11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Introduction to Security<br />

In <strong>the</strong> early days, security was not high on <strong>the</strong> list <strong>of</strong> issues facing s<strong>of</strong>tware engineers, even for<br />

those involved in DoD systems, except for those who developed s<strong>of</strong>tware for classified systems.<br />

At best, most used defensive techniques aimed at surviving mistakes users might make. They seldom<br />

concerned <strong>the</strong>mselves with <strong>the</strong> possibility that someone with malicious intent might subvert<br />

<strong>the</strong>ir systems.<br />

This was particularly true <strong>of</strong> <strong>the</strong> internet, which was spawned from <strong>the</strong> ARPANET [Leiner 2012,<br />

Museum 2006]. The ARPANET began as a research-oriented development to <strong>of</strong>fer packet switching<br />

as a new paradigm in network construction—it was a research project for researchers. The underlying<br />

technology was developed with an open, trusting style. Everyone was expected to be a<br />

friendly user. Indeed, <strong>the</strong>re was a culture <strong>of</strong> cooperation and a willingness to contribute fixes for<br />

common problems that was self-regulating.<br />

Initially, <strong>the</strong> expansion <strong>of</strong> <strong>the</strong> ARPANET to <strong>the</strong> internet simply expanded <strong>the</strong> user community to a<br />

broader segment <strong>of</strong> <strong>the</strong> research community. However, once <strong>the</strong> commercial potential was realized,<br />

<strong>the</strong> rapid growth led to a user pr<strong>of</strong>ile that more closely reflects <strong>the</strong> general population. Unfortunately,<br />

<strong>the</strong> general population includes mischievists, thieves, and criminals.<br />

Several people, including those who developed <strong>the</strong> underlying technology, warned that <strong>the</strong> internet<br />

was not intended to be secure and that <strong>the</strong>re was a serious potential for abuse. Although<br />

DARPA began investigating security solutions [FAS 2000], <strong>the</strong>re was little concern among users<br />

because <strong>the</strong>re was no “smoking gun”—no indication that anyone would seriously attack <strong>the</strong> internet<br />

or systems on <strong>the</strong> internet. While <strong>the</strong>re were some attacks, <strong>the</strong>re was still no clear indication <strong>of</strong><br />

a persistent threat and, <strong>the</strong>refore, no serious attention given to security.<br />

Genesis <strong>of</strong> <strong>the</strong> CERT Coordination Center<br />

That ambivalence was rudely shaken on November 2, 1988, when a graduate student released a<br />

worm on <strong>the</strong> internet [ACM 1989]. The Morris Worm (named for its inventor) brought <strong>the</strong> internet<br />

to its knees. For <strong>the</strong> 72 hours after <strong>the</strong> release <strong>of</strong> <strong>the</strong> worm, <strong>the</strong> research community, coordinated<br />

by two program managers at DARPA, reverse engineered <strong>the</strong> worm to understand how it<br />

functioned, <strong>the</strong>n began to provide advice to systems administrators on removing <strong>the</strong> worm. Communication<br />

was hampered because <strong>the</strong> worm clogged <strong>the</strong> network, <strong>the</strong> primary means <strong>of</strong> communication<br />

for many sites. Moreover, many sites removed <strong>the</strong>mselves from <strong>the</strong> ARPANET altoge<strong>the</strong>r,<br />

fur<strong>the</strong>r hampering communication and <strong>the</strong> transmission <strong>of</strong> <strong>the</strong> solution that would stop <strong>the</strong><br />

worm. Although <strong>the</strong> ad hoc collaboration <strong>of</strong> experts from around <strong>the</strong> country was effective in defeating<br />

<strong>the</strong> worm, DARPA realized that <strong>the</strong> worm, though destructive, was reasonably benign in<br />

relation to havoc it might have wreaked if Morris had been more malicious. DARPA management<br />

knew that <strong>the</strong>re would certainly be more malicious attacks in <strong>the</strong> future and, <strong>the</strong> following week,<br />

asked <strong>the</strong> <strong>SEI</strong> to propose a mechanism that would encourage and support collaboration among<br />

technical experts in resolving security problems, and coordinate <strong>the</strong>ir response activities in <strong>the</strong><br />

event <strong>of</strong> future attacks against <strong>the</strong> internet and connected systems.<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 161<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!