<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8954181093014024108</id><updated>2022-08-17T08:29:53.076+01:00</updated><category term="Mobile security"/><category term="Rant"/><category term="Security Risk Management"/><category term="SROI"/><category term="DLP"/><category term="Authentication"/><category term="Encryption"/><category term="Identity management"/><category term="Social media"/><category term="Legal"/><category term="Payments security"/><category term="Privacy"/><category term="Secure Development"/><category term="Security norms"/><category term="PCI-DSS"/><category term="2FA"/><category term="Contracts"/><category term="Future"/><category term="Metrics"/><category term="SIEM"/><category term="Startups"/><category term="Classification"/><category term="Cloud"/><category term="DDOS"/><category term="DR"/><category term="DRM"/><category term="Disclosure"/><category term="Incident"/><category term="NFC"/><category term="OS Security"/><category term="Virtualization"/><category term="jobs"/><title type='text'>RSSC</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.rakkhis.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>76</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-5460519881086118810</id><published>2012-12-18T11:30:00.002+00:00</published><updated>2012-12-18T11:30:59.478+00:00</updated><title type='text'>Practical gun reform</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;The Connecticut shooting this week has really affected me. Far more than similar incidents in the past. Not really sure why but probably because of the young age of the kids that were killed and my own impending fatherhood. Just the thought of 9 months of caring for this little thing and then all the love and care you put in afterwords to all be taken away in a random event like this. It is sickeningly frighting. My thoughts and emotions like many others spring to why does these type of events always seem to happen in America? Bowling for Columbine comes to mind and the gut reaction is that guns have a large part to play and something must be able to be done to reduce the chances that this type of event could ever happen again. Is there any chance for practical gun reform not just in the US but improvements in all countries?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;I have been debating with a few colleagues, one of which has a high degree of  opposition to any form of gun reform even though he has never owned a  gun nor would ever own one. I have also read a quite a few articles on this topic since the weekend including a lot of good debate on Hacker News. The statistics also start to come out (lies, dammed lies and...). This from the NY times (researched by quite a few &lt;a href=&quot;http://injuryprevention.bmj.com/content/10/5/280.short&quot;&gt;studies&lt;/a&gt;) stuck with me (particularly because growing up in Australia I remember this incident): &lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&quot;In Australia in 1996, a mass killing of 35 people galvanized the nation’s conservative prime minister to ban certain rapid-fire long guns. The “national firearms agreement,” as it was known, led to the buyback of 650,000 guns and to tighter rules for licensing and safe storage of those remaining in public hands. The law did not end gun ownership in Australia. It reduced the number of firearms in private hands by one-fifth, and they were the kinds most likely to be used in mass shootings.&lt;br /&gt;In the 18 years before the law, Australia suffered 13 mass shootings — but not one in the 14 years after the law took full effect. The murder rate with firearms has dropped by more than 40 percent&quot; &lt;/blockquote&gt;&lt;br /&gt;However many of the comments and articles urge people to look past the initial emotional reaction and to approach the problem rationally. Articles like this &lt;a href=&quot;http://diegobasch.com/mass-shootings-political-correctness-and-magical-thinking&quot;&gt;one&lt;/a&gt; in particular ask some questions that really hit home: is public policy really the best way to the reduce the risks of shootings such as this? Would policy do more good than harm (unintended consequences especially)? As most government programs cost money and considering the US especially has more debt than it can ever pay back and Europe is in a hole, what is the opportunity cost of such programs? &lt;br /&gt;&lt;br /&gt;One person suggested the &lt;a href=&quot;http://en.wikipedia.org/wiki/5_Whys&quot;&gt;5 why&#39;s&lt;/a&gt; be applied to this shooting. So here is an attempt at that:&lt;br /&gt;&lt;br /&gt;The problem: kids were gunned down&lt;br /&gt;1. Why? A 20 year old apparently wanted to get revenge on his mum&amp;nbsp; &lt;br /&gt;2. Why? He was potentially mentally ill and was able to obtain three guns from his mums house&lt;br /&gt;&lt;br /&gt;I&#39;m not going to explore why he was mentally ill here because there is no way I can answer that.&lt;br /&gt;&lt;br /&gt;3. Why? She had the guns easily accessible to him in the house&lt;br /&gt;4. Why? Could be a range of reasons, the most common I have seen people provide:&lt;br /&gt;4a. Self defence / safety&lt;br /&gt;4b. Provide food by hunting&lt;br /&gt;4c. Target practice / sport (hunting)&lt;br /&gt;4d. As a defense mechanism against the state holding a monopoly on violence / she was part of a minority group that required three guns to fight oppression&lt;br /&gt;&lt;br /&gt;5. Why?&lt;br /&gt;5a. The area she lived in had a high rate of violence which the authorities were not effective enough at combating. She had gone through a violent incident in the past.&lt;br /&gt;5b. It was a way of getting cheaper food / earn money&lt;br /&gt;5c. It was a hobby&lt;br /&gt;5d. Belief that an armed populace is the best defense against state tyranny. That arms are required to fight oppression when the authorities can/won&#39;t assist&lt;br /&gt;&lt;br /&gt;Working up from what could be some underlying causes. 5a and 5b: reducing crime and improving living standards are things governments should be working on anyway. Is the best we can do to reduce the risk of horrific events such as these, simply to keep working on these areas?&lt;br /&gt;&lt;br /&gt;5c and 5d and 3 seems like areas where some practical gun reforms could help. Some of the ideas I was thinking of:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Background checks including psychological evaluation before purchase of any gun&lt;/li&gt;&lt;li&gt;Any guns that are stored at home must be stored in a locked container. If random spot checks could be performed and some on a risk based manner in a cost effective manner, similar to tax audits that would be ideal. Perhaps a levy on gun owners to fund this (rights and responsibilities and all)&lt;/li&gt;&lt;li&gt;Annual safety training at the cost of the gun owner &lt;/li&gt;&lt;/ul&gt;These type of measures all seem sensible and even intuitive. But there are hundreds of studies on gun control or gun reform, the most worrying for suggestions like the above are studies like this: &lt;a href=&quot;http://abs.sagepub.com/content/52/10/1447.short&quot;&gt;Mass Shootings in Schools The Worst Possible Case for Gun Control&lt;/a&gt;. It even specifically mentioned regulations that require locks were not effective.&lt;br /&gt;&lt;br /&gt;Even if any of these changes were proven the be the right thing to do, could they even be implemented? Could the laws be passed in every state in the US for example, what would the unintended consequences be, and what would the opportunity costs be?&lt;br /&gt;&lt;br /&gt;At least the only thing that seems guaranteed is that there will be a lot of debate on this topic in the next few months. A lot of people will be reading the research, pouring through the statistics, working out how they can use this incident to further their own motives. All I hope is that at the end some practical actions get taken that at least reduce the risk of this type of horrific incident occurring again.&lt;br /&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt;or follow me on Twitter: &lt;a class=&quot;twitter-follow-button&quot; href=&quot;http://twitter.com/rakkhis&quot;&gt;Follow @rakkhis&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/5460519881086118810/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2012/12/practical-gun-reform.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5460519881086118810'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5460519881086118810'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2012/12/practical-gun-reform.html' title='Practical gun reform'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-4178975363244066976</id><published>2012-12-16T10:42:00.000+00:00</published><updated>2012-12-16T11:04:21.901+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Metrics"/><category scheme="http://www.blogger.com/atom/ns#" term="SROI"/><title type='text'>How security surveys could be improved</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-J31DGoAgpZs/UM2kjgxpeoI/AAAAAAAAE8A/kINfDLQ3EvI/s1600/BigDataFail-300x208.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-J31DGoAgpZs/UM2kjgxpeoI/AAAAAAAAE8A/kINfDLQ3EvI/s1600/BigDataFail-300x208.jpg&quot; /&gt;&lt;/a&gt;&quot;It is a matter of opinion, there is isn&#39;t any science behind it&quot;. A quote from a partner at a Big 4 accounting firm at a presentation I attended recently. In security, very few companies have the systems in place to capture the data to accurately perform quantitative risk assessments, assess security costs and investments in a true cost benefit manner nor measure the true cost of security incidents. Sadly this means that we are reliant on surveys as a source of insight into everything from emerging threats, benchmarks of maturity and whether we are investing in the right areas. So if this is the case, why aren&#39;t security surveys better and what could be done to make them better?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;There seems to be plenty of security surveys and especially at this time of the year, people are evaluating how the last year went and trying to predict the next. They mostly seem to be run by consulting companies and governance institutes with motives ranging from building business development opportunities to providing a service to their community of members. My particular experience came recently from an internal security person presenting the results of a survey he has been contributing to for over 5 years and then a few weeks later a presentation from a Big 4 accounting firm to our team on the survey they had just run. I was quite interested in both because having attempted to benchmark a security practise before on a capability maturity model, write a security strategy and write business cases for security investments the insight and methodology were highly relevant.&lt;br /&gt;&lt;br /&gt;Sadly though when both were presenting, the main thoughts going through my head was whether this data was really accurate and whether its conclusions could be relied upon. This led me to ask the question at the end of the Big4 presentation: to me it seems like this survey based approach relies greatly on the &lt;a href=&quot;http://en.wikipedia.org/wiki/The_Wisdom_of_Crowds&quot;&gt;wisdom of crowds&lt;/a&gt; principles, so how have you tried to align to these or something similar? The risk and technology partner presenting looked bemused, she started to stammer and didn&#39;t really seem to understand the question. I tried to explain: so the wisdom of crowds is a book that talks about how the collective view of the crowd can be smarter than the smartest person(s) in the crowd but this requires a few principles to be adhered to, these being diversity of opinion, independence, decentralization and a method to aggregate the private judgements into a collective view. She seemed even more confused but then provided a potential slip of brutal honesty: &quot;It is a matter of opinion, there is isn&#39;t any science behind it&quot;.&lt;br /&gt;&lt;br /&gt;The last part of that statement was what I found most disappointing. She was right, the responses were a number of opinions but why does there mean that there is no science behind it? It seems to me that if you are going to spend a lot of money, time and resources to collect this information, print glossy brochures and publications and run a number of show and tell sessions to share the insights from it, why would not employ some data scientists and people that run surveys and polls for a living and put some scientific rigour about it? Would this not greatly increase the confidence you have in the results which would then allow greater success in meeting the underlying motives e.g. sell some work in the areas that are growing or provide a service in the areas that need the most improvement / provide best bang for buck.&lt;br /&gt;&lt;br /&gt;To me it seems like some simple measures could align security surveys to the principles in the wisdom of crowds:&lt;br /&gt;&lt;br /&gt;&lt;i&gt;&lt;b&gt;Diversity of opinion&lt;/b&gt;&lt;/i&gt;&amp;nbsp; &lt;br /&gt;&lt;div&gt;This seems to be the big one that most security surveys struggle with. At this presentation a colleague of mine asked: so who typically fills in this questionnaire? The answer: a range of people, usually it is sent to the CISO and he/she completes it or delegates it. It seemed reasonable, except there was not any real rigour in the methodology to ensure that true diversity was achieved. The danger here was there was a high chance that someone in the security department completed the survey. This was highlighted by questions such as &quot;is security delivering the value required by the business?&quot; A truly diverse range of people in the organisation completing a response this question seems like it would be valuable rather than say 5% business, 95% security staff. The gentleman answering the question did not even have any stats of how many of the survey responses had been completed by someone in the security department vs. outside of that. This seems like a really simple thing that could be tracked in the survey. In fact ideally the methodology would be more proactive and actually seek responses from as diverse group as possible: from all different roles in the business, technology and security, from the C level to the coal face.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;&lt;b&gt;Independence&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;The crowd became less intelligent when &quot;members of the crowd were too conscious of the opinions of others and  began to emulate each other and conform rather than think differently&quot;. You could see this in 2008 coming upto the financial crises and with how much of the financial community was using the same models when it came to rating CDO&#39;s. This is a particular insidious problem within the security community. If you have attended a security conference in the past year or so it would have been amazing if there was not a majority of talks on mobile security, cloud, APT&#39;s etc. It is not like most companies have solved the basics, nor that the business has stopped caring about things like passwords or single-sign on, it is just that these topics are not sexy at the moment. Therefore addressing this point could be a simple benefit of doing the above: ensuring the responding parties are diverse. There could perhaps even be some filtering questions asked of the responder which would allow measurement in their alliance to the herd on key opinions e.g. can data be stored securely in a public cloud? There response could still be collected to the main questions but you could cut the data in a way that took the independence of responses into account.&lt;i&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;&lt;b&gt;Decentralisation&lt;/b&gt;&lt;/i&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;It appears if you are able to get the knowledge of specialists, especially local knowledge that only they have the the overall collective decision or insight is smarter. In a security context this could be improved by ensuring the survey is truly global rather than western English speaking countries, again ensuring that people on the coal face provide responses e.g. the firewall engineer, the investigator, the penetration tester in addition to the CISO who may have a more generalist knowledge. Also in business and technology, including the teller, the machine operator as well as the GM of Internet Banking. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;i&gt;&lt;b&gt;Aggregation&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;Generally the survey itself is a good way of doing this. However some basic improvements could be made:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Ask the question with the end in mind&lt;/b&gt; - in many of the surveys the questions do not appear to be crafted by people with a high degree of experience in polling or surveying field. They are probably written by security people. A question should always be driven from what decision can we make with this data, what stakeholders would be interested in this and why (and does this match our actual target audience), what insight does the answer being one of the options rather than another tell me? Many of the surveys seem to want to move with the times (e.g. have cloud and mobile etc in the responses). However not only does changing the question every year reduce it&#39;s value in historical trends, the way the question is asked, the end answer does not provide anything valuable. Insights which security people are always interested in and which questions should be crafted around to answer seem to be:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;What areas of security is my organisation performing well in or poorly in (what the maturity level is) relative to my peers?&lt;/li&gt;&lt;li&gt;Where should I focus my investment and where could I make savings? Is the level of investment / spend on security technology, people,  process reasonable commiserate with peers? Is more or less justified and  in what areas?&lt;/li&gt;&lt;li&gt;What areas of security are providing the most value to the business and which areas could the&amp;nbsp; most value be provided?&lt;/li&gt;&lt;li&gt;Where is the next major set of incidents or regulation coming from and how could I get in front of the curve/demands?&lt;/li&gt;&lt;li&gt;Is the investment / focus I&#39;m making in various areas of security actually resulting in improvements and benefits being realised?&lt;/li&gt;&lt;li&gt;How can I measure improvements or reductions in my security posture / risk exposure? How secure am I relative to peers and the threat environment?&lt;/li&gt;&lt;li&gt;Where is the lack of security controls actually costing me money or causing harm in terms of reputational damage, legal, contractual or regulatory impacts vs. being a theoretical risk?&lt;/li&gt;&lt;li&gt;What should be my top three priorities for the next year or within the next three years and how would I make some practical improvements in these areas?&lt;/li&gt;&lt;/ul&gt;There are probably many more but my point being these should be identified and a clear mapping of survey question results to how these are answered. A pilot could be run of the survey or even purely computer based simulations of answers to see how various answers would provide insight, which could then be used to tune the questions prior to the real survey.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Basis statistics&lt;/b&gt; -&amp;nbsp; understanding average vs. median, how outliers affect / skew your results, the value of standard deviations and confidence intervals, the difference between correlation and causation. Actually presenting commentary and explanation and not just pretty graphs. The value of sorting and infographics. All of which and more I&#39;m sure experience people in running surveys would be able to provide and all of which would greatly increase the value of the results. I mean surely a big global accounting company running an annual global survey could build a competent team of these people (e.g. hire the pollsters that run these for political campaigns) rather than simply asking managers, directors and partners to run these simply because they sell services in the risk and security space.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;Summary (TLDR;)&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;The security industry has a high reliance on survey based data. These survey&#39;s unfortunately seem to have a lack of scientific rigour and could be improved by adhering to the principles in the wisdom of crowds:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Diversity of opinion - designing the survey to include a broad range of business, technology and security responders at all levels in a broad range of organisations&lt;/li&gt;&lt;li&gt;Independence - testing for herd think with filtering questions and allowing different data cutting with higher or lower independence&lt;/li&gt;&lt;li&gt;Decentralisation - looking for specialist local knowledge rather than generalists&lt;/li&gt;&lt;li&gt;Aggregation - designing questions to answer things people actually want to know, ensuring the responses can actually provide this and testing it. Improving the basic statistics and presentation&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;Related posts:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/01/analysing-aberdeen-group-application.html&quot;&gt;ROI in the secure development lifecyle&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/07/security-return-on-investment-roi.html&quot;&gt;Security ROI&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/07/security-return-on-investment-roi.html&quot;&gt;Annualized loss expectancy&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;PS: no blogs for a whole year, epic fail and typically what happens to most blogs. No excuses really, just a lack of serious inspiration combined with other hobbies taking time, working on projects I&#39;ve already talked about (DLP, SIEM) and long delivery times on other projects. Goal is to write a couple of posts in this Christmas break (Oracle security stack and Big data in SIEM are the goals), will see how we go. Don&#39;t think this will ever be a regular blog but hopefully some interesting and valuable content and a bit out of the box thinking and challenging the norms. Especially if you got this far, thanks for reading and please comment / link me your content!&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt;or follow me on Twitter: &lt;a class=&quot;twitter-follow-button&quot; href=&quot;http://twitter.com/rakkhis&quot;&gt;Follow @rakkhis&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Picture source:&amp;nbsp; http://siliconangle.com/files/2012/11/BigDataFail-300x208.jpg&lt;/span&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/4178975363244066976/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2012/12/how-security-surveys-could-be-improved.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/4178975363244066976'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/4178975363244066976'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2012/12/how-security-surveys-could-be-improved.html' title='How security surveys could be improved'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-J31DGoAgpZs/UM2kjgxpeoI/AAAAAAAAE8A/kINfDLQ3EvI/s72-c/BigDataFail-300x208.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-1502110745817870981</id><published>2011-11-19T10:59:00.001+00:00</published><updated>2011-11-20T11:25:24.782+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="jobs"/><title type='text'>Simple tips for getting a job in #infosec</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-dXMsDRng9Go/Tsjg5qyUFnI/AAAAAAAACIY/ILttx7ef1-0/s1600/2560666767_82edc1b3fb.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;http://2.bp.blogspot.com/-dXMsDRng9Go/Tsjg5qyUFnI/AAAAAAAACIY/ILttx7ef1-0/s320/2560666767_82edc1b3fb.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;left&quot; class=&quot;bloggerplus_text_section&quot;&gt;With the global financial crisis many people have been looking for stability. I on the other hand have worked mainly as a contractor in the past four years so have had a great deal of experience in finding new roles. Many roles have been really interesting and rewarding, generally lasting between 6 months and 1.5 years. I have been lucky enough to only ever have a maximum of two weeks between roles. These are some practical tips and lessons learnt for finding a job in security that have worked for me.&amp;nbsp;&lt;/div&gt;&lt;div align=&quot;left&quot; class=&quot;bloggerplus_text_section&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;left&quot; class=&quot;bloggerplus_text_section&quot;&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;b style=&quot;font-size: 24px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;The CV&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Like most endeavors some time spent planning upfront really makes a difference. Working out what you really want to do and why  is critical. The more specific you can get that the better. Security has so many areas of specialization, a clear concise decision here really sets you up for success. Mind mapping to brainstorm this is a great way to get some thoughts down. It does not even have to be a specific role but at least a clear idea of the work you want to do day to day and what you do not want, based on what you enjoyed and motivated you in the past.&lt;br /&gt;&lt;br /&gt;Once you have this description, it is a case of cutting your CV down to fit this and only this. As many have said about Steve Jobs, one of his key skills was the ability to say no, to cut out everything that is not required. I have found in security you can get invoked in so many different things and even some of your achievements in the past may not be what you want to do going forward. This is a really hard process but from the other side of the table, people really want to work out where you would best fit, what projects or work allocation you would be best suited to. Making this easier for them by clearly highlighting two or three real strengths and achievements with what you actually want to do works for everybody. I have worked in policy development, third party risk assessments, PCI-DSS, but if I list these three times each they are the only roles I will find. Also expect to be questioned about what you list, do not put things where you had a marginal involvement, but rather those that you know in intimate detail. &lt;br /&gt;&lt;br /&gt;I am also not a fan of big lists of technology or skills without clear experience or achievements. Listing clear measurable wins with the relevant technology and skills demonstrated is the way to make an impact. Avoid generic cover letters and a shotgun approach. Even 10 minutes spent mirroring a reflecting back the wording of the job spec / advertisement with the fit to your experience and achievements will get significantly better results.  There are many ways to order your CV but I like key achievements linked to experience first, education and certifications later. &lt;br /&gt;&lt;b style=&quot;font-size: 24px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Finding a role&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;There is a lot said about finding jobs through your contacts network and a large number of roles not being advertised but for me old fashioned job boards and recruiters have got me every job over the last four years. Find the major job board for technology in your city / country, setup a profile and some very specific alerts. Target the work you really want to do rather than generic or all security roles. I think the advertised roles are actually only useful to find recruiters who get these roles. Get to know these recruiters. Meet with them, keep in touch. Every role I got in the last four years was a recruiter I knew contacting me about a role that had come up, not for ones I had applied myself.&lt;br /&gt;&lt;br /&gt;That said cultivating  your network is never a waste of time. Personally I never got a role directly due to my network, however it is always a good way of keeping up with what is going on and security tends to be a small world so you never know where you may run into a contact. The monthly meetups like Defcon, OWASP are ideally suited for this and the best way to get people taking to you in these, is to do a short presentation. It does not have to be anything that special, just a perspective on a current issue with some fun and informative slides will do the trick.&lt;br /&gt;&lt;b style=&quot;font-size: 24px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;The number&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;When dealing with recruiters again having a clear statement of what you want to do and what you do not, really makes them work for you. Fight the feeling that you may miss out on something, being specific will get you more of what you want faster. A common question from recruiters is also what you are on currently and what you are looking for. My approach here is to have one number. Not a range. Just a researched number on what is realistically achievable. This should be from people that actually do the role you are after than recruiters of possible. If it is a recruiter number get at least 3 opinions and add 20%. State this number clearly and shut up. Do not negotiate at this stage, if there is an actual job offer latter you can work out whether any trade off is worthwhile but at this stage go in with the best position to negotiate down from. It is a lot easier for you to decide to go down rather than get it up later.&lt;br /&gt;&lt;b style=&quot;font-size: 24px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;The interview&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;This seems to be where a lot of security people let themselves down. Technical questions are specific to the area you are applying for but having a clear structure with the answer or solution followed by a solid example of where you demonstrated this seems sensible. Like public speaking or presenting practice your response to common questions aloud many times. I believe every security professional should have a good answer to dealing with risk acceptance and influencing and convincing the business.  I always found a whiteboard or bringing a pad to draw on was my friend. It is so much easier to explain ideas when you have a visual aid and it can get the interviewer involved in problem solving and provide a frame of reference for questions and answers. Even if the answer is not visual, anchoring with a mindmap works well.  Definitely have some questions for them. It is a good opportunity to evaluate if you actually want to work there and also get them imaging you in the role. I like questions like what will my priorities be for the first month. What does good look like or success measured? What will be my decision authority? What is the style of management - hands on or off? How is bad news received by the organization?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&amp;nbsp;Summary / TLDR;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Decide what you really want to do day to day&lt;/li&gt;&lt;li&gt;Cut down your CV to suit this only&lt;/li&gt;&lt;li&gt;Get to know the recruiters that get your roles&lt;/li&gt;&lt;li&gt;Pick a salary or rate number, state it and shut up&lt;/li&gt;&lt;li&gt;Provide all interview answers with an answer from experience.&lt;/li&gt;&lt;li&gt;Present visually if possible and ask questions that get them imagining you in the role&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Photo credit &lt;a href=&quot;http://www.flickr.com/photos/yggg/2560666767/sizes/m/in/photostream/&quot;&gt;Flikr&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/1502110745817870981/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/11/simple-tips-for-getting-job-in-infosec.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/1502110745817870981'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/1502110745817870981'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/11/simple-tips-for-getting-job-in-infosec.html' title='Simple tips for getting a job in #infosec'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-dXMsDRng9Go/Tsjg5qyUFnI/AAAAAAAACIY/ILttx7ef1-0/s72-c/2560666767_82edc1b3fb.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-6991917702172416873</id><published>2011-10-19T11:50:00.000+01:00</published><updated>2011-10-19T23:18:06.848+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Contracts"/><category scheme="http://www.blogger.com/atom/ns#" term="Rant"/><category scheme="http://www.blogger.com/atom/ns#" term="Security norms"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Risk Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Startups"/><title type='text'>Top 3 reasons why fighting small battles is losing us the war</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-s6Dl-wU0St4/Tp6rDqEgh-I/AAAAAAAACIA/2kzhvvibU0M/s1600/5266793839_082c390402_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-s6Dl-wU0St4/Tp6rDqEgh-I/AAAAAAAACIA/2kzhvvibU0M/s1600/5266793839_082c390402_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Are you sure you are a security guy? A friend and colleague working in anti-fraud has asked me a number of times on a recent project. The answer is no I am not. Not your typical one anyway. I think sometimes I am more of a business guy trapped in the body of a work prevention officer. I care about viability, the bottom line and time to market. I spam people with the latest developments in the industry. I am also a tech geek trapped in the body of InfoSec guy. I think web sockets, noSQL, node.js, coffee script is cool; not worry immediately about security hazards they bring. I believe most things that benefit the business can be done securely enough to mitigate the risks to a level the business would accept. For these reasons, I have become increasingly frustrated with the InfoSec industry and security in large companies in general. If we stopped crying wolf at the small stuff, there is a better chance we could have some real influence on the big issues.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;Large corporations today are not getting the benefits startups and consumers enjoy. The technology innovation and adoption cycle used to go government &amp;gt; corporations &amp;gt; consumer. That is now reversed. This is not entirely the fault of security and compliance groups but some of it certainly is. Maybe not by directly saying NO, but by the perception that security, compliance or risk would never approve this. By making the review and assessment process so long and onerous, it is just easier to not do it.&lt;br /&gt;&lt;br /&gt;I will provide three examples where fighting small battles is losing us the war:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;1. Fear of the external and loss of control&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;See if you agree with the following statements in today&#39;s world:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Security of the internal network is a myth e.g. RSA, Sony&lt;/li&gt;&lt;li&gt;Having a hard outer shell and soft center(s) is pointless&lt;/li&gt;&lt;li&gt;Firewalls are porous&lt;/li&gt;&lt;li&gt;Anti-virus is ineffective&lt;/li&gt;&lt;li&gt;You have to give someone access. Someone has to administer systems&lt;/li&gt;&lt;li&gt;Data loss and leakage is simple and occurs every day&lt;/li&gt;&lt;li&gt;Many services are outsourced, this includes the cleaners in your office and datacenter, repairmen, temps and contractors, all the way to HR, infrastructure, desktop and networks management&lt;/li&gt;&lt;li&gt;Great volumes of data are already stored outside the corporations network, often unencrypted e.g. emails sent externally, backup tapes&lt;/li&gt;&lt;li&gt;Data sent externally, even where encrypted, will be decrypted and stored on external systems. It may not be disposed of securely&lt;/li&gt;&lt;li&gt;An organizations most valuable data is unstructured and stored in email and file shares (on servers, endpoints, mobile, backups)&lt;/li&gt;&lt;li&gt;Due to email your most sensitive data already lives and traverses the Internet daily&lt;/li&gt;&lt;li&gt;Most web applications still have the most basic cross site scripting and SQL injection vulnerabilities&amp;nbsp;&lt;/li&gt;&lt;li&gt;Many systems are still vulnerable to default or simple passwords or are missing patches&lt;/li&gt;&lt;li&gt;Social engineering is still one of the most effective attack vectors. Coming through the front door is still good enough and easy enough&lt;/li&gt;&lt;/ul&gt;Still with me? At least for the 20% that matters? How about these:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Moving security controls as close to the sensitive data as possible makes sense&lt;/li&gt;&lt;li&gt;If the sensitive data is secured, network controls, remote access, where the data is physically matters a lot less&lt;/li&gt;&lt;li&gt;Five of the most effective security controls in most scenarios would be authentication, authorization, logging and monitoring, encryption and patching&lt;/li&gt;&lt;/ul&gt;Still with me? I would be surprised if many battle hardened security professionals today disagreed with the general observations above. Still having come all the way to the edge of the cliff, many will not take a leap to the logical conclusions.&lt;br /&gt;&lt;br /&gt;Many startups today will begin with their life on the Internet. The required tools are simple, easy to access, easy to use and often free. Tools such as collaboration, social networking, video conferencing, group messaging or social coding. Even the basics just work so much better than in large corporations. Email is fast and easily searchable, calendars and available time sharable across anyone. Documents live in one place on the web, do not need to be emailed and can be worked on by anyone simultaneously. Endpoints and mobile can be whatever makes you most productive (e.g. Mac, Android, Ubuntu) and information and functions accessible easily from anywhere in the world.&lt;br /&gt;&lt;br /&gt;All of these services could be available to large corporations at reasonable security. The fear of putting data outside of the corporate internal network, the fear of staff you do not control, the over reliance on network controls and antivirus is a major barrier. To even consider these business enabling tools, security would need months due diligence, weeks of evaluation, signing over of the vendors first born in case something goes wrong. As InfoSec professionals we do not want to do the same boring simple cheap controls that make 80% of the difference, no this is new and risky so there must be mountain of new controls, which we never have to deploy on internal networks because there was no business case. My favorite is when we pretend we are lawyers and are concerned about the liability and data jurisdiction restrictions. Why don&#39;t we assess the risk, put reasonable controls in place and let the business get on with it?&lt;br /&gt;&lt;br /&gt;The thing we do not seem to realize is that for there to be any need for security there must be a business first. Many of the things that startups and consumers take for granted now is the small stuff. In the scheme of things and if you subscribe to the above truisms they are not the big risks to the business. By simply denying them or making it so hard for the business to do them, all we do is lose our seat at the table. They work around us or approach us too late to allow any influence. &amp;nbsp;By working with the business on the small stuff that simply reduces the friction and allows them to compete in today&#39;s world, we have a far better chance at getting a seat at the table for the decisions that really matter.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;2. Too much complexity&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Most security professionals would subscribe to the view that increased complexity reduces security and increases the likelihood of vulnerabilities. Yet we seem unable to be comfortable with a parato level of security. An example: once we had a project to improve the supplier security schedules at a company. These are the legal clauses relating to security that goes into contacts with suppliers. The organization recognized that they were a mess. There were too many different versions, they were inconsistently applied and had no relation to the risk posed by the supplier. There was a wise view that the internal policies and standards could not be simply applied to all suppliers in a legal contract, as they were simply not written for that purpose and any suppliers that read them would not actually signup to them.&lt;br /&gt;&lt;br /&gt;Me and two security guys I respect a lot were tasked with coming up with a new security schedule to solve this problem. One of the guys in particular is quite brilliant, he is recently told me &quot;I have no idea what I would do if a company actually did the basics right. If they did passwords and patching, I would be lost. Everything else is just window dressing&quot;. I liked the cut of his jib. Therefore, we wrote a one pager. Just the absolute minimum security controls we could accept with a simple, unambiguous four step criteria of which controls would apply to which type of product / service.&lt;br /&gt;&lt;br /&gt;Of course being a large company, it then needed the dreaded review cycle. Every security, risk and compliance professional that reviewed it felt that their touch was needed; a critical security control that could not be lived without has to be added. Not surprisingly at the end, it was over 85 pages and completely unusable. The organization itself was no way close to compliant with it and no way would any supplier sign it.&lt;br /&gt;&lt;br /&gt;I think after giving so much ground and having security cut from initiatives, after having to battle to get funding for every security initiative we now just shoot for the stars expecting to be beaten down. Being naturally risk averse and afraid of missing something we ask for everything. The latest advanced persistent unicorns are defeating all our controls; we need new and advanced defenses. It does not matter if you are just doing point-to-point web services with mutual authentication. TLS is too old and not sexy. We need this cool message signing to defeat the evil Zeus and Stuxnet!&lt;br /&gt;&lt;br /&gt;The role of security is not to get cool tools deployed. Most of the time the basics done well is enough and applying the appropriate controls at the least cost and effort will get the business to engage more frequently and on issues that are more important.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;3. Passing the buck&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Agree with some of what you wrote above but end of the day I do not care. As long as the business accepts the risk, they can do what they want. I still get paid and do not need to stick my neck on the line.&lt;br /&gt;&lt;br /&gt;This is just wrong.&lt;br /&gt;&lt;br /&gt;Like a doctor or lawyer of old, be a trusted processional. A true expert. Like when faced with a complex and risky surgery or an experimental drug. You will not feel the consequences as patient (the business) will but like the doctor you are often, the best positioned to make an expert recommendation. You will fail and make the wrong recommendation sometimes but if you out yourself in the shoes of the business owner and use all your domain expertise and experience to make the best recommendation you can then would that not more often that not result in the best outcome for the organisation? Ultimately, it is still a business decision, like the patients, and they may choose to ignore your recommendation. However, where we save our own arse and do not even make a recommendation then that is the biggest disservice.&lt;br /&gt;&lt;br /&gt;We should be fighting for the big stuff and not sweating the small stuff. We should identify and focus on the big risks to the organisation and not get dragged down rabbit holes every time they occur. And the occur often. What could put the business out of business? There should only be a handful. What just helps the business get stuff done? These things are not without risk but the risk can be managed with simple, cost effective measures. This is not about passing the buck to the business but rather stepping up as domain experts and security professionals. Accepting responsibility, sticking our necks on the line for the overall best outcome for the business.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Summary (TLDR;)&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Apply modern attitudes to security. Internal is not safer than external these days. There is no reason that security should directly or indirectly prevent services to big companies that consumers and startups use safely&lt;/li&gt;&lt;li&gt;Be pragmatic and reduce complexity. Resist the temptation to implement additional security controls because it is a new service or a new control when the basics reduce the risk to an acceptable level&lt;/li&gt;&lt;li&gt;Use your expertise to make recommendations not just get risk&amp;nbsp;acceptances&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Related posts:&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/05/7-ways-to-exploit-psychology-to-sell.html&quot;&gt;7 ways to exploit psychology to sell security&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/01/early-security-engagement-critical-or.html&quot;&gt;Early security engagement - critical or waste?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/11/in-security-is-it-better-to-be-black.html&quot;&gt;In security is it better to be black and white?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;PS: For anyone who subscribes to this blog, apologies for the lack of articles recently. Have been busy moving from London back to Melbourne and getting a new job. Article about what I have found effective in getting a security role to follow soon and hopefully at least one a month.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt;or follow me on Twitter: &lt;a class=&quot;twitter-follow-button&quot; href=&quot;http://twitter.com/rakkhis&quot;&gt;Follow @rakkhis&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;br /&gt;Photo credit: &lt;a href=&quot;http://www.flickr.com/photos/protestphotos1/5266793839/sizes/s/in/photostream/&quot;&gt;ProtestPhotos1&lt;/a&gt; Flikr&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/6991917702172416873/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/10/top-3-reasons-why-fighting-small.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/6991917702172416873'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/6991917702172416873'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/10/top-3-reasons-why-fighting-small.html' title='Top 3 reasons why fighting small battles is losing us the war'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-s6Dl-wU0St4/Tp6rDqEgh-I/AAAAAAAACIA/2kzhvvibU0M/s72-c/5266793839_082c390402_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-7499100017342157615</id><published>2011-08-09T14:38:00.000+01:00</published><updated>2011-08-09T14:38:00.628+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile security"/><title type='text'>Apple bringing secure email to the masses with iOS 5</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-v2LLS3-w5Oo/TiQrlrfv18I/AAAAAAAACDY/xtT0G7vRf-Y/s1600/506858927_5fa530ce3e.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;172&quot; src=&quot;http://2.bp.blogspot.com/-v2LLS3-w5Oo/TiQrlrfv18I/AAAAAAAACDY/xtT0G7vRf-Y/s320/506858927_5fa530ce3e.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;One of my worst ever projects was implementing PGP email encryption. Considering I have only worked in large financial services companies, that is saying something. I have &lt;a href=&quot;http://www.rakkhis.com/2010/08/implementing-email-encryption-lessons.html&quot;&gt;reflected&lt;/a&gt; on the lessons learnt from this project before, but I felt that PGP was fundamentally flawed. When Apple iOS 5 was unveiled, there was a small feature that no one talked about. It was hidden among the sparkling jewels of notifications, free messaging and just works synchronization. That feature was S/MIME email encryption support. Now S/MIME is not new, however Apple is uniquely positioned with their ecosystem and user-centric design to solve the fundamental problems and bring secure email to the masses.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Written for &lt;a href=&quot;http://security.blogoverflow.com/2011/08/09/apple-bringing-secure-email-to-the-masses-with-ios-5/&quot;&gt;security.blogoverflow.com&lt;/a&gt; &lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;I have detailed the problems that email encryption solves, and those it does not solve before. To re-iterate and update:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Attacker eavesdropping or modifying an email in transit&lt;/b&gt;. both on public networks such the Internet and unprotected wireless networks as well as private internal networks. Recently I have experienced things that have hammered home the reality of this threat: Heartfelt presentations at security conferences such as Uncon about the difficulties faced by those in oppressive regimes such as Iran, where the government reading your email could result in death or worse for you and your family. Even &quot;liberal&quot; governments such as the US blatantly ignoring the law to perform mass domestic &lt;a href=&quot;http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy&quot;&gt;wire tapping&lt;/a&gt; in the name of freedom. The right to privacy is a human right. Most critical communication these days is electronic. There is a clear problem to be solved in keeping this communication only to it&#39;s intended participants.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Attacker reading or modifying emails in storage&lt;/b&gt;. The recent attacks on high profile targets such as Sony and low profile like MTGox, who were brought low by simple exploitation of unpatched systems and SQL injection vulnerabilities, have revealed an un-intended consequence. The email addresses and passwords published were often enough to allow attackers access to a users email account as the passwords were re-used. I don&#39;t know about you but these days a lot of my most important information is stored in my gmail account. The awesome search capability, high storage capacity and accessibility everywhere means that it is a natural candidate for scanned documents and notes as well as the traditional highly personal and private communications. There is a problem to be solved of adding a layered defense; an additional wall in your castle if the front gate is breached.&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Attacker is able to send emails impersonating you&lt;/b&gt;. It is amazing how much email is trusted today as being actually from the stated sender. In reality normal email provides very little non-repudiation. This means, it is trivial to send an email that appears to come from someone else. This is a major reason why phishing and spear phishing in particular are still so successful. Now spam blockers, especially good ones like Postini have become very good at examining email headers, verified sender domains, MX records etc to reject fraudulent emails (which is effective unless of course you are an RSA employee and dig it out of your quarantine). You can also have more localised proof of concept of this. If your work accepts manager e-mail approvals for things like pay rises and software access, and it also has open SMTP relays you can have some fun by Googling SMTP telnet commands. There is a problem to solve in how to reliably verify the sender of the email and ensure the contents have not been tampered with.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;Problems not solved by email encryption and signing:&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Sending the wrong contents to the right person (s)&lt;/li&gt;&lt;li&gt;Sending the right contents to the wrong person (s)&lt;/li&gt;&lt;li&gt;Sending the wrong contents to the wrong person (s)&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;These are important to keep in mind because you need to choose the right tool for the job. Email encryption is not a panacea for all email mis-use cases.  &lt;br /&gt;&lt;br /&gt;So having established that there is a need for email encryption and signing, what are the fundemental problems with a market leading technology like PGP (now owned by Symantec)?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Fundemental problems in summary&lt;/b&gt;:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Key exchange&lt;/b&gt;. Bob Greenpeace wants to send an email to Alice Activist for the first time. He is worried about Evil Government and Greedy OilCorp reading it and killing them both. Bob needs Alice&#39;s public key to be able to encrypt the document. If Bob and Alice both worked at the same company and had PGP universal configured correctly, or worked in organisations that both had PGP universal servers exposed externally, or had the foresight to publish their public keys to the public PGP global key server, all would be well. However this is rarely the case. Also email is a conversation. Alice not only wants to reply but also add in Karl Boatdriver in planning the operation. Now suddenly all three need his public keys and he theirs. Bob, Alice and Karl are all experts in their field but not technical and have no idea how to export and send their public keys and install these keys before sending secure email. They have an operation to plan for Thursday!&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Working transparently and reliably everywhere&lt;/b&gt;. Bob is also running Outlook on his Windows phone 7 (*chuckles*), Alice Pegasus on Ubuntu and Karl Gmail via Safari on his iPad. Email encryption, decryption, signing, signature verification, key exchange all need to just work on all of these and more. It also cannot be like PGP desktop which uses a dirty hack to hook into a rich email client. This gives it extremely good reliability and performance. Intermittent issues like emails going missing and blank emails never occur. Calls to PGP support for any enterprise installation are few and far between. All users in companies love PGP and barely notice it is there. In many organisations email is the highest tier application. It has to have three nines uptime. If Alice and Karl are about to be captured by Greedy Oilcorp and they need to get an email to Bob they cannot afford to get a message blocked by PGP error.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Less fundamental but still annoying:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Adding storage encryption&lt;/b&gt; - there is no simple way with PGP to encrypt a clear text email in storage. You can send it to yourself again or export it to a file system and encrypt it there but that is it. This is a problem in where the email is not sensitive enough to encrypt in transit (or just where you just forgot) but where after the fact, you do care if script kiddies with your email password get that email and publish it on Pastebin.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;How Apple could solve these fundamental problems with iOS 5&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Key exchange&lt;/b&gt; - If you read &lt;a href=&quot;http://markn.ca/2011/ios4/&quot;&gt;marknca&lt;/a&gt;&#39;s excellent iOS security guide, you will see that Apple has effectively built a Public Key Infrastructure (PKI). Cryptographically signing things like apps and checking this signature before allowing them to run is key to their security model. This could be extended to users to provide email encryption and specifically transparent key exchange in the following manner:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Each user with an Apple ID would have a public/private key pair automatically generated&lt;/li&gt;&lt;li&gt;The public keys would be stored on the Apple servers and available via API and on the web to anyone&lt;/li&gt;&lt;li&gt;The private keys would be encrypted to the the users Apple account passphrase and be synchronized via iCloud to all iOS and Mac endpoints &lt;/li&gt;&lt;li&gt;To send a secure email the user would just click a secure button on their email tool&lt;/li&gt;&lt;li&gt;When sending an email via an iOS device, a Mac or via Mobile me web it would query the Apple servers for the recipients private key and encrypt and sign (optional) the email&lt;/li&gt;&lt;li&gt;On receipt as long as the device had been unlocked the email would be decrypted. For web access as long as the certificate was stored in the browser the email would be decrypted (could be an addon to Safari)&lt;/li&gt;&lt;li&gt;To encrypt an email in storage you would just drag it to a folder called private email. You could write rules for what emails were automatically stored there.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;This system would make key exchange, email encryption, decryption and signing totally transparent. Because S/MIME uses certificates it is easy to get the works everywhere property. However Apple would first enable this only for .me addresses and iOS devices and Mac&#39;s to enable them to sell more of these and to beef up their enterprise cred. Smart hackers and addon writers would soon make it work everywhere though. There you go, secure email for the masses.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Summary (TLDR):&lt;/b&gt;&amp;nbsp; &lt;br /&gt;&lt;ul&gt;&lt;li&gt;Email encryption solves the problems of interception in transit and adds a secondary layer of defence if your email account is compromised. Signing ensures the recipient can trust it is you sending&lt;/li&gt;&lt;li&gt;Email encryption and signing does not solve human errors relating to email&lt;/li&gt;&lt;li&gt;PGP fails at key exchange, working transparently and reliably and email storage encryption&lt;/li&gt;&lt;li&gt;Apple with S/MIME support in iOS5 and existing Public Key Infrastructure (PKI) could make secure email just work by simplifying key generation and exchange and integrating encryption, decryption and signing into iOS native mail applications&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;Related posts:&lt;/b&gt; &lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/08/implementing-email-encryption-lessons.html&quot;&gt;Implementing email encryption: lessons learned&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/09/3-million-reasons-to-encrypt-your.html&quot;&gt;3 Million reasons to encrypt your Blackberry&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/10/beating-crackberry-if-apple-google-and.html&quot;&gt;Beating crackberry: if Apple, Google and Microsoft were serious about enterprise smartphones&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter: &lt;a class=&quot;twitter-follow-button&quot; href=&quot;http://twitter.com/rakkhis&quot;&gt;Follow @rakkhis&lt;/a&gt; &lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Photo credit: &lt;a href=&quot;https://secure.flickr.com/photos/u2canreed/506858927/sizes/m/in/photostream/&quot;&gt;u2canreed&lt;/a&gt; Flikr&lt;br /&gt;&lt;br /&gt;Editing and review assistance:&amp;nbsp; &lt;a href=&quot;https://twitter.com/#%21/roryalsop&quot;&gt;Rory Alsop&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/7499100017342157615/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/08/apple-bringing-secure-email-to-masses.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/7499100017342157615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/7499100017342157615'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/08/apple-bringing-secure-email-to-masses.html' title='Apple bringing secure email to the masses with iOS 5'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-v2LLS3-w5Oo/TiQrlrfv18I/AAAAAAAACDY/xtT0G7vRf-Y/s72-c/506858927_5fa530ce3e.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-1661092428379149286</id><published>2011-07-03T21:35:00.003+01:00</published><updated>2011-07-05T11:28:07.743+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Social media"/><title type='text'>Google+ because I hate being put in a box</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-kTH0H3y_CWA/ThDHjsKDGCI/AAAAAAAACCo/kVjWgaXJQNk/s1600/2404069584_0e4ff8df95.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;149&quot; src=&quot;http://3.bp.blogspot.com/-kTH0H3y_CWA/ThDHjsKDGCI/AAAAAAAACCo/kVjWgaXJQNk/s200/2404069584_0e4ff8df95.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;No one talks in my Facebook groups. People talk too much on my Twitter feed. These are my two biggest problems on social networks at the moment. I&#39;m pretty sure this only impacts me though. I have been playing around with Google plus for a few days now and interestingly I think it could solve both problems. I also have some suggestions that would improve the service for me at least.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Too little engagement&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;As you can see my Facebook groups are pretty bare.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-XnUPBZz6Bpw/ThDH6idrjbI/AAAAAAAACCs/DBNEJ3gf_g0/s1600/facebook+groups.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;441&quot; src=&quot;http://1.bp.blogspot.com/-XnUPBZz6Bpw/ThDH6idrjbI/AAAAAAAACCs/DBNEJ3gf_g0/s640/facebook+groups.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;I have created and got added into the following groups:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Geek channel - new technology, gadgets and other geek stuff.&lt;/li&gt;&lt;li&gt;Current and ex gamers - computer games&lt;/li&gt;&lt;li&gt;Sporadic photographers&lt;/li&gt;&lt;li&gt;UK friends - close friends I see regularly in real life&lt;/li&gt;&lt;li&gt;PwC&amp;nbsp;Melbourne&amp;nbsp;alumni - work&amp;nbsp;colleagues&amp;nbsp;and friends from my first job&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;There is very little engagement in these groups. The largest contributor by far is me. There is very little discussion. I posted this question on &lt;a href=&quot;http://www.quora.com/Is-Facebook-groups-working/talk&quot;&gt;Quora&lt;/a&gt; &lt;insert link=&quot;&quot; quora=&quot;&quot;&gt; and the answer came back that this clearly only impacted me.&amp;nbsp;&lt;/insert&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The main reasons for this are:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Got no friends&lt;/b&gt; - I have a low number of friends, just over a 100. These are all people I have met in real life.&amp;nbsp;&amp;nbsp;I have my privacy settings set to pretty much share anything only with my friends.&amp;nbsp;This is how Facebook grew up. It is in Facebook&#39;s genes. Long before groups existed you only shared content that you wanted your &quot;friends&quot; to see and they saw everything you shared. I am not a&amp;nbsp;particularly&amp;nbsp;private person but I cringe now at adding anyone that does not fit this profile.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Got no groupies - &lt;/b&gt;This means I have a low number of people in each group. I&#39;m scared of adding random people that may fit well into the groups because it means I need to friend them first and I have no idea what I have shared over the years with just &quot;my friends&quot;.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Low online&amp;nbsp;engagement&lt;/b&gt;&amp;nbsp;- I got told in the geek tech group there is low engagement because they read the same types of things e..g Techcrunch, Hacker news etc they do not feel the need to share nor discuss items in the Facebook group. However offline I know this to be false. I have discussions around things I have read with these people who had no idea what it was and seemed&amp;nbsp;genuinely&amp;nbsp;interested in having a dialog about it. This suggests at least in part it could be the tools and process.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Too much engagement&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;I must really annoy anyone that follows me on &lt;a href=&quot;https://twitter.com/#%21/rakkhis&quot;&gt;Twitter&lt;/a&gt;. My profile reads:&amp;nbsp;&lt;/div&gt;&lt;blockquote class=&quot;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #777777; font-family: Georgia,serif; font-size: 14px; font-style: italic; line-height: 18px;&quot;&gt;&lt;a class=&quot;  twitter-hashtag&quot; href=&quot;https://twitter.com/#%21/search?q=%23infosec&quot; muse_scanned=&quot;true&quot; rel=&quot;nofollow&quot; style=&quot;color: #2fc2ef; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline; white-space: nowrap;&quot; title=&quot;#infosec&quot;&gt;&lt;span class=&quot;hash&quot; style=&quot;cursor: pointer; display: inline-block; margin: 0px; opacity: 0.7; padding: 0px;&quot;&gt;#&lt;/span&gt;&lt;span class=&quot;hash-text&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;infosec&lt;/span&gt;&lt;/a&gt;, sporadic blogger, risk,&amp;nbsp;&lt;a class=&quot;  twitter-hashtag&quot; href=&quot;https://twitter.com/#%21/search?q=%23privacy&quot; muse_scanned=&quot;true&quot; rel=&quot;nofollow&quot; style=&quot;color: #2fc2ef; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; white-space: nowrap;&quot; title=&quot;#privacy&quot;&gt;&lt;span class=&quot;hash&quot; style=&quot;display: inline-block; margin: 0px; opacity: 0.7; padding: 0px;&quot;&gt;#&lt;/span&gt;&lt;span class=&quot;hash-text&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;privacy&lt;/span&gt;&lt;/a&gt;, mobile. gadgets, new technology, startups, stock and currency trading, football&amp;nbsp;&lt;a class=&quot;  twitter-hashtag&quot; href=&quot;https://twitter.com/#%21/search?q=%23epl&quot; muse_scanned=&quot;true&quot; rel=&quot;nofollow&quot; style=&quot;color: #2fc2ef; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; white-space: nowrap;&quot; title=&quot;#epl&quot;&gt;&lt;span class=&quot;hash&quot; style=&quot;display: inline-block; margin: 0px; opacity: 0.7; padding: 0px;&quot;&gt;#&lt;/span&gt;&lt;span class=&quot;hash-text&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;epl&lt;/span&gt;&lt;/a&gt;,&amp;nbsp;&lt;a class=&quot;  twitter-hashtag&quot; href=&quot;https://twitter.com/#%21/search?q=%23F1&quot; muse_scanned=&quot;true&quot; rel=&quot;nofollow&quot; style=&quot;color: #2fc2ef; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; white-space: nowrap;&quot; title=&quot;#F1&quot;&gt;&lt;span class=&quot;hash&quot; style=&quot;display: inline-block; margin: 0px; opacity: 0.7; padding: 0px;&quot;&gt;#&lt;/span&gt;&lt;span class=&quot;hash-text&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;F1&lt;/span&gt;&lt;/a&gt;, photography&lt;/span&gt;&lt;/blockquote&gt;&lt;div&gt;These are most of the things I am interested in and talk about. Just for good measure if I will also throw in the random thought or something &lt;a href=&quot;http://www.sebastianmarshall.com/&quot;&gt;inspirational&lt;/a&gt; &lt;sebastianmarshall link=&quot;&quot;&gt; or just &lt;a href=&quot;http://www.overcomingbias.com/&quot;&gt;interesting&lt;/a&gt;.&lt;/sebastianmarshall&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Anyone who has well organized Twitter lists and put me in a specific list must be driven mad. E.g. I do tend to talk about information security a lot so the following lists I am added to make sense:&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-4tGwGdH-Ih8/ThDMAU5Ch-I/AAAAAAAACCw/6GUx09b5uUY/s1600/listsiamontwitter.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-4tGwGdH-Ih8/ThDMAU5Ch-I/AAAAAAAACCw/6GUx09b5uUY/s1600/listsiamontwitter.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;lists following=&quot;&quot; me=&quot;&quot;&gt;&lt;/lists&gt;&lt;/div&gt;&lt;div&gt;So when I post some random thoughts about new technology, like going on about #googleplus recently it must drive people mad. Or more likely they would not even see it. If you are like Jason who follows over 73,000 people his twitter stream looks something like that this second:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/--OCI-gfSXCs/ThDNAYdxmHI/AAAAAAAACC0/IPb-E0YXXAU/s1600/jason1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/--OCI-gfSXCs/ThDNAYdxmHI/AAAAAAAACC0/IPb-E0YXXAU/s1600/jason1.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;And then 2 seconds later (yes he had followed 3 more people in that short time):&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-QyZPCQPIrws/ThDNGHh3ytI/AAAAAAAACC4/zgcRONFesMo/s1600/jason2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-QyZPCQPIrws/ThDNGHh3ytI/AAAAAAAACC4/zgcRONFesMo/s1600/jason2.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Similar to the way Facebook has organically evolved, people just accept that they will miss tweets. They will dip into their feed every now and occasionally get some value. Things like mysixthsense addon have tried to solve this, but it does not work on mobile. The noise to signal ratio gets so bad that I actually feel bad having a conversation with people or especially participating in a hashtag e.g. #bbcsml when the program is on TV or #bsideslondon when I am at that conference. I am effectively spamming my followers with content that do not want to read and outside of the box they put me in when they followed me.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;How Google plus solves these&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Google plus has been designed from the ground up to solve these problems. If it is used as designed. I&amp;nbsp;appreciate&amp;nbsp;that is a big caviet, however being baked in there is a far greater chance of success as people who start using Google plus will start to use the product correctly. As we know well in security, it is&amp;nbsp;ridiculously more effective to bake something in rather than bolting it on later.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The way it solves these problems is primarily via Circles. When someone follows me they add me to a circle. Now this is the key part. Even though circles are&amp;nbsp;asymmetric&amp;nbsp;following like Twitter, for the whole model to work well I need to also follow them and add them to a Circle. They will then see what I share publicly as well as what I share to that Circle.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;An example of this would be:&lt;/div&gt;&lt;div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;John sees someone link to one of my posts about information security. He is wowed by its sheer&amp;nbsp;brilliance&amp;nbsp;and decides to follow me to&amp;nbsp;receive&amp;nbsp;further words of wisdom&lt;/li&gt;&lt;li&gt;He adds me to his Circle called infosec&lt;/li&gt;&lt;li&gt;He can currently see everything I post publicly&lt;/li&gt;&lt;li&gt;However I get a notification that John has decided to follow me&lt;/li&gt;&lt;li&gt;I check his profile and see that he interested Information Security&lt;/li&gt;&lt;li&gt;I add him to my Circle called infosec&lt;/li&gt;&lt;li&gt;Now he sees anything I share as public as well as anything I share that is information security related&lt;/li&gt;&lt;/ol&gt;John sees what he followed me for. He does not see any other random crap I share e.g. with my Photography circle or conversations I have about currency trading. This will hopefully also mean that I don&#39;t hate de-friend people (or people hate de-friend me which is more likely) for sharing baby photos or clogging up my stream with check-in&#39;s, Farmville and other BS posts.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;Some have said that Circles should have imported your Gmail contacts groups (for those who have set those up). I started organizing my Circles in the same way but now I think this is the wrong idea. You need to organize your Circles around how you want to&amp;nbsp;receive&amp;nbsp;and publish content. This means primarily around interests rather than location, &amp;nbsp;common contacts etc.&lt;br /&gt;&lt;br /&gt;The comments feature means that he can comment directly on anything I say about infosec with other interested people without clogging up his or their streams. The notifications on any Google property alerts him and keeps him engaged once he has commented. If John is really interested in Currency trading also because he is also not one&amp;nbsp;dimensional&amp;nbsp;I can add him to that Circle also. He will hopefully return the favour and limit his conversation on Currency trading to his Trading Circle.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Suggested improvements&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Suggested circles when following - &lt;/b&gt;Google shines in big data analysis. To go back to the above example, they should analyse John&#39;s profile, past posts, likes (+1), searches, emails, check-ins, purchases (Google checkout) etc, analyse my circle and suggest to me what Circle I should add John to. Each option analysed can be an Opt-in for privacy&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Suggested circles when sharing&lt;/b&gt; - when I post something including text, images, links etc it should suggest which Circle maybe interested in this information and also suggest Circles I should not post it in. This could be a similar feature to the Gmail lab that currently suggests users in emails you have missed. It should provide me&amp;nbsp;analytics&amp;nbsp;on things like the level of engagement, click through&#39;s etc to also help me tune my Circles and what I share to them&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Circle tree&lt;/b&gt; - circles should have a hierarchy. As a geek I like the idea of normalization of my circles. So my Gaming friends are also my Fiends. Currently if I get a new gaming friend I have to add him to two circles. This could be made easier if the Gaming Circle could just part of my Friends circle. The user interface is also really well designed and could&amp;nbsp;accommodate&amp;nbsp;this easily. However I&#39;m not sure if this would be more confusing to non technical people, thus the current slightly more in-efficient way maybe better (or it could be an option to enable).&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Circles in all sharing contexts&lt;/b&gt; - the choice of circle to share to should&amp;nbsp;extremely&amp;nbsp;simple on the native mobile applications. This is where an increasing amount of content sharing, generation and discussion will occur and this design needs to be baked in there (not share to public as default and only simple option). I also read a lot of content offline and use the Tweetymail feature to share it with both Twitter and Facebook groups. Google plus needs to provide an email address to do this (should be simple as Blogger does this currently). Also the email needs to have tags to specify the Circle e.g. [Trading] or #trading. Adding features such as buffering (e.g. bufferapp.com) and scheduling of G+ posts would also be welcomed.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Mitigate accidental sharing&lt;/b&gt; - Currently I use Facebook for close friends, Linked-in for work&amp;nbsp;colleagues&amp;nbsp;and ex work&amp;nbsp;colleagues&amp;nbsp;and Twitter for anyone. Google plus has the potential to allow you to combine these into one social network. However one&amp;nbsp;of the big risks of combining groups in an application like G+ rather than keeping&amp;nbsp;separate&amp;nbsp;networks is there is a greater chance of sharing the wrong thing with the wrong crowd. This means Wiener type moments and DM&#39;s sent as public could be a lot more common (the media rejoices).&amp;nbsp; Google should detect when you maybe making a mistake e.g. sharing a picture with a Circle or people you have not shared it with before, sharing a photo publicly when you&amp;nbsp;usually&amp;nbsp;only share links publicly. It can then prompt you to make sure, add an undo option like the Gmail labs for 30 seconds, solve a simple maths problem to reduce drunken and fat&amp;nbsp;finger&amp;nbsp;sharing.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;I can understand why these were not added as they could be seen as a privacy breech and after the Buzz disaster Google wants to avoid them like the plague. Also potentially not part of the minimum viable product. It would be great however if they were added in as an Opt-in.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Summary (TLDR):&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;People do not engage enough on Facebook groups because that is not how Facebook is used&lt;/li&gt;&lt;li&gt;People ignore Tweets because there is no way to specify a list when tweeting and no way to isolate&amp;nbsp;conversations&amp;nbsp;except via messages with bi-directional follow&lt;/li&gt;&lt;li&gt;Google solves both of these if used correctly by Circles, which allow you to group incoming and outgoing content to suit the audience. The comments feature is fast and encourages localized discussions&lt;/li&gt;&lt;li&gt;Suggested improvements are for Google to use its awesome&amp;nbsp;analytical&amp;nbsp;capability to suggest Circles when both adding people (and on changing tastes over time) and on sharing. These should be an Opt-in feature to minimize privacy impact. The Circle architecture needs to be preserved in mobile and offline sharing.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Related posts:&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/03/feeding-offline-reading-habit.html&quot;&gt;Farming at work: social media in the enterprise&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/09/farming-at-work-social-media-in.html&quot;&gt;Feeding an offline reading habit&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/08/social-location-privacy-what-is-fuss.html&quot;&gt;Social location privacy - what is the fuss?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Connect on Google Plus:&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If you are interested in any of the following contact me on &lt;a href=&quot;https://plus.google.com/107761331713571426869/posts&quot; rel=&quot;author&quot;&gt;Google plus&lt;/a&gt;&amp;nbsp;and I will add you to the right circle. If you add me, please send me a message saying what Circle you have added me to (i.e. what content you will be sharing with me) and what you are interested in (or fill your profile in well in&amp;nbsp;English&amp;nbsp;:)&lt;br /&gt;&lt;br /&gt;I tend to share and want to discuss information from my sources on Twitter (may change to Google plus over time), Hacker news, Techmeme, security.stackexchange, Techcrunch my &lt;a href=&quot;https://www.google.com/reader/shared/user%2F00560647208152517952%2Fstate%2Fcom.google%2Fstarred&quot;&gt;Reader list&lt;/a&gt;, and of course what I&#39;m thinking and writing about currently:&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Information security - specifically security architecture, threat modeling, application security, risk management, security metrics, NFC and mobile security, payment systems and privacy&lt;/li&gt;&lt;li&gt;New technology and cool gadgets&lt;/li&gt;&lt;li&gt;Startups - I attend monthly meetups for Silicon Round-about London and Hackernews&lt;/li&gt;&lt;li&gt;Stock and currency trading - my &lt;a href=&quot;http://stocktwits.com/streams/watch_lists/8005&quot;&gt;watchlist&lt;/a&gt; on stocktwits&lt;/li&gt;&lt;li&gt;Football - English premier league&lt;/li&gt;&lt;li&gt;Formula 1&lt;/li&gt;&lt;li&gt;Photography - my stuff on &lt;a href=&quot;http://www.flickr.com/photos/rakkhi&quot;&gt;Flikr&lt;/a&gt; (moving to Google plus most likely in future) and &lt;a href=&quot;http://instaview.me/user/rakkhi/&quot;&gt;Instagram&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter: &lt;a class=&quot;twitter-follow-button&quot; href=&quot;http://twitter.com/rakkhis&quot;&gt;Follow @rakkhis&lt;/a&gt; &lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;br /&gt;Photocredit: Flikr &lt;a href=&quot;http://www.flickr.com/photos/86886338@N00/2404069584/&quot;&gt;recubejim&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/1661092428379149286/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/07/google-plus-because-i-hate-being-put-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/1661092428379149286'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/1661092428379149286'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/07/google-plus-because-i-hate-being-put-in.html' title='Google+ because I hate being put in a box'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-kTH0H3y_CWA/ThDHjsKDGCI/AAAAAAAACCo/kVjWgaXJQNk/s72-c/2404069584_0e4ff8df95.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-5893219105738736387</id><published>2011-06-20T17:44:00.001+01:00</published><updated>2011-06-20T19:52:17.596+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Authentication"/><title type='text'>I was hacked @MTGOX #bitcoin – 3 reasons I am not worried</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-0T5up0TAfFs/Tf90ERfCVOI/AAAAAAAAB_Q/SClpc0FTQlU/s1600/home-alone.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;191&quot; src=&quot;http://2.bp.blogspot.com/-0T5up0TAfFs/Tf90ERfCVOI/AAAAAAAAB_Q/SClpc0FTQlU/s200/home-alone.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;I have been violated. It is a sobering experience. Username, email, hashed password available on the Internet in a prime database for &lt;strike&gt;script kiddies&lt;/strike&gt; Lulzsec et al. I now have some sympathy for &lt;a href=&quot;http://www.rakkhis.com/2011/04/rsa-apt-hack-blogger-tells-all.html&quot;&gt;RSA&lt;/a&gt;. Actually, hang on a sec. No I don’t. I actually did what I preached. Read on for three simple strategies that game me comfort after having my details compromised as part of the &lt;a href=&quot;http://www.dailytech.com/Inside+the+MegaHack+of+Bitcoin+the+Full+Story/article21942.htm&quot;&gt;MTGOX bitcoin hack&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Aside: why Bitcoin? I will let you Google the augments &lt;a href=&quot;http://launch.is/blog/l019-bitcoin-p2p-currency-the-most-dangerous-project-weve-ev.html&quot;&gt;for&lt;/a&gt; and &lt;a href=&quot;https://www.quora.com/Bitcoin/Is-the-cryptocurrency-Bitcoin-a-good-idea&quot;&gt;against&lt;/a&gt;. Certainly been enough coverage lately even on &lt;a href=&quot;http://www.techmeme.com/search/query?q=bitcoin&amp;amp;wm=false&quot;&gt;Techmeme&lt;/a&gt; and &lt;a href=&quot;http://hnsearch.heroku.com/#bitcoin&quot;&gt;Hackernews&lt;/a&gt;. For me it boils down to: &lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;I am an infosec geek and the idea of a non fiat virtual currency, that has built in inflation controls, less vulnerable to manipulation by &lt;strike&gt;special interests&lt;/strike&gt; central governments and rooted in good crypto appeals to me&lt;/li&gt;&lt;li&gt; I am a disciple of &lt;a href=&quot;http://www.amazon.com/Crash-Proof-2-0-Economic-Collapse/dp/047047453X&quot;&gt;Peter Schiff&lt;/a&gt; and &lt;a href=&quot;http://www.amazon.com/Fooled-Randomness-Hidden-Chance-Markets/dp/0812975219&quot;&gt;Nassim Taleb&lt;/a&gt;, so for the same reasons I am long gold and short the US dollar. I was not in a position to exploit Y2K, neither the dot com boom nor the 2008 housing bubble. The potential for a mass return any of gold, short USD or bitcoin in the next few years is too good an opportunity to miss out. Bitcoin could work. It could fail completely. However, for a very limited capped downside and very little effort there is the potential for a very large gain. I hope that all three provide exposure to positive black swans with a capped loss in case of a blowout.&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;So what about all the hacking? MTGox, &lt;a href=&quot;http://www.betanews.com/article/Trojan-stealing-Bitcoin-users-wallets-says-Symantec/1308345951&quot;&gt;Trojans&lt;/a&gt;, individuals having their machines &lt;a href=&quot;http://www.theregister.co.uk/2011/06/16/bitcoin_theft_claims/&quot;&gt;stolen&lt;/a&gt; for bitcoins. Well remember why people rob banks. That is where the money is. This is the equivalent of &lt;a href=&quot;https://secure.wikimedia.org/wikipedia/en/wiki/Ned_Kelly&quot;&gt;Ned Kelly&lt;/a&gt; (showing my roots) or Jessy James Wild West days. Banks were not very good at protecting themselves back then. After hundreds of years, billions of dollars invested you &lt;a href=&quot;https://www.infosecisland.com/blogview/13982-Bank-of-Americas-10-Million-Dollar-Breach-Loss.html&quot;&gt;could&lt;/a&gt; &lt;a href=&quot;http://albertmikha.com/citibank-has-been-hacked-200000-customer-data-stolen/&quot;&gt;argue&lt;/a&gt; they still suck. Unfortunately, for bitcoin, in the Twitter age, you have to secure at lightening speed and any failure is broadcast to the world instantly. But you know what? If you want to take a punt and potentially be the next &lt;a href=&quot;http://www.sebastianmarshall.com/self-control-and-enduring-success&quot;&gt;Rothschild&lt;/a&gt;, start a bitcoin bank and/or trading exchange. Put the security in place, hire your sheriffs, and guarantee deposits and holdings.&lt;br /&gt;&lt;br /&gt;So the three strategies that gave me piece of mind when my username, email, and MTGOX password was exposed:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;1. Long complex password.&lt;/b&gt; Yes &lt;a target=&quot;_blank&quot; href=&quot;https://docs.google.com/viewer?a=v&amp;pid=sites&amp;srcid=ZGVmYXVsdGRvbWFpbnxyZXVzYWJsZXNlY3xneDozNDcwNDhmMmE2MmJiMDkw&quot;&gt;size does matter&lt;/a&gt;. It is simple but like SQL injection and Cross Site Request Forgery (CSRF) and the rest of the OWASP top 10 that led to compromises like this, hardly anyone does the simple things well and do them consistently. My strategy is to use a phrase I can remember, which has upper case, lower case, numbers, and symbols, about 10 characters long. Then I add a salt or unique random value per site / service. This salt is stored in Laspass and 1Password. I do this because even password vaults can be &lt;a href=&quot;http://blog.lastpass.com/2011/05/lastpass-security-notification.html&quot;&gt;comprised&lt;/a&gt; and have security vulnerabilities and this reduces the centralized risk. Practically for those I use frequently I can remember the salt, so for apps that do not let you switch to a password manager and back on the iPhone or iPad, this is particularly handy. Total password length is about 15 characters and complex. Even with a botnet of &lt;a href=&quot;https://www.readwriteweb.com/hack/2010/11/how-to-crack-passwords-in-the.php?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+readwriteweb+%28ReadWriteWeb%29&quot;&gt;GPU’s&lt;/a&gt; this would be a challenge to bruteforce, rainbow table or dictionary attack. If I ever need to update the password because of silly password expiry rules, I just need to change the random salt.&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;&lt;b&gt;2. Unique password for each site.&lt;/b&gt; With the above system, I have unique password on each site but using the common phrase, I get less of a usability trade-off. Using the salt first, so you allow the password manager to auto-fill, then entering the phrase makes it work practically. Therefore, even if point 1 above fails and the password is discovered in clear text, the attacker does not automatically gain access to every other site. In situations like this, I also do not have the headache of changing hundreds of passwords; worrying about if one or more is compromised in the time interval. The recent hacks have demonstrated even your “do not care” sites should have unique passwords unless you absolutely do not care if they and other “do not care” sites are compromised. Where the site allows I also try to register with the additional plus e.g. rakkhi.s+mtgox@gmail.com . This little trick still gets email delivered to my inbox and allows for easy identification of spam and illegal sale of information. There was a  idea on H&lt;a target=&quot;_blank&quot; href=&quot;http://blog.jgc.org/2011/06/my-email-canary.html&quot;&gt;Canary&lt;/a&gt;N a while back, which is also good if you can live with having one unread email&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;&lt;b&gt;3. Two factor authentication&lt;/b&gt;. Google in their awesomeness locked my account and informed me there was suspicious activity detected. I also had the piece of mind knowing that I had the &lt;a href=&quot;https://www.google.com/support/accounts/bin/static.py?page=guide.cs&amp;amp;guide=1056283&amp;amp;topic=1056284&quot;&gt;two-step verification&lt;/a&gt; enabled on Gmail. So again, even if they got my password it is not automatic entry into my email. I use two factor wherever it is offered. E.g. Paypal (both Yubikey and mobile SMS), Laspass (Yubikey), my business banking (RSA for now).&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Summary:&lt;/b&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Make a large number of small bets on things that have a caped downside and low effort but a extremely high potential upside&lt;/li&gt;&lt;li&gt;Use a long complex password and store all or part in a password manager&lt;/li&gt;&lt;li&gt;Use unique passwords per site even the low priority ones&lt;/li&gt;&lt;li&gt;Use two factor authentication where possible&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Related posts:&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt; &lt;a href=&quot;http://www.rakkhis.com/2011/03/password-stolen-ounce-of-prevention.html&quot;&gt;Password stolen: an ounce of prevention&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/12/why-you-should-use-password-vault.html&quot;&gt;Why you should use a password vault&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/08/why-dont-facebook-twitter-and-google.html&quot;&gt;Why don&#39;t Facebook, Twitter and Google support strong authentication?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;Good tool to see if your email account has been hacked in recent events from &lt;/b&gt;&lt;span class=&quot;tweet-user-name&quot;&gt;&lt;a class=&quot;tweet-screen-name user-profile-link&quot; data-user-id=&quot;121391248&quot; href=&quot;https://twitter.com/#%21/dagrz&quot; title=&quot;Daniel Grzelak&quot;&gt;dagrz&lt;/a&gt;&lt;/span&gt;&lt;b&gt;: &lt;/b&gt;&lt;a href=&quot;http://shouldichangemypassword.com/&quot;&gt;http://shouldichangemypassword.com/&lt;/a&gt;  &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter: &lt;a class=&quot;twitter-follow-button&quot; href=&quot;http://twitter.com/rakkhis&quot;&gt;Follow @rakkhis&lt;/a&gt; &lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/5893219105738736387/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/06/i-was-hacked-mtgox-bitcoin-3-reasons-i.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5893219105738736387'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5893219105738736387'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/06/i-was-hacked-mtgox-bitcoin-3-reasons-i.html' title='I was hacked @MTGOX #bitcoin – 3 reasons I am not worried'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-0T5up0TAfFs/Tf90ERfCVOI/AAAAAAAAB_Q/SClpc0FTQlU/s72-c/home-alone.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-3355312625592135068</id><published>2011-06-15T14:14:00.000+01:00</published><updated>2011-06-15T14:14:59.585+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Secure Development"/><title type='text'>Agile != security</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-rMJV8MlGSso/TfiwFLnkwgI/AAAAAAAAB_M/UGVI2Jwl6yM/s1600/359394164_9c6dc89ae0_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-rMJV8MlGSso/TfiwFLnkwgI/AAAAAAAAB_M/UGVI2Jwl6yM/s1600/359394164_9c6dc89ae0_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;I am going to fail. Agile and security just do not mix, especially secure at source. Agile is all about rapid development, everyone in a room with brown paper plastered across the wall, product backlogs building up while developers code feverishly on today&#39;s priorities. Security works well in a structured environment. We influence through control points and project gates. Oh, you are writing requirements? Let me provide you some from security. Design stage? A threat model and design review. Build we will mostly ignore but test is our Coup de grâce. The pen test is the height of security skill where your lovely creations will be decimated! But how do I apply this magnificence to agile when I am called a &lt;a href=&quot;https://secure.wikimedia.org/wikipedia/en/wiki/The_Chicken_and_the_Pig&quot;&gt;CHICKEN&lt;/a&gt; and thrown out of the room?&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;I have been reading some of the Microsoft material on a Secure Development Life-cycle (&lt;a href=&quot;http://www.microsoft.com/security/sdl/discover/sdlagile.aspx&quot;&gt;SDL&lt;/a&gt;) in agile. There was also a good post on the Security Architecture Linked-in group on my last post on this security people coding in agile environments. Apparently secure at source in an agile world is just what we struggle to do in waterfall projects, with all our control and gates, but just done every sprint. How hard could it be? &lt;br /&gt;&lt;br /&gt;Therefore, this is really a post of two halves. I probably should have told you that from the start so you would not think there is gold in these hills. However, I am reading Little Bets so here is to failing fast and often. Aside: why do I buy books that tell you the whole argument in the title? The Long Tail, Blink, Little Bets etc... Right so this is what I am going to try:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Per sprint:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Get to the daily scrums and fortnightly sprint planning sessions&lt;/b&gt; so I can put forward my valuable chicken advice and requirements. This will probably only work if I am in the same room, which could be a challenge since I am in a different continent but I will work on my boss on that.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Threat model.&lt;/b&gt; Try to get the developers and product guys to think of mis-use cases and attack trees per sprint. This could be challenging, as they will probably say NO (although Lulzsec, Sony and RSA are helping my cause here and I know a few physiological tricks now to exploit). Nevertheless, a sprint may also be too small a unit for threat modelling. This may work best per release.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Security unit test cases&lt;/b&gt;. Writing security unit tests along with the developers’ functional unit test. These should be from the threat model and will also be automated and added to the regression suite where possible&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Static analysis.&lt;/b&gt; We have an automated code-scanning tool, which the developers should be running every time they check-in code. Tickets are then raised for defects. Let&#39;s see how quickly these get fixed and what priority they receive. I will also be pushing for manual peer review by both developers and me. One of the biggest problems I can for see is although there is a lot of new code being written, there is many existing assets to be re-used. The web stuff from the start-up is being manually pen tested but doubt anyone has reviewed the code and we will not have time to do that. &lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Dynamic analysis&lt;/b&gt;. We also have the Q/A group that use an automated application vulnerability scanner. I will be looking at that, working with them to tune and raising tickets for defects.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&amp;nbsp;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Per release:&lt;/b&gt;&lt;/span&gt; &lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Manual penetration test&lt;/b&gt;. Sorry I promised at B-sides to call this a security controls review, as we are too soft and squishy for outcome based testing. Even if we were not the CEO is probably not going to like the spear phishing email nor our partners when we try to hack through them. Still we have an internal team for this testing and it will do what it always does give us some comfort we are running faster than the guy running from the bear. &lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;For the program:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Try getting the developers some secure coding training&lt;/b&gt;. They have already started so I like my chances of finding some time between 1-4am. Maybe bribing them with beer will work. We have secure coding standards, which I will also make them aware of, but unfortunately, they do not cover all languages in use. Enough general OWASP stuff to be of use though. &lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Security incident response plan&lt;/b&gt;. I am a big fan of having the fire engine well tuned. A full rehearsal hardly ever happens in a project but once again, at the start I am optimistic. &lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Security architecture&lt;/b&gt;. We have specialists within the architecture team drawing boxes and lines. This all looks good, reusable loosely coupled authentication services, role based authorisation, logging, and encryption in the right places, DDOS protection. Policies and standards are providing the broad requirements.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Infrastructure and network security&lt;/b&gt;. The ops guys will do their normal job of reviewing builds, installing configuration compliance, vulnerability scanning and setting up the correct firewall rules. YAWN.... Well until IP V6 stuff-ups makes all this important again. Manual controls review will test this all as well for what it&#39;s worth.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Security governance and risk reporting.&lt;/b&gt; All the existing 10 levels of security and risk committees will be used. The big test as always will be whether we can convince them to delay launch to fix the 10 medium-low risk security bugs. Think about that for a bit before you comment. &lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/09/security-metrics-if-you-do-not-measure.html&quot;&gt;&lt;b&gt;Metrics&lt;/b&gt;&lt;/a&gt;. Therefore, we can actually measure the ongoing state of security and whether the secure at source approach has been effective.&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Summary:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Security at source in agile development my approach:&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Get in the room, be a pig if possible&lt;/li&gt;&lt;li&gt;Write threat models and security test cases per sprint or release&lt;/li&gt;&lt;li&gt;Source code review on check in. Dynamic and manual testing&lt;/li&gt;&lt;li&gt;Developer secure coding training and coding standards&lt;/li&gt;&lt;li&gt;Security architecture at least conceptual&lt;/li&gt;&lt;li&gt;Infrastructure and network security. #bettersafethansony&lt;/li&gt;&lt;li&gt;Incident response plan that is rehearsed&lt;/li&gt;&lt;li&gt;Security governance and risk reporting and escalation &lt;/li&gt;&lt;li&gt;Measure everything. Especially after you release&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Only time will tell if this is all effective. I can see some massive challenges ahead and I really wonder if anyone is doing security well in agile, especially in large organisations. Do we all just have the waterfall SDL hammer and everything looks like nail? Of course if you are doing this well, I would love to hear what you have found works practically. Especially if you have proven it works more than once. If you have been able to measure this impact even better. Please leave a comment or contact me at rakkhi@rakkhis.com , I&#39;ll be happy to share my thoughts in more detail also. Watch out for my post in a few months for lessons learned on this. A few Lulz to be had.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Related posts:&lt;/b&gt; &lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/04/agile-most-security-guys-are-useless.html&quot;&gt;Agile: Most security guys are useless&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/03/mitigating-owasp-top-10-without-any.html&quot;&gt;Mitigating OWASP top 10 without any code&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/03/apple-succeeds-where-security-failed.html&quot;&gt;Apple succeeds where security failed with web developers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter: &lt;a class=&quot;twitter-follow-button&quot; href=&quot;http://twitter.com/rakkhis&quot;&gt;Follow @rakkhis&lt;/a&gt; &lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Photo credit: &lt;a href=&quot;http://www.flickr.com/photos/antiguan_life/359394164/sizes/s/in/photostream/&quot;&gt;antiguan_life&lt;/a&gt; Flikr&amp;nbsp;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/3355312625592135068/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/06/agile-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/3355312625592135068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/3355312625592135068'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/06/agile-security.html' title='Agile != security'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-rMJV8MlGSso/TfiwFLnkwgI/AAAAAAAAB_M/UGVI2Jwl6yM/s72-c/359394164_9c6dc89ae0_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-2872699282459595576</id><published>2011-05-31T11:51:00.004+01:00</published><updated>2011-06-15T12:35:24.713+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Risk Management"/><category scheme="http://www.blogger.com/atom/ns#" term="SROI"/><title type='text'>7 ways to exploit psychology to sell security</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-7cxGhVZb0II/TeTF3KmSQyI/AAAAAAAAB_I/MRA_9OyQsx8/s1600/1500229796_fc3d191b07.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://4.bp.blogspot.com/-7cxGhVZb0II/TeTF3KmSQyI/AAAAAAAAB_I/MRA_9OyQsx8/s320/1500229796_fc3d191b07.jpg&quot; width=&quot;130&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;@J4vv4d&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;I have felt the bitter taste of defeat many times. That feeling in a meeting, on a call at a presentation when you feel the tide turning against you. All the logical arguments that seemed so persuasive ten minutes ago have evaporated and all you have is another meeting or a working group to explore options. The security improvements that were so badly needed rejected once more. &lt;a href=&quot;https://twitter.com/J4vv4d&quot;&gt;&lt;span class=&quot;screen-name screen-name-J4vv4d pill&quot;&gt;@J4vv4d&lt;/span&gt;&lt;/a&gt; from &lt;a href=&quot;http://www.quantainia.com/&quot; target=&quot;_blank&quot;&gt;Quantainia&lt;/a&gt; writes for a new years resolution &quot;If you’ve heard me talk about security but still don’t think it’s important. That’s my fault not yours&quot;. So why not use some techniques from psychology to help?&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;I am slowly making my way through the Schneier&#39;s essays on Instapaper and found this &lt;a href=&quot;http://www.schneier.com/essay-155.html&quot;&gt;one&lt;/a&gt; on the Psychology of security. If you have ever wondered why certain security projects get funded, why some decks work a lot better than others and why some arguments seem to resonate over others of equivalent merit; then psychology of security holds a lot of answers. Schneier provides the theory, research and some tricks and recommendations on using psychology to sell security; this is my take on expanding those techniques. The basis for all of this is grounded in scientific experiments, all the links to the research are in Schneier&#39;s essay.&lt;br /&gt;&lt;br /&gt;How do you use these? You are never going to remember all of them and that&#39;s often the biggest problem with things like NLP. They are too hard to use in everyday life because they take a lot of un-natural practice before they become second nature. So I suggest that you use it as a checklist or put the key points into a mindmap. Check them before and after writing your next deck or business case. Practice often enough and you will start using them in conversations, meetings, and calls.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;1. Play up spectacular risks.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Schneier: &quot;People exaggerate spectacular but rare risks and downplay common risks.&quot; Intuitively you know this to be true. There is a far greater risk of dying in a car crash but more people are afraid of flying. At time of writing in May 2011, 9/11 was nearly 10 years ago, but it led to a massive pay day for every security agency. Even 10 years on it&#39;s power is so great that the US government was able to extend the patriot act for another four years. The massive over-reaction that meant a huge erosion of American civil liberties extended without cause all because of a spectacular risk from 10 years ago. Now you may not want to use this because it seems like FUD. Well guess what? FUD works. You can either continue an ideological objection to FUD or you can get paid. Or feed your kids, increase your reputation and influence, get that security improvement you know that really needs to be done. Whatever rocks your boat. So play up the China hackers, cyber-warfare and advanced persistent threats.&lt;br /&gt;&lt;br /&gt;Risks from sources people do not trust seem more plausible. This is why you need to forget about that insider threat argument. It is never going to work. You want to play up the uncertainty. Detailed scenarios also increase believability. Put in gory details; really describe a scenario rather than a scattergun bullet-point approach of possible threats. That&#39;s why I love attack trees. If you do not have the numbers, as we often don&#39;t, use the fact that people tend to ignore probabilities where there is a high emotional content. Play up the emotions in your detailed scenario of Chinese hackers for maximum effectiveness. Grouping risks together for executive management is not your friend. Evaluating risks as a group makes them seem less risky. If you are only getting 5 minute slot, or one slide, prioritize and present them the most compelling, most emotional and spectacular risk scenario. Finally leverage the anchoring effect. High loss numbers like Sony 100 million records lost, or HSBC being fined $4 million for loosing 2 CD&#39;s of customer data are great for this. Write the number on a white-board they can see when they walk in. Even if you do not directly talk about it, the number is anchored in their minds. When you talk about a loss or risk this will then make them perceive it as more risky. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;2. Make it personal.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you really want that new Dataloss prevention system talk to the execs about &lt;b&gt;their &lt;/b&gt;email being stolen, if &lt;b&gt;their&lt;/b&gt; laptop or blackberry was hacked. What would &lt;b&gt;they &lt;/b&gt;do there were fraudulent credit card transactions on &lt;b&gt;their &lt;/b&gt;statement? Even for impacts like damage to the company brand, it is so much more persuasive if put in a personal context. A major incident would affect the brand and reduce long-term share price and growth which would have a significant impact on anyone with share options to vest in a few years. Kids are a great lever. We seem to have an evolutionary response against any thing that will harm kids. While logical from an evolutionary perspective, today this is often applied irrationally and can be exploited. Link your risk not just to Mr senior manager and his wallet but also his kids. We store a lot of personal data in our databases. Imagine if your kids personal data was all over the Internet?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;3. Overestimation of current risks&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;At the time of writing this links very nicely with 1. Spectacular risks. With the high profile hacks of RSA, Sony and the Apple and Google location gate scandals there should be plenty of current events to shape to your purpose. Emotional events are even better i.e. 9/11, location and privacy issues work well for us also. This works because recent events are easier to imagine therefore more effective regardless of their actual likelihood or applicability to your company. Imagination is also a wonderful thing. Considering a particular outcome in your imagination makes you think it is more likely to occur. An outcome that is more difficult to imagine will be marked down even if you have all the numbers to back it up. You can link this with anchoring through techniques like getting your manager to imagine a malware infection on their kids computer before you make your pitch for the new IDS. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;4. Overestimation of risks outside their control&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Again, this is another reason for the flying vs. driving risk failure. This is why the cloud seems so scary, even though the insider threat could happen in any company. There is an illusion of control over &quot;employees&quot; in your own company vs. another company you contract with. Even though, especially in large companies it would be just as easy for organized crime or government to get a cleaner or temp into either. Any risk that is imposed, where they have no control always seems higher. This is another reason to play up regulation, class actions and contract breeches rather than internal policies and standards when you want to get something done. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;5. Risk of large loss chosen over certain small loss&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This is why you lose. The risk of a massive loss e.g. Sony now estimated at $130 million from the PSN hack, part of an overall $1.3 billion loss and untold reputational damage. I bet some poor sucker in security tried to convince them years ago that that they should patch the Apache servers or they should encrypt customer personal information. Take the certain &lt;strike&gt;loss&lt;/strike&gt; security investment now over an uncertain huge loss. Guess which one was chosen? Better safe than Sony. Given a chance of a big loss vs. certain small loss, the big loss will be chosen by most people. Strangely enough though that is how we try to make most business cases for security. Spend this small amount now to avoid this big risk in future. And we are still surprised when it doesn&#39;t work. Getting though today is what is most important. This project. This quarter. This year. Even presenting the risk as a small, immediate loss will be more successful than the complex calculation of future losses. A delay to the project, extra defect repair costs, a certain fine from a regulator are all good things to use. People are also more likely to accept a smaller incremental gain than a chance at a larger gain. The bird in the hand. This is actually also good for your delivery. Do not go for big bang. Focus on small incremental gains. It maybe easier and ultimately more fruitful to go for extra features in what you already have. That web application firewall or IPS module in your load balance than a completely new system. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;6. Exploit heuristics&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Rules of thumb. Just the wording and re-framing an argument can make all the difference. In studies over 70% choose the positively worded outcome even when the probability is equal. So why say the chance to lose 10 million when you can present it as an opportunity to save 10 million? People tend to accept things closer to the current state. They are going to trade-off more for security they have accustomed to. This explains the success of firewall and anti-virus companies. Can you bolt on an IPS to a firewall or removable media control to your AV? Risks involving people rate higher. If you really want to sell your APT or malware threat talk about the humans that wrote and benefit from it and how they and their kids are personally affected. We evaluate small numbers well but suck at larger numbers. So use small percentages. A computer in our company, just like the one you use or your kid at home, is infected once every 2 seconds. One in every three documents, just like the board minutes for this meeting, sent out of the company is an office document. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;7. Costs&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Finally, on presenting costs in a way that increases your chances of success. People judge costs on reference. They are willing to may more for something that seems like it should be more expensive. Tiffanie&#39;s have been using this for years, why can&#39;t you? To build a world-class security to support a world class consumer experience you need to spend $X on security. Small costs are not accounted for in mental costs. Can you present your cost as a cost per user, cost per event or incident, $ per day? The framing effect. Always show the highest cost option first and the one you actually want in the middle. Time discounting - costs and benefits in future are discounted. Gains are discounted more than losses and smaller amounts are discounted more than large. Present your savings in the first year and load up your higher costs on the back end. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Recap&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;To sell security effectively:&lt;br /&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Play up spectacular risks&lt;/li&gt;&lt;li&gt;Make it personal and use kids&lt;/li&gt;&lt;li&gt;Use 1-3 examples of current events&lt;/li&gt;&lt;li&gt;Use examples of threats outside of management control&lt;/li&gt;&lt;li&gt;Present certain, current losses even if small. Aim for incremental improvements in security&lt;/li&gt;&lt;li&gt;Re-frame your argument as an opportunity for gain. Bolt onto existing investments&lt;/li&gt;&lt;li&gt;Present costs smartly. Use anchoring, break costs into small units, load up near term gains.&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;Security is the art of managing trade-offs. No matter what security role you do, you will always be selling. Do it well. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Related posts:&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/11/in-security-is-it-better-to-be-black.html&quot;&gt;In security is it better to be black and white?&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/08/how-real-is-insider-threat.html&quot;&gt;How real is the insider threat?&lt;/a&gt;&lt;b&gt;&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/07/turning-bankers-to-engineers-in.html&quot;&gt;Turning bankers to engineers in a generation&lt;/a&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter &lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Photo credit:&amp;nbsp; &lt;a href=&quot;http://www.flickr.com/photos/woody1969/1500229796/sizes/m/in/photostream/&quot;&gt;Woody1969&lt;/a&gt; Flikr. Not really @J4vv4d&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/2872699282459595576/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/05/7-ways-to-exploit-psychology-to-sell.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/2872699282459595576'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/2872699282459595576'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/05/7-ways-to-exploit-psychology-to-sell.html' title='7 ways to exploit psychology to sell security'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-7cxGhVZb0II/TeTF3KmSQyI/AAAAAAAAB_I/MRA_9OyQsx8/s72-c/1500229796_fc3d191b07.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-2140342980860045118</id><published>2011-05-14T10:36:00.001+01:00</published><updated>2011-05-16T17:02:17.329+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Mobile security"/><category scheme="http://www.blogger.com/atom/ns#" term="NFC"/><category scheme="http://www.blogger.com/atom/ns#" term="Payments security"/><title type='text'>The suprising security model for NFC payments</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;a href=&quot;https://picasaweb.google.com/rakkhi.s/RSSC?authkey=Gv1sRgCIzCisCh1J6MBg#5606503005685248290&quot;&gt;&lt;img align=&quot;right&quot; border=&quot;0&quot; height=&quot;240&quot; src=&quot;http://lh5.ggpht.com/_zJrzIzbpkg8/Tc5Mx3YHcSI/AAAAAAAAB-w/yZQ4Pzv2CrQ/s288/1.jpg&quot; style=&quot;margin: 5px;&quot; width=&quot;240&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;One of my &lt;a href=&quot;http://www.rakkhis.com/2010/12/infosec-crystal-ball-2011.html&quot;&gt;new years resolutions&lt;/a&gt; was to learn more about NFC security. Not because I disagree completely with people &lt;a href=&quot;http://techcrunch.com/2011/03/16/mobile-wallet-nfc-overhyped/&quot;&gt;saying&lt;/a&gt; it is over-hyped but since Chip and pin was added to credit and debit cards, NFC is one of the most interesting innovations in payments, at least in the west (Japan has been using NFC for years). NFC presents some really interesting security challenges so I have been reading a lot of research papers and buying coffee for a number of experts. What I have discovered so far really surprised me. &lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;I approached NFC asking the standard questions (insert hammer and nail joke here). How is authentication and authorisation performed, how is sensitive data protected in transit and in storage, what logging is available and how are configuration stores protected? What I have been finding is that the security model really does not have many of these features at all especially on the client side (i.e. the NFC device such as the Samsung Galaxy S). Speed is the primary emphasis, the main benefit of the technology seen as enabling people just to touch and go even on a &lt;a href=&quot;http://www.youtube.com/watch?v=GkI2nn0ZQsk&amp;amp;sns=em&quot; target=&quot;_blank&quot;&gt;Roller coaster&lt;/a&gt;. The trade-off for this is in security. So when an NFC device connects to a reader there is no authentication, no authorisation and no encryption of information in transit. That&#39;s why you see attacks like &lt;a href=&quot;http://www.rfidjournal.com/article/articleview/2749/1/1/&quot; target=&quot;_blank&quot;&gt;this&lt;/a&gt; and &lt;a href=&quot;http://hackaday.com/2011/02/08/farebot-android-nfc-proof-of-concept/&quot; target=&quot;_blank&quot;&gt;this&lt;/a&gt; being possible. &lt;br /&gt;&lt;br /&gt;The NFC device contains a secure element (SE) on a phone this would be usually on the &lt;a href=&quot;http://www.samsung.com/uk/news/newsRead.do?news_seq=27270&amp;amp;page=1&quot; target=&quot;_blank&quot;&gt;SIM&lt;/a&gt;, in-built chip in phone or Micro SD.&amp;nbsp; The SE&#39;s are manufactured to the same standards and certifications as the chip in chip and pin credit and debit cards, often by the same manufacturer. The SE is the only component of an NFC solution that will undergo any evaluation against security requirements and accreditation. The card number (PAN), card holder name, expiry, card security code (CVV2) is loaded into this and can only be read by the authorised application on the phone. However when transmitting this information it is sent in the clear and can be intercepted if you are in range. There is the capability for a challenge response mechanism (similar to chip and pin where the user would enter a pin to pay) and for the NFC application to communicate with a mobile gateway for out of band authorisation via a one time CVV2; but these features, at least currently, are rarely used. &lt;br /&gt;&lt;br /&gt;Instead all of the security is essentially server side, which is actually pretty smart. Issuers have set limits on NFC transactions e.g £10 so the maximum fraud potential is contained. They know which PAN&#39;s are allocated to NFC capable cards / devices, and even on contactless cards the PAN transmitted for the NFC transaction can be different to what is shown on the card. So if an NFC PAN shows up in a card not present transaction e.g. buying something online or even in a non NFC point of sale the Issuer can reject it. The other protections for cards currently are also in place, even obtaining all the card details from an NFC device most issuers now require address validation and 3D secure for card not present transactions. There are some merchants that will not implement these and not even ask for the CVV2 but this is usually a business decision to accept liability for any fraud to get increased sales and a better customer experience. All the normal fraud checks such as checking or stolen card lists, real time risk scoring based on transaction velocity, history, location also apply to NFC payments. &lt;br /&gt;&lt;br /&gt;So overall the systems are fairly well designed and while there will no doubt be plenty of FUD whenever a researcher &quot;hacks&quot; NFC payments, holistically the systems in place provide a good balance of convenience and fraud risk.&lt;br /&gt;&lt;br /&gt;I am just starting to learn about this technology and the above was fairly high level. If I have made any errors or my interpretations of various documents and conversations have not been accurate feel free to comment. I&#39;m always happy to learn. &lt;br /&gt;&lt;br /&gt;Some good research papers on NFC security if you are interested in reading further:&lt;br /&gt;&lt;a href=&quot;http://db.tt/bImNEzg&quot; target=&quot;_blank&quot;&gt;Security in Near Field Communications&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://db.tt/orngZFQ&quot; target=&quot;_blank&quot;&gt;Proximity mobile payments: leveraging NFC&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://db.tt/BgVtCot&quot; target=&quot;_blank&quot;&gt;Practical experiences with NFC security on mobile phones&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://db.tt/AdOdOQ6&quot; target=&quot;_blank&quot;&gt;Mobile payments in the United States at retail point of sale&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Related posts:&lt;br /&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/10/rich-vs-thin-client-20-native-app-or.html&quot; target=&quot;_blank&quot;&gt;Native apps vs mobile apps&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/10/beating-crackberry-if-apple-google-and.html&quot; target=&quot;_blank&quot;&gt;Beating crackberry: if Google and Apple were serious about enterprise mobile&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/09/privacy-in-age-of-augmented-humanity.html&quot; target=&quot;_blank&quot;&gt;Privacy in the age of augmented humanity&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter &lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;PS: first blog post created entirely my new iPad :) it&#39;s awesome&lt;br /&gt;Photo credit Flikr &lt;a href=&quot;http://www.flickr.com/photos/robbie73/4346732208/sizes/s/in/photostream/&quot; target=&quot;_blank&quot;&gt;Robert van der Steeg&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/2140342980860045118/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/05/suprising-security-model-for-nfc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/2140342980860045118'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/2140342980860045118'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/05/suprising-security-model-for-nfc.html' title='The suprising security model for NFC payments'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh5.ggpht.com/_zJrzIzbpkg8/Tc5Mx3YHcSI/AAAAAAAAB-w/yZQ4Pzv2CrQ/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-6881569691101072332</id><published>2011-05-06T16:33:00.005+01:00</published><updated>2011-05-06T16:43:40.396+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rant"/><category scheme="http://www.blogger.com/atom/ns#" term="SROI"/><title type='text'>What does Sony need to rebuild confidence after #sonyhack ?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Was debating with a few security collegues whether this massive 77 Million + data breech would actually hurt Sony on the bottom line and discussing TJX as a good example where actually as a retail organization the impact may not be that large nor that permanent.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Posting my answer to the &lt;a href=&quot;http://www.quora.com/What-can-the-SONY-Playstation-Network-do-to-rebuild-confidence-after-the-data-hack&quot;&gt;Quora&lt;/a&gt; question on the same title: Q: what does Sony need to do to rebuild confidence after this massive and potentially avoidable security incident?&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;A: Potentially not much. As per &lt;a href=&quot;http://blog.us.playstation.com/2011/05/05/a-letter-from-howard-stringer/&quot;&gt;Howard Stringer&lt;/a&gt; Sony are offering:&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;$1 million identity theft insurance policy&lt;/li&gt;&lt;li&gt;A welcome back package including a month of free PlayStation Plus membership for all PSN customers,&lt;/li&gt;&lt;li&gt;As well as an extension of subscriptions for PlayStation Plus and Music Unlimited customers to make up for time lost&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;First comment on blog: &lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you kind sir. Let’s not make the same mistakes again, shall we?&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; It’s all good Sony. Got tonnes of Single Player trophies waiting to be synced :P&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;If that is any indicator of the average PSN user they don&#39;t really care. If they see some wierd credit card charges they will not be liable anyway. The identity theft insurance will provide some financial recourse to anyone who is a victim of identity theft. The exit costs of moving from the Playstation console, game and friends network to an competitor like XBOX is very high. Sony has excellent lock-in, this will be forgotton about in 6 months except by security people using it in powerpoint decks to get more money.&lt;br /&gt;&lt;br /&gt;Case in Point &lt;a href=&quot;http://datalossdb.org/incidents/548-hack-exposes-94-million-credit-card-numbers-and-transaction-details&quot;&gt;TJX incident&lt;/a&gt; 94 Million credit cards stolen&lt;br /&gt;&lt;br /&gt;Lets have a look at the share price shall we:&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-d39NsDGZ_fA/TcQUdjoX_yI/AAAAAAAAB-Q/uuprNk5lcso/s1600/TJ+Maxx.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-d39NsDGZ_fA/TcQUdjoX_yI/AAAAAAAAB-Q/uuprNk5lcso/s1600/TJ+Maxx.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;The chronology: &amp;nbsp; &lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt; Hackers break in in Jan 2007&lt;/li&gt;&lt;li&gt;Discovered and publicy reported Dec 2008 (makes Sony look good eh?)&lt;/li&gt;&lt;li&gt;May 2001 Share price has more than returned to pre-incident levels and over the past 3 years considerably out performed the S&amp;amp;P500 (red line) &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;Lets take a Snapshot of Sony for posterity:&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-do0yyIMM68c/TcQUY3Kcq_I/AAAAAAAAB-M/lgp_z5fxfUA/s1600/sony.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-do0yyIMM68c/TcQUY3Kcq_I/AAAAAAAAB-M/lgp_z5fxfUA/s1600/sony.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;Maybe worth buying some Sony shares....&lt;br /&gt;&lt;br /&gt;Related posts:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/07/turning-bankers-to-engineers-in.html&quot;&gt;Turning bankers to engineers in a generation&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.blogger.com/%20http://www.rakkhis.com/2010/07/security-return-on-investment-roi.html&quot;&gt;Security Return On Investment (ROI)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/01/early-security-engagement-critical-or.html&quot;&gt;Early security engagement - critical or waste?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter &lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/6881569691101072332/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/05/what-does-sony-need-to-rebuild.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/6881569691101072332'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/6881569691101072332'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/05/what-does-sony-need-to-rebuild.html' title='What does Sony need to rebuild confidence after #sonyhack ?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-d39NsDGZ_fA/TcQUdjoX_yI/AAAAAAAAB-Q/uuprNk5lcso/s72-c/TJ+Maxx.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-2169300647965553323</id><published>2011-04-24T16:15:00.010+01:00</published><updated>2011-04-27T15:42:30.417+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><title type='text'>Apple Google #locationgate: breaches EU Data Protection Directive</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-hN9y0XwrBW4/TbRBuYk7FvI/AAAAAAAAB9U/Y1JaADdt5go/s1600/5256031617_467bc41023_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&amp;nbsp;&lt;img border=&quot;0&quot; height=&quot;179&quot; src=&quot;http://4.bp.blogspot.com/-hN9y0XwrBW4/TbRBuYk7FvI/AAAAAAAAB9U/Y1JaADdt5go/s320/5256031617_467bc41023_m.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The story over the last week has been &lt;s&gt;the&lt;/s&gt; &lt;s&gt;royal wedding&lt;/s&gt;&amp;nbsp;Apple and Google collecting location information including GPS and closest cell phone towers on their iOs and Android devices and transmitting these back to big brother. In the case of Apple the file containing this information was stored un-encrypted on the device, backed-up also in the clear to any machine the device was&amp;nbsp;synchronised&amp;nbsp;with and &amp;nbsp;contained far more historic location information that was required. At least Apple annonimized and sent this information every 12 hours (reducing real time tracking ability) and technically did ask for &quot;permission&quot; because everyone reads through those privacy and terms and conditions policies. Google asked for permission in a little bit less opaque way but transmits location information back in near real time. Microsoft has also joined the party admitting they collect location data but do not store it on the device. Symbian or WebOS anyone for a complete set?&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;I really don&#39;t understand why companies still feel it is a better long term move to do these types of activities covertly. The first principle in the &lt;a href=&quot;http://en.wikipedia.org/wiki/Data_Protection_Directive&quot;&gt;EU Data Protection Directive&lt;/a&gt; is Notice. &quot;Ensure the end user is clearly informed when data is being collected&quot;. I have so many arguments with the marketing people on projects about this exact point. To me it is really simple, if you are performing a legitimate activity and it provides benefit to the user there should be no problem for clearly and explicitly asking for&amp;nbsp;permission&amp;nbsp;not burying it in a 100 page document no one is every going to read.&lt;br /&gt;&lt;br /&gt;On both iOS and Android devices collecting this information on the device provides significant performance benefits. Just try using location in just GPS only mode on Android. Welcome back its been about 10 minutes! I&#39;m not sure if this the direct cause but there was a massive improvement in the&amp;nbsp;accuracy&amp;nbsp;and speed of GPS when the iPhone 4 and the&amp;nbsp;corresponding&amp;nbsp;iOS version was released. I&#39;m sure most users would be to happy provide their location information to Apple for better location services if they were open about it and asked upfront. I mean look at how many millions use check-in services providing this information for free just to be major and how many geo tag photos, tweets etc.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-aO7RDocC-h0/Tbgqeg91tqI/AAAAAAAAB9c/D_vQjPP6J1E/s1600/Loc-service.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://3.bp.blogspot.com/-aO7RDocC-h0/Tbgqeg91tqI/AAAAAAAAB9c/D_vQjPP6J1E/s320/Loc-service.png&quot; width=&quot;192&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Figure 1&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;The second principle in the Data Protection Directive is Choice. This is not either use location services or don&#39;t. It is a choice of whether this information is stored and transmitted Apple. To make matters worse Apple on the other hand &lt;a href=&quot;http://online.wsj.com/article/SB10001424052748704123204576283580249161342.html&quot;&gt;continues to collect&lt;/a&gt; location information even when the Location services is turned off. Google as least allowed users the choice of option of participating in  this collection as a option on the device (refer figure 1), however the  language could again be a lot more clear that they will also be  transmitting this information in near real time back to Google. In  addition for Android versions older than 2.3 the location files &lt;a href=&quot;http://www.boingboing.net/2011/04/22/android-secretly-sto.html#comment-1090308&quot;&gt;do not seem to be deleted&lt;/a&gt;  which is great with the fragmentation in the Android market. Also the  option to not transmit data to Google is hidden away under Location and  security - Use wireless networks option. The opt-out option comes up  when you tick this option. Selecting disagree means you are back to GPS with  its performance delays. There is no simple option to get the benefits  without transmitting the data to Google.&lt;br /&gt;&lt;br /&gt;The third principle is Onward Transfer. One would hope that Google or Apple would only turn over this information with a warrant &amp;nbsp;and never directly to advertisers. Hopefully it is also truly&amp;nbsp;annonimized as they say be of no use as a historical location tracking of individuals; I am a&amp;nbsp;bit suspicious of device ID&#39;s and unique random&amp;nbsp;identifiers&lt;br /&gt;&lt;br /&gt;Then there is the principle of &amp;nbsp;Security. Why is this information being stored in an un-encrypted format? Is there any good reason for this? Apple especially should know better - in the&amp;nbsp;&lt;a href=&quot;http://www.wired.com/images_blogs/gadgetlab/2011/04/applemarkeybarton7-12-10.pdf&quot;&gt;13-page letter&lt;/a&gt;&amp;nbsp;sent by Apple’s general counsel Bruce Sewell in July 2010, he states the information is transmitted over secure wireless. If they recognise the information is sensitive enough to require encryption in transit then why not storage?&lt;br /&gt;If there is a reason like they need to access the database when the phone is locked, surely something like a one way hash of the information that needs to be read would be a lot better design.&lt;br /&gt;&lt;br /&gt;Purpose is another principle to be considered. The data should only be collected, stored and used for the specified approved purpose. Apple&#39;s general council states in the same letter &quot;these databases must be updated continuously to account for, among other things, the ever-changing physical landscape&quot;. This basically implies that there is little value holding a large amount of historical data and it should not be stored locally on a device nor by Apple. &lt;a href=&quot;http://www.macrumors.com/2011/04/25/steve-jobs-on-ios-location-issue-we-dont-track-anyone/&quot;&gt;Steve Jobs&lt;/a&gt; in his usual verbose style stated &quot;We don&#39;t track anyone&quot;. I think the point he is missing is that this data, especially the historical data, allows the&amp;nbsp;possibility&amp;nbsp;of tracking any iOS user. Clearly if that is not the purpose this data should not have been kept. A positive for Google is at least they do not store this large cache of historical location data.&lt;br /&gt;&lt;br /&gt;Finally&amp;nbsp;there is the principle of access. From the kings of design and user&amp;nbsp;experience, how hard would it be to add a button to wipe the information on an iOS device, opt-in or out of it being collected and select how far back it goes?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Summary:&lt;/b&gt;&lt;br /&gt;The collection, storage and transmission of personal location information by Apple and Google violates some basic privacy principles set out in the EU Data Protection Directive being:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Notice and consent - users should have been clearly informed and their permission explicitly obtained, like they are informed an APP contains over 18 content. Google does this better than Apple but it could still be improved&lt;/li&gt;&lt;li&gt;Security - the data should have been encrypted or one way hashed on the device&lt;/li&gt;&lt;li&gt;Purpose - if historical information was not required it should not have been kept&lt;/li&gt;&lt;li&gt;Access - users should have a simple option to delete the information collected&lt;/li&gt;&lt;/ul&gt;I hope that Apple and Google take measures to address these in a patch to iOS and Android shortly.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Updates:&lt;/b&gt;&lt;br /&gt;&lt;b&gt;27/04/2011&lt;/b&gt; - Adding &lt;a href=&quot;http://www.theregister.co.uk/2011/04/27/windows_phone_location_tracking/&quot;&gt;Microsoft&lt;/a&gt; to this also now. Apparently no data stored locally but it is collected and transmitted.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;27/04/2011&lt;/b&gt; - Apple provides official &lt;a href=&quot;http://www.apple.com/pr/library/2011/04/27location_qa.html&quot;&gt;press release&lt;/a&gt; response. Firstly this is written in really clear language and very little marketing speak +1 for Apple. It is good they acknowledge that while the data is transmitted in an encrypted form it is not encrypted on the phone and will only be encrypted in backup if you enable backup encryption (we all do right? right?). Major point: &quot;The reason the iPhone stores so much data is a bug we uncovered and plan  to fix shortly (see Software Update section below). We don’t think the  iPhone needs to store more than seven days of this data&quot;. Good that they acknowledge they are collecting far more data that is required for the purpose and plan on fixing it. This is also very good and validates what I hoped regarding the onward transfer principle: &quot;location is not shared with any third party or ad unless the user explicitly approves&quot;.&lt;br /&gt;&lt;br /&gt;The patch I was asking for:&lt;br /&gt;&quot;Sometime in the next few weeks Apple will release a free iOS software update that:   &lt;br /&gt;&lt;ul class=&quot;square&quot;&gt;&lt;li&gt;reduces the size of the crowd-sourced Wi-Fi hotspot and cell tower database cached on the iPhone,&lt;/li&gt;&lt;li&gt;ceases backing up this cache, and&lt;/li&gt;&lt;li&gt;deletes this cache entirely when Location Services is turned off.&quot;&lt;/li&gt;&lt;/ul&gt;Overall excellent response, they may still get sued and EU may look into Data Protection Directive breech but the patch is a good outcome.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Related posts:&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/03/google-circles-many-ways-to-do-identity.html&quot;&gt;Google circles - many ways to do identity?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2011/01/obama-cyber-id-bad-idea.html&quot;&gt;Obama Cyber ID = bad idea&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.rakkhis.com/2010/09/privacy-in-age-of-augmented-humanity.html&quot;&gt;Privacy in an Age of Augmented Humanity&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Background&lt;/b&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.theregister.co.uk/2011/04/22/apple_iphone_location_tracking_analysis/&quot;&gt;The Register - Apple iPhone tracking analysis&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.wired.com/gadgetlab/2011/04/apple-iphone-tracking/&quot;&gt;Wired - Why and How Apple is collecting your location data&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://bits.blogs.nytimes.com/2011/04/22/google-says-it-collects-location-data-on-phones-for-location-services/&quot;&gt;Google says it collects location data&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.boingboing.net/2011/04/22/android-secretly-sto.html&quot; rel=&quot;bookmark&quot;&gt;Android secretly stores location data too -- though less of it, and with less detail&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://online.wsj.com/article/SB10001424052748704123204576283580249161342.html&quot;&gt;IPhone Stored Location in Test Even if Disabled&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.apple.com/pr/library/2011/04/27location_qa.html&quot;&gt;Apple official response&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;Photo credit&amp;nbsp;&lt;a href=&quot;http://www.flickr.com/photos/caseorganic/5256031617/sizes/s/in/photostream/&quot;&gt;caseorganic&lt;/a&gt; Flikr. Google Android image from Stuart Ward.&lt;br /&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter &lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/2169300647965553323/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/04/apple-google-locationgate-just-ask-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/2169300647965553323'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/2169300647965553323'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/04/apple-google-locationgate-just-ask-for.html' title='Apple Google #locationgate: breaches EU Data Protection Directive'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-hN9y0XwrBW4/TbRBuYk7FvI/AAAAAAAAB9U/Y1JaADdt5go/s72-c/5256031617_467bc41023_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-5141091478180655860</id><published>2011-04-10T23:29:00.000+01:00</published><updated>2011-04-10T23:36:05.541+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Authentication"/><category scheme="http://www.blogger.com/atom/ns#" term="Identity management"/><title type='text'>Federated authentication: security that makes you money</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: right;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-ecOgDe0fyL4/TaIm3aLfErI/AAAAAAAAB8g/oTwCwFnJkjQ/s1600/4464828517_2fdf5f479c_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ecOgDe0fyL4/TaIm3aLfErI/AAAAAAAAB8g/oTwCwFnJkjQ/s1600/4464828517_2fdf5f479c_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Federated authentication: using the same login details across multiple organizations and services; it is one of the few security technologies that can actually be revenue generating for end-user (non security vendor) businesses. There seems to be so many reasons to adopt it, but it is still a hard sell and does not have widespread implementation. However we maybe reaching a tipping point where this may all change.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;I want to get something out the way first of all, any writing on federated authentication can get &lt;a href=&quot;http://www.schneier.com/blog/archives/2011/03/federated_authe.html&quot;&gt;bogged&lt;/a&gt; down in using one identity everywhere.&amp;nbsp;Governments&amp;nbsp;in particular, all over the world including the &lt;a href=&quot;http://www.dhs.gov/xlibrary/assets/ns_tic.pdf&quot;&gt;US&lt;/a&gt;&amp;nbsp;[PDF] have had this vision and &lt;a href=&quot;http://youtu.be/cqggW08BWO0&quot;&gt;promoted&lt;/a&gt; it via their agents. As I have &lt;a href=&quot;http://www.rakkhis.com/2011/03/google-circles-many-ways-to-do-identity.html&quot;&gt;posted&lt;/a&gt; &lt;a href=&quot;http://www.rakkhis.com/2011/01/obama-cyber-id-bad-idea.html&quot;&gt;quite&lt;/a&gt; a &lt;a href=&quot;http://www.rakkhis.com/2010/07/laws-of-identity-in-practice_25.html&quot;&gt;few&lt;/a&gt; times before, I don&#39;t think one identity for everything will ever work but I am all about reaching a happy middle between the current situation and that Orwellian hell.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Business case for federated authentication&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The first comment on the Schneier post on federated authentication is &quot;There is no problem here that people need solved.&amp;nbsp;Linking all these iDs only serves corporations and the government&quot;. This is simply not true, increased use of federated authentication would provide significant benefits to users in terms of&amp;nbsp;convenience and security.&amp;nbsp;Convenience in not having to register, setup and maintain profiles for every new service and not having to&amp;nbsp;remember&amp;nbsp;the current&amp;nbsp;plethora&amp;nbsp;of usernames and passwords. Security is also improved because a limited number accounts are easier to authenticate strongly and access is a lot easier to&amp;nbsp;&lt;a href=&quot;http://www.rakkhis.com/2011/03/password-stolen-ounce-of-prevention.html&quot;&gt;revoke&lt;/a&gt; if credentials are every compromised. While some would &lt;a href=&quot;http://www.quora.com/OpenID/What-s-wrong-with-OpenID&quot;&gt;argue&lt;/a&gt; these problems are effectively solved for most ordinary users via the remember me option in browsers or via a password manager. However these are a&amp;nbsp;band-aids for the&amp;nbsp;symptoms&amp;nbsp;not a&amp;nbsp;treatment&amp;nbsp;for the root cause.&lt;br /&gt;&lt;br /&gt;Where I do agree with the comment above, is that federated authentication&amp;nbsp;certainly&amp;nbsp;serves corporations and the government; so much so that it is hard to&amp;nbsp;believe&amp;nbsp;that it is not more widespread. These benefits can be considered from a B2C and B2B perspectives. B2C:&amp;nbsp;A 2007 study by &lt;a href=&quot;http://www.grokdotcom.com/2007/10/03/yes-or-no-why-must-i-choose/&quot;&gt;Future now&lt;/a&gt; found that over 50% of top online retailers required customers to register before checkout. One would hope this has improved by 2011 but a &lt;a href=&quot;http://www.forrester.com/rb/Research/required_registration_lowers_online_conversion_rates/q/id/45179/t/2&quot;&gt;Forrester&lt;/a&gt; study in 2008 identified that 25% of potential&amp;nbsp;customers&amp;nbsp;would leave the site without purchase if asked to register. These type of numbers make it seem obvious that if you need any form of registration or signup, make this as easy as possible for the user as it directly affects your bottom line. With federated authentication users can in one or two clicks use an existing identity, no forms to fill, no profile to complete, simples!&lt;br /&gt;&lt;br /&gt;B2B: growing your business is increasingly creating a mash-up of services and with SAAS services getting cheaper and more&amp;nbsp;ubiquitous, they continue to grow in popularity. &amp;nbsp;Jim Scully and Barbara Levin found in a 2010 study for &lt;a href=&quot;http://onlinelibrary.wiley.com/doi/10.1002/ert.20294/abstract&quot;&gt;Employment Relations Today&lt;/a&gt; that more companies implemented shared services in the two years to 2009-2010 than in the last 15. Any time one company needs to use another companies resources for non public services or information there is an identity and access management problem to solve. This adds cost and time to any project to work out provisioning, approvals, resets and un-locks, and recertification. If part of the business case for using a SAAS solution for something like&amp;nbsp;time-sheets or&amp;nbsp;&amp;nbsp;HR is speed and cost to implement, it hardly makes sense to weigh it down with yet another access control process.&amp;nbsp;There is also an on-going maintenance cost that increases the total cost of ownership, for example&amp;nbsp;in 2005 &lt;a href=&quot;http://www.forrester.com/rb/Research/twenty-three_best_practices_for_customer_service_center/q/id/37873/t/2&quot;&gt;Forrester&lt;/a&gt; reported that 25-40% of helpdesk calls are password related. With federated authentication, all those problems are already handled by the users existing identity provider.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Barriers to implementation&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;With so many easy to identify benefits, why has federated authentication had such slow adoption? Security concerns are no doubt a major reason. Trusting another organization to be an identity provider to your resources and in reverse exposing the crown jewels that are your directory services, is a bridge too far for most organizations. These are a valid concerns, however practically anytime you allow another organization access, you are trusting their processes and the contractual measures in place. This includes their staff vetting, their physical access controls and their joiners, leavers, movers processes.&amp;nbsp;Especially where permanent access is required, is it really that different to trusting their identity and authentication systems? In fact where they make take days or months to tell you when staff have left, there is a greater&amp;nbsp;likelihood&amp;nbsp;with federated access than this process is&amp;nbsp;synchronized&amp;nbsp;with their own systems.&lt;br /&gt;&lt;br /&gt;Another valid concern is the keys to the kingdom problem. This also applies to &lt;a href=&quot;http://www.rakkhis.com/2010/12/why-you-should-use-password-vault.html&quot;&gt;password managers&lt;/a&gt;, but securing a small number of identity and authentication systems is a lot easier and more&amp;nbsp;effective&amp;nbsp;than having hundreds of weak passwords (or the same weak password a hundred times). Open-ID providers like Google now offer two factor authentication; if you do not like a soft token on your phone, &lt;a href=&quot;http://www.yubico.com/openid-server&quot;&gt;Yubikey&lt;/a&gt; USB hardware tokens are also supported by many Open-ID providers. Control and auditing is also greatly improved; do you know every application where you have used a password? Me neither. Yet many Open-ID providers have all the sites where you have granted access to that identity, revoking access is a one click process.&lt;br /&gt;&lt;br /&gt;The difficulty or&amp;nbsp;perceived&amp;nbsp;difficulty of establishing a federated identity infrastructure is also often a barrier. No single project wants to take the risk and cost of implementing the required technology and processes for the corporation and security departments struggle to get funding and priority for these projects. Microsoft really missed a trick with not making a version of Windows where all forests had a simple discover and federate option. They were probably too scared of the security and privacy outcry that would have no doubt followed in their hayday to ever try it. Active Directory Federation Services (ADFS) especially version 2 is a great step&amp;nbsp;forward&amp;nbsp;and Windows 2008 provides read only domain controllers for securing directory servers in DMZ&#39;s. However it is still not a simple process, requiring each company that wants to federate to setup trusts and manually exchange configuration materials. A fair amount of testing is still required and it is certainly not something business users can setup without IT. To their credit Ping Identity and OpenSSO have also made the process about as simple as it can be. OpenSSO (now &lt;a href=&quot;https://wikis.forgerock.org/confluence/display/openam/Home&quot;&gt;OpenAM&lt;/a&gt; supported by Forgerock) provides a simple servelet, an agent that can be installed on any web server, configured to use an LDAP and you are ready for federated authentication and single sign-on.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Tipping point&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;There are a number of reasons that I think federated identity and authentication has reached or is nearing a tipping point. Firstly technologies such as Open-ID, oAuth v2, SAML are now mature and have robust and simple implementations. There are &lt;a href=&quot;http://openid.net/get-an-openid/&quot;&gt;plenty&lt;/a&gt; of Open-ID providers with at least one vendor that everyone on the Internet has an account with for products they actually want to use; federated authentication capability is just a nice fringe benefit. Open-ID can be implemented with a great UI that is&amp;nbsp;intuitive&amp;nbsp;even for non-technical users. The &lt;a href=&quot;http://stackexchange.com/users/login?returnurl=%2f&quot;&gt;Stack Exchange&lt;/a&gt; login and I would hope &lt;a href=&quot;http://simplesecurityra.com/&quot;&gt;Simple Security Risk Assessment&lt;/a&gt; (SSRA) (shameless plug) are good examples. As more and more services move to the cloud, shedding their legacy&amp;nbsp;applications&amp;nbsp;and their password databases, &amp;nbsp;it will become easier to use federated authentication.&amp;nbsp;&amp;nbsp;For example Amazon AWS offers an &lt;a href=&quot;http://aws.amazon.com/iam/&quot;&gt;Identity and Access&amp;nbsp;Management&amp;nbsp;service&lt;/a&gt;&amp;nbsp;and I would not be&amp;nbsp;surprised&amp;nbsp;if this offered the option of federated access at least across AWS in future.&amp;nbsp;Anyone using Google App&#39;s benefits from being able to collaborate with other businesses simply by entering an email address - this is how easy it should be to setup federated access, it should be business driven rather than requiring a technology project.&lt;br /&gt;&lt;br /&gt;For new companies it is a no brainer to use an existing identity provider. As a straw-poll consider the latest of batch of Y-combinator&amp;nbsp;&lt;s&gt;recruits&lt;/s&gt;&amp;nbsp;&lt;a href=&quot;http://networkeffect.allthingsd.com/20110322/meet-y-combinators-latest-class/&quot;&gt;millionaires&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://convore.com/&quot;&gt;Convore&lt;/a&gt; - Real-time group conversations. Chat with public and private groups on the Web, or the iPhone app IRC for everyone - &lt;b&gt;Twitter&lt;/b&gt; and &lt;b&gt;Facebook&lt;/b&gt; login&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.tutorspree.com/&quot;&gt;Tutorspree&lt;/a&gt; - Airbnb for tutoring - &lt;b&gt;Facebook&lt;/b&gt; login&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.earbits.com/&quot;&gt;Earbits Radio&lt;/a&gt; - Internet radio that serves as a marketing platform for music-related products. Labels, artists and live music promoters bid for airtime. Shortcut description: “The Google AdWords for the music industry.” - &lt;b&gt;Facebook&lt;/b&gt; login&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;You get the point. Also notice the elephant in the room and our&amp;nbsp;favorite&amp;nbsp;CIA agent yet to be mentioned: Facebook.&amp;nbsp;Unfortunately&amp;nbsp;they are not an Open-ID provider but they do support something &lt;a href=&quot;https://developers.facebook.com/docs/guides/web/&quot;&gt;similar&lt;/a&gt;, for user and businesses there are few practical differences in use. Facebook also highlights a key business reason for federation: access to all that social data and possibility of going viral. More attractive than cost reductions and time savings, this is a real revenue side reason to use federated access. Listening to a startup pitch from &lt;a href=&quot;http://recip.ly/&quot;&gt;Recip.ly&lt;/a&gt;&amp;nbsp;at a recent&amp;nbsp;Silicon&amp;nbsp;roundabout meeting, &quot;of course we use Facebook connect so we already know what they like&quot;. While this makes the privacy and security side of me cringe if you want to sell federated authentication maybe start with your marketing department.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The business case for federated access is based on making it easier for consumers to sign-up and use your services and cheaper and faster to integrate with business partners&lt;/li&gt;&lt;li&gt;Security and implementation costs are often barriers however these can be overcome with strong authentication for a limited number of identities and via technologies such as OpenAM&lt;/li&gt;&lt;li&gt;The tipping point for federated authentication is here, if you want to get in front of the curve Open-ID is well worth implementing&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter &lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;br /&gt;Photo credit:&amp;nbsp;&lt;a href=&quot;http://www.flickr.com/photos/56695083@N00/4464828517/sizes/s/in/photostream/&quot;&gt;KatB Photography&lt;/a&gt;&amp;nbsp;Flikr&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/5141091478180655860/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/04/federated-authentication-security-that.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5141091478180655860'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5141091478180655860'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/04/federated-authentication-security-that.html' title='Federated authentication: security that makes you money'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-ecOgDe0fyL4/TaIm3aLfErI/AAAAAAAAB8g/oTwCwFnJkjQ/s72-c/4464828517_2fdf5f479c_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-7731607067245512839</id><published>2011-04-06T22:41:00.000+01:00</published><updated>2011-04-06T22:55:07.160+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rant"/><category scheme="http://www.blogger.com/atom/ns#" term="Secure Development"/><title type='text'>Agile: Most security guys are useless</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; text-align: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-tDTVuiex7-c/TZzC2wZSnFI/AAAAAAAAB8c/bpr4sxW_kkE/s1600/320px-Agile_Software_Development_methodology.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://3.bp.blogspot.com/-tDTVuiex7-c/TZzC2wZSnFI/AAAAAAAAB8c/bpr4sxW_kkE/s320/320px-Agile_Software_Development_methodology.jpg&quot; width=&quot;257&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;[1]&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;The return of king &lt;a href=&quot;http://techcrunch.com/2011/01/20/google-ceo-change/&quot;&gt;Larry&lt;/a&gt; to his rightful throne at Google with his &lt;a href=&quot;http://news.ycombinator.com/item?id=2411348&quot;&gt;&lt;s&gt;nerds&lt;/s&gt; engineers rule edict&lt;/a&gt;&amp;nbsp;and&amp;nbsp;Jason Fried of 37 Signals talking about the &lt;a href=&quot;http://www.inc.com/magazine/20110401/jason-fried-why-i-run-a-flat-company.html&quot;&gt;culture&lt;/a&gt; of a flat company got me thinking whether in an Agile development world are most security guys useless? The short rationale is that in Agile and really any lean, successful company, you want &quot;everyone to touch the product&quot;. Security guys need to code, those that don&#39;t (the majority) are not required. But is this the whole story...&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;The 12 principles [2] behind Agile development are (emphasis mine):&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Customer satisfaction by &lt;b&gt;rapid delivery&lt;/b&gt; of useful software&lt;/li&gt;&lt;li&gt;Welcome &lt;b&gt;changing&lt;/b&gt; requirements, even late in development&lt;/li&gt;&lt;li&gt;Working software is delivered &lt;b&gt;frequently&lt;/b&gt; (weeks rather than months)&lt;/li&gt;&lt;li&gt;&lt;b&gt;Working&lt;/b&gt; software is the principal measure of progress&lt;/li&gt;&lt;li&gt;Sustainable development, able to maintain a &lt;b&gt;constant&lt;/b&gt; pace&lt;/li&gt;&lt;li&gt;Close, daily co-operation between business people and developers&lt;/li&gt;&lt;li&gt;Face-to-face conversation is the best form of communication (co-location)&lt;/li&gt;&lt;li&gt;Projects are built around motivated individuals, who should be trusted&lt;/li&gt;&lt;li&gt;Continuous attention to technical excellence and good design&lt;/li&gt;&lt;li&gt;Simplicity&lt;/li&gt;&lt;li&gt;Self-organizing teams&lt;/li&gt;&lt;li&gt;Regular adaptation to changing circumstances&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;If you are a startup in particular I don&#39;t think you can develop any other way than Agile. Your best bet for survival is to get something out there and iterate like hell. Even in large companies these days rapid delivery, reduced costs, adapting to requirements that get elaborated as you go are &lt;a href=&quot;http://stackoverflow.com/questions/2187598/successful-projects-using-agile-methods/2193434#2193434&quot;&gt;increasingly&lt;/a&gt; the &lt;a href=&quot;http://www.computerworlduk.com/management/infrastructure/applications/news/index.cfm?newsid=6286&quot;&gt;norm&lt;/a&gt;.&amp;nbsp;Paul Graham &lt;a href=&quot;http://www.paulgraham.com/boss.html&quot;&gt;says&lt;/a&gt; &quot;a programmer working as programmers are meant to, is always making new things&quot;. I would argue this should be true for everyone working on agile projects including security people. The only people that add value are coding, designing the UI, testing etc; &quot;touching the product&quot;.&amp;nbsp;Unfortunately most security people are not doing this; they create documentation, provide advice and consulting, &quot;manage risks&quot; or manage other security people and thus at best add zero value. &amp;nbsp;Arguably you would be far better having only security engineers that coded the security components and where they performed code reviews and security testing actually fixed the problems.&lt;br /&gt;&lt;br /&gt;How about the opposite perspective though? Starting from the top: CISO&#39;s sit on&amp;nbsp;executive&amp;nbsp;committees, ten or more layers removed where such hierarchies exist. CSO Online &lt;a href=&quot;http://www.csoonline.com/article/221739/what-is-a-chief-security-officer-&quot;&gt;states&lt;/a&gt; they are the &quot;executive responsible for the organization&#39;s entire security posture&quot; these days expanding their empire to risk, governance, information security, IT security, physical security, data loss and even fraud. Surely that is an important position for ensuring your project delivers the business benefits really quickly. So what if &lt;a href=&quot;http://www.paulgraham.com/wealth.html&quot;&gt;startups&lt;/a&gt; don&#39;t have them, every&amp;nbsp;&lt;a href=&quot;http://www.boazgelbord.com/2009/05/do-companies-need-ciso.html&quot;&gt;Fortune 500 company&lt;/a&gt;&amp;nbsp;does right? They must add a lot value. I mean it is the big stuff that makes the difference, securing the budget for that new DLP system, funding for enough resources to review all the projects and changes, keep the security operations running. Even I have &lt;a href=&quot;http://www.rakkhis.com/2011/01/early-security-engagement-critical-or.html&quot;&gt;argued&lt;/a&gt; before that enterprise security controls make the biggest difference in the security posture of an organization.&lt;br /&gt;&lt;br /&gt;Then there is everyone that does &quot;Governance Risk and Compliance (GRC). Bingo! Sorry thought I was at Infosec. Afterall the majority of what companies only do security for&amp;nbsp;&lt;a href=&quot;http://www.rakkhis.com/2010/07/security-return-on-investment-roi.html&quot;&gt;compliance&lt;/a&gt;&amp;nbsp;and regulations are growing increasingly &lt;s&gt;insane&lt;/s&gt; &lt;a href=&quot;http://www.techdirt.com/articles/20110303/03520213350/france-goes-overboard-data-retention-wants-user-passwords-retained.shtml&quot;&gt;complex&lt;/a&gt;; even Agile projects need to know whether sending data out of Europe where the evil &lt;a href=&quot;http://www.theonion.com/video/cias-facebook-program-dramatically-cut-agencys-cos,19753/&quot;&gt;CIA&lt;/a&gt; may watch breaches the Data Protection Act right? It&#39;s not like email flows freely around the world, no would store the company&#39;s most &lt;a href=&quot;http://current.com/groups/the-hacker-news/92989936_anonleaks-hbgary-email-viewer-portal-71-800-emails-exposed-the-hacker-news.htm&quot;&gt;valuable&lt;/a&gt; information in email right? In addition there are the physical security guys obsessing over slab to slab construction and&amp;nbsp;separate rooms for developers, got keep those desks clear and laptops leashed!&amp;nbsp;Also not be forgotten information security that reviews all the supplier &lt;a href=&quot;http://www.rakkhis.com/2010/10/legally-blond-why-you-do-not-need-50.html&quot;&gt;contracts&lt;/a&gt;&amp;nbsp;including all those pesky cloud vendors and perform all the supplier due diligence visits. Developers in Hawai in Summer and a data center in the Alps in Winter; it&#39;s a dirty job but someone has to do it.&lt;br /&gt;&lt;br /&gt;Then all the middle managers in security, risk, compliance;&amp;nbsp;absolutely&amp;nbsp;mandatory&amp;nbsp;to keep the troops motivated and in line. No decently large company could do what 37 signals has achieved right? Of course we still need all the bottom of pyramid security underlings running firewalls, providing access, monitoring the SIEM. We would never want &lt;a href=&quot;http://tinyurl.com/3uqxdh9&quot;&gt;outsource&lt;/a&gt; or &lt;a href=&quot;https://www.google.com/enterprise/marketplace/viewListing?productListingId=5969052+17186312869074713199&amp;amp;pli=1&quot;&gt;automate&lt;/a&gt; these services.&lt;br /&gt;&lt;br /&gt;Finally where the bullet hits close to home: security architecture and design for projects. Even on Agile projects we perform a CIA analysis and advice on the inherent risk of a project even before it starts, which of course is always listened to. We write security requirements, driven from threat models that reduce &lt;a href=&quot;http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&quot;&gt;re-inventing&lt;/a&gt; the wheel and &lt;a href=&quot;http://www.rakkhis.com/2011/03/mitigating-owasp-top-10-without-any.html&quot;&gt;integrate&lt;/a&gt; with enterprise security infrastructure. We review and collaborate on the design, develop attack trees and mis-use cases for sprints and plan security testing. When Fortify360 finds&amp;nbsp;&lt;a href=&quot;http://security.stackexchange.com/questions/1262/fortify360-sinks-sources-vulnerability-count&quot;&gt;300&lt;/a&gt; cross site scripting vulnerabilities, we &lt;a href=&quot;http://tinyurl.com/4yyvt3t&quot;&gt;advice&lt;/a&gt; how they can be fixed. Look even &lt;a href=&quot;http://www.microsoft.com/security/sdl/discover/sdlagile.aspx&quot;&gt;Microsoft&lt;/a&gt;&amp;nbsp;says we are&amp;nbsp;necessary&amp;nbsp;even for Agile processes and that is &lt;a href=&quot;http://www.zdnet.com/blog/security/pwn2own-2011-ie8-on-windows-7-hijacked-with-3-vulnerabilities/8367&quot;&gt;working so well&lt;/a&gt;. But does the business care about any of this, or would they rather have someone that is helping to get the code completed securely and delivered?&lt;br /&gt;&lt;br /&gt;All the security guys I&amp;nbsp;&lt;a href=&quot;http://dc4420.org/&quot;&gt;know&lt;/a&gt;&amp;nbsp;that can code enjoy breaking things too much and either run or work for pen test companies, very few seem interested in working for end-user companies building defenses. Even the few that do, do so as part of security consulting vendors, very few real security hackers work for companies building new systems.&lt;br /&gt;&lt;br /&gt;Thankfully it seems unlikely that any large company will soon replace all its security, risk and compliance staff with security engineers that code&amp;nbsp;but just to hedge my bets a little bit I&#39;m going to work on some node.js and jquery to maintain &lt;a href=&quot;http://www.simplesecurityra.com/&quot;&gt;http://www.simplesecurityra.com&lt;/a&gt; (shameless plug). Any links to outstanding resources for either that I can&#39;t find easily on Google would be greatly&amp;nbsp;appreciated&amp;nbsp;#lazyweb. Dam in the hour it took me to write this I could have got hello world and a twitter feed working on my node server.&lt;br /&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter &lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;br /&gt;Sources:&lt;br /&gt;[1] Agile software development poster.&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Agile_software_development&quot;&gt;http://en.wikipedia.org/wiki/Agile_software_development&lt;/a&gt;&lt;br /&gt;[2]&amp;nbsp;&amp;nbsp;Beck, Kent; et al. (2001). &quot;Principles behind the Agile Manifesto&quot;. Agile Alliance. Retrieved 2011-04-06&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/7731607067245512839/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/04/agile-most-security-guys-are-useless.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/7731607067245512839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/7731607067245512839'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/04/agile-most-security-guys-are-useless.html' title='Agile: Most security guys are useless'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-tDTVuiex7-c/TZzC2wZSnFI/AAAAAAAAB8c/bpr4sxW_kkE/s72-c/320px-Agile_Software_Development_methodology.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-88431664730637857</id><published>2011-04-04T01:08:00.002+01:00</published><updated>2011-04-04T11:16:58.317+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DLP"/><category scheme="http://www.blogger.com/atom/ns#" term="SIEM"/><title type='text'>RSA APT hack - blogger tells all</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-JtMjMMmJgQw/TZkCLoMfHkI/AAAAAAAAB8Y/wEizP7n4ZfI/s1600/2877421629_63aaa5d8f5_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-JtMjMMmJgQw/TZkCLoMfHkI/AAAAAAAAB8Y/wEizP7n4ZfI/s1600/2877421629_63aaa5d8f5_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;So an RSA employee released a &lt;a href=&quot;https://www.readability.com/articles/ucidvgey?legacy_bookmarklet=1#&quot;&gt;blog post&lt;/a&gt; with some more details of the &quot;Advanced Persistent Threat&quot; attack that involved the theft of information related to SecurID. RSA should be praised for this, as I like many others, had been&amp;nbsp;disappointed&amp;nbsp;with them for less than &lt;a href=&quot;http://www.rakkhis.com/2011/03/rsa-and-scada-two-ends-of-disclosure.html&quot;&gt;responsible disclosure&lt;/a&gt;. Although this post does not provide details of what was stolen (maybe they don&#39;t know?) that would enable smaller&amp;nbsp;organizations&amp;nbsp;and individuals without direct contact with RSA to perform a &lt;a href=&quot;http://www.rakkhis.com/2011/03/risk-assessment-glimpse-of-future.html&quot;&gt;risk assessment&lt;/a&gt;, it does at least provide opportunities for lessons learnt. It also raises questions on why a security company did not have appropriate controls to mitigate these risks.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;blockquote&gt;&quot;The number of enterprises hit by APTs grows by the month...&amp;nbsp;&amp;nbsp;examples are in the press regularly, and some examples are [Arora attacks] and [HB Gary]&quot;&lt;/blockquote&gt;Never a good sign when they start with: look it wasn&#39;t just us getting hacked. This was terrible for HB Gary and even worse when you release a deck a few days before stating how one of your &lt;a href=&quot;https://docs.google.com/viewer?url=http%3A%2F%2Fwww.rsa.com%2Finnovation%2Fdocs%2F11313_APT_BRF_0211.pdf&quot;&gt;flagship products&lt;/a&gt; is great for mitigating APT&#39;s or and a post titled &quot;&lt;a href=&quot;http://blogs.rsa.com/rivner/2019-what-we-did-to-fight-apts/&quot;&gt;What we did to fight to APT&#39;s&lt;/a&gt;&quot; written on&amp;nbsp;February&amp;nbsp;18th 2011 (month before the attack was disclosed).&lt;br /&gt;&lt;blockquote&gt;&quot;These companies deploy any imaginable combination of state-of-the-art perimeter and end-point security controls, and use all imaginable combinations of security operations and security controls. Yet still the determined attackers find their way in. What does that tell you?&quot;&lt;/blockquote&gt;Agreed that you can never get the risk to zero but without details on what mitigating controls RSA did have in place, there appears to be some basic security controls that have failed either in design or effectiveness.&lt;br /&gt;&lt;blockquote&gt;&quot;they then send that user a Spear Phishing email... The email was crafted well enough to trick one of the employees to retrieve it from their Junk mail folder, and open the attached excel file&quot;&lt;/blockquote&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;RSA really?&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;So any training on email security including spear phishing? Was the false positive rate so bad in your email filtering service that such an email was put in junk mail for retrieval by the user, without further authorization, rather than being quarantined?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Lesson:&lt;/b&gt; you should be training users not to open emails from senders they do not recognize. Spear phishing training needs to be part of any user awareness program. Any email that triggers a junk rating, especially where it has an attachment, should be placed in quarantine for review.&lt;br /&gt;&lt;blockquote&gt;&quot;The spreadsheet contained a zero-day exploit that installs a backdoor through an Adobe Flash vulnerability (CVE-2011-0609)&quot;&lt;/blockquote&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;b&gt;&lt;b&gt;RSA really?&lt;/b&gt;&amp;nbsp;&lt;/b&gt;Is there a good business reason why Joe from HR needs to have Flash? Is it&amp;nbsp;necessary&amp;nbsp;for his job or is it easier to roll it out to everyone rather than field the complaints for not being able to watch iPlayer? In fact did Joe need Internet access at all? Could he have a white list of allowed sites required for his job and a simple and automated way to apply for additional access with justification?&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;Lesson:&lt;/b&gt; basic advice many of us have been providing for years to &lt;a href=&quot;http://www.rakkhis.com/2010/11/practical-and-cheap-pci-dss-compliance.html&quot;&gt;small business&lt;/a&gt; and &lt;a href=&quot;http://www.rakkhis.com/2011/03/password-stolen-ounce-of-prevention.html&quot;&gt;non techy Internet surfers&lt;/a&gt;: for things like browser&#39;s and browser extensions, really common software that has an attack surface you can drive a bus through such as Adobe Acrobat Reader and Flash, MS office; patching&amp;nbsp;&amp;nbsp;is really good idea, using alternatives such as Open office, &lt;a href=&quot;http://sourceforge.net/projects/pdfcreator/&quot;&gt;PDF creator&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Adobe_Flash#Alternatives_to_Flash&quot;&gt;not flash&lt;/a&gt;&amp;nbsp;and to eliminate them altogether is even better. Internet access to all sites should not be carte blanche for all, whitelist where you can and put effective approval processes in place to cut your attack surface significantly.&lt;br /&gt;&lt;blockquote&gt;&quot;&lt;a href=&quot;http://www.f-secure.com/v-descs/backdoor_w32_poisonivy.shtml&quot;&gt;Poison Ivy&lt;/a&gt; variant set in a reverse-connect mode that makes it more difficult to detect, as the PC reaches out to the command and control rather than the other way around.&quot;&lt;/blockquote&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;b&gt;&lt;b&gt;RSA really?&lt;/b&gt;&amp;nbsp;&lt;/b&gt;Now this is where the story gets really bad. Any IDS should be able to detect new outbound connections from desktops to addresses on the Internet. I have worked for organizations where Confika and plenty of other malware was detected in this way. Envision should have been configured to alert the security team of anything like this.&amp;nbsp;A desktop firewall should have stopped outbound connections to anything other than authorized programs.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;Lesson:&lt;/b&gt;&amp;nbsp;Configure a firewall and host based IDS on every end point, do not allow unlimited outbound connections, but rather whitelist a set of programs e.g. the browser.&amp;nbsp;Everything else like AV should be updated via internal servers. Configure IDS on the Internet&amp;nbsp;perimeter&amp;nbsp;to specifically alert and ideally IPS to block suspicious outbound connections, even where they piggy back on a browser or other allowed programs.&lt;br /&gt;&lt;blockquote&gt;&quot;You can try building bigger and better radars, or, as someone I talked to said, you can try staring more closely at your existing radars&quot;&lt;/blockquote&gt;Actually an attack, even if it is a zero day exploit being sent by email was caught by your existing radar, it just wasn&#39;t dealt with effectively. An endpoint connecting to an unknown address on the Internet, that is not a stealth fighter that is a 747 and your existing radar works perfectly&lt;br /&gt;&lt;blockquote&gt;&quot;Already we’re learning fast, and every organization hit by an APT is much more prepared against the next one... What we’re witnessing now are the early days.&amp;nbsp;&quot;&lt;/blockquote&gt;This really is not a new type of attack, in fact I would be&amp;nbsp;surprised&amp;nbsp;if RSA had not earned millions in for years scaring organizations into buying Envision for exactly this type of threat.&lt;br /&gt;&lt;blockquote&gt;&quot;by detecting what is happening early on, RSA was able to respond quickly and engage in immediate countermeasures&quot;&lt;/blockquote&gt;&lt;b&gt;&lt;b&gt;RSA really?&lt;/b&gt;&amp;nbsp;&lt;/b&gt;The key information left out is how quickly? Are we talking minutes, hours, days? He mentions other organizations taking &quot;months&quot; so more than a minute and less than 3 months? Doesn&#39;t Envision have real time alerts to your 24x7 monitoring team? No IPS to automatically block outbound Internet connections like this? No automated preventative action configured in Envision?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Lesson: &lt;/b&gt;Investing in SIEM software like Envision is pointless unless you spend the time to setup the alerts and have a robust and step by step procedure for your Security Operations Center (SOC) on what to do when an alert is detected. I wrote a bit about this in getting more &lt;a href=&quot;http://www.rakkhis.com/2010/10/improving-roi-of-siem-logging-and.html&quot;&gt;ROI from your SIEM&lt;/a&gt;&amp;nbsp;. Even better use an IPS and automate your response within acceptable false&amp;nbsp;positives.&lt;br /&gt;&lt;blockquote&gt;&quot;They performed privilege escalation on non-administrative users in the targeted systems, and then moved on to gain access to key high value targets, which included process experts and IT and Non-IT specific server administrators.&quot;&lt;/blockquote&gt;&lt;b&gt;&lt;b&gt;RSA really? &lt;/b&gt;&lt;/b&gt;This provides some answer to the above question, the detection and response certainly was not immediate. Why do even administrators have permanent access to critical systems? Why is access not provided on an as needs basis with an incident or change ticket? Was Envision configured to monitor for administrator logins outside of these approved reasons for logging in? Finally the greatest irony, where was the two factor authentication to for administrative users? If this was in place at best the attacker is only able to capture a one time password with limited timeframe to use.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Lesson: &lt;/b&gt;More away from permanent privileged access to critical production systems. Establish a process for access to be enabled only with an approved change or support ticket. Configure monitoring for administrator logins outside without this rationale. Two factor authentication for administrator access even to internal systems should be mandatory.&lt;br /&gt;&lt;blockquote&gt;&quot;Then they went into the servers of interest, removed data and moved it to internal staging servers where the data was aggregated, compressed and encrypted for extraction.&lt;br /&gt;&lt;br /&gt;The attacker then used FTP to transfer many password protected RAR files from the RSA file server to an outside staging server at an external, compromised machine at a hosting provider.&quot;&lt;/blockquote&gt;&lt;br /&gt;&lt;b&gt;RSA really?&lt;/b&gt;&lt;br /&gt;Data Loss Prevention (DLP) - What about securing the data not the infrastructure? &lt;a href=&quot;http://www.rsa.com/node.aspx?id=3426&quot;&gt;Discover, educate, enforce and report&lt;/a&gt;? We know the information stolen was related to SecurID, surely this should have been indexed in your DLP tool and any outbound connection over the Internet blocked? Even if the files were encrypted and could not be read by a DLP tool, the ad-hoc transfer of a encrypted files from highly sensitive servers to internal staging servers and then external servers via FTP should have raised a flag in DLP to block and review.&lt;br /&gt;&lt;br /&gt;Encryption in storage - Why was the SecurID information not encrypted? Even if the malware was able to exploit a zero day to get to the servers storing this information, finding a clear text version should have been next to impossible. Decryption keys should have been stored on a Hardware Security Module (HSM).&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Lesson: &lt;/b&gt;It may be impossible to&amp;nbsp;truly&amp;nbsp;prevent malware getting to your endpoints in particular, so move your protections closer to what is really valuable by using tools like DLP and actually &lt;a href=&quot;http://www.rakkhis.com/2010/07/practical-lessons-learned-from.html&quot;&gt;implementing them correctly.&lt;/a&gt;&lt;br /&gt;Encryption should also be used to protect really sensitive data in storage.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;RSA really?&lt;/b&gt;&lt;br /&gt;Network segmentation - why can malware than infects an endpoint even reach the servers that hold information on SecurID? Don&#39;t tell me you had *shock* flat corporate network?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Lesson:&amp;nbsp;&lt;/b&gt;&lt;a href=&quot;http://www.opengroup.org/jericho/&quot;&gt;Jericho failed&lt;/a&gt; for a good reason, don&#39;t&amp;nbsp;believe&amp;nbsp;the hype,&amp;nbsp;firewalls&amp;nbsp;are still&amp;nbsp;useful&amp;nbsp;security tools and getting better all the time with&amp;nbsp;dynamic&amp;nbsp;rules, &lt;a href=&quot;http://www.rakkhis.com/2010/07/iphone-and-android-securely-in.html&quot;&gt;coordinated systems linked to a central point&lt;/a&gt; and application layer analysis. Using them to segment your most valuable assets is a good idea.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;RSA really?&lt;/b&gt;&lt;br /&gt;Thin client endpoints - Malware on desktops using zero days is clearly a risk especially with business critical software like Flash installed, so how about a purely thin client infrastructure? It saves money, can provide better performance and provides better sandboxing capability for endpoints.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Lesson:&lt;/b&gt;&amp;nbsp;Add improved security to your &lt;a href=&quot;http://www.rakkhis.com/2010/07/iphone-and-android-securely-in.html&quot;&gt;business case&lt;/a&gt; for thin or zero client endpoints that work anywhere&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Summary and conclusions:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I admire RSA for writing this type of post providing at least a little bit more information on the attack but I reject their premise that this type of attack requires a &quot;new&amp;nbsp;defense&amp;nbsp;doctrine&quot;. Good mitigations to this type of threat vector has existed for years and many organizations have them in place, clearly better than a premier security company.&lt;br /&gt;&lt;br /&gt;Summary on the lessons learned from RSA getting hacked:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Email as a malware distribution mechanism is not dead. Dig out those user awareness presentations and add some training on spear phishing and trusting the junk filter a bit more&lt;/li&gt;&lt;li&gt;Internet access is a luxury not a default right. Do not provide it if it is not required for a clear business benefit.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Consider white listing websites that need to be accessed based on the user role, being smart like rules that check referring URL to be Google can prevent the backlash and loss of productivity while significantly improving security&amp;nbsp;&lt;/li&gt;&lt;li&gt;Re-evaluate the business reason for software like Flash, Adobe reader, Office, browser extensions as part of the gold build for all desktops and laptops. Alternatives exist, users with a specific business reason can request it - cut your attack surface&lt;/li&gt;&lt;li&gt;Use IDS to detect and ideally IPS to prevent connections from endpoints to suspicious sites&lt;/li&gt;&lt;li&gt;Configure a desktop firewall and host based IDS to block any new outbound connections without approval&lt;/li&gt;&lt;li&gt;Monitor alerts from your IDS/IPS - have a team that is trained to react to these alerts with clear and&amp;nbsp;rehearsed&amp;nbsp;procedures&lt;/li&gt;&lt;li&gt;Implement two factor authentication for administrator access even to internal systems. Move away from permanent privileged access for critical systems and monitor for logins outside of approved changes and support tickets&lt;/li&gt;&lt;li&gt;Move your security controls closer to your most valuable data with tools, people and&amp;nbsp;processes&amp;nbsp;for DLP. Your monitoring strategy needs to consider encrypted files, either analysing a decrypted version or flagging any new encrypted transfers. Encrypting the data in storage to add further layer of protection even if is stolen is also a good idea&lt;/li&gt;&lt;li&gt;Network segmentation - create secure network zones even within your internal network for your crown jewels, control and monitor access to these&lt;/li&gt;&lt;li&gt;Think about thin or zero client endpoints&lt;/li&gt;&lt;/ul&gt;You may never reduce the risk of an &quot;APT&quot; to zero but you can&amp;nbsp;certainly&amp;nbsp;take a lot of measures to build defence in depth and mitigate the risks to an acceptable level without re-inventing the wheel. People maybe the weakest link but this hardly news and plenty can be done, perhaps some security companies should change to do as do rather than do as I say.&lt;br /&gt;&lt;br /&gt;Like this post? Get updates via &lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt; or follow me on Twitter &lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Share this, that&#39;s how ideas spread&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Photo credits:&amp;nbsp; &lt;a href=&quot;http://www.flickr.com/photos/rickh710/2877421629/sizes/s/in/photostream/&quot;&gt;rickh710&lt;/a&gt; Flikr&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/88431664730637857/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/04/rsa-apt-hack-blogger-tells-all.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/88431664730637857'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/88431664730637857'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/04/rsa-apt-hack-blogger-tells-all.html' title='RSA APT hack - blogger tells all'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-JtMjMMmJgQw/TZkCLoMfHkI/AAAAAAAAB8Y/wEizP7n4ZfI/s72-c/2877421629_63aaa5d8f5_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-8464962106800724322</id><published>2011-03-26T14:53:00.001+00:00</published><updated>2011-04-01T00:29:43.086+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Risk Management"/><title type='text'>Risk assessment: a glimpse of the future</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh4.googleusercontent.com/-zgUrOaWHaCo/TY35r1G3BnI/AAAAAAAAB74/EtFxEfFWhFM/s1600/3155662908_546dc6e3ef_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://lh4.googleusercontent.com/-zgUrOaWHaCo/TY35r1G3BnI/AAAAAAAAB74/EtFxEfFWhFM/s1600/3155662908_546dc6e3ef_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;I&amp;nbsp;believe&amp;nbsp;a great risk assessment gives you a glimpse of the future. It gives you more control, more certainty; trust is good, control is better. If you are like me and on occasion have a niggle in the back of your mind about the security of your company or a new project going live, a risk assessment is the way to get that peace of mind. If you like to be confident that you have thought through the all the issues and angles, this is an exercise you should do regularly. When you need to decide on anything security related and you need to know is this the right decision, you need to first answer the question of what is the risk? If you need to know am I getting &amp;nbsp;value from this security investment? This is why you need to do a risk assessment.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;A security risk assessment is a thought process. You need a tool that guides you through&amp;nbsp;assessing:&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Value&lt;/b&gt; - what is your most important information? You only need as much as security as you have value to protect&lt;/li&gt;&lt;li&gt;&lt;b&gt;Threats&lt;/b&gt; - is there anyone that has the incentives and ability to cause you a problem?&lt;/li&gt;&lt;li&gt;&lt;b&gt;Weaknesses&lt;/b&gt; - what are the weaknesses in your systems, your people and processes that could be exploited? How serious are these?&lt;/li&gt;&lt;li&gt;&lt;b&gt;Risk&lt;/b&gt; - based on all this what is your actual risk? What is the real exposure?&lt;/li&gt;&lt;li&gt;&lt;b&gt;Controls&lt;/b&gt; - how does everything you have spent on security so far help you reduce this risk? If you got rid of a control would it significantly increase the risk? Is it worth investing in new technology, people and process?&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This is why I created &lt;a href=&quot;http://www.simplesecurityra.com/&quot;&gt;Simple Security Risk Assessment&lt;/a&gt;&amp;nbsp;(SSRA). It is really easy to use and&amp;nbsp;intuitive. It is a structured mapping tool to help you make decisions about security. It will help you comply with PCI-DSS, HIPPA and other regulations that mandates performing a risk assessment. When you have a list of audit findings or penetration testing results, make sense of your priorities and your actual risks using SSRA. &lt;a href=&quot;http://www.simplesecurityra.com/main/main.action&quot;&gt;Try it out&lt;/a&gt;&amp;nbsp;now and &lt;a href=&quot;https://twitter.com/rakkhis&quot;&gt;let me know&lt;/a&gt; what you think.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Photo credit:&amp;nbsp;&lt;a href=&quot;http://www.flickr.com/photos/stuckincustoms/3155662908/sizes/s/in/photostream/&quot;&gt;Stuck in Customs&lt;/a&gt; Flikr&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Like this post? Get updates via&amp;nbsp;&lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt;&amp;nbsp;or follow me on Twitter&amp;nbsp;&lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;/div&gt;Share this, that&#39;s how ideas spread: &lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/8464962106800724322/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/risk-assessment-glimpse-of-future.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/8464962106800724322'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/8464962106800724322'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/risk-assessment-glimpse-of-future.html' title='Risk assessment: a glimpse of the future'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh4.googleusercontent.com/-zgUrOaWHaCo/TY35r1G3BnI/AAAAAAAAB74/EtFxEfFWhFM/s72-c/3155662908_546dc6e3ef_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-8136707923366135994</id><published>2011-03-26T02:25:00.003+00:00</published><updated>2011-04-01T00:33:34.452+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Disclosure"/><category scheme="http://www.blogger.com/atom/ns#" term="Incident"/><category scheme="http://www.blogger.com/atom/ns#" term="Legal"/><title type='text'>RSA and SCADA: two ends of the disclosure spectrum</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh5.googleusercontent.com/-n-OUQcDl2po/TY1D_m8x5PI/AAAAAAAAB7w/Ar4vWQd7nb8/s1600/480088730_830fee9783_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://lh5.googleusercontent.com/-n-OUQcDl2po/TY1D_m8x5PI/AAAAAAAAB7w/Ar4vWQd7nb8/s1600/480088730_830fee9783_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;In the last week we have seen what I feel is two ends of the disclosure spectrum for security. The RSA SecurID incident with such a &lt;a href=&quot;http://www.rsa.com/node.aspx?id=3872&quot;&gt;high level statement&lt;/a&gt; on one end (called &quot;corporate spin&quot; by &lt;a href=&quot;http://www.schneier.com/blog/archives/2011/03/rsa_security_in.html&quot;&gt;Schneier&lt;/a&gt;) and 34 vulnerabilities and proof of concept code on SCADA systems on the other;&amp;nbsp;&lt;a href=&quot;http://seclists.org/bugtraq/2011/Mar/187&quot;&gt;disclosed&lt;/a&gt; by a researcher without following responsible disclosure principles. Both are far from ideal and badly in need of improvement.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The RSA statement seemed like exactly the &lt;a href=&quot;http://eskenzi.wordpress.com/2011/03/21/rsa-hack-%E2%80%93-a-lesson-in-how-not-to-handle-a-pr-disaster/&quot;&gt;wrong way&lt;/a&gt; to disclose a security incident. It teased with morsels like &quot;information is specifically related to RSA’s SecurID two-factor authentication products&quot;, played buzzword bingo with &quot;the attack is in the category of an Advanced Persistent Threat (APT)&quot; and just confused with &quot;customers should increase security for social media applications&quot;. Their advice to worried customers read like a Jedi mind trick; use strong passwords, do not open unknown email&amp;nbsp;attachments, we were never &lt;strike&gt;here&lt;/strike&gt; hacked. For&amp;nbsp;Coviello’s credibility I hope it was some marketing or PR blunder that made this statement so devoid of useful facts.&lt;br /&gt;&lt;br /&gt;The problem with this type of minimal disclosure is that all pundits could do was&amp;nbsp;&lt;a href=&quot;http://newschoolsecurity.com/2011/03/what-does-coviellos-rsa-breach-letter-mean/&quot;&gt;speculate&lt;/a&gt;. There was some &lt;a href=&quot;http://steve.grc.com/2011/03/19/reverse-engineering-rsas-statement/&quot;&gt;good&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;http://www.hbarel.com/blog/?itemid=62&quot;&gt;analysis&lt;/a&gt; of the possible impacts but without real data on what was stolen, what vulnerabilities they exploited and whether the threat had now been fully&amp;nbsp;neutralized, it was all just blind guesses. So many outstanding questions: is SecurID now broken or can we rely on the fact that you need a pin, a serial number and the other factor; you know those pesky passwords we don&#39;t value so much anymore because we have a SecurID token... oh wait... In addition, with the obvious focus on SecurID, since it was mentioned in the press release, hardly anyone was considering everything else that RSA holds e.g. emails as HBGary found out can occasionally have some valuable information, the RSA &lt;a href=&quot;http://www.rsa.com/node.aspx?id=2754&quot;&gt;portfolio&lt;/a&gt; includes DLP software, SIEM software, GRC, Identity Management and even a Fraud center which is provided as a SAAS and no doubt many banks use RSA datacenters for storing some&amp;nbsp;interesting&amp;nbsp;data. Oh yeah and apparently &lt;a href=&quot;http://www.rsa.com/innovation/docs/11313_APT_BRF_0211.pdf&quot;&gt;Envision is really good at&amp;nbsp;mitigating APT&#39;s&lt;/a&gt;&amp;nbsp;[PDF]&amp;nbsp;if we only we had such a tool....&lt;br /&gt;&lt;br /&gt;The extent and nature of the information stolen and how the breech&amp;nbsp;occurred&amp;nbsp;has many different implications for different companies and individuals. No doubt RSA is working with large companies,&amp;nbsp;especially&amp;nbsp;large banks that have rolled out hard token&#39;s to millions of customers around the world, but what about everyone else? A small company or individual has no way of performing a &lt;a href=&quot;http://www.simplesecurityra.com/&quot;&gt;risk assessment&lt;/a&gt; and RSA has not provided anything of use beyond general security good practices. &lt;a href=&quot;http://www.schneier.com/essay-146.html&quot;&gt;Schneier&lt;/a&gt; in 2007: &quot;Secrecy prevents people from accurately assessing their own risk. Secrecy precludes public debate about security, and inhibits security education that leads to improvements. Secrecy doesn&#39;t improve security; it stifles it&quot;.&lt;br /&gt;&lt;br /&gt;On the other hand what&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;Luigi Auriemma did with the SCADA vulnerabilities is also irresponsible. While these systems are typically not connected to the Internet the world learnt of SCADA through Stuxnet. SCADA systems control some of the most critical national infrastructure around the world. Disclosing security vulnerabilities without providing any chance for the&amp;nbsp;manufacturers&amp;nbsp;to release patches and organizations to install them is&amp;nbsp;disappointing&amp;nbsp;for a skilled and professional researcher.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;In the impact analysis that followed, I really do not understand statements like this:&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&quot;systems deployed are not directly connected to the Internet, Løppenthien said. Those that are connected are usually protected by a firewall, which the hacker would have to bypass first&quot; and&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&quot;In my opinion there is absolutely no risk because these systems are not made to be reached via the internet&quot; both statements in a&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.computerworld.com.au/article/380781/scada_vulnerabilities_prompt_us_government_warning/&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;Computerworld article&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;. I consider a system connected to the Internet &lt;/span&gt;&lt;b style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;IF&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt; it can be reached via an Internet facing firewall, how long have we been&amp;nbsp;preaching&amp;nbsp;about application layer threats and the&amp;nbsp;ubiquitous&amp;nbsp;port 80 and 443? I really hope that&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;Løppenthien meant these systems are behind multiple internal firewalls or better air-gapped networks with no systems that connect to the outside world (a nigh on impossible task these days). Also&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;absolutely&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&amp;nbsp;no risk? Stuxnet highlighted that attack does not need to be via the Interent, USB devices carried in by trusted employees with access work just fine.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;Also consider the nature of the findings: remotely exploitable vulnerabilities that allow &lt;/span&gt;&lt;a href=&quot;http://aluigi.org/adv/factorylink_2-adv.txt&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;arbitary file transfer&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&amp;nbsp;and&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://aluigi.org/adv/genesis_3-adv.txt&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;memory and buffer overflows&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;. These are potentially high impact. SCADA is not Windows but I would not be&amp;nbsp;surprised&amp;nbsp;to see a Critical or Important rating assigned from Microsoft and a CVE rating of 8 or higher for types of vulnerabilities. There are some good arguments for both full disclosure&amp;nbsp;immediately&amp;nbsp;and&amp;nbsp;responsible&amp;nbsp;disclosure on the &lt;/span&gt;&lt;a href=&quot;http://www.securityfocus.com/archive/1/517130/30/0/threaded&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;Bugtraq&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt; thread, ultimately though this debate has already&amp;nbsp;occurred&amp;nbsp;and &lt;a href=&quot;http://en.wikipedia.org/wiki/Responsible_disclosure&quot;&gt;responsible disclosure won&lt;/a&gt;. This does not mean avoid full disclosure forever but provide a period for the vendor to release patches and risk aware customers to apply them.&amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;a href=&quot;http://www.schneier.com/essay-146.html&quot;&gt;Schneier&lt;/a&gt;: &quot;the threat of publishing the vulnerability is almost as good as actually publishing it&quot;.&lt;br /&gt;&lt;br /&gt;Both these incidents highlighted to me that a middle ground is required. Vulnerability researchers have an obligation to follow responsible disclosure if they want a collaborative and profitable partnership with companies and companies need full and timely disclosure if want our trust.&amp;nbsp;Especially&amp;nbsp;a security company more than most; it is human nature to respect those that walk the talk. Do not just release some marking about how Envision mitigate against APT&#39;s; prove it. I hope one day there is an international&amp;nbsp;regulation or binding industry standard for the disclosure of security&amp;nbsp;vulnerabilities&amp;nbsp;and incidents. It has worked well for the financial services industry that has excellent reporting and central databases for things such as credit card fraud. While service such as the &lt;a href=&quot;https://verisframework.wiki.zoho.com/Introduction-Overview-1.html&quot;&gt;Veris framework&lt;/a&gt; and ironically RSA &lt;a href=&quot;http://www.rsa.com/node.aspx?id=3071&quot;&gt;e-Fraud network&lt;/a&gt;&amp;nbsp;have made a start, we really need regulation to fix this&amp;nbsp;externality&amp;nbsp;and a set clear&amp;nbsp;standards&amp;nbsp;for what security&amp;nbsp;vulnerabilities&amp;nbsp;and incidents need to be reported, the level of detail required to protect the public and in what timeframes to allow reasonable notice but not the ostrich effect. Data loss reporting has made a start on this in many countries but broader security&amp;nbsp;disclosure&amp;nbsp;clearly needs a G20 level&amp;nbsp;agreement&amp;nbsp;and mandate.&amp;nbsp;&lt;a href=&quot;http://www.schneier.com/essay-146.html&quot;&gt;Schneier&lt;/a&gt;:&amp;nbsp;&quot;Vulnerabilities [and incidents] are largely an externality&quot; and&amp;nbsp;governments&lt;a href=&quot;http://rakkhi.blogspot.com/2010/07/security-return-on-investment-roi.html&quot;&gt;&amp;nbsp;exist mainly to correct externalities&lt;/a&gt;, its past time they got on with it.&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;Photo credit:&amp;nbsp;&lt;a href=&quot;http://www.flickr.com/photos/karjamdus/480088730/sizes/s/in/photostream/&quot;&gt;Krsoci&lt;/a&gt; Flikr&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Like this post? Get updates via&amp;nbsp;&lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt;&amp;nbsp;or follow me on Twitter&amp;nbsp;&lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Share this, that&#39;s how ideas spread:&amp;nbsp;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/8136707923366135994/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/rsa-and-scada-two-ends-of-disclosure.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/8136707923366135994'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/8136707923366135994'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/rsa-and-scada-two-ends-of-disclosure.html' title='RSA and SCADA: two ends of the disclosure spectrum'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh5.googleusercontent.com/-n-OUQcDl2po/TY1D_m8x5PI/AAAAAAAAB7w/Ar4vWQd7nb8/s72-c/480088730_830fee9783_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-5558193956901402445</id><published>2011-03-25T13:03:00.004+00:00</published><updated>2011-04-03T19:07:51.976+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Social media"/><title type='text'>Feeding an offline reading habit</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh4.googleusercontent.com/-XNvE6eL8T2E/TYyLGDfL4kI/AAAAAAAAB7s/uptPYcrUxns/s1600/4052161755_a5ba7e6651_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://lh4.googleusercontent.com/-XNvE6eL8T2E/TYyLGDfL4kI/AAAAAAAAB7s/uptPYcrUxns/s1600/4052161755_a5ba7e6651_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Ever since I got an iPhone 4 with the retina display I have been hooked on keeping up with my favourite tech and security blogs on the move. Yes I’m one of those annoying zombies you see reading on their phone while walking, standing in line, on the train etc. It has enabled me to make better use of this time and keep entertained. However one of the major problems &amp;nbsp;is that I live in London and most of my reading is done on the one hour commute to and from work on the tube (underground subway). The tube has no Internet access so I have had to find some offline ways to feed my habit.&amp;nbsp;These are some of the best ways I have found to read and share what I like:&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://itunes.apple.com/us/app/reeder/id325502379?mt=8#&quot;&gt;Reeder&lt;/a&gt;&lt;/b&gt; – a lot of people say RSS is dead and most outside tech circles do not even know what it is. But for offline reading it is absolutely brilliant. This is the most used app on my iPhone, just sync it to a Google reader account, add your favourite RSS feeds and it is good to go. It has great sharing options (more on that later) and has recently added Readability get those articles which only give you a partial post via RSS (online capability unfortunately). &amp;nbsp;It also has a copy link button which is great for…&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://itunes.apple.com/us/app/instapaper/id288545208?mt=8#&quot;&gt;Instapaper&lt;/a&gt;&lt;/b&gt; – the second most used app on my phone .You can copy a link to a long article from Reader, switch to Instapaper and it will pop us with a notification to add that to your reading list. Instapaper is awesome and has also had an upgrade recently which adds more sharing options, a way to see what articles your friends have liked and editor curated feeds like Techmeme [edit:&amp;nbsp;unfortunately&amp;nbsp;RSS feeds to folders were removed in v3.0 apparently no one was using them, a very sad event for us offline readers]. I have heard that Readability is also good but with Instapaper I have had no need for anything else&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://tweetymail.com/&quot;&gt;Tweetymail&lt;/a&gt;&lt;/b&gt; – again bucking the trend that email is dead. Email is great because it allows caching of messages. With Reader and Instapaper you have the option to mail link, setup Tweetymail with your Twitter account and you can tweet your message and the link via email. These can simply queue up when you are offline and automatically send, much better than the drafts in the Twitter app which you have to remember to post. Tweetymail will also alert you on @mentions via email, so if the iPhone notification system annoys you it is a great alternative.&amp;nbsp;You can also get your timeline with filters, and of course any links can be added to Instapaper for later reading.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://thefriendmail.com/&quot;&gt;Friendmail&lt;/a&gt;&lt;/b&gt; – a new addition from the makers of Tweetymail for Facebook. Gives you a twice daily Facebook news feed, allows you to post status updates, comments and even likes. All done via email offline and posted when you have an offline connection&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Email PDF’s and IBooks&lt;/b&gt; – PDF’s and PDF links can be emailed to yourself and then opened in iBooks. Until Instapaper adds PDF support this is a good way, if a little cumbersome to read documents people annoyingly insist on publishing only via PDF&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://hnrecap.com/&quot;&gt;HNRecap&lt;/a&gt;&lt;/b&gt; – good site that sorts the best hacker news stories of the day with a handy button for adding to Instapaper.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://itunes.apple.com/us/app/posterous/id394252521?mt=8#&quot;&gt;Posturous&lt;/a&gt; and &lt;a href=&quot;http://itunes.apple.com/us/app/tumblr/id305343404?mt=8#&quot;&gt;Tumblr&lt;/a&gt; apps&lt;/b&gt; – Both of these have a much better interface than the Blogger app unfortunately for now. Make it very easy to post pictures and blogs. Posturous in particular is great as it allows you to write a blog post via email without even needing the app.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Push email&lt;/b&gt; - a lot of what I talked about above needs push email that is automatically downloaded to your phone. Setup your email to use IMAP, instructions for Gmail &lt;a href=&quot;http://www.google.co.uk/url?sa=t&amp;amp;source=web&amp;amp;cd=2&amp;amp;ved=0CCQQFjAB&amp;amp;url=http%3A%2F%2Fmail.google.com%2Fsupport%2Fbin%2Fanswer.py%3Fanswer%3D77695&amp;amp;ei=hoyMTZH2OYy4hAevrNWoCw&amp;amp;usg=AFQjCNGEAW6NviSLYwg0m0oSGYxFQNODHQ&amp;amp;sig2=sMpKS08H_a4ay_avrEUjvw&quot;&gt;here&lt;/a&gt; and then set on your iPhone: Settings &amp;gt; Mail, Calender, Contacts &amp;gt; Fetch New Data - Push and I use every 15 minutes. I have found IMAP a lot better than Exchange for accurate and timely sync.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;b&gt;[Edit] &lt;a href=&quot;http://pipes.yahoo.com/pipes/&quot;&gt;Yahoo pipes&lt;/a&gt; and &lt;a href=&quot;http://www.wizardrss.com/&quot;&gt;WizardRSS&lt;/a&gt;&lt;/b&gt; - After the&amp;nbsp;disappointment&amp;nbsp;of Instapaper removing the full text RSS to folder, I found WizardRSS. This is service based on &lt;a href=&quot;http://pipes.yahoo.com/pipes/&quot;&gt;Yahoo pipes&lt;/a&gt; lets you get the full text of any RSS feed. I was very happy to find it worked well for &lt;a href=&quot;http://www.wizardrss.com/feed/news.ycombinator.com/rss&quot;&gt;Hacker news&lt;/a&gt;. You can do some amazing things with Yahoo pipes, for example an &lt;a href=&quot;http://pipes.yahoo.com/pipes/pipe.run?_id=bb3582b4c9e68a825da0d903d537d870&amp;amp;_render=rss&quot;&gt;Engadget feed&lt;/a&gt; I built that is ranked by Postrank. Great set of slides showing you the power of Yahoo pipes and getting more out of RSS for your busy day and offline reading below.&lt;br /&gt;&lt;br /&gt;I have created the following pipes which you are welcome to use, you can just add the links directly into Reader to get the RSS feed. The Postrank numbers work for me, feel free to clone the pipe and adjust the number:&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://pipes.yahoo.com/engadgetpr/techblogsrsspr10&quot;&gt;Popular tech blogs&lt;/a&gt; - Techcrunch, Readswriteweb, Mashable, Techmeme etc with a Postrank above 8.0&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://pipes.yahoo.com/engadgetpr/hackernewsfullcopyprabove7&quot;&gt;Hacker news&lt;/a&gt; - full copy of Hackernews articles with Postrank above 8.0&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://pipes.yahoo.com/engadgetpr/securitybloggersprabove7&quot;&gt;Security bloggers network&lt;/a&gt; - filtered for articles with Postrank above 7.0&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://pipes.yahoo.com/engadgetpr/dailynewspr10&quot;&gt;Daily news&lt;/a&gt; - with Postrank of above 10.0, because I feel like I live in a geek bubble&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;If you create any cool pipes, please leave the link in comments.&lt;/div&gt;&lt;br /&gt;&lt;div id=&quot;__ss_7269594&quot; style=&quot;width: 595px;&quot;&gt;&lt;strong style=&quot;display: block; margin: 12px 0 4px;&quot;&gt;&lt;a href=&quot;http://www.slideshare.net/geekygirldawn/sxsw-hacking-rss-filtering-processing-obscene-amounts-of-information&quot; title=&quot;SXSW Hacking RSS: Filtering &amp;amp; Processing Obscene Amounts of Information&quot;&gt;SXSW Hacking RSS: Filtering &amp;amp; Processing Obscene Amounts of Information&lt;/a&gt;&lt;/strong&gt; &lt;object height=&quot;497&quot; id=&quot;__sse7269594&quot; width=&quot;595&quot;&gt; &lt;param name=&quot;movie&quot; value=&quot;http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=sxswhackingrss2011-110315070538-phpapp01&amp;stripped_title=sxsw-hacking-rss-filtering-processing-obscene-amounts-of-information&amp;userName=geekygirldawn&quot; /&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;/&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;/&gt;&lt;embed name=&quot;__sse7269594&quot; src=&quot;http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=sxswhackingrss2011-110315070538-phpapp01&amp;stripped_title=sxsw-hacking-rss-filtering-processing-obscene-amounts-of-information&amp;userName=geekygirldawn&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;595&quot; height=&quot;497&quot;&gt;&lt;/embed&gt; &lt;/object&gt; &lt;br /&gt;&lt;div style=&quot;padding: 5px 0 12px;&quot;&gt;View more &lt;a href=&quot;http://www.slideshare.net/&quot;&gt;presentations&lt;/a&gt; from &lt;a href=&quot;http://www.slideshare.net/geekygirldawn&quot;&gt;Dawn Foster&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Would love to know any other tips, message me &lt;a href=&quot;http://twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt; or leave a comment.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;My curated lists:&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.instapaper.com/starred/rss/759758/04YH35R06nBhQGYlWozC7x63U5Y&quot;&gt;Liked on Instapaper RSS feed&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.google.com/reader/public/atom/user%2F00560647208152517952%2Fstate%2Fcom.google%2Fstarred&quot;&gt;Stared on Google reader&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;Photo credit: &lt;a href=&quot;http://www.flickr.com/photos/aramisfirefly/4052161755/sizes/s/in/photostream/&quot;&gt;Matthew Stuart&lt;/a&gt; Flikr&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;Like this post? Get updates via&amp;nbsp;&lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt;&amp;nbsp;or follow me on Twitter&amp;nbsp;&lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Share this, that&#39;s how ideas spread:&amp;nbsp;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/5558193956901402445/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/feeding-offline-reading-habit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5558193956901402445'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5558193956901402445'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/feeding-offline-reading-habit.html' title='Feeding an offline reading habit'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh4.googleusercontent.com/-XNvE6eL8T2E/TYyLGDfL4kI/AAAAAAAAB7s/uptPYcrUxns/s72-c/4052161755_a5ba7e6651_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-6483021660344831187</id><published>2011-03-14T00:00:00.002+00:00</published><updated>2011-04-01T00:37:59.482+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Secure Development"/><category scheme="http://www.blogger.com/atom/ns#" term="Security norms"/><title type='text'>Mitigating OWASP top 10 without any code</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh5.googleusercontent.com/--98XHQ681yU/TX1aTkEBA0I/AAAAAAAAA20/kL_ZgSevmo0/s1600/2078076913_74ab13ddb4_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://lh5.googleusercontent.com/--98XHQ681yU/TX1aTkEBA0I/AAAAAAAAA20/kL_ZgSevmo0/s200/2078076913_74ab13ddb4_m.jpg&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/div&gt;We have been taught in the last 10 years that application security is what is important, that software must be coded securely and that infrastructure was becoming less and less&amp;nbsp;relevant. So why is it then that when I am writing a security view for a recent project, the majority of my web&amp;nbsp;application&amp;nbsp;security threats are mitigated via the infrastructure?&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The OWASP top 10 has become a bible for web application security and the &lt;a href=&quot;http://msdn.microsoft.com/en-us/library/ff649461.aspx&quot;&gt;Microsoft security frame&lt;/a&gt; a very useful checklist. How about if you could defend against all the OWASP top 10 and implement all the controls in the security frame without touching one line of code? That is what we got close to on this project:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border: outset #ECE5B6 1.0pt; mso-cellspacing: 0cm; mso-padding-alt: 0cm 0cm 0cm 0cm; mso-yfti-tbllook: 1184;&quot;&gt;&lt;tbody&gt;&lt;tr style=&quot;mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;&lt;b&gt;MS Security Frame Control&lt;/b&gt;&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;&lt;b&gt;OWASP Top 10 threat mitigated&lt;/b&gt;&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;&lt;b&gt;Infrastructure control&lt;/b&gt;&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 1;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Input validation&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;A1 - Injection&lt;br /&gt;&lt;br /&gt;A2 - Cross site scripting&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;A BIG-IP F5 with a web application firewall and   layer 7 IPS modules deployed in front of the presentation servers. As a web   application with less than 20 forms and 50 input fields it was simple to   write whitelist validation rules for all input. The input was generally   alphanumeric only and/or could be tightly validated with a regex. Where input   is used in output the WAF provides escaping.&lt;br /&gt;&lt;br /&gt;A further protocol analysis firewall between the   application and database servers validated that no SQL or OS commands   were passed even though&amp;nbsp; &amp;nbsp;paramaterised queries are being used,   adding&amp;nbsp;defence&amp;nbsp;in depth.&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 2;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Authentication&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;A3 - Broken authentication and session management&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;All requests to the web application are   intercepted by Siteminder as the web application manager (WAM). Site minder   provides an authentication screen and validates credentials against an LDAP.   Siteminder also calls on the RSA server to provide a step up two   factor&amp;nbsp;authentication&amp;nbsp;and can be used to include federated single   sign-on in future.&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 3;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Authorization&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;A4 - Direct object references&lt;br /&gt;&lt;br /&gt;A8 - Failure to restrict URL access&lt;br /&gt;&lt;br /&gt;A10 -&amp;nbsp;Un-validated&amp;nbsp;redirects and   forwards&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Siteminder checks the users LDAP group,   determines the users role and ID and injects this into every http header as   an encrypted and signed token. The application can then use this to determine   the functions and information that should be available to the user (note code   is required here but the Java Spring framework built-in operator)&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 4;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Configuration&amp;nbsp; &amp;nbsp;management&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;A6 - Security misconfiguration&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Secured through authentication   and&amp;nbsp;authorization&amp;nbsp;detailed above&lt;br /&gt;&lt;br /&gt;Hardened builds are used for all infrastructure   and Tripwire is used to monitor file integrity and   key&amp;nbsp;configuration&amp;nbsp;settings. nCircle is used to scan for   vulnerabilities and a patching process exists.&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 5;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Protecting sensitive data&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;A7 - Insecure cryptographic storage&lt;br /&gt;&lt;br /&gt;A9 - Insufficient transport layer protection&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;The F5 also establishes the TLS connection and   provides SSL offload capability to improve performance. Sensitive data fields   are encrypted using the DB2 database encryption. Keys are stored in hardware   security module attached to the database server.&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 6;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Session management&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;A3 - Broken authentication and session management&lt;br /&gt;&lt;br /&gt;A5 - Cross site request forgery&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;WebSphere&amp;nbsp;application&amp;nbsp;manager manages   the session and inserts form tokens to prevent CSRF&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 7;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Cryptography&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;A7 - Insecure cryptographic storage&lt;br /&gt;&lt;br /&gt;A9 - Insufficient transport layer protection&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;No custom cryptography is used as it is all   performed by the infrastructure. RSA2048, AES256, SHA256 algorithms and key   lengths are used. The passwords stored in the LDAP are hashed and salted.&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 8;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Exception management&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;The F5 web application firewall ensures that only   a white list of exception data can be output. Stack traces, SQL, credit card   numbers etc are not allowed to be output.&lt;/td&gt;  &lt;/tr&gt;&lt;tr style=&quot;mso-yfti-irow: 9; mso-yfti-lastrow: yes;&quot;&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Auditing and logging&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;&lt;/td&gt;   &lt;td style=&quot;border: inset #ECE5B6 1.0pt; padding: 1.5pt 1.5pt 1.5pt 1.5pt;&quot; valign=&quot;top&quot;&gt;Logging is performed in the web application   firewall, Siteminder and&amp;nbsp;Apache. All logs are&amp;nbsp;exported&amp;nbsp;to a   central Splunk repository where alerts and correlations are defined for   monitoring&lt;/td&gt;  &lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;All the key controls are implemented in the infrastructure. Developers can be left to coding the functionality and improving performance. The security controls can also be implemented at a &lt;a href=&quot;http://rakkhi.blogspot.com/2011/01/early-security-engagement-critical-or.html&quot;&gt;company level&lt;/a&gt;, with minimal security involvement required per project.&amp;nbsp;&amp;nbsp;Is it just that when all you have is a hammer, everything looks like a nail or is this&amp;nbsp;truly&amp;nbsp;a better approach?&lt;br /&gt;&lt;br /&gt;Photo credit:&amp;nbsp;&lt;a href=&quot;http://www.flickr.com/photos/marcelgermain/2078076913/sizes/s/in/photostream/&quot;&gt;MarcelGermain&lt;/a&gt; Flikr&lt;br /&gt;&lt;br /&gt;Like this post? Get updates via&amp;nbsp;&lt;a href=&quot;http://feeds.feedburner.com/RSSC&quot;&gt;RSS&lt;/a&gt;&amp;nbsp;or follow me on Twitter&amp;nbsp;&lt;a href=&quot;http://www.twitter.com/rakkhis&quot;&gt;@rakkhis&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Share this, that&#39;s how ideas spread:&amp;nbsp;&lt;a class=&quot;twitter-share-button&quot; data-count=&quot;none&quot; data-via=&quot;rakkhis&quot; href=&quot;http://twitter.com/share&quot;&gt;Tweet&lt;/a&gt;&lt;script src=&quot;http://platform.twitter.com/widgets.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/6483021660344831187/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/mitigating-owasp-top-10-without-any.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/6483021660344831187'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/6483021660344831187'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/mitigating-owasp-top-10-without-any.html' title='Mitigating OWASP top 10 without any code'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh5.googleusercontent.com/--98XHQ681yU/TX1aTkEBA0I/AAAAAAAAA20/kL_ZgSevmo0/s72-c/2078076913_74ab13ddb4_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-2387932495786693909</id><published>2011-03-13T21:42:00.006+00:00</published><updated>2011-06-28T19:06:48.828+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Social media"/><title type='text'>Google+ - many ways to do identity?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;b&gt;Update 2011/06/28&lt;/b&gt; :&lt;br /&gt;&lt;br /&gt;Looks like Google+ finally launched if only to a select group of invites: &lt;a href=&quot;http://techcrunch.com/2011/06/28/google-plus/&quot;&gt;http://techcrunch.com/2011/06/28/google-plus/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Analysis of security identity implications of circles as more information comes out. Having it baked in should make a lot of difference. Lessons look learned with Instagram type filters for photo sharing and a mobile application built from the start. &lt;br /&gt;&lt;br /&gt;Lets just hope it doesn&#39;t take a Wave time timeframe to launch to everyone.&lt;br /&gt;&lt;br /&gt;--------&lt;br /&gt;Exciting news today with Google circles to be &lt;a href=&quot;http://www.readwriteweb.com/archives/google_to_launch_major_new_social_network_called_c.php&quot;&gt;announced&lt;/a&gt;&amp;nbsp;at SXSW and then&amp;nbsp;disappointingly&amp;nbsp;&lt;a href=&quot;http://networkeffect.allthingsd.com/20110313/new-google-circles-would-have-more-nuanced-sharing-but-google-says-no-launch-imminent/&quot;&gt;not&lt;/a&gt;. Lets hope that Google can learn the &lt;a href=&quot;http://mashable.com/2010/08/06/google-wave-lessons/&quot;&gt;lessons of Wave&lt;/a&gt;&amp;nbsp;about not stretching the hype for too long before the launch and not screwing up privacy. Lets also hope they can deliver something that is&amp;nbsp;truly&amp;nbsp;engaging and delivers the vision of law 5 in the laws of identity where others have &lt;a href=&quot;http://rakkhi.blogspot.com/2011/01/obama-cyber-id-bad-idea.html&quot;&gt;failed&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;&lt;b&gt;&lt;a href=&quot;http://www.identityblog.com/?p=286&quot;&gt;5. Pluralism of Operators and Technologies&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;A universal identity system must channel and enable the inter-working of multiple identity technologies run by multiple identity providers&lt;/blockquote&gt;Facebook groups has &lt;a href=&quot;http://www.quora.com/Facebook-Groups/Why-will-Facebook-Groups-fail&quot;&gt;yet to solve this problem&lt;/a&gt;&amp;nbsp;and&amp;nbsp;Zuckerberg&#39;s quote &quot;Having two identities for yourself is an example of a lack of integrity” may suggest they &lt;a href=&quot;http://www.zephoria.org/thoughts/archives/2010/05/14/facebook-and-radical-transparency-a-rant.html&quot;&gt;will never get it&lt;/a&gt; and don&#39;t see that as a problem.&lt;br /&gt;&lt;br /&gt;More analysis as details on Google Circles is released. Until then, this deck outlining what is possible the vision behind Google circles is well worth reading:&lt;br /&gt;&lt;br /&gt;The videos are well done:&lt;br /&gt;http://www.google.com/intl/en_uk/+/learnmore/forum/&lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;560&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/xwnJ5Bl4kLI&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;560&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/BeMZP-oyOII&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;560&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/MRkAdTflltc&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;560&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/Tku1vJeuzH4&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;560&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/6y_xKVSRAy8&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;560&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/iA22daAstNg&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/0DoAl4JXhQo&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;560&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/ocPeAdpe_A8&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;560&quot; height=&quot;349&quot; src=&quot;http://www.youtube.com/embed/QN38vHZjWXw&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;div id=&quot;__ss_4656436&quot; style=&quot;width: 477px;&quot;&gt;&lt;b style=&quot;display: block; margin: 12px 0 4px;&quot;&gt;&lt;a href=&quot;http://www.slideshare.net/padday/the-real-life-social-network-v2&quot; title=&quot;The Real Life Social Network v2&quot;&gt;The Real Life Social Network v2&lt;/a&gt;&lt;/b&gt; &lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;object height=&quot;510&quot; id=&quot;__sse4656436&quot; width=&quot;477&quot;&gt; &lt;param name=&quot;movie&quot; value=&quot;http://static.slidesharecdn.com/swf/doc_player.swf?doc=vtm2010-100701010846-phpapp01&amp;stripped_title=the-real-life-social-network-v2&amp;userName=padday&quot; /&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;/&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;/&gt;&lt;embed name=&quot;__sse4656436&quot; src=&quot;http://static.slidesharecdn.com/swf/doc_player.swf?doc=vtm2010-100701010846-phpapp01&amp;stripped_title=the-real-life-social-network-v2&amp;userName=padday&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;477&quot; height=&quot;510&quot;&gt;&lt;/embed&gt; &lt;/object&gt;&amp;nbsp;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;padding: 5px 0 12px;&quot;&gt;View more &lt;a href=&quot;http://www.slideshare.net/&quot;&gt;documents&lt;/a&gt; from &lt;a href=&quot;http://www.slideshare.net/padday&quot;&gt;Paul Adams&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/2387932495786693909/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/google-circles-many-ways-to-do-identity.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/2387932495786693909'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/2387932495786693909'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/google-circles-many-ways-to-do-identity.html' title='Google+ - many ways to do identity?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/xwnJ5Bl4kLI/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-7707522445260396772</id><published>2011-03-13T01:35:00.004+00:00</published><updated>2011-04-17T17:34:15.919+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DDOS"/><title type='text'>DDOS protection strategies</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh4.googleusercontent.com/-O1AFm-D6Y9w/TXwZSh81ebI/AAAAAAAAAwo/NmRcEV-7ws8/s1600/5405357868_c3527b1e27_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://lh4.googleusercontent.com/-O1AFm-D6Y9w/TXwZSh81ebI/AAAAAAAAAwo/NmRcEV-7ws8/s1600/5405357868_c3527b1e27_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Distributed Denial of Service (DDOS) has drawn attention &lt;a href=&quot;http://blekko.com/ws/ddos+/techblogs+/date&quot;&gt;lately&lt;/a&gt;&amp;nbsp;with incidents ranging from&amp;nbsp;Anonymous&amp;nbsp;&lt;a href=&quot;http://www.readwriteweb.com/archives/ddos_attacks_take_down_mastercard_and_visa_website.php&quot;&gt;taking down&lt;/a&gt; the Visa and Mastercard sites as retribution for cutting donations to Wikileaks, to Wordpress being &lt;a href=&quot;http://techcrunch.com/2011/03/04/wordpress/&quot;&gt;attacked&lt;/a&gt; by the Chinese. A talk at the &lt;a href=&quot;http://dc4420.org/&quot;&gt;DC4420&lt;/a&gt; meetup in London described DDOS as the modern political protest, comparable to a crowd protesting on Oxford street. The protest means that some people cannot go shopping, and there is media attention drawn to the cause; Paypal goes down for a few hours, the techblogs, Twitter and eventually old media play a similar role. In addition, the few million the site loses to downtime means that they may think twice about bowing to&amp;nbsp;pressure so quickly from a US&amp;nbsp;senator. Regardless of motives, if you operate a major website today, especially one where every minute of downtime has an impact to the bottom line, DDOS protection&amp;nbsp;is something you have to think about.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The most important thing to remember is that no DDOS protection strategy will be 100% effective. If the attackers can throw &lt;a href=&quot;http://www.securityweek.com/ddos-attacks-exceed-100-gbps-attack-surface-continues-expand&quot;&gt;100gbps&lt;/a&gt;&amp;nbsp;at you for long enough then you will eventually go down. For most sites paying for that kind of redundant capacity is just not economical. But it&#39;s not just brute force, mitigating resource exhaustion is also an important consideration. Throwing a massive amount of network traffic from all around the world will eventually work but it is expensive and/or hard to coordinate. If an attack can simply exhaust the CPU, memory, file descriptors or target services such as DNS, they still achieve their goal.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;In designing a DDOS protection strategy for a recent project my objectives were:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Run faster than the guy running from the bear e.g. Paypal did not go down in the Wikileaks fallout&lt;/li&gt;&lt;li&gt;Survive a sustained attack - at least for 24 hours and if possible a week. If a botnet is being hired then &amp;nbsp;the longer it needs operate and&amp;nbsp;the larger it needs to be, &amp;nbsp;the more money it is costing the attacker. Even for crowd sourced botnets like the low orbit cannon, timing is critical. A political statement is only powerful if you can announce your message and then deliver while the fickle newscycle is paying attention&lt;/li&gt;&lt;li&gt;The cost for DDOS protection should be less than the downtime. The total cost of protection options can be annualized and then calculated as a cost per hour or minute. The cost of downtime is&amp;nbsp;usually&amp;nbsp;calculated as part of of DR or&amp;nbsp;availability&amp;nbsp;SLA&#39;s and even if you cannot get exact costs you should be able to make range estimates. If there is no downtime cost then there is no need to have DDOS protection. For example the Visa and Mastercard sites going down, they do not process any payments through those site so who cares? If Paypal or Amazon went down on the other hand.....Assuming there is a downtime cost your goal is something like this:&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh5.googleusercontent.com/-Rwb6pKdonAQ/TXuuuFH90vI/AAAAAAAAAwg/X5HFStdl5Ds/s1600/ddos+protection.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;243&quot; src=&quot;https://lh5.googleusercontent.com/-Rwb6pKdonAQ/TXuuuFH90vI/AAAAAAAAAwg/X5HFStdl5Ds/s400/ddos+protection.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;With a focus also on simplicity and defence in depth, here was my protection strategy:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;DDOS filtering service&lt;/b&gt; - provided by the ISP or a specialist firm such as &lt;a href=&quot;http://www.prolexic.com/&quot;&gt;Prolexic&lt;/a&gt;, &lt;a href=&quot;http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/ddos/index.xhtml&quot;&gt;Verisign&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.dosarrest.com/&quot;&gt;Dosarrest&lt;/a&gt;&amp;nbsp;etc.&amp;nbsp;An ISP is the most simple and most large ISP&#39;s will offer this service. Specialist services will require DNS redirection or GRE tunnel for BGP route advertisement. The service should include detection and rapid response. When a DDOS attack is detected they should have a network to filter the DDOS traffic before it gets to your network. A g&lt;a href=&quot;http://news.ycombinator.com/item?id=1986728&quot;&gt;ood post&lt;/a&gt; on Hacker news also backs this as the number one strategy and recommends installing the tools to be able to describe to the protection service with&amp;nbsp;precise&amp;nbsp;and useful data on why you think you maybe under DDOS attack if they have not detected it and not just help I&#39;m under a DDOS attack&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Capacity to not to fail&amp;nbsp;immediately&lt;/b&gt;&amp;nbsp;- border routers, firewalls, IPS, web application firewalls need sufficient capacity to not be immediately&amp;nbsp;overwhelmed. These are not so much for DDOS protection but as they are between the attacker and your servers, their capacity needs to be a consideration. My line in the sand was 5gpbs and 10 million packets per second (pps)&amp;nbsp;for all in-line network kit for March 2011 considering the cost benefit equation above&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;DOS protection features in network&amp;nbsp;appliances&lt;/b&gt;&amp;nbsp;- virtually all modern firewalls and IPS have some DOS protection features. A web application firewall can also perform some layer 7 defence and specialist appliances such as &lt;a href=&quot;http://www.cisco.com/en/US/products/ps5888/index.html&quot;&gt;Cisco Guard&lt;/a&gt; also exist (Edit: Cisco Guard is now end of life and you could try something like the &lt;a href=&quot;http://www.arbornetworks.com/cleanpipes&quot;&gt;Arbour TMS&lt;/a&gt;). For example we have a Big-IP F5 performing load balancing and with IPS and web application firewall modules. The old school ping of death, syn floods, smurf attacks are tickbox options and not representative of a DDOS attack today but still why not enable them. The web app firewall can also perform rate limiting on IP or URL, black list IP&#39;s when it reaches a transactions per second limit or certain latency. Both of these will require monitoring and tuning and may not help you greatly against attacks launched from numerous unrelated endpoints but it is protection against the lone gunman and defence in depth. &lt;a href=&quot;http://www.zdziarski.com/blog/?page_id=442&quot;&gt;Mod evasive&lt;/a&gt; and other&amp;nbsp;Apache&amp;nbsp;tuning can provide similar features if you do not have an appliance.&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;SSL accelerator &lt;/b&gt;- &amp;nbsp;hat tip to to the DC4420 talk by &lt;a href=&quot;http://www.thc.org/&quot;&gt;THC&lt;/a&gt; for this one, he calculated a SSL connection takes&amp;nbsp;15 times more server resources than client resource. On a low power laptop he could generate 1000 SSL connections per second (cps), a small web server (think Amazon EC2 small allocation) could only manage 80 cps. However with an SSL accelerator it increased to 60,000 cps, so deploy an SSL accelerator&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Rehearsed&amp;nbsp;plan&lt;/b&gt; - having DDOS&amp;nbsp;monitoring&amp;nbsp;and response in the security incident plan and&amp;nbsp;rehearsing&amp;nbsp;it. Asking&amp;nbsp;penetration&amp;nbsp;testers to specifically look for architectural and technical DOS vulnerabilities and&amp;nbsp;advising&amp;nbsp;on remediating&amp;nbsp;them&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Another mitigation which was not right for this project but worth exploring:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Redundant ISP&#39;s with Nginx cluster&lt;/b&gt; - a great approach detailed &lt;a href=&quot;http://blog.unixy.net/2010/08/the-penultimate-guide-to-stopping-a-ddos-attack-a-new-approach/&quot;&gt;here&lt;/a&gt;. Basically involves using a reverse proxy with web servers hosted at multiple ISP&#39;s:&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh6.googleusercontent.com/-rXdeSXS_ha8/TXwGNrrLNeI/AAAAAAAAAwk/iFDd-lEo9GA/s1600/nginx_constellation.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://lh6.googleusercontent.com/-rXdeSXS_ha8/TXwGNrrLNeI/AAAAAAAAAwk/iFDd-lEo9GA/s320/nginx_constellation.png&quot; width=&quot;210&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://www.ecl-labs.org/2011/03/17/roboo-http-mitigator.html&quot;&gt;Roboo - HTTP robot mitigator&lt;/a&gt;&lt;/b&gt; - open source tool that uses a challenge response mechanism to identify HTTP robots. Good powerpoint deck also on DDOS presented at Blackhat Europe 2011. Works on the Ngix webserver so really good if you also using the above strategy. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div&gt;Photo credit:&amp;nbsp;&lt;a href=&quot;http://www.flickr.com/photos/alatryste/5405357868/sizes/s/in/photostream/&quot;&gt;Alatryste&lt;/a&gt; Flikr&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/7707522445260396772/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/ddos-protection-strategies.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/7707522445260396772'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/7707522445260396772'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/ddos-protection-strategies.html' title='DDOS protection strategies'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh4.googleusercontent.com/-O1AFm-D6Y9w/TXwZSh81ebI/AAAAAAAAAwo/NmRcEV-7ws8/s72-c/5405357868_c3527b1e27_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-5623291836723708043</id><published>2011-03-09T03:01:00.000+00:00</published><updated>2011-03-09T03:05:56.052+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Authentication"/><title type='text'>Password stolen: an ounce of prevention</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh4.googleusercontent.com/-yKsCgemo5bQ/TXbswn3D8-I/AAAAAAAAAwc/z3emC35TI_g/s1600/362527788_a603f4195b_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://lh4.googleusercontent.com/-yKsCgemo5bQ/TXbswn3D8-I/AAAAAAAAAwc/z3emC35TI_g/s200/362527788_a603f4195b_m.jpg&quot; width=&quot;133&quot; /&gt;&lt;/a&gt;&lt;/div&gt;My response to a &lt;a href=&quot;http://www.helpareporter.com/&quot;&gt;HARO&lt;/a&gt; question:&amp;nbsp;Recent hacks potentially compromised the passwords of hundreds of&amp;nbsp;thousands of users on popular websites, a real problem since&amp;nbsp;people seldom maintain unique passwords. This story looks at what&amp;nbsp;you should do when your password is potentially compromised,&amp;nbsp;outlining good password hygiene.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;This got me thinking of a situation where someone has used the same password across almost every site and service on the Internet and they find it out it is compromised. I could brainstorm lots of ideas on how to prevent this from happening by very few once it had actually happened.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Response - the pound of cure&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;If the password is for a single site then you can follow a process like this:&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh5.googleusercontent.com/-gTr50eIYyQQ/TXbi3OwG0UI/AAAAAAAAAwY/jCOgOjuNpmE/s1600/resetpass.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;131&quot; src=&quot;https://lh5.googleusercontent.com/-gTr50eIYyQQ/TXbi3OwG0UI/AAAAAAAAAwY/jCOgOjuNpmE/s320/resetpass.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The problem really arises if that same password works for tens if not hundreds of sites. If you are not even aware of what sites you have used that password on! Or the password is to your email accounts which allows someone to reset passwords to other sites or get enough personal information to have a good guess at other passwords or secret questions. If this is the case, then I think you need a multi pronged approach:&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Discovery:&lt;/i&gt;&lt;/b&gt; you can use sources such as your browser history or the sites where your browser has saved passwords for to identify where you need to change your password&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Prioritize:&lt;/i&gt;&lt;/b&gt;&amp;nbsp;target the critical sites that can really hurt you. Anything banking or payments related, this includes anywhere you have linked your credit card or bank account e.g. Paypal, iTunes, a betting or online stock broking account. Email accounts that you could be used to reset passwords, social networking and other sites which hold a lot of identity information.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Other measures you can take are to contact the organizations such as your bank which can then monitor your Internet banking, credit cards etc more closely and raise the risk score for these in their systems. Getting some identity theft protection and monitoring over use of credit record checks are also a good move, especially if you believe some of those critical sites have been compromised.&lt;br /&gt;&lt;br /&gt;That was really it for response, not a great deal I could come up with, prevention really does seem a lot better way to go even if it just minimizes the number of sites impacted&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;The ounce of prevention&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;There are a number of steps to prevent this from&amp;nbsp;occurring:&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;i&gt;Eliminating passwords&lt;/i&gt;&lt;/b&gt; - you could get a simple hardware token such as a &lt;a href=&quot;http://yubico.com/&quot;&gt;Yubikey&lt;/a&gt; and there are a number of &lt;a href=&quot;http://wiki.yubico.com/wiki/index.php/Main_Page&quot;&gt;sites&lt;/a&gt; that will let you use that instead of a password. Registering for &lt;a href=&quot;http://openid.net/&quot;&gt;OpenID&lt;/a&gt; is also a good idea, this lets you have one account for many different sites which based on the OpenID provider can be strongly authenticated with something like a Yubikey or if you choose Google, their new &lt;a href=&quot;http://www.google.com/support/accounts/bin/static.py?page=guide.cs&amp;amp;guide=1056283&amp;amp;topic=1056284&quot;&gt;two step verification process&lt;/a&gt;. Having a second authentication factor means that even if you lose your password an attacker cannot get access to your accounts without also having the hardware token or your phone.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;i&gt;Password manager&lt;/i&gt;&lt;/b&gt; - &amp;nbsp;there are a number of popular ones such as Lastpass, 1Password and Keypass. An &lt;a href=&quot;https://www.ironkey.com/&quot;&gt;Ironkey&lt;/a&gt; is also a good option as it provides a hardware encrypted USB key with a built in Firefox browser and password manager. These&amp;nbsp;allow you to generate a strong password that is different for each site but still get the benefits of&amp;nbsp;convenient&amp;nbsp;login and can be accessed on your mobile so they are available everywhere. I wrote in more detail about password managers &lt;a href=&quot;http://rakkhi.blogspot.com/2010/12/why-you-should-use-password-vault.html&quot;&gt;here&lt;/a&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;i&gt;Choose a strong password&lt;/i&gt;&lt;/b&gt; - good practice these days is at least 8 characters, alpha and numerics, upper and lower case and symbols or special characters. This would make unlikely that someone could guess or bruteforce your password. Using a passphrase, which would be a longer phrase that is memorable is another good alternative.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;i&gt;Password reset&lt;/i&gt;&lt;/b&gt; - often a weak point. Make sure you choose strong security question answers, follow the practice for choosing strong passwords because there is no point having a strong password that can be reset with &quot;apple&quot; and &quot;england&quot;. Having an alternate email account registered to&amp;nbsp;receive&amp;nbsp;password resets&amp;nbsp;in-case&amp;nbsp;your primary is compromised is also a good idea.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;i&gt;Internet hygiene&lt;/i&gt;&lt;/b&gt;&amp;nbsp;- there are simple measures you can take to avoid disclosing your password online. Not clicking on any links from senders you do not recognize, not opening email from senders you do not recognize, running up-to-date antivirus, personal firewall and patching your operating system, browser, common programs like Acrobat reader, office and Java. Running a few useful addon&#39;s like &lt;a href=&quot;http://noscript.net/&quot;&gt;No Script&lt;/a&gt; (allows you to enable javascript only where you want) and &lt;a href=&quot;https://www.eff.org/https-everywhere&quot;&gt;HTTPS everywhere&lt;/a&gt; (which attempts to connect to the secure versions of all your favourite sites). Only entering your password after verifying in the address bar that it is actually the site you are supposed to be at and there is a padlock indicating you are browsing over HTTPS. You will never win a free iPad so avoid those free surveys!&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Photo credit:&amp;nbsp;&lt;a href=&quot;http://www.flickr.com/photos/harmony19490/362527788/sizes/s/in/photostream/&quot;&gt;Ngọc Hà&lt;/a&gt; (Flikr)&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/5623291836723708043/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/password-stolen-ounce-of-prevention.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5623291836723708043'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5623291836723708043'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/password-stolen-ounce-of-prevention.html' title='Password stolen: an ounce of prevention'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh4.googleusercontent.com/-yKsCgemo5bQ/TXbswn3D8-I/AAAAAAAAAwc/z3emC35TI_g/s72-c/362527788_a603f4195b_m.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-3859723146814737947</id><published>2011-03-09T01:16:00.000+00:00</published><updated>2011-03-09T01:20:59.944+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rant"/><title type='text'>Why advertise your Facebook site?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;If you do not learn from history:&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh6.googleusercontent.com/-EUQ8oQGmMjE/TXbQMiEhZKI/AAAAAAAAAwM/xv9YL5b_6_8/s1600/MainMenuUK.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;https://lh6.googleusercontent.com/-EUQ8oQGmMjE/TXbQMiEhZKI/AAAAAAAAAwM/xv9YL5b_6_8/s400/MainMenuUK.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh4.googleusercontent.com/-r6bGsEAuLsw/TXbQUzaGdII/AAAAAAAAAwU/kMQq9dj_obw/s1600/Nickelodeon.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh4.googleusercontent.com/-r6bGsEAuLsw/TXbQUzaGdII/AAAAAAAAAwU/kMQq9dj_obw/s1600/Nickelodeon.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;img border=&quot;0&quot; height=&quot;258&quot; src=&quot;https://lh4.googleusercontent.com/-r6bGsEAuLsw/TXbQUzaGdII/AAAAAAAAAwU/kMQq9dj_obw/s400/Nickelodeon.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;You are doomed to repeat it:&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh3.googleusercontent.com/-PfDAMaFCMcg/TXbQUIqAUkI/AAAAAAAAAwQ/9XoZ69zVypA/s1600/facebook+nice.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;232&quot; src=&quot;https://lh3.googleusercontent.com/-PfDAMaFCMcg/TXbQUIqAUkI/AAAAAAAAAwQ/9XoZ69zVypA/s400/facebook+nice.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Since reading &lt;a href=&quot;http://www.markevanstech.com/2010/11/27/is-facebook-the-new-aol/&quot;&gt;Mark Evan&#39;s&lt;/a&gt; post last year&amp;nbsp;everytime&amp;nbsp;I see an&amp;nbsp;advertisement&amp;nbsp;on TV or a billboard with the Facebook site link (http://www.facebook.com/brand) instead of the brand&#39;s primary website I cringe. It is not that I have anything against Facebook, for me it is a brilliant tool for keeping in touch with people in a three continents. I just do not get people that follow brands on Facebook though, sure maybe there are deals e.g. the Starbucks page but that does not seem worthwhile to&amp;nbsp;pollute&amp;nbsp;your newsfeed.&lt;br /&gt;&lt;br /&gt;I especially do not get brands that promote their Facebook page ahead of their primary website. Sure people are spending about a third of their time online on Facebook and about a quarter of everyone on the Internet is on Facebook but if you are going to spend millions on advertising why direct people to your Facebook page? &amp;nbsp;I mean it is easy enough to link to the Facebook page, use it for deals, comments etc but surely your advertising should promote your primary site. Any users that spend their life on Facebook and want to follow brands are going to find your site from a link or by searching directly on Facebook anyway. Not only is advertising Facebook page putting all your eggs in the &lt;strike&gt;AOL&lt;/strike&gt; Facebook basket it cannot be good for SEO and having your main site being front of mind with your consumers. Also unless you have started to use Facebook credits and are transacting through your site or sell nothing online, surely you are better off having users go directly to your main site and actually make you money?&amp;nbsp;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/3859723146814737947/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/why-advertise-your-facebook-site.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/3859723146814737947'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/3859723146814737947'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/why-advertise-your-facebook-site.html' title='Why advertise your Facebook site?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh6.googleusercontent.com/-EUQ8oQGmMjE/TXbQMiEhZKI/AAAAAAAAAwM/xv9YL5b_6_8/s72-c/MainMenuUK.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-5852479056376701921</id><published>2011-03-04T22:41:00.000+00:00</published><updated>2011-03-04T22:44:23.400+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2FA"/><category scheme="http://www.blogger.com/atom/ns#" term="Classification"/><category scheme="http://www.blogger.com/atom/ns#" term="DLP"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><title type='text'>Data classification: start with the end in mind</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh5.googleusercontent.com/-PNln3wzsQbc/TXFiJARTgOI/AAAAAAAAAwI/v_QjjjirVnY/s1600/51519638_6b899a7d1c_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;172&quot; src=&quot;https://lh5.googleusercontent.com/-PNln3wzsQbc/TXFiJARTgOI/AAAAAAAAAwI/v_QjjjirVnY/s200/51519638_6b899a7d1c_m.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;My response to a &lt;a href=&quot;http://www.helpareporter.com/&quot;&gt;HARO&lt;/a&gt; question: &amp;nbsp;To be read by IT managers at SMB&#39;s: tips for setting up a data&amp;nbsp;classification system that assigns levels of sensitivity to data.&amp;nbsp;What do they need to know to get started and what tools will they&amp;nbsp;need to invest in? What are the costs involved and what are the&amp;nbsp;benefits and pitfalls?&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The key to data&amp;nbsp;classification&amp;nbsp;is to start with the end in mind. I have seen organizations execute multi year projects with hundreds of consultants and thousands of workshop hours to classify all their data, only to find it a complete waste of time. This was because the whole exercise was a tickbox exercise to meet a &lt;a href=&quot;http://rakkhi.blogspot.com/2010/07/security-return-on-investment-roi.html&quot;&gt;regulatory&lt;/a&gt; or audit&amp;nbsp;requirement and&amp;nbsp;success&amp;nbsp;was seen as classifying the data. Even if the project managed to complete, the classifications were stale almost as soon the project finished. The processes they put in place to sustain the efforts where just not effective. Processes such as requiring every user to classify the data they created or an annual process for every business unit to inventory their data and update the classifications.&lt;br /&gt;&lt;br /&gt;Why? Because people do not want to classify data. As much as security people would like end users to classify everything as soon as they create it and think about the classification before they email something, it just does not happen. End users focus on their day jobs and farming on Facebook not classifying data.&lt;br /&gt;&lt;br /&gt;Instead these organizations should have viewed classification as a means to an end. A starting point to using a risk based approach to protecting the most important data to the organization. To ensure the scarce security resources are spent in the most effective manner and productivity and&amp;nbsp;usability&amp;nbsp;are not hampered&amp;nbsp;unnecessarily. The classification process and&amp;nbsp;associated&amp;nbsp;security controls need to be automated and transparent to the end user if you want them to be sustainable and&amp;nbsp;truly&amp;nbsp;effective.&lt;br /&gt;&lt;br /&gt;The whole point of classifying data is a close alignment of security controls to the potential impact to the organization if the data gets compromised. Typically you will do one or more of the following to protect your most sensitive data:&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Encryption - in transit and/or storage&lt;/li&gt;&lt;li&gt;Reduce data loss - stop it from leaving the organization when it should not&lt;/li&gt;&lt;li&gt;Stronger authentication - make it harder for the wrong people to get access through the front door&lt;/li&gt;&lt;li&gt;Improved network controls - protect the back door&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;So rather than run a data classification project in isolation or even viewing classifying data as a major phase to be completed first: identify, protect and iterate. Automate so that future data of the same type is classified and protected without requiring human intervention.&lt;br /&gt;&lt;br /&gt;Firstly you do need a classification scheme but this is not as important and you would think. There is very little point in having more than three classification levels:&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Public - self evident, data that has no impact if disclosed&lt;/li&gt;&lt;li&gt;Confidential - your most important data that will have a major financial, reputational, legal, operational etc impact if is disclosed&lt;/li&gt;&lt;li&gt;Internal - everything else in the middle, data that you do not want the general public to access but will not hurt you as much as Confidential data if it is disclosed&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Remember the end goal - you will get the most benefits in the line between Confidential and Internal. Unless you are starting a complete green fields your public data is obvious will already be on places like your website front page and your marketing materials. Some of your Confidential data is not being sufficiently protected exposing you to that impact and some of your Internal data maybe over protected, providing an opportunity to improve performance or usability&amp;nbsp;or reduce costs.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Confidential data without sufficient controls&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Being a security person I will of course start here but you may want to skip ahead to Internal data with too many controls.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Some will say there is no point implementing encryption or data loss protection unless you have first classified your data. I take almost the opposite view, the best time to identify your most sensitive data is when you are in a position to protect it.&amp;nbsp;&lt;/div&gt;&lt;br /&gt;The approach I take in &lt;a href=&quot;http://www.simplesecurityra.com/&quot;&gt;Simple security risk assessment (SSRA)&lt;/a&gt;&amp;nbsp;is that that almost all companies will have data that fits into one of these categories, within each there will be data that will be extremely sensitive:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Personally Identifiable Information (PII) -&amp;nbsp;health and medical information, criminal records, disability, religion, sexual orientation, government identifiers e.g. SSN, NI, disputes, disciplinary, investigations, industrial relations, redundancy plans&lt;/li&gt;&lt;li&gt;Customer information -&amp;nbsp;customer lists, sales strategies, unreleased products and promotions, projections&lt;/li&gt;&lt;li&gt;Financial information - unreleased results, forecasts, guidance&lt;/li&gt;&lt;li&gt;Corporate, IP, legal -&amp;nbsp;legal cases, forensics, investigations, prospective acquisitions, mergers, due diligence, major risk assessments, regulatory issues and correspondence, IP, trade secrets, unapproved patents and trademarks, private keys and passwords to access other Confidential&amp;nbsp;information, unreleased restructure, redundancy, board papers, senior/exec mgmt correspondence&lt;/li&gt;&lt;li&gt;Transaction information -&amp;nbsp;high value, low volume, special, exception transactions&lt;/li&gt;&lt;li&gt;Card data -&amp;nbsp;card number, CVV2, expiry, magnetic strip, Track 2 info&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;If you want to think beyond confidentiality:&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Data requiring very high integrity - where there will be immediate impact for loss of integrity e.g. automated decisions made on data&lt;/li&gt;&lt;li&gt;Data requiring very high&amp;nbsp;availability&amp;nbsp;-&amp;nbsp;immediate impact for loss of availability, instant loss of revenue / increased cost&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;You can go through and manually identify this data but this not sustainable. The best approach is to automate the identification and protection processes. Data loss prevention tools have become very good at doing this and you do not have to invest millions to use them. Try &lt;a href=&quot;http://www.mydlp.org/&quot;&gt;MyDLP&lt;/a&gt;&amp;nbsp;an open source tool.&amp;nbsp;&lt;/div&gt;&lt;br /&gt;Start with even the most structured of the above list: credit card numbers or government identifiers such as national identity or social security numbers. These are great because you can define a precise regular expression to find them. Most DLP tools have rules for this out of the box but even if they do not, instructions are&amp;nbsp;&lt;a href=&quot;http://tinyurl.com/66n4usj&quot;&gt;not hard to find&lt;/a&gt;. Use the DLP software to find where this information currently lives, where it moves both internally and external to your organization and where and who uses it. If you are like most organizations you will be&amp;nbsp;surprised&amp;nbsp;when data you thought was in a single database is copied to emails,&amp;nbsp;&amp;nbsp;spreadsheets, share drives. If you do not want to try MyDLP or similar, most DLP vendors like Symantec or RSA will come out and do this type of discovery&amp;nbsp;exercise&amp;nbsp;for you free of charge (obviously as a great entry point for their tool).&lt;br /&gt;&lt;br /&gt;Then put protections in place:&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Encryption - a database of credit card numbers or social security numbers that is not encrypted is a great place to start. Hopefully you will not have too many of these and identifying them for your DBA&#39;s to encrypt is a good start. Going forward setting up an automated email if this is detected again is a good step - it will most likely be someone taking an extract or copy that they should not be. If you have email encryption software you maybe able to configure it to automatically encrypt emails that match the same signature or that are specifically flagged by your DLP software. If your disputes team or HR team &amp;nbsp;need to regularly extract and work with credit card or employee data respectively, consider creating an encrypted share drive for them. They can then continue to work as normal and the data will be encrypted&amp;nbsp;transparently&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Reduce data loss - this is primary purpose for the DLP software. I have some practical lessons learnt on where and how to &lt;a href=&quot;http://rakkhi.blogspot.com/2010/07/practical-lessons-learned-from.html&quot;&gt;implement DLP&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Stronger authentication - if you have two factor authentication for remote access already extend it to servers and applications that are storing your Confidential data. If you do not have something consider something open source like &lt;a href=&quot;http://www.wikidsystems.com/community-version&quot;&gt;WikiD&lt;/a&gt;. A &lt;a href=&quot;http://yubico.com/&quot;&gt;yubikey&lt;/a&gt; can be easy way to add two factor to just about anything due to its broad integration.&amp;nbsp;Again hopefully this is not something have to do frequently - adding it to a project checklist and setting up a similar alert to the 2FA admins when a system holding this type of data is detected should be sufficient to ensure it continues going forward&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Improved network controls - create specific VLAN&#39;s for systems that hold this data, put access controls in place to limit network access only to systems that should communicate with these systems. Everyone on your LAN should not be able to access the database storing your card data or HR data for example. &amp;nbsp;If you have a firewall that supports &lt;a href=&quot;http://bit.ly/eGn06p&quot;&gt;dynamic rules&lt;/a&gt;, you maybe able to automate this, otherwise again it is project checklist and an alert to your network admin on detection&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Structured data is the best place to start with this process, but you can also protect less structured data by taking a hash or indexing data that you first&amp;nbsp;manually&amp;nbsp;identify as Confidential. Everything from your CEO&#39;s email, the folder where your finance staff store the annual reports and projections, to your R&amp;amp;D database can be &lt;a href=&quot;http://en.wikipedia.org/wiki/Cryptographic_hash_function&quot;&gt;hashed&lt;/a&gt;&amp;nbsp;and then an exact or partial match of the hash found. The above protections and alerts can then also be applied to this less structured data.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Internal data with too many controls&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Unfortunately&amp;nbsp;this will tend to be more rare than you hoped for. It will generally be present where you have applied it a control to everything because it was too hard to apply specifically. Nevertheless the benefits of having a uniform environment for troubleshooting and support will mean this actually makes sense.&amp;nbsp;For other&amp;nbsp;controls the type of threat it is mitigating may mean it is important to apply it to everything rather than focusing on just protecting your most sensitive information.&amp;nbsp;For example you have anti-virus on all servers, or a standard build where you have disabled unnecessary or insecure services such as telnet or tftp or you maybe performing&amp;nbsp;vulnerability&amp;nbsp;scanning on all your systems.&amp;nbsp;In these cases the benefits of classification are two fold:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Prioritization&amp;nbsp;- once you know where your Confidential data is you can focus on patching these first in addition to your Internet facing servers&lt;/li&gt;&lt;li&gt;Monitoring - if you get an alert of a virus, a large number of failed logins etc where your Confidential data is these can automatically&amp;nbsp;receive&amp;nbsp;a higher rating&lt;/li&gt;&lt;/ul&gt;Typically the overhead of security controls is not sufficient where you would remove something already in place. But you could run also use your DLP software to identify data flows and stores that are not Confidential and remove some controls where appropriate, for example:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Very large files&amp;nbsp;transferred&amp;nbsp;frequently that you are&amp;nbsp;transferring&amp;nbsp;over SFTP that could actually be moved to standard FTP&lt;/li&gt;&lt;li&gt;If you define network zones to protect your most sensitive information could you remove some firewalls or at least simplify the ruleset&lt;/li&gt;&lt;li&gt;Systems only storing Internal data that any new employee could be given access to&amp;nbsp;immediately, meaning they are more productive from day one and you have less access request to approve and provision&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;Summary&lt;/b&gt;&lt;br /&gt;Three takeaways:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Start with the end in mind&lt;/b&gt; - the whole point of classifying data is so you can protect what is most important and save money and time on the rest&lt;/li&gt;&lt;li&gt;&lt;b&gt;Identify, protect, iterate&lt;/b&gt; - do not get stuck&amp;nbsp;classifying&lt;/li&gt;&lt;li&gt;&lt;b&gt;Automate&lt;/b&gt; - consider how your most sensitive data will continue to be identified and protected with minimal human&amp;nbsp;involvement. At least setup alerts which will trigger action&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/5852479056376701921/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/data-classification-start-with-end-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5852479056376701921'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/5852479056376701921'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/data-classification-start-with-end-in.html' title='Data classification: start with the end in mind'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh5.googleusercontent.com/-PNln3wzsQbc/TXFiJARTgOI/AAAAAAAAAwI/v_QjjjirVnY/s72-c/51519638_6b899a7d1c_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8954181093014024108.post-7243238492036839306</id><published>2011-03-03T00:45:00.000+00:00</published><updated>2011-03-03T00:49:56.222+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Mobile security"/><category scheme="http://www.blogger.com/atom/ns#" term="Secure Development"/><title type='text'>Apple succeeds where security failed with web developers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://lh3.googleusercontent.com/-BXXHzfEI0d8/TW7kS0hZB2I/AAAAAAAAAwE/6ghe75j9ct8/s1600/108948880_712aa207c9_m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://lh3.googleusercontent.com/-BXXHzfEI0d8/TW7kS0hZB2I/AAAAAAAAAwE/6ghe75j9ct8/s1600/108948880_712aa207c9_m.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Interesting article today some malware with the linkbait title &quot;&lt;a href=&quot;http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/&quot;&gt;The mother of all Android malware has arrived&lt;/a&gt;&quot;. It involves the malware writer downloading over 50 free applications from the Android appstore, adding a trojan to them, repackaging them and&amp;nbsp;releasing&amp;nbsp;them for download. Aided by the fact they were existing applications, it is reported there were between 50,000-200,000 downloads in over 4 days (it took Google that long to shut down the malware spreading applications). The trojan used a root exploit and allowed stealing of data as well as opening up a back-door for download of further malware.&lt;br /&gt;&lt;br /&gt;There is some really good discussion on comparison of the Apple vs. Google approaches to their respective appstores on &lt;a href=&quot;http://news.ycombinator.com/item?id=2279228&quot;&gt;Hacker News&lt;/a&gt;. What struck me the most though was how Apple&#39;s review process appears to have succeeded where security professionals have failed for years with developers.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;There is some great discussion on the HN comments about the Apple review process. I think fair to say that the process is not&amp;nbsp;infallible&amp;nbsp;and there are some good examples of how malware could potentially be allowed through:&lt;br /&gt;&lt;br /&gt;Using a dynamic binding that is not detected during static analysis:&lt;br /&gt;&lt;blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; font-family: Verdana; font-size: 12px;&quot;&gt;&lt;i&gt;&quot;You need a message name (@selector), and the names are strongly typed&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote&gt;What do you mean by strong typing here? AFAIK ObjC has dynamic binding, which means you can send the same message to a different object based on a condition. So from what I see, you can pretend you&#39;re sending a message to an internal object, but then switch the object out for an external one later.&amp;nbsp;&lt;/blockquote&gt;A &quot;timebomb&quot; - code that&amp;nbsp;executes&amp;nbsp;after a period of time or based on a specific condition not triggered during the review process:&lt;br /&gt;&lt;blockquote&gt;&lt;i&gt;A time bomb needs a callback in the binary&lt;/i&gt;&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;i&gt;&lt;/i&gt;Nope. You read the current time in at startup, to, I don&#39;t know, display to the user, then at some later point, after enough obfuscation and misdirection, innocuously check if the number you got back was past 1335830400.&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;i&gt;and then the app needs to actually do something if the response comes back as 1,000. Which means that code needs to be in the binary.&lt;/i&gt;&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;i&gt;&lt;/i&gt;But the response won&#39;t be 1,000. The response will have lots of data you&#39;d send otherwise, then an innocuous-sounding string like, I don&#39;t know, &quot;true&quot; or something, tacked on at the end, and you&#39;ll have a check for the end of the string being &quot;true&quot; buried somewhere deep within your code, which is where you&#39;ll switch the object out.&quot;&lt;/blockquote&gt;However &lt;a href=&quot;http://techcrunch.com/2011/01/19/iphone-ipad-top-app-downloads/&quot;&gt;10 Billion app&lt;/a&gt; downloads later, we are yet to see malware like the above spread on the iOS platform. While this does not mean we could not see it tommorow or the day after as iOS gains greater marketshare and more high value applications such as banking and stock trading moves to mobile, it is an impressive record.&lt;br /&gt;&lt;br /&gt;A great deal of the credit for this has to go to the strict Apple review process. They have&amp;nbsp;succeeded&amp;nbsp;where security professionals have failed for years with web developers.&amp;nbsp;By implementing even &quot;just&quot; static analysis of code and making developers aware that their app will get rejected if they fail this testing, Apple has raised the bar on security and quality of code.&lt;br /&gt;&lt;br /&gt;Compare this to web applications; cross site scripting (XSS) has been known about for donkeys years, great &lt;a href=&quot;http://www.owasp.org/index.php/Cross-site_Scripting_(XSS)&quot;&gt;guidance&lt;/a&gt; has existed on preventing XSS for a similar amount of time but you still get a SECURITY application like Lastpass having a &lt;a href=&quot;https://grepular.com/LastPass_Vulnerability_Exposes_Account_Details&quot;&gt;basic XSS vulnerability&lt;/a&gt;. Security professionals have been trying for years to implement secure development lifecycle&amp;nbsp;disciplines. Practices such as a static and dynamic code analysis on every project prior to going live. But with &lt;a href=&quot;http://v1.aberdeen.com/launch/report/benchmark/6983-RA-software-development-lifecycle.asp?lan=US&quot;&gt;studies like this&lt;/a&gt; finding 72% of their sample group not applying security at source and clearly with Lastpass as a case in point, we are not succeeding.&lt;br /&gt;&lt;br /&gt;The truth appears that without a central gatekeeper like Apple these types of security practices will never be implemented&amp;nbsp;ubiquitously. This is perhaps one of the greatest security benefits of software distribution moving to the Appstore type model and I hope that Google implements at least a minimal process of source code review, corporations can then follow suit.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.rakkhis.com/feeds/7243238492036839306/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.rakkhis.com/2011/03/apple-succeeds-where-security-failed.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/7243238492036839306'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8954181093014024108/posts/default/7243238492036839306'/><link rel='alternate' type='text/html' href='http://www.rakkhis.com/2011/03/apple-succeeds-where-security-failed.html' title='Apple succeeds where security failed with web developers'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07085705116337330457</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh3.googleusercontent.com/-BXXHzfEI0d8/TW7kS0hZB2I/AAAAAAAAAwE/6ghe75j9ct8/s72-c/108948880_712aa207c9_m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>