<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-23642591</atom:id><lastBuildDate>Thu, 08 Feb 2024 15:08:10 +0000</lastBuildDate><title>Security Theater of the Absurd</title><description>Current security issues, vulnerabilities, and the phenomenon of security theater.</description><link>http://security-theater.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>33</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-116362844503930595</guid><pubDate>Wed, 15 Nov 2006 22:07:00 +0000</pubDate><atom:updated>2006-11-15T17:07:25.043-05:00</atom:updated><title>SANS Top-20 Internet Security Attack Targets (2006 Annual Update)</title><description>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;http://www.sans.org/top20/&lt;br&gt;&lt;/br&gt;&lt;br&gt;&lt;/br&gt;&lt;br&gt;&lt;/br&gt;Technorati Tags: &lt;a rel=&#39;tag&#39; href=&#39;http://technorati.com/tag/SANS&#39; class=&#39;performancingtags&#39;&gt;SANS&lt;/a&gt;&lt;/div&gt;</description><link>http://security-theater.blogspot.com/2006/11/sans-top-20-internet-security-attack.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-115998841254098410</guid><pubDate>Wed, 04 Oct 2006 19:00:00 +0000</pubDate><atom:updated>2006-10-04T15:00:12.593-04:00</atom:updated><title>USB Drive Access Control Part 2</title><description>So I&#39;m still looking at options for controlling access to USB devices and other forms of removable media.&amp;nbsp; As you can see in &lt;a href=&quot;http://security-theater.blogspot.com/2006/05/usb-drive-access-control-part-1.html&quot;&gt;this article&lt;/a&gt;, I have a list of potential applications to help me with that.&amp;nbsp; In the mean time, I discovered a way to help me mitigate the problem.&lt;br /&gt;&lt;br /&gt;Some users in my company will require the use of USB flash drives or hard drives, and for that, we need to purchase some software tools to be able to restrict access by user and by device model.&amp;nbsp; Other users, however, have no use for USB storage devices at all.&lt;br /&gt;&lt;br /&gt;The &quot;old school&quot; method of restricting access to USB was to disable the USB ports in the BIOS.&amp;nbsp; This was highly effective, and if the BIOS was password protected, the user couldn&#39;t find a workaround to give them access.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;There were only 3 problems with this method.&amp;nbsp; First, in theory, a knowledgeable individual could just install a USB card in an available PCI slot.&amp;nbsp; While this is unlikely considering my user base, it is still a potential risk.&amp;nbsp; Second, many newer systems, such as Dell&#39;s Optiplex GX280, have done away with PS/2 ports for the mouse and keyboard, relying instead on USB.&amp;nbsp; If you disable all the USB ports, there go your input devices.&amp;nbsp; Third, it requires a visit to each PC, since I haven&#39;t found a way to script BIOS changes yet.&lt;br /&gt;&lt;br /&gt;So here&#39;s the new and improved method, courtesy of Windows XP SP2:&lt;br /&gt;1. Start the registry editor (regedit.exe).&lt;br /&gt;2. Go to &lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;wbr&gt;\CurrentControlSet\Control.&lt;br /&gt;3. From the Edit &lt;br /&gt;menu, select New, Key, and type&lt;br /&gt;StorageDevicePolicies. If this key already &lt;br /&gt;exists, then skip to&lt;br /&gt;the next step.&lt;br /&gt;4. Highlight the newly created key &lt;br /&gt;&quot;StorageDevicePolicies&quot; and&lt;br /&gt;from the Edit menu select New, DWORD Value, type &lt;br /&gt;WriteProtect and&lt;br /&gt;press Enter.&lt;br /&gt;5. Double-click WriteProtect and enter 1 for &lt;br /&gt;Value data. The value&lt;br /&gt;1 makes all the USB drives read-only; a value of 0 will &lt;br /&gt;make them&lt;br /&gt;writable.&lt;br /&gt;6. Close the registry editor and restart the &lt;br /&gt;computer.&lt;br /&gt;&lt;br /&gt;I also found way to do this via GPO, &lt;a href=&quot;http://www.petri.co.il/disable_writing_to_usb_disks_in_xp_sp2_with_gpo.htm&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tag/usb&quot; rel=&quot;tag&quot;&gt;usb&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/security&quot; rel=&quot;tag&quot;&gt;security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/registry&quot; rel=&quot;tag&quot;&gt;registry&lt;/a&gt;</description><link>http://security-theater.blogspot.com/2006/10/usb-drive-access-control-part-2.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-115982011304325361</guid><pubDate>Mon, 02 Oct 2006 20:04:00 +0000</pubDate><atom:updated>2006-10-02T16:15:13.093-04:00</atom:updated><title>Zero-day flaw in Firefox</title><description>I&#39;ve been recommending the use of Firefox for at least a year now, because of the reduced likelihood of encountering a security vulnerability, as well as the better interface and the ability to use add-ons.  Now it looks like Firefox&#39;s advantage may have been &quot;security through obscurity.&quot;  As it gains market share on IE, it becomes more of a target for hackers and vulnerability researchers.&lt;br /&gt;&lt;br /&gt;While that&#39;s not a bad thing, because I firmly believe that the open model of Firefox will ultimately lead to a more secure product, it serves to illustrate that flaws exist in every application.&lt;br /&gt;&lt;br /&gt;Here&#39;s the link to the story: &lt;a href=&quot;http://news.zdnet.com/2100-1009_22-6121608.html&quot;&gt;Hackers claim zero-day flaw in Firefox.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;On another note, since this is a javascript-related flaw, there&#39;s a great extension for Firefox that is very effective at blocking malicious javascript.  It&#39;s called &lt;a href=&quot;https://addons.mozilla.org/firefox/722/&quot;&gt;NoScript&lt;/a&gt;, and it allows you to whitelist any sites you want to run javascript, while blocking any others.  It&#39;s one of the extensions I always load in a new installation of Firefox.</description><link>http://security-theater.blogspot.com/2006/10/zero-day-flaw-in-firefox.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-115980433201163566</guid><pubDate>Mon, 02 Oct 2006 14:22:00 +0000</pubDate><atom:updated>2006-10-02T16:25:05.216-04:00</atom:updated><title>20 Reasons the World Despises Norton AV?</title><description>I found this article, and I&#39;m not sure if I agree with the author completely.  It&#39;s basically bashing Norton Antivirus as causing more problems than it solves.  Here is the article:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.dtgeeks.com/index.php/blogs/comment/20_reasons_the_world_hates_norton_anti_virus/&quot;&gt;http://www.dtgeeks.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;I personally haven&#39;t used Norton Antivirus (the home version) in a number of years, but I have heard some complaints that it is bloatware, and it slows down older PCs to a crawl.  Not sure about the other allegations in the article, though.&lt;br /&gt;&lt;br /&gt;I am currently running Symantec Antivirus Corporate Edition 10 on my company&#39;s network, and I have few problems with it, and the problems I have are not enough to switch, at least not yet.  Here are my list of negatives about Symantec AV:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Infrequent updates.  I&#39;m not talking about virus definitions.  I&#39;m talking about actual updates to the application.  They seem to come out every six months or so.  I&#39;m not even sure about that, which leads to my next point;&lt;/li&gt;&lt;li&gt;No update notifications.  How can I tell if there&#39;s a new version out?  I either have to check their website frequently, or hope that a tech news site might mention it.&lt;/li&gt;&lt;li&gt;Updates require full install.  Why can&#39;t Symantec do an upgrade installation?  Seems like every update requires uninstalling and reinstalling the server application and the System Center Console.&lt;/li&gt;&lt;/ol&gt;Not to gang up on Symantec too much, here are my list of positives, which is why I&#39;m actually sticking with them:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;VERY quick turnaround on zero-day definitions.  Symantec&#39;s RapidRelease virus definitions have been very good for me.  On the rare occasion that I encountered a virus that Symantec didn&#39;t detect (3 times in 6 years), I received an updated definition in under 4 hours each time.&lt;/li&gt;&lt;li&gt;Centralized management.  While it&#39;s not perfect, the Symantec System Center shows me everything I need to know about the protected computers on my network.  The fact that you can centralize your quarantine of suspicious files, and your alerts make it even better.&lt;/li&gt;&lt;/ol&gt;UPDATE: I found this great site which appears to test how well the leading antivirus products stack up against a database of 315,000 virus samples.  Check it out &lt;a href=&quot;http://www.virus.gr/english/fullxml/default.asp?id=82&amp;mnu=82&quot;&gt;here&lt;/a&gt;.  While it doesn&#39;t list Symantec Corporate on the recent tests, it does list Norton Antivirus, and it appears to have dropped from Number 6 best ranked in April 2005 to Number &lt;span style=&quot;font-weight: bold;&quot;&gt;22&lt;/span&gt; in August 2006.  Seems to be heading in the wrong direction.  Note: I can&#39;t vouch for the reliability of this site, as I only just stumbled across it.  I will update with further details when they become available.</description><link>http://security-theater.blogspot.com/2006/10/20-reasons-world-despises-norton-av.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-115979865260109757</guid><pubDate>Mon, 02 Oct 2006 14:15:00 +0000</pubDate><atom:updated>2006-10-02T10:17:32.613-04:00</atom:updated><title>Return from the void</title><description>Hello everyone, sorry for the long delay since my last post!  I have had a number of personal crises to deal with, along with a few professional ones, that have preventing me from posting any updates to this blog for the past 2 months or so.  I apologize for that, and I will endeavor to post more frequently to this blog, both for my own benefit and yours.&lt;br /&gt;&lt;br /&gt;Stay tuned for a few new items today, and more to come!</description><link>http://security-theater.blogspot.com/2006/10/return-from-void.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-115326589577085511</guid><pubDate>Tue, 18 Jul 2006 23:33:00 +0000</pubDate><atom:updated>2006-07-18T19:38:15.826-04:00</atom:updated><title>Microsoft Acquires Winternals Software</title><description>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;&lt;p&gt;Wow, big news!  Microsoft has acquired one of the most useful and innovative software companies ever to attempt to improve on Microsoft&#39;s products.  Mark Russinovich is one of the most intelligent and creative people I have ever met.  Some of the products he releases for free on the Sysinternals site are worth more than some paid products.  And the Winternals products are equally impressive.  Mark, if you don&#39;t know him, was the person who broke the news 10 years ago that you could turn NT Workstation into NT Server by making a simple registry change.&lt;/p&gt;  &lt;p&gt;So this is undoubtably a good move for Microsoft, but is it a good move for Mark?  The answer depends on what Microsoft lets him work on.  His title is Technical Fellow, which has traditionally been a position that gets a lot of leeway in the creative process.  If Mark can use his new insider influence in the same manner he has done things with Winternals, look for some very positive changes in Microsoft products, at least from the perspective of IT tools and ease of management.&lt;br/&gt; &lt;/p&gt;  &lt;blockquote cite=&quot;http://www.winternals.com/Company/PressRelease92.aspx&quot;&gt;&lt;H3&gt;Microsoft Acquires Winternals Software&lt;/H3&gt;Company appoints operating systems kernel expert Mark Russinovich as Technical Fellow.&lt;br/&gt; &lt;p&gt;Microsoft Corp. today announced the acquisition of Winternals Software LP, a privately held company based in Austin, Texas, that provides Windows®-based enterprises with systems recovery and data protection solutions in addition to offering a freeware tools Web site called Sysinternals. The addition of Winternals is a significant advance in Microsoft&#39;s promise to lower customers&#39; total cost of ownership of the Microsoft® Windows platform. Customers will be able to continue building on Sysinternals&#39; advanced utilities, technical information and source code for utilities related to Windows. Financial terms of the acquisition were not disclosed.Winternals was established in 1996 by Mark Russinovich and Bryce Cogswell, who are recognized industry leaders in the areas of operating system design and architecture. Russinovich will join the Microsoft Platforms &amp;amp; Services Division as a technical fellow, working with numerous technology teams across Microsoft, and Cogswell will join the Windows Component Platform Team in the role of software architect.&lt;/p&gt;  &lt;/blockquote&gt;&lt;p class=&quot;citation&quot;&gt;&lt;cite cite=&quot;http://www.winternals.com/Company/PressRelease92.aspx&quot;&gt;&lt;a href=&quot;http://www.winternals.com/Company/PressRelease92.aspx&quot;&gt;Winternals Software - Products&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;  &lt;p&gt;Want to know Mark&#39;s perspective?  Here&#39;s his blog entry on the subject:&lt;/p&gt;  &lt;blockquote&gt;&lt;H3&gt;On My Way to Microsoft!&lt;/H3&gt;&lt;/blockquote&gt;            &lt;blockquote&gt;I’m very pleased to announce that &lt;a href=&quot;http://www.winternals.com/Company/PressRelease92.aspx&quot;&gt;Microsoft has acquired Winternals Software&lt;/a&gt;and Sysinternals. Bryce Cogswell and I founded both Winternals andSysinternals (originally NTInternals) back in 1996 with the goal ofdeveloping advanced technologies for Windows. We’ve had anincredible amount of fun over the last ten years working on a widerange of diverse products such as Winternals Administrator’s Pak,Protection Manager, Defrag Manager, and Recovery Manager, and thedozens of Sysinternals tools, including Filemon, Regmon and ProcessExplorer, that millions of people use every day for systemstroubleshooting and management. There’s nothing more satisfyingfor me than to see our ideas and their implementation have a positiveimpact.&lt;br/&gt; &lt;/blockquote&gt;&lt;p&gt;&lt;i&gt;&lt;a href=&quot;http://www.sysinternals.com/blog/2006/07/on-my-way-to-microsoft.html&quot;&gt;Mark&#39;s Sysinternals Blog: On My Way to Microsoft!&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;  &lt;blockquote&gt; &lt;/blockquote&gt;&lt;p/&gt;&lt;p/&gt;&lt;p style=&quot;font-size:10px;text-align:right;&quot;&gt;technorati tags:&lt;a href=&quot;http://technorati.com/tag/sysinternals&quot; rel=&quot;tag&quot;&gt;sysinternals&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/winternals&quot; rel=&quot;tag&quot;&gt;winternals&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/mark&quot; rel=&quot;tag&quot;&gt;mark&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/russinovich&quot; rel=&quot;tag&quot;&gt;russinovich&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/Microsoft&quot; rel=&quot;tag&quot;&gt;Microsoft&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://security-theater.blogspot.com/2006/07/microsoft-acquires-winternals-software.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-115275535524739887</guid><pubDate>Thu, 13 Jul 2006 01:44:00 +0000</pubDate><atom:updated>2006-07-12T22:14:18.140-04:00</atom:updated><title>Stop Being Stupid; It&#39;s Free: Hard Disk Encryption</title><description>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;I have to call your attention to this great article by Marcus Ranum.  If you don&#39;t know who Marcus is, he&#39;s the Chief of Security for &lt;a href=&quot;http://www.tenablesecurity.com&quot;&gt;Tenable Network Security&lt;/a&gt;, the company that makes Nessus and NeWT.  He is the author of a number of thought-provoking articles on computer security.  He also has some entertaining items on his site, including a &lt;a href=&quot;http://www.ranum.com/security/computer_security/calendar/index.html&quot;&gt;Computer Security Calendar.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Now that I have filled you in on the author, let me tell you about the article.  It&#39;s about how easy (and free) it is to set up disk encryption on your computer using a product called TrueCrypt.&lt;br /&gt;&lt;blockquote cite=&quot;http://www.ranum.com/security/computer_security/editorials/diskcrypt/index.html&quot;&gt;&lt;strong&gt;&lt;br /&gt;Stop Being Stupid; It&#39;s Free&lt;/strong&gt;&lt;br /&gt;&lt;p&gt;I&#39;m not sure why I&#39;ve been so cavalier about my data since then, but to tell you the truth I&#39;ve never bothered with hard disk encryption, personally. I think part of it was that I didn&#39;t particularly care if anyone got my data, because I like to live an open life, but it&#39;s been slowly sinking in that there&#39;s no sense making life easy for the bad guys. If I can rob some phisher, hacker, or spammer of a moment&#39;s pleasure at little cost to myself, that seems like a worthy goal.&lt;/p&gt;  &lt;p&gt;After a few days of researching I stumbled across a thing called TrueCrypt. It meets a lot of my requirements, namely:&lt;br /&gt;&lt;/p&gt;  &lt;ul&gt; &lt;li&gt;Free&lt;br /&gt;&lt;/li&gt; &lt;li&gt;Uses recognizable and known encryption algorithms&lt;br /&gt;&lt;/li&gt; &lt;li&gt;Works sensibly with a container file that can be treated as external data (i.e.: backed up to tape entire)&lt;br /&gt;&lt;/li&gt; &lt;li&gt;Source code available&lt;br /&gt;&lt;/li&gt; &lt;li&gt;No adware or &quot;wouldn&#39;t you like to buy me now?&quot; bullshit&lt;br /&gt;&lt;/li&gt; &lt;li&gt;Small footprint&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;Now, it&#39;s not as if I&#39;m going to go through and review the entire source code of the engine but I like the fact that it&#39;s being developed openly and (as far as I can tell) is part of a project that is not socially or financially beholden to anyone.&lt;/p&gt;  &lt;/blockquote&gt;&lt;p&gt;&lt;a href=&quot;http://www.ranum.com/security/computer_security/calendar/jul.jpg&quot;&gt;&lt;img style=&quot;width: 468px; height: 390px;&quot; alt=&quot;&quot; src=&quot;http://www.ranum.com/security/computer_security/calendar/jul.jpg&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p class=&quot;citation&quot;&gt;&lt;cite cite=&quot;http://www.ranum.com/security/computer_security/editorials/diskcrypt/index.html&quot;&gt;&lt;a href=&quot;http://www.ranum.com/security/computer_security/editorials/diskcrypt/index.html&quot;&gt;A Nice Surprise&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 10px; text-align: right;&quot;&gt;technorati tags:&lt;a href=&quot;http://technorati.com/tag/information&quot; rel=&quot;tag&quot;&gt;information&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/security&quot; rel=&quot;tag&quot;&gt;security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/encryption&quot; rel=&quot;tag&quot;&gt;encryption&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/TrueCrypt&quot; rel=&quot;tag&quot;&gt;TrueCrypt&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://security-theater.blogspot.com/2006/07/stop-being-stupid-its-free-hard-disk.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-115258755072372166</guid><pubDate>Tue, 11 Jul 2006 03:08:00 +0000</pubDate><atom:updated>2006-07-10T23:12:30.773-04:00</atom:updated><title>The Weakest Link in Network Security</title><description>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;&lt;blockquote cite=&quot;http://www.entrepreneur.com/article/0,4621,328335,00.html&quot;&gt;&lt;p/&gt;  &lt;/blockquote&gt;&lt;p&gt;I found this excellent article on Entrepreneur.com.  It spells out some of the inherent risks in Information Security that come with the reality of giving access to users.  Many things can happen as a result of carelessness that can devastate even a well-protected network.&lt;/p&gt;  &lt;p&gt;The recommendations in this article provide an excellent starting point for providing protection against the human element of Information Technology.&lt;br/&gt; &lt;/p&gt;  &lt;DIV style=&quot;width: 585px; padding-left: 10px; padding-top: 10px;&quot;&gt;&lt;span class=&quot;storyhead&quot;&gt;The Weakest Link in Network Security&lt;/span&gt;&lt;br/&gt; &lt;DIV class=&quot;medium&quot;&gt;&lt;strong&gt;Viruses and spyware threaten your data security--but carelessness can be an even bigger threat.&lt;/strong&gt;&lt;br/&gt;    			 			 		&lt;span class=&quot;small&quot;&gt;		July 10, 2006&lt;/span&gt;&lt;br/&gt; &lt;span class=&quot;small&quot;&gt; 				By Peter Alexander   				 &lt;/span&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;blockquote cite=&quot;http://www.entrepreneur.com/article/0,4621,328335,00.html&quot;&gt;&lt;DIV style=&quot;width: 585px; padding-left: 10px; padding-top: 10px;&quot;&gt; 			&lt;/DIV&gt;&lt;p&gt;Your small-business network may be protected by firewalls, intrusion detection and other state-of-the-art security technologies. And yet, all it takes is one person&#39;s carelessness, and suddenly it&#39;s as if you have no network security at all.&lt;/p&gt;  &lt;p&gt;Let me give you an example. In March 2006, a major financial services firm with extensive network security disclosed that one of its portable computers was stolen. The laptop contained the Social Security numbers of nearly 200,000 people. How did it happen? An employee of the firm, dining in a restaurant with colleagues, had locked the laptop in the trunk of a SUV. During dinner, one of the employee&#39;s colleagues retrieved an item from the vehicle and forgot to re-lock it. As fate would have it, there was a rash of car thefts occurring in that particular area at that particular time, and the rest is history.&lt;/p&gt;  &lt;p&gt;The moral of that story is clear: No matter how secure your network may be, it&#39;s only as secure as its weakest link. And people--meaning you and your employees--are often the weakest link. It&#39;s important to note that poor security puts your business, as well as your partners, at risk. As a result, many enterprises and organizations, such as credit-card companies, now specify and require minimum levels of security you must have in order to do business with them.&lt;/p&gt;  &lt;/blockquote&gt;&lt;p class=&quot;citation&quot;&gt;&lt;cite cite=&quot;http://www.entrepreneur.com/article/0,4621,328335,00.html&quot;&gt;&lt;a href=&quot;http://www.entrepreneur.com/article/0,4621,328335,00.html&quot;&gt;The Weakest Link in Network Security&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;  &lt;p/&gt;&lt;p/&gt;&lt;p style=&quot;font-size:10px;text-align:right;&quot;&gt;technorati tags:&lt;a href=&quot;http://technorati.com/tag/information&quot; rel=&quot;tag&quot;&gt;information&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/security&quot; rel=&quot;tag&quot;&gt;security&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/encryption&quot; rel=&quot;tag&quot;&gt;encryption&lt;/a&gt;, &lt;a href=&quot;http://technorati.com/tag/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://security-theater.blogspot.com/2006/07/weakest-link-in-network-security.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114868520237128874</guid><pubDate>Fri, 26 May 2006 23:04:00 +0000</pubDate><atom:updated>2006-06-19T20:01:26.536-04:00</atom:updated><title>Symantec AV Flaw</title><description>Wow, hot on the heels of my last post regarding antivirus options, there comes this news regarding Symantec Antivirus:&lt;br /&gt;&lt;br /&gt;A new vulnerability has been discovered by security firm eEye Digital Security in Symantec Antivirus 10.x and Client Security 3.x that could allow for remote code execution.  This does not appear to affect the consumer versions of Symantec&#39;s products.&lt;br /&gt;&lt;br /&gt;The vulnerability  report:&lt;br /&gt;&lt;a title=&quot;http://www.eeye.com/html/research/upcoming/20060524.html&quot; href=&quot;http://www.eeye.com/html/research/upcoming/20060524.html&quot;&gt;http://www.eeye.com/html/research/upcoming/20060524.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt; Other news articles on the subject:&lt;br /&gt;&lt;a title=&quot;http://www.eweek.com/article2/0,1895,1967941,00.asp&quot; href=&quot;http://www.eweek.com/article2/0,1895,1967941,00.asp&quot;&gt;http://www.eweek.com/article2/0,1895,1967941,00.asp&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;p&gt;&lt;/p&gt; &lt;a title=&quot;http://www.cnn.com/2006/TECH/internet/05/25/antivirus.flaw.ap/index.html?section=cnn_topstories&quot; href=&quot;http://www.cnn.com/2006/TECH/internet/05/25/antivirus.flaw.ap/index.html?section=cnn_topstories&quot;&gt;http://www.cnn.com/2006/TECH/internet/05/25/antivirus.flaw.ap/index.html?section=cnn_topstories&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;p&gt;&lt;/p&gt;Note that this is only a preliminary report from eEye, and Symantec should be given the opportunity to respond accordingly.&lt;br /&gt;&lt;br /&gt;While a vulnerability in a security product can be a scary thing, this shouldn&#39;t be too much concern for anyone who has implemented a reasonable amount of layered security, such as a firewall restricting port access to all systems, whether public-facing or not.</description><link>http://security-theater.blogspot.com/2006/05/symantec-av-flaw.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114865442903419582</guid><pubDate>Fri, 26 May 2006 14:23:00 +0000</pubDate><atom:updated>2006-05-26T10:40:29.096-04:00</atom:updated><title>Enterprise Antivirus Solutions?</title><description>My company&#39;s Symantec Antivirus Corporate Edition subscription is about to expire, so I figured this would an opportune time to examine other antivirus options.&lt;br /&gt;&lt;br /&gt;I&#39;ve used a number of antivirus solutions on the enterprise (or at least small-to-medium business) level, including Symantec, Trend Micro, CA, and Panda.  I&#39;ve fooled around on the personal computing level with some of the other options, such as McAfee and Grisoft.  I sort of inherited the existing Symantec setup at this company, and it has performed relatively well for us, purely on the level of virus scanning.  We had an issue about a year ago with a zero-day virus infection, but one we isolated the executable, Symantec quickly gave us a Rapid Release definition to detect and remove it.&lt;br /&gt;&lt;br /&gt;On the other hand, I&#39;m not that thrilled with the centralized administration Symantec offers in this product.  The deployment options are kind of klunky, and the ability to determine which computers on the network need the software installed is somewhat inadequate.  These are minor annoyances that could certainly deal with if necessary, if the rest of the product is satisfactory.&lt;br /&gt;&lt;br /&gt;The one thing I have a major problem with is the performance of the application.  A while back (I believe it was with version 10.0.1000), there was a bug that caused computers to boot up extremely slowly due to a startup scan that slowed everything down.  I believe the solution was to upgrade to version 10.0.1007, which disabled this scan at startup.  I&#39;m not sure if this has been rectified in later versions, but it seems to me that a startup scan would be a good thing, if it didn&#39;t hobble performance so much.&lt;br /&gt;&lt;br /&gt;In any event, if I didn&#39;t think there was anything better out there, I would probably just grin and bear it.  But I have had some very good experiences with Trend Micro (on a smaller scale, mind you), and Panda has been highly recommended by some of my peers.  I&#39;m not too crazy about CA, just because of some bad experiences with Cheyenne AV back in the Windows NT days.&lt;br /&gt;&lt;br /&gt;Any recommendations?  Or does anyone have any good resources, such as product comparisons and reviews from a reputable source?  I tried searching for reviews, but most of the comparisons I can find are no more recent than 2003.</description><link>http://security-theater.blogspot.com/2006/05/enterprise-antivirus-solutions.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114834645838019495</guid><pubDate>Tue, 23 May 2006 00:42:00 +0000</pubDate><atom:updated>2006-05-22T21:24:07.730-04:00</atom:updated><title>USB Drive Access Control Part 1</title><description>The security risk of allowing unfettered access to USB drives by employees is making me (and my CIO) nervous.  How are you dealing with this risk?&lt;br /&gt;&lt;br /&gt;Depending on the business needs of an organization, some people disable USB entirely, either through BIOS settings, registry changes, or the ultimate medieval solution: glue in the actual USB ports.  As we have a business need for some controlled access to USB drives, I can&#39;t go that route.&lt;br /&gt;&lt;br /&gt;So I&#39;m looking for some more granular control over USB device access.  I&#39;m looking for the following criteria:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Control access by user&lt;/li&gt;&lt;li&gt;Integration with Active Directory&lt;/li&gt;&lt;li&gt;Control access by device type - I&#39;m not talking about USB drives vs. CD drives.  I mean &quot;allow access to 512MB Kingston USB drive, but block all others,&quot; for example.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;There are quite a few products out there, but I don&#39;t have enough information yet to make an educated decision.  Here is the short list of products I requested more information from:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.devicelock.com/&quot;&gt;DeviceLock&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.pillar-solutions.com/p_device_wall/&quot;&gt;DeviceWall&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.securewave.com/sanctuary_DC.jsp&quot;&gt;Sanctuary Device Control&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.reflex-magnetics.com/products/disknetpro/&quot;&gt;Disknet Pro&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.gfi.com/endpointsecurity/&quot;&gt;EndpointSecurity&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Except for that last one, do I detect a naming trend?  I will post again after I have had a chance to evaluate these options.  I&#39;m also open to any other product suggestions that will meet my needs.</description><link>http://security-theater.blogspot.com/2006/05/usb-drive-access-control-part-1.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114661700190228500</guid><pubDate>Wed, 03 May 2006 00:34:00 +0000</pubDate><atom:updated>2006-05-02T20:43:21.916-04:00</atom:updated><title>Banking and Two-factor Authentication</title><description>There&#39;s an interesting article in Network World this week, written by Daniel Blum:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.networkworld.com/columnists/2006/042406blum.html&quot;&gt;Authentication: Where&#39;s the magic factor?&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;As someone who uses online banking as much as possible, I welcome the concept of two-factor authentication to increase security.  As the article points out, however, which two factors will the banks choose?  There is an overabundance of options from a number of different vendors. &lt;div class=&quot;more&quot;&gt;&lt;br /&gt;&lt;br /&gt;I think the solution that wins out will be the one that accomplishes the following:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;The bank will have a favorable ratio of good publicity to low cost of implementation.&lt;/li&gt;&lt;li&gt;The user will have increased confidence in their personal safety.&lt;/li&gt;&lt;li&gt;The user will little or no trouble adapting to the new authentication method.&lt;/li&gt;&lt;li&gt;The bank will be able to place more blame on users in the event of a security breach.&lt;/li&gt;&lt;/ol&gt;Obviously, since the banks will be footing the bill, the benefits that apply to them will probably outweigh everything else.  But don&#39;t discount the weight of public opinion.  If Bank A decides to implement this unwieldy biometric solution that requires each account holder to take a trip to the bank to have their retina scanned, and to pick up the scanner device to attach to their computer, they may lose customers to Bank B, who decided to send everyone an RSA SecureID token to use with their account.  While Bank A might have gone with the more secure solution (depending on your opinion of the accuracy of biometrics), Bank B has caused less inconvenience to their customers while still greatly increasing the security of their online banking solution. &lt;/div&gt;</description><link>http://security-theater.blogspot.com/2006/05/banking-and-two-factor-authentication.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114670546455824310</guid><pubDate>Sat, 29 Apr 2006 01:06:00 +0000</pubDate><atom:updated>2006-05-03T21:39:54.163-04:00</atom:updated><title>Password Policies on Disconnected Systems</title><description>Another great post from Jesper&#39;s blog, regarding what password policies are not enforced when a system is not connected to the domain:&lt;br /&gt;&lt;a href=&quot;http://blogs.technet.com/jesper_johansson/archive/2006/04/21/425991.aspx&quot;&gt;&lt;br /&gt;Some Password Policy Settings Are Not Enforced When Disconnected&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;My first thought when hearing the topic was, &quot;how can they ignore password expiration and account lockouts when disconnected?&quot;  After reading the explanation, however, I realize it couldn&#39;t be done any other way.  Both of these policies would make it extremely difficult for mobile users to function if they were applied when the user is disconnected. &lt;div class=&quot;more&quot;&gt;&lt;br /&gt;&lt;br /&gt;It&#39;s not that the policies are that much worse for mobile users (although Jesper recommends against account lockout policies anyway); the problem is the hoops that must be jumped through if someone runs afoul of one of these policies while away from the domain, or away from an internet connection entirely.&lt;br /&gt;&lt;br /&gt;The concept that a user will have to log in to a VPN in order to reset their expired password is bad enough.  I could see this being a huge issue for my mobile users, and for myself as well.&lt;br /&gt;&lt;br /&gt;But even worse is the account lockout policy.  If a laptop could be locked out by entering in the wrong password too many times, the only recourse would be to reconnect the laptop to your network to accept the re-enabling of the account.  No VPN shortcuts either; the computer would actually have to be connected for this to work.  Imagine having a company based on the U.S., and having a user lock themselves out while traveling overseas!  What do they do, ship the laptop back to the States?&lt;br /&gt;&lt;br /&gt;Thankfully, Microsoft has insightful people like Jesper who consider these issues before they become a problem. &lt;/div&gt;</description><link>http://security-theater.blogspot.com/2006/04/password-policies-on-disconnected.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114670160176514441</guid><pubDate>Thu, 27 Apr 2006 23:53:00 +0000</pubDate><atom:updated>2006-05-03T20:13:21.776-04:00</atom:updated><title>The wisdom of &quot;Temporary&quot; Adminstrators</title><description>Interesting post over on Jesper&#39;s blog:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://blogs.technet.com/jesper_johansson/archive/2006/04/19/425748.aspx&quot;&gt;&quot;Temporary &quot; Administrators&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;As Jesper explains, don&#39;t make anyone an administrator &lt;span style=&quot;font-style: italic;&quot;&gt;temporarily&lt;/span&gt;, unless you are prepared to trust them to be an administrator &lt;span style=&quot;font-style: italic;&quot;&gt;permanently&lt;/span&gt;.  A temporary administrator can put code in place that will give them access for long after you have revoked their administrative access.&lt;br /&gt;&lt;br /&gt;Malicious intentions aside, the pervasiveness of malware should make you think twice about doling out administrative privileges, whether on the local system or domain- (or enterprise-) wide.  All it takes is hitting one disreputable website with administrative privileges to turn a system into a Typhoid Mary. &lt;div class=&quot;more&quot;&gt;&lt;br /&gt;&lt;br /&gt;I have had the misfortune to deal with many systems in a similar circumstance.  One organization decided, in their shortsighted wisdom, to correct application access issues by giving users local admin rights.  This is all too common, especially in small to mid-sized businesses.  While this will alleviate the symptoms quickly, it will cause more problems in the long run.&lt;br /&gt;&lt;br /&gt;The process of bringing the users&#39; access down to acceptable levels of privilege was painful, but not as painful as attempting to eradicate some of the pests these users had accumulated over the months of surfing the web as administrators.  The last few lines of Jesper&#39;s post brought back the memory of the solution to this problem:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Courier New;font-size:85%;&quot;&gt;&quot;Is the rootkit now gone? Noohooo. It is still there, and will remain there until you use the rootkit removal tool: format c:\&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; (from neutral read-only media).&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;This is the only option in most cases, since you can never be sure you have gotten rid of every last piece of malware that can invade a system.  I have wasted way too many hours in the past attempting to clean a PC without wiping it out, only to go back a day later to find it just as infected as when I started, if not worse.  &lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://security-theater.blogspot.com/2006/04/wisdom-of-temporary-adminstrators.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114670641998317131</guid><pubDate>Wed, 26 Apr 2006 01:27:00 +0000</pubDate><atom:updated>2006-05-03T21:33:39.983-04:00</atom:updated><title>Penetration Testing vs Vulnerability Assessment</title><description>Informative post on the difference between pen testing and vulnerability assessment:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.darknet.org.uk/2006/04/penetration-testing-vs-vulnerability-assessment/&quot;&gt;Penetration Testing vs Vulnerability Assessment&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This post brings up an important point.  What most companies are looking for, at least initially, is a vulnerability assessment.  This allows you to generate a list of problems with your infrastructure that may need repair or some other form of mitigation.  This can take the form of a security audit, where you have some outside consultant come in and run all kinds of tests against your network, or it can take the form of some form of vulnerability scanning product, such as the one offered by &lt;a href=&quot;http://www.qualys.com&quot;&gt;Qualys&lt;/a&gt;.</description><link>http://security-theater.blogspot.com/2006/04/penetration-testing-vs-vulnerability.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114661068303774266</guid><pubDate>Mon, 24 Apr 2006 22:47:00 +0000</pubDate><atom:updated>2006-05-02T18:58:03.053-04:00</atom:updated><title>Why Winternals Sued Best Buy</title><description>While this is not a security-related issue directly, it concerns the illegal use of copyrighted software.  Why a company as large as Best Buy would choose to do something so blatantly illegal, I can&#39;t comprehend.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.sysinternals.com/blog/2006/04/why-winternals-sued-best-buy.html&quot;&gt;Why Winternals Sued Best Buy&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;On a separate note, the Winternals Administrator&#39;s Pak is one of the most useful collections of utilities I have ever come across as a network administrator.  While I have not had as much need for it since moving into the security field, I still recommend it every chance I get.</description><link>http://security-theater.blogspot.com/2006/04/why-winternals-sued-best-buy.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114660992353031713</guid><pubDate>Thu, 20 Apr 2006 22:40:00 +0000</pubDate><atom:updated>2006-10-25T02:08:02.893-04:00</atom:updated><title>Skype Risk Analysis</title><description>I spent some time reviewing the risks of Skype, a popular VoIP application.  I figured since i put the time into reading it, I&#39;d condense my thoughts into an article on the subject.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Disclaimer:&lt;/span&gt; I don&#39;t claim to have any inside knowledge of the workings of Skype.  The only information I have is based on documentation that is publicly available on their website, as well as a few other analyses I have seen on the web.&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b style=&quot;&quot;&gt;Overview&lt;/b&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Skype is a popular Voice over IP (VoIP) system, created by Niklas Zennström and Janus Friis, founders of KaZaA.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Similar to KaZaA, Skype is based on Peer-to-Peer (P2P) technology.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;While other VoIP services use a centralized server to manage communications sessions, Skype software clients directly interact with each other to ensure that the network directory is up to date and that calls are quickly completed.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;This P2P network allows clients in different locations to locate each other and send text messages, hold voice calls, and exchange data files.&lt;div class=&quot;more&quot;&gt;&lt;br /&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;Unlike KaZaA, which earns its revenue from advertisements, the Skype client contains no adware and spyware, at least at the time of this writing. Also, calls between Skype clients are free of charge.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Instead, the Skype system earns revenue by charging for the use of the gateway that interconnects the Skype network with the regular telephone system.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;code&gt;&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Another important detail to note is that KaZaA 3.0 contains its own integrated Skype client, so users of Skype may also be communicating with users of KaZaA, rather than just Skype users.&lt;/p&gt;&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Although some of the files that are traded over KaZaA are exchanged with the permission of the copyright holders, it appears that the primary use of KaZaA appears to be the illegal exchange of copyrighted songs and movies.    &lt;p class=&quot;MsoNormal&quot;&gt;&lt;b style=&quot;&quot;&gt;Description of Skype services&lt;/b&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;The Skype client can perform the following functions:&lt;/p&gt;  &lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Voice      calling to another Skype user&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Voice      conference calling&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Voice      calling to traditional telephone lines (SkypeOut)&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Voice      calling from traditional telephone lines (SkypeIn)&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Chat,      providing instant messaging for groups of up to 48 participants&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Cross-platform      file transfer&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Directory      and presence management&lt;/li&gt;&lt;/ul&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;Skype client software is compatible with the following platforms: Windows XP, Windows 2000, Linux, Apple Macintosh OS X, and Pocket PCs running Windows Mobile 2003.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;b style=&quot;&quot;&gt;Network Requirements&lt;/b&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;At a minimum, the following conditions must be true of the network being used by the computer running Skype for the Skype client to communicate :&lt;/p&gt;  &lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Outgoing      TCP connections should be allowed to remote ports 1024 and higher.&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Outgoing      TCP connections should be allowed to remote ports 80 and 443.&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;Outgoing      UDP packets should be allowed to remote ports 1024 and higher. For UDP to      be useful to Skype, the NAT must allow for replies to be returned to sent      UDP datagrams. (The state of UDP “connections” must be kept for at least      30 seconds, and Skype recommends that these translations be maintained for      as long as an hour, if possible.)&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;The      NAT translation should provide consistent translation, meaning that      outgoing address translation is usually the same for consecutive outgoing      UDP packets.&lt;/li&gt;&lt;/ul&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Skype is very effective at circumventing the restrictions of firewalls and Network Address Translation (NAT), provided most of the above requirements are met.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;b style=&quot;&quot;&gt;Skype Security&lt;/b&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;When discussing the security of a VoIP solution, there are a number of factors to take into account.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;&quot;&gt;Authentication&lt;/i&gt; – the only authentication being done by Skype is based on a user name and password.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Obviously, no one should ever share their Skype user name and password, or have it saved on their computer.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Potentially, anyone with User A’s user name and password could install a copy of the Skype client, and receive calls that were intended for User A.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Equally likely is the scenario where User B “borrows” User A’s laptop, and is able to use the Skype client with a saved password.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Of course, even if User B receives a call intended for User A, it is likely that the caller would be able to identify User A by their voice, in many cases.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;&quot;&gt;Encryption&lt;/i&gt; – According to Skype, all message contents between any pair of Skype users is encrypted end to end by utilizing the RSA encryption algorithm for key exchange and Advanced Encryption Standard (AES) in its AES-256 mode as its bulk encryption algorithm.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;The key for a Skype session is unique to that session and is not re-used. However, Skype does not publish its key exchange algorithm or its over-the-wire protocol and has not explained the underlying design of its certificates, is authentication system, or its encryption implementation. Therefore it is impossible to validate the company&#39;s claims regarding encryption.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;&quot;&gt;Integrity&lt;/i&gt; – Software running on P2P networks could have wide-ranging implications that are not completely understood yet.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;While the Skype client does not currently include any spyware or adware, there are no guarantees that it might not include them in the future.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;Also, as Skype is a completely closed-source system, it is harder to determine if the software contains vulnerabilities that could be exploited by malicious users.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;&quot;&gt;Bandwidth&lt;/i&gt; – If a Skype client makes a voice call to one person, the bandwidth usage is minimal, approximately 70kbps.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;However, if conference calling is used, or multiple users are running the Skype client, this can add up very quickly, and have an impact on internet bandwidth.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;&quot;&gt;File Transfer&lt;/i&gt; – Similar to Instant Messaging programs, and other P2P applications the Skype client can be used as a file transfer utility.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;This could potentially allow confidential information to be sent to unauthorized individuals.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;i style=&quot;&quot;&gt;Malware Vector&lt;/i&gt; – As mentioned above, files could be transferred between Skype clients.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;This could allow a virus to be brought into the network if the Skype client connects to another computer that is infected. Skype poses more risk than programs like KaZaA because they have built-in anti-virus protection that scans programs as they are downloaded; Skype appears to have no such protection.&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;&lt;b style=&quot;&quot;&gt;Conclusion&lt;/b&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;In some ways, the voice functionality of Skype appears to have more security than traditional telephone networks, based on the fact that the sessions are encrypted.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;However, we have no way of knowing how well the encryption is implemented, considering this is a closed source product. &lt;span style=&quot;&quot;&gt; &lt;/span&gt;It is also feasible that the Skype system could be compromised by a skillful attacker, or by a motivated insider. &lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;The larger concern is the risk of having unwanted software introduced by the Skype client.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;While the file transfer functionality is an easily recognizable vector, a less obvious risk is that the application itself could be compromised.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;If a buffer overflow could be utilized to make the application accept a malicious file and execute it, any connection made to the Skype client could be a potential attack.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;I am attempting to present both sides of the issue in this analysis.  The choice is yours whether this application is enough of a risk to restrict its use in your organization. &lt;/div&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;</description><link>http://security-theater.blogspot.com/2006/04/skype-risk-analysis.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114493455668928812</guid><pubDate>Thu, 13 Apr 2006 13:21:00 +0000</pubDate><atom:updated>2006-04-13T09:27:44.296-04:00</atom:updated><title>Who Sets The Audit Standards? Part 3 of 3</title><description>And here is part 3 of this informative series.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.rsasecurity.com/blog/entry.asp?id=1080&quot;&gt;http://www.rsasecurity.com/blog/entry.asp?id=1080&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Topics covered include what members get out of a professional body, and what needs to be done to further support professionalism.  This is the final part of the series, so it also includes a conclusion.</description><link>http://security-theater.blogspot.com/2006/04/who-sets-audit-standards-part-3-of-3.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114428456528355998</guid><pubDate>Thu, 06 Apr 2006 00:45:00 +0000</pubDate><atom:updated>2006-04-05T20:51:44.156-04:00</atom:updated><title>Who Sets The Audit Standards? Part 2 of 3</title><description>Part 2 of 3 of a very interesting series by John Madelin.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.rsasecurity.com/blog/entry.asp?id=1077&quot;&gt;http://www.rsasecurity.com/blog/entry.asp?id=1077&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Among the topics, the devaluation of the CISSP brand, whether the scope of financial auditors should be broadened to include security concerns, and what constitutes a &quot;Professional Body.&quot;&lt;br /&gt;&lt;a href=&quot;http://www.rsasecurity.com/blog/entry.asp?id=1077&quot;&gt; &lt;/a&gt;</description><link>http://security-theater.blogspot.com/2006/04/who-sets-audit-standards-part-2-of-3.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114420221227722249</guid><pubDate>Wed, 05 Apr 2006 01:53:00 +0000</pubDate><atom:updated>2006-04-27T20:49:42.896-04:00</atom:updated><title>StillSecure StrataGuard 4.5 Free</title><description>Alessandro Perilli from Security Zero wrote an excellent &lt;a href=&quot;http://www.securityzero.com/2006/04/review-strata-guard-free.html&quot;&gt;review of StrataGuard 4.5 Free&lt;/a&gt;, an Intrusion Detection System that is available free of charge.&lt;br /&gt;&lt;br /&gt;Based on this review, I&#39;m downloading a copy of the ISO to try on my test network.</description><link>http://security-theater.blogspot.com/2006/04/stillsecure-strataguard-45-free.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114420024647402561</guid><pubDate>Wed, 05 Apr 2006 01:15:00 +0000</pubDate><atom:updated>2006-04-04T21:24:06.490-04:00</atom:updated><title>Florida band blocked from trip by terrorism fears</title><description>This story is somewhat close to my heart, because I have family in Southwest Florida.  And I will admit that I was in my high school band, and we went on trips, but none as cool as this.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.news-press.com/apps/pbcs.dll/article?AID=/20060317/NEWS01/60317033/1075&quot;&gt;Fort Myers High band denied trip to London &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This band is actually invited to go to London, tour some famous historical landmarks, and participate in the 2007 New Years&#39; Day Parade.  School officials are blocking the opportunity because of the terrorist attack from July 2005.  Any terrorist reading about this story would think &quot;mission accomplished.&quot;&lt;br /&gt;&lt;br /&gt;Note: I first picked up on this from &lt;a href=&quot;http://www.stupidsecurity.com/article.pl?sid=06/04/02/0540218&quot;&gt;Stupid Security.&lt;/a&gt;</description><link>http://security-theater.blogspot.com/2006/04/florida-band-blocked-from-trip-by.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114419726904227501</guid><pubDate>Tue, 04 Apr 2006 23:55:00 +0000</pubDate><atom:updated>2006-05-02T20:12:17.730-04:00</atom:updated><title>Block Google Desktop</title><description>Many organizations are not so keen on their employees using Google Desktop within their enterprise.  I share that apprehension, and I have done a little research into what can and cannot be done to rein in this overly communicative application.&lt;br /&gt;&lt;br /&gt;A lot of the credit for being able to control this application must go to Google.  I&#39;m not sure if this was the case when it was initially released, but the current Enterprise version of the program includes some great resources.  Most importantly, it includes an Administrative Template for Windows Group Policy.  If you load this template into a GPO, you can effectively curtail any behavior you deem unsuitable for your network. &lt;div class=&quot;more&quot;&gt;&lt;br /&gt;&lt;br /&gt;For my money, the most important settings in this template are the following:&lt;br /&gt;   &lt;span style=&quot;font-weight: bold;&quot;&gt;1. Prohibit Policy-Unaware versions&lt;/span&gt; - Prohibits installation and execution of versions of Google Desktop that are unaware of Group Policy.&lt;br /&gt;   &lt;span style=&quot;font-weight: bold;&quot;&gt;2. Disable sharing and receiving of web history and documents across computers &lt;/span&gt;- Prevent Google Desktop from sharing the user&#39;s web history and document contents across the user&#39;s different Google Desktop installations, and will also prevent it from receiving such shared items from the user&#39;s other machines.&lt;br /&gt;   &lt;span style=&quot;font-weight: bold;&quot;&gt;3. Disallow Plug-ins&lt;/span&gt; - Prevent installation of Google Desktop plug-ins.&lt;br /&gt;&lt;br /&gt;If you put these three policy settings in place, you&#39;ll be much better off from a security standpoint than if you do nothing.&lt;br /&gt;&lt;br /&gt;If you want to go further, you can take some steps to completely block Google Desktop from running at all.  Some suggestions:&lt;br /&gt;   &lt;span style=&quot;font-weight: bold;&quot;&gt;4. Prevent Indexing policy settings&lt;/span&gt; - There are about 19 different &quot;Prevent indexing of ...&quot; policy settings in the Administrative Template.  You can enable some or all of them to prevent that category from being indexed at all.  If it&#39;s not indexed, it can&#39;t be shared, copied, or transmitted to a third party.&lt;br /&gt;   &lt;span style=&quot;font-weight: bold;&quot;&gt;5. Software Restriction Policies&lt;/span&gt; - You can enable these policies through Group Policy, and choose to disallow the application from running throughout a domain either based on a path rule (C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe) or based on a hash rule, where Windows creates a hash of the current version of the file.  (Note, the hash will be rendered obsolete if the version of Google Desktop is updated, but that can be prevented with the following 2 entries)&lt;br /&gt;   &lt;span style=&quot;font-weight: bold;&quot;&gt;6. Block Auto-update setting&lt;/span&gt; - Another Administrative Template setting; you can choose to block updates to the program.  No updates = no additional functionality to worry about blocking.&lt;br /&gt;   &lt;span style=&quot;font-weight: bold;&quot;&gt;7. Content Filtering&lt;/span&gt; - You could add desktop.google.com to whatever method you use to block access to websites.  If your users can&#39;t get there, they can&#39;t download the installer in the first place.&lt;br /&gt;&lt;br /&gt;I&#39;m sure there are other methods that can be used to block Google Desktop, but I&#39;ve found these to be pretty effective.  I must admit, I would probably be doing a lot more administrative acrobatics (such as blocking things through firewall ACLs, or more group policy settings) if Google had not released their Enterprise software.  I should also note that it includes an Admin Guide that explains a lot of the features of the program, including all the settings in the Administrative Template file.&lt;br /&gt;&lt;br /&gt;While Desktop Search Engines (DSE&#39;s) such as Google Desktop do present a risk, that risk can be mitigated, as long as the software company is willing to provide the tools to do so.  I think Google is setting a very good example with their Google Desktop for Enterprise option.&lt;br /&gt;&lt;br /&gt;I intend to explore other DSE&#39;s in the near future.  I will post my findings.&lt;br /&gt;&lt;/div&gt;</description><link>http://security-theater.blogspot.com/2006/04/block-google-desktop.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114411650046005150</guid><pubDate>Tue, 04 Apr 2006 01:47:00 +0000</pubDate><atom:updated>2006-05-02T20:15:46.476-04:00</atom:updated><title>Termination Procedures</title><description>It is very important for businesses of any size to have in place specific procedures that must be followed whenever an employee leaves the company, whether of his own volition, or by the action of the company.  As I mentioned in my previous post, these procedures must be followed no matter which employee is being terminated.&lt;br /&gt;&lt;br /&gt;Some considerations for such a procedure:&lt;br /&gt;&lt;br /&gt;1. &lt;span style=&quot;font-weight: bold;&quot;&gt;Document it.&lt;/span&gt;  It doesn&#39;t matter if your company has only 1 server that runs 1 critical application, and an email server; there should be a written document that explains how to remove access for any user, and how to disable or delete their email address.&lt;code&gt;&lt;div class=&quot;more&quot;&gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;2. &lt;span style=&quot;font-weight: bold;&quot;&gt;Be comprehensive.&lt;/span&gt;  On the flip-side of the coin, if you have 30 or 40 servers, 5 applications for each department or business unit, and email, VPN access, intranet applications, etc; you need to have a checklist for each item so that all access to each system can be verified and removed.&lt;br /&gt;&lt;br /&gt;3. &lt;span style=&quot;font-weight: bold;&quot;&gt;Know your users.&lt;/span&gt;  This ties in to #2.  If you don&#39;t know what accounts are out there, you may not be able to track them all down when you need to.  Make sure all user accounts for each system are documented per employee, so that you can easily figure out which systems to go to first when disabling accounts.  It&#39;s important to check the rest, just in case, but if it&#39;s going to take you the better part of an hour to get through &lt;span style=&quot;font-style: italic;&quot;&gt;everything&lt;/span&gt;, it helps to prioritize.&lt;br /&gt;&lt;br /&gt;4. &lt;span style=&quot;font-weight: bold;&quot;&gt;Beyond IT.&lt;/span&gt;  Not unreasonably, we tend to focus on computer systems access, since that is our main responsibility.  But it is important to think beyond the PCs and servers during terminations.  For instance, access to voicemail boxes, teleconferencing systems, keycard entry systems, combination locks, even old-fashioned key locks.  While not all these may be &quot;owned&quot; by IT, they must be part of the procedure, so the person or department responsible for restricting those means of access can be notified and respond in a timely fashion.&lt;br /&gt;&lt;br /&gt;5. &lt;span style=&quot;font-weight: bold;&quot;&gt;Independent verification.&lt;/span&gt;  Not that I&#39;m suggesting anyone shouldn&#39;t be trusted, but it is a good practice to have a second pair of eyes verify that access has been completely removed during the termination procedures.  In that case of having 30 servers or so to go through, it can be a tedious process, and anyone can miss an obscure method of access.  Human error should be taken into account in any process whenever possible.&lt;br /&gt;&lt;br /&gt;That&#39;s the overview for terminations.  These procedures should be part of the security manual of any company, large or small. &lt;/div&gt;</description><link>http://security-theater.blogspot.com/2006/04/termination-procedures.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114376397398978528</guid><pubDate>Fri, 31 Mar 2006 00:09:00 +0000</pubDate><atom:updated>2006-03-30T19:12:54.003-05:00</atom:updated><title>Who sets the audit standards?</title><description>I found this article on the RSA Security Blog.  It is the first of three-part series, so it is mainly focused on the background of auditing and accounting.  It&#39;s an interesting read, I&#39;m sure the next two parts will be equally informative.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.rsasecurity.com/blog/entry.asp?id=1076&quot;&gt;Who Sets the Audit Standards? Part 1 of 3&lt;/a&gt;</description><link>http://security-theater.blogspot.com/2006/03/who-sets-audit-standards.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-23642591.post-114277769198049454</guid><pubDate>Sun, 19 Mar 2006 14:13:00 +0000</pubDate><atom:updated>2006-03-19T23:52:56.783-05:00</atom:updated><title>Security Audit Time</title><description>Today&#39;s the day.  We&#39;re having an external security auditor come in to take a look at one the networks I work with.  I&#39;m not expecting any earth-shattering revelations, but, having dealt with this firm before, they usually come back with some interesting suggestions.  If that is the case today, I will share the love.</description><link>http://security-theater.blogspot.com/2006/03/security-audit-time.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>