parallel. Accordingly, QC processing power can be increased very dramatically resulting in machines operating in the petaflop and exaflop range.</p>
<p>University and national government laboratories have been researching quantum computing for years. <a href="http://www.dwavesys.com/en/dw_homepage.html">D-Wave</a> (Burnaby British Columbia, Canada), born from research at the University of British Columbia, is commercially selling early stage QC.</p>
<p>There are many scientific problems that can be addressed using quantum computing. We expect, but cannot confirm, that interested funding sources for research include intelligence agencies that want to use QCs to decrypt encrypted messages, as well as analyze massive amounts of collected data.</p>
<p>And if QCs can be used to break or decrypt encrypted data, then quantum cryptography will be needed to keep up and protect that data. And so there is a sort of cryptographic arms race underway, albeit in slow motion, hindered by the technical problems involved.</p>
<p>Quantum cryptography research isn’t looking for better encryption algorithms, but rather focuses on Quantum Key Distribution to strengthen encryption. Some approaches are limited in that they require dedicated fiber optic connections for key exchanges, although testing also is being done using satellites and over-the-air links. Companies to watch are <a href="http://www.idquantique.com/">ID Quantique</a> (Geneva, Switzerland), <a href="http://www.magiqtech.com/MagiQ/Home.html">MagiQ Technologies</a> (Somerville, Mass) and Australian company <a href="http://quintessencelabs.com/">QuintessenceLabs Inc.</a>, with an office in Mountain View, CA.). While this work would appear secondary to the motivation to decipher secret messages, reported NSA eavesdropping may accelerate interest in both. But keep in mind that potential solutions are immature, expensive and highly complex. It will be many years before either quantum computing, or cost-effective quantum encryption key exchanges, are commercially available.</p>
<p>An effect of quantum computing research is likely to be similar to the effect that recent NSA revelations have had: creating distrust and disbelief that anything can be hidden from well motivated, well funded, interested parties, be they spy agencies or commercial rivals. Companies and government agencies need to convince their business partners that the information they are required to keep secret is adequately protected. One way to provide such reassurance is to demonstrate a realistic understanding of how quantum technologies are advancing.  Furthermore, organizations need to test and re-test the current, and largely adequate, data protection methods used to maintain the privacy of their sensitive data today. Proper implementation is the &#8220;key.&#8221; Quantum computing and Quantum Key Distribution, while interesting, remain elusively over the horizon.</p>
<p>The post <a href="/does-the-nsa-use-quantum-computing-to-break-things/">Does the NSA Use Quantum Computing to Break Things?</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/does-the-nsa-use-quantum-computing-to-break-things/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>YAC/YAM, Log Management, SIEM and Big Data Security Intelligence</title>
		<link>/yacyam-log-management-siem-and-big-data-security-intelligence/</link>
					<comments>/yacyam-log-management-siem-and-big-data-security-intelligence/#respond</comments>
		
		<dc:creator><![CDATA[Victor Wheatman]]></dc:creator>
		<pubDate>Wed, 06 Nov 2013 19:40:41 +0000</pubDate>
				<category><![CDATA[Archived Articles]]></category>
		<guid isPermaLink="false">http://184.154.4.181/?p=17155</guid>

					<description><![CDATA[<p>Maybe it&#8217;s just me, but many market analysts tend to be skeptical about the latest shiny new thing promising the &#8220;complete solution&#8221; in security and other technology initiatives. Skepticism is fueled&#8230;</p>
<p>The post <a href="/yacyam-log-management-siem-and-big-data-security-intelligence/">YAC/YAM, Log Management, SIEM and Big Data Security Intelligence</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fyacyam-log-management-siem-and-big-data-security-intelligence%2F&amp;linkname=YAC%2FYAM%2C%20Log%20Management%2C%20SIEM%20and%20Big%20Data%20Security%20Intelligence" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fyacyam-log-management-siem-and-big-data-security-intelligence%2F&amp;linkname=YAC%2FYAM%2C%20Log%20Management%2C%20SIEM%20and%20Big%20Data%20Security%20Intelligence" title="LinkedIn" rel="nofollow noopener" target="_blank"></a></p><p>Maybe it&#8217;s just me, but many market analysts tend to be skeptical about the latest shiny new thing promising the &#8220;complete solution&#8221; in security and other technology initiatives. Skepticism is fueled by the constant stream of overlapping tools, enhancements and nuanced products promising to do something &#8220;more;&#8221; but with functionality that ultimately may become features in other products. Some organizations want and need to stay ahead of the adoption curve and pay attention to market moves by new and established vendors.</p>
<p>Security skepticism is found in security monitoring consoles that have been described in derogatory terms as &#8220;Yet Another Console/Yet Another Monitor (YAC/YAM).&#8221; These assessments require <s>s</s>ecurity analysts to sit at monitors, eyeballing the red, green and gray spinning meters, indicators and alarms, looking for trouble.  Such technical talent is in short supply. The enterprise is relying on the sensitive, intuitive capabilities of security operations and threat management professionals who essentially &#8220;know&#8221; a problem when they see it. But many worrisome events go unnoticed, unreported and unresolved. And then there are the false indicators that may be perfectly fine, but look &#8220;funny&#8221; and require further time consuming analysis.</p>
<p>Consoles and monitors eventually evolved into Security Information and Event Management (SIEM) solutions. SIEM<em> products themselves are</em> the result of the merger of Security Information Management (SIM) and Security Event Management (SEM) products. SIM software provides after-the-fact reports on things that have happened (often for compliance and forensic requirements.) SEM software works to provide near-time or real-time warnings of abnormalities that may indicate a viral infection, an attempted denial of service attack or other nasty work by nasty digital criminals. SIEMs are fed data from anti-malware, firewalls, authentication gateways, endpoints and other sources to help security analysts make sense of things.  Correlating something bad happening &#8220;over here&#8221; with something bad happening &#8220;over there&#8221; may not be easy or even possible.</p>
<p>There have been disappointing SIEM deployments and project restarts.  In some cases, the flaws lie upstream. Anti-malware products that feed the SIEM can miss viral infections, Trojans and Advanced Persistent Threats (APTs) that lodge and spread within the network-computing infrastructure until they launch with a loud and expensive &#8220;gotcha!&#8221; Malware can invisibly collect user IDs and passwords, or support industrial espionage by stealing proprietary data, and then sending it out under the cover of other intra- and inter-enterprise communications.</p>
<p>The market knows something is missing with SIEM. While security professionals are reluctant to go public about their projects, under the protection of anonymity, we&#8217;ve come across some telling tales that validate a market need for something more.  One financial services security manager told us:</p>
<p>&#8220;We have a bit of a challenge because SIEM is very much an infrastructure monitoring tool. We’re simply getting data from routers, switches, firewalls, servers, authentication servers, authentication databases and the like and collecting them. We have done some level of correlation, but I would say it’s still pretty much a first generation level. We haven’t gone into any correlation other than suspicious network traffic. We haven’t built any complex use cases yet. This is something we’re looking at either doing ourselves or bringing in a 3rd party.&#8221;</p>
<p>And another:</p>
<p>&#8220;The SIEM promise is seen as nirvana but doesn’t seem achievable. It&#8217;s a lot of work to support the SIEM. We don&#8217;t expect the SIEM rules to come from the vendors. Most of the things important to the company and the things to look for must come from people inside the company.&#8221;</p>
<p>A number of vendors including Splunk, headquartered in San Francisco, CA, HP/ArcSight, based in Cupertino, CA, and early stage start-ups are working to address the next stage of enterprise security intelligence, based on the idea that there is &#8220;big data&#8221; within the computing and networking environment that needs to be evaluated for threats and vulnerabilities. Two fairly new vendors are Click Security, in Austin, TX and SMAARTS in San Mateo, CA.* These companies propose to add value to some of the existing approaches, finding flaws in how older solutions handle unstructured data. For example, some use log storage and search to detect and ideally prevent bad things from happening. But because older techniques use stored data and search, there is the opportunity for malware to infiltrate the infrastructure before it can be detected and neutralized. There are necessary limits on what data can be analyzed in a timely fashion. But the market seems to be heading towards streaming, real-time analytics and automated system responses to identified attacks while avoiding both false positives and false negatives.</p>
<p>It may be too early in the game for start-ups to credibly demonstrate that their promises, based on proprietary technology and algorithms, are ready for commercial use. But there does seem to be a market need for solutions that supplement the skills of security analysts who &#8220;know it when they see it.&#8221; A recent SANS survey found that many organizations are collecting far more information than they can analyze, and that the associations among logged security events are not easily done.</p>
<p>No organization has an unlimited budget. The security “wish list” can be very long and difficult to prioritize. Technologically aggressive organizations and those that cannot tolerate much risk should keep an eye on this evolutionary trend. By instantaneously examining much more transactional and operational data than is handled currently by today&#8217;s commercially available SIEM solutions, organizations should be able to advance in their ability to defend their data &#8211; and reputations &#8211; in the continually evolving threat environment.</p>
<p>*Disclosure:  The author is a market development advisor to SMAARTS.</p>
<p>The post <a href="/yacyam-log-management-siem-and-big-data-security-intelligence/">YAC/YAM, Log Management, SIEM and Big Data Security Intelligence</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/yacyam-log-management-siem-and-big-data-security-intelligence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Skeptical of Biometrics? Have a Backup Plan</title>
		<link>/skeptical-of-biometrics-have-a-backup-plan/</link>
					<comments>/skeptical-of-biometrics-have-a-backup-plan/#respond</comments>
		
		<dc:creator><![CDATA[Victor Wheatman]]></dc:creator>
		<pubDate>Tue, 22 Oct 2013 22:45:14 +0000</pubDate>
				<category><![CDATA[Archived Articles]]></category>
		<guid isPermaLink="false">http://184.154.4.181/?p=17924</guid>

					<description><![CDATA[<p>So whoopie-do, the new iPhone has a fingerprint reader to unlock the phone as a market differentiator,  and to open new authentication applications and developer opportunities &#8211; assuming Apple opens&#8230;</p>
<p>The post <a href="/skeptical-of-biometrics-have-a-backup-plan/">Skeptical of Biometrics? Have a Backup Plan</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fskeptical-of-biometrics-have-a-backup-plan%2F&amp;linkname=Skeptical%20of%20Biometrics%3F%20Have%20a%20Backup%20Plan" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fskeptical-of-biometrics-have-a-backup-plan%2F&amp;linkname=Skeptical%20of%20Biometrics%3F%20Have%20a%20Backup%20Plan" title="LinkedIn" rel="nofollow noopener" target="_blank"></a></p><p>So whoopie-do, the new iPhone has a fingerprint reader to unlock the phone as a market differentiator,  and to open new authentication applications and developer opportunities &#8211; assuming Apple opens up the appropriate APIs.  This is based on the technology  Apple bought last year when it acquired AuthenTec which has encryption technology, fingerprint sensors and identity management software.</p>
<p>And already, hackers, taking a clue from 1970s spy movies, managed to fool the reader using the simplest of techniques: they lifted a registered fingerprint from a drinking glass, presented it to the reader, and voila! You&#8217;re in!  (BTW, whatever happened to the requirement it be a &#8220;live&#8221; finger?)</p>
<p>I&#8217;ve long been skeptical of biometrics because of their False Acquisition and False Rejection Rates (FAR/FRR) but the technology is improving.  For example, instead of typing texts or email on my phone, I use voice to text with reasonably accurate results.  Usually.  Such mobile based systems such as the iPhone&#8217;s Siri are cloud enabled, using the heavy-duty computing power of the data center in the sky. PC-based systems such as Dragon voice-to-text have been used for quite a few years, also with mixed results.</p>
<p>It&#8217;s an open question if smudgy biometric-enabled iPhones or any abused, challenged fingerprint system is going to do the job expected, 100 percent of the time.  Some people don&#8217;t have fingerprints that register.  We&#8217;ve long seen biometric systems installed for data center access control, but they&#8217;ve often fallen into disuse.  And there are those times when the system just doesn&#8217;t work as advertised: at a trade show I offered my hand to a palm print biometric identification system. The system simply refused to recognize me after registration. Not very impressive.</p>
<p>Last year, the president and founder of a multi-factor out-of-band authentication company came to the company where I worked to demonstrate his pride and joy solutions. Most of the product/service he showed uses SMS texting and other messaging to a pre-registered cell phone for out-of-band authentication. That went fine.  Then came a test of the voice biometrics option.  The CEO first enrolled his voiceprint and then demonstrated how it worked for accessing a bank account. Then he made a mistake: he challenged the other analysts in the briefing to try to break into the bank account using their own voices. I worked in radio and have an ear for regional accents. I asked a colleague from Chicago to try it since the CEO came from the Windy City and had a distinctive accent. First try: failed. Second try: IN! The Chicago-accented analyst fooled the voice biometric!</p>
<p>Now it’s likely that system sensitivity was tuned low to account for noisy environments, poor quality cell phone microphones and other factors but the episode fed my skepticism on biometrics.</p>
<p>There are going to be exceptional cases, but these experiences and observations underscore the need for backup systems on critical, biometric authentication functions. You don&#8217;t want to bet on any one system working all of the time. Always include a back-up. And the back-up of choice for all but the most sensitive of access applications turns out to be the good old UserID and a creative password.</p>
<p>Security mechanisms are not foolproof, and that’s why a layered approach, AKA &#8220;security in depth&#8221; remains necessary defensively as well as in access control.</p>
<p>The post <a href="/skeptical-of-biometrics-have-a-backup-plan/">Skeptical of Biometrics? Have a Backup Plan</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/skeptical-of-biometrics-have-a-backup-plan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Securing the Internet of Things</title>
		<link>/securing-the-internet-of-things/</link>
					<comments>/securing-the-internet-of-things/#respond</comments>
		
		<dc:creator><![CDATA[Victor Wheatman]]></dc:creator>
		<pubDate>Tue, 22 Oct 2013 22:40:37 +0000</pubDate>
				<category><![CDATA[Archived Articles]]></category>
		<guid isPermaLink="false">http://184.154.4.181/?p=17920</guid>

					<description><![CDATA[<p>A European judge recently blocked a security researcher&#8217;s paper describing how to bypass a car&#8217;s immobilizer theft-protection system. The Next Generation of airline control systems is designed to efficiently improve&#8230;</p>
<p>The post <a href="/securing-the-internet-of-things/">Securing the Internet of Things</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fsecuring-the-internet-of-things%2F&amp;linkname=Securing%20the%20Internet%20of%20Things" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecuritycurrent.com%2Fsecuring-the-internet-of-things%2F&amp;linkname=Securing%20the%20Internet%20of%20Things" title="LinkedIn" rel="nofollow noopener" target="_blank"></a></p><p>A European judge recently blocked a security researcher&#8217;s paper describing how to bypass a car&#8217;s immobilizer theft-protection system.</p>
<p>The Next Generation of airline control systems is designed to efficiently improve air travel, but the new system reportedly uses no encryption on its communications links, and is also missing authentication mechanisms meaning false signals could be introduced to create airborne confusion.</p>
<p>And then there is the research by the late security expert Barnaby Jack to hack critical medical devices such as insulin pumps and pacemakers.</p>
<p>These systems &#8211; modern automobiles, air control systems, along with power plant controls, sophisticated and connected medical equipment, many household appliances and other devices were once isolated, but now they are increasingly connected and interconnected as part of the &#8220;Internet of Things.&#8221;   And, like virtually all developments of the past, the focus is on functionality with security being an after-thought.  But now, increasing attention is being placed on securing these things with the publication of white papers, journal articles, as well as focused conferences and focused security solution providers.</p>
<p>Much of the attention on device security is driven by the move to mobility. As employees demand access to tablets and smarter phones for business critical functions, how is security being addressed?  The best approach is to not view wired and wireless as all that different. The variety of channels will continue to trend towards a chaotic, mixed environment that companies and government agencies need to manage.  But focusing solely on mobile devices is a mistake.  Business and control devices such as multi-function printers (MFPs), factory and power plant controls managed by Programmable Logic Controllers (PLCs), smarter and smarter cars, smart homes and electronic, networked locks on doors each have potential risks and vulnerabilities.  And the list goes on.</p>
<p>So why is this important?</p>
<p>Well, because things happen. The Stuxnet worm entered unconnected systems through USB drives to infect software at power plants and other industrial facilities  &#8212; and it spread beyond its initial targets. There have been attacks on supervisory control and data acquisition (SCADA) systems.  In theory, an attacker could open a dam&#8217;s floodgates or trigger sewage discharges into the drinking water supply. Or maybe prison doors could be opened by organized crime-sponsored hackers, releasing nasty characters or at the very least, putting prison guards at risk.</p>
<p>Some device security concerns relate to network technology such as switches that support VPNs, or which handle machine-to-machine communications. These need to be trusted and protected.  Having compromised security hardware is a double whammy &#8211; they&#8217;re supposed to protect but if they themselves are vulnerable, well, what good are they?  They also need to be properly identified by digital certificates for software updates and maintenance.</p>
<p>Familiar office machines are also overlooked channels for potential breaches. Multi-function printers (MFPs) handle photo copying, scanning and faxing in addition to printing, but sensitive documents can be left in the tray leading to privacy breaches and the loss of intellectual property.  The integrated memory on MFPs can retain sensitive information meaning disposal needs to be carefully thought through, and since MFPs are on the network, they are vulnerable to remote exposure.</p>
<p>A number of niche vendors have taken a variety of approaches to protecting devices and systems: <a href="http://www.industrialdefender.com/">Industrial Defender</a> focuses on securing industrial controls, <a href="http://www.arxan.com/">Arxan Technologies</a> offers software protection, the Certificate Authorities provide x.509 device certificates, <a href="http://www.wave.com/">Wave</a> provides embedded device security, and <a href="http://www.mocana.com/">Mocana</a> has developers&#8217; toolkits and has been producing conferences on the topic.</p>
<p>While fighting fires on the front lines of network and application security, security professionals also need to look at how their companies or agencies are evaluating device security, and provide leadership as part of an overall enterprise risk management strategy.</p>
<p>After all, what can happen?  Maybe you don&#8217;t want to find out.</p>
<p>The post <a href="/securing-the-internet-of-things/">Securing the Internet of Things</a> appeared first on <a href="https://securitycurrent.com">Security Current</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/securing-the-internet-of-things/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
