02.06.2013 Views

Editor's note

Editor's note

Editor's note

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

If we have made an in-depth risk analysis (sorry if I<br />

insist), we should know that even when these devices<br />

are not company-owned, we still need to include them<br />

in the strategic security plan; to say it clearly: wherever<br />

there is company valuable information, there are no<br />

excuses for not protecting it.<br />

Illegal Software, Dual Problem<br />

I Unfortunately it is true that many people use illegal<br />

software as a protection method!<br />

Besides being a logical nonsense, it entails a severe<br />

risk since there are many documented threats hidden in<br />

antivirus software or other kinds of allegedly fake antimalware;<br />

not to mention illegal software infection rates,<br />

usually downloaded from sites specialized in these<br />

matters.<br />

We are all responsible for bringing awareness both to<br />

companies and individuals; similarly we are accountable<br />

for pursuing the necessary know-how to understand this<br />

world we live in and decrease risk exposure.<br />

Keep One’s Eyes On The Ball<br />

Many of the APT type attacks have been targeted<br />

to access and expose an organization’s sensitive<br />

information.<br />

In some cases, information disclosed was not that<br />

valuable per se; but the discredit caused by such a<br />

disclosure was!<br />

What would happen if we could protect information in<br />

such a way that even when accessed by an attacker the<br />

same could not be used? Well, that’s what I mean when<br />

I say we should keep one’s eyes on the ball!<br />

Some experts recommend use of different encryption<br />

techniques (more or less complex and focused on<br />

different devices) as a way to reduce information<br />

exposure degree.<br />

Even when information could be accessed and<br />

extracted from the organization, decryption would be<br />

such a complex process that it would take hundreds<br />

or thousands of years to decrypt, using last generation<br />

computers, thus making its practical use impossible.<br />

This clearly raises many other technical nature<br />

challenges, e.g. digital certificates custody, though if we<br />

consider we still have the chance to apply much simpler<br />

techniques for applications like files encoding and<br />

database encryption for applications, just to mention a<br />

few, this kind of risk mitigation techniques could have<br />

their preferential space in the next future of information<br />

security.<br />

Give Him An Inch And He Will Take A Mile<br />

Stuxnet, Operation Shady RAT and the attacks against<br />

the International Olympic Committee and the World<br />

starterkit 02/2011(2)<br />

SOCIAL FRAUD<br />

Anti-Doping Agency (reportedly hidden and active at<br />

least during 5 years), among many others, are clear<br />

examples of what could happen but are not decisive<br />

when it comes to analyzing the future; all we can attest<br />

is not knowing what new threats will appear.<br />

However, we’ve got so much to do before giving up,<br />

some people even say that this is a war and that we can<br />

win it; I believe it’s too soon to say that, though without<br />

a doubt there’s plenty of room for improvement in most<br />

companies and public agencies information security<br />

management systems.<br />

There is one point where many experts agree; i.e.<br />

that new attacks call for new monitoring, detection, and<br />

prevention techniques; however these techniques do<br />

exist, the problem is just that they are not used widely<br />

enough.<br />

Just to give you an example; the SIEM (Security<br />

Information and Event Management) notion is<br />

practically unknown and partially implemented by many<br />

organizations, missing the opportunity to have at least<br />

integral monitoring systems that enable threat detection<br />

from the behavioral standpoint, supplementing pattern<br />

detection systems and other heuristic techniques; a<br />

value added for this kind of systems is that they enable<br />

audit leads, very useful to minimize impact in the event<br />

of an attack!<br />

GABRIEL MARCOS<br />

Twitter: @jarvel<br />

Page 34 http://pentestmag.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!