Sunday, November 3, 2013
Apple Takes Additional Precautions with its iPhone Fingerprint Sensor
The Fate of the Security "Profession"
- One of the criteria for professionalization has been (at least partially) met. The security profession is facing a shortage of qualified personnel. The operative term here is "qualified." In an era where colleges and universities are regularly pumping out folks with computer/information security degrees, senior professionals are still having difficulty finding people with the KSAs to do the work. Experience (The "E" that we add over time to KSAs) helps and is supposed to enhance basic skills...but many organizations have taken to ignoring the training and experience offered by colleges and universities as being meaningless to the security utility in the workplace. Further, there is still a wide variety of degree variance between university programs in Infosec -- and very few security professionals recommend ANY program as being appropriatly constructed to tackle a security gig straight out of the classroom. To me, this translates to a case of "deficiencies in the occupational workforce" as well as an inability to provide a steady stream of qualified personnel into the workforce.
- What do we do about it? Folks, the lack of response from us as a profession seems to indicate either that (a) we agree with the characterization or (b) while we disagree with the report we don't see how to change it. While I will be the first person to admit that there is a portion of our work is art, we cannot surrender the battle for the science lest we lose the ability to maintain the seat at the table that we have fought to occupy over the past 15 years. When organizations cannot afford to steal senior folks from other organizations, they will turn more and more to technology to substitute for experience. Should this trend occur, we may find ourselves in a position where the chief security officer position (one of the 3 most senior positions our career progression has to offer) goes the way of the VP of Telephony.
The point of this post in a fairly simple one: we cannot as professionals (even if we aren't technically a profession) to accept the status quo accurately pointed out by the NAS report. We need to find a method of identifying and fostering the skills and mindset needed to succeed and -- most importantly -- stay ahead of the bad guys. If we fail to invest in this effort than we do a disservice to our constituents as well as those who are trying to follow in our footsteps.Think I'm exaggerating? I am personally aware of three multi-billion dollar entities who have broken up their security responsibilities amongst multiple entities upon the departure of their CSO. Two of those three seem to be sustaining compliance and security levels within minimal to no difficulty.
Saturday, October 5, 2013
World's Largest Data Breaches
David McCandless and the team from Information Is Beautiful recently released both a static and interactive infographic visualizing the World's Biggest Data Breaches. It provides an interesting perspetive of the size, scope, and cause of breaches cor the past ten years. There were some interesting nuggets there, even for a security guy!
You can find a link to the infographic here. Enjoy!
Wednesday, September 25, 2013
Data Aggregator Giants Hacked
Today Brian Krebs (krebsonsecurity.com) has posted the results of a months-long investigation conducted by his organization. These results, while long suspected, are disheartening: it appears that several well known data aggregators have been compromised, and their files accessed for malicious use.
The underground ID Theft service SNNDOB[dot]ms (hereafter SSNDOB) has for two years marketed itself as a source for valid compromised identities. The source of their data has been largely unknown, but access to a major data aggregator was suspected. Several months ago, SSNDOB’s own compromised database was compromised and a copy was provided to Brian Krebs for analysis. Further analysis was performed on the networks, activities, and credentials held by SSNDOB administrators revealing a small Botnet operating on the internal systems of LexisNexis, Dunn & Bradstreet, and Kroll Background America.
The SSNDOB service has served up more than 1.02 million unique social security numbers, and nearly 3.1 million date of birth records since its inception in early 2012
You can read Krebs' full post regarding the compromise here. Be advised that I have no further substatiation of Mr. Krebs' claims nor any statements from the aformentioned companies...but krebsonsecurity.com is known to be one of the most credible sources out there. Also here is a link with some great tips about what to do if you suspect your identify has been compromised.
Be aware...
Monday, September 23, 2013
IE Zero Day Released Into the Wild
Saturday, September 21, 2013
iOS 7 Security Bug Discovered
Sunday, September 15, 2013
Nymi -- Biometrics Revisited
- Invasiveness. Utilization of biometrics in some form or fashion usually means the surrender and recording of a person's unique physical characteristics. If you use a fingerprint scanner, for example, then somewhere within your network is some type of digital representation of your staffs' fingerprints. Same for retinal scanners. Many organizations see the adoption of such tools to be invasive and "overkill" from a security standpoint.
- Privacy. With over 35 states having data privacy and security laws, protection of biometric data adds yet another category of data to be secured within the enterprise. Worse, biometric data may subject organizations to portions of the HIPAA/HITECH regulations that they mighn't have to deal with at present.
- Rejection/Acceptance Rates. If you enter your password and token data in correctly, the system will allow you access. Period. If you use a biometric device, you are subject to false rejection and denial of access -- or worse (from a security perspective) false acceptance which will allow unauthorized personnel access to your secure data. While these rates are falling as technologies get better, they are still not at 100% -- which means they run the risk of being labelled as a (a) nuisance or encumberance to operations or (b) ineffective in securing the enerprise.
- Static Nature of My "Unique Heart Rate." I'm not a doctor, but I would assume that my heart characteristics now as an overweight 47 year-old man have changed slightly since I was a 22 year-old Lean Mean Fighting Machine. What specific items are measured to generate this unique signature. If my heart health changes (cholesterol, etc.), will I be locked out of my own Nymi-enabled devices? While heart rate and heart beat are different things, I would assume that my heartbeat is one of the variables which goes into my unique signature. What's the variance and/or tolerance rate of the device in this regard? If (for example) I set Nymi at my resting heart rate just after I wake up, will I be unable to use it just after a workout when my heart beat is accellerated? What if I get a pacemaker installed or need heart surgery (as another dear friend of mine is undergoing this week)? Would those things change my characteristics to the point of needing to reset my Nymi -- and is such a reset possible?
- It's All About The Data. What, specifically, is being transmitted by the Nymi? Is is compared against a centrally-stored signature or is the authentication done in the local device? If there is a centralized store of data, then I would want to know how Nymi is protecting that data. If authentication is done locally in the Nymi device then I would expect that either a static or dynamic "go code" is sent to the authenticating system. If the code is dynamic (similar, for instance, to the random RSA token), what's the schema used to generate the random code to ensure it can't be spoofed? If it is static and tied to the individual Nymi device, then how is the code server secured? (Note: Nymi speaks often about its use of Bluetooh technology...but Bluetooh technology isn't foolproof or hackproof. :) )
- What's the Uplift? The marketing campaign for Nymi is clearly geared to the consumer...but for this technology to work in as widespread a fashion as described there needs to be acceptance by enterprise-class users such as (for example) payment processors. Given the highly-regulated nature of that industry (and the heightened level of concern regarding data security these days), the questions listed in (2) above would have to be answered in meticulous detail before widespread adoption could take place.