network SECURITY SE CURITY
ISSN 1353-4858 February 2009
www.networksecuritynewsletter.com
Contents
Featured this month: De-perimeterisation: inevitable and essential
I
n a world where employees are mobile, businesses are highly interconnected, and the internet is king, the difference between ‘secure’ private networks and ‘insecure’ public networks is blurring. To tackle the security challenges of this new way of doing business, security professionals need to de-perimeterise, focusing on data rather than the network, and phasing out traditional perimeter security.
Key elements of de-perimeterisation are hardening every endpoint, web-enabling applications, encrypting data at rest and in transit, and enforcing data-level authentication and authorisation. The new, de-centralised, distributed model has been proven to support the secure exploitation of the potential of ebusiness. Go to Page 7…
A window to the world?
W
eb 2.0, cloud computing, AJAX, and web applications represent the future of internet use. As a result, web content has undergone an explosion as businesses integrate data and services and present complex internal IT systems to users on the outside of the network perimeter. This represents a risk to the network, as a poorly configured CMS means that network security
can be quickly bypassed, data assets corrupted, user information accessed, and the network compromised.
Tamas Biro, co-founder of Sense/Net, looks at potential threats from a badly managed corporate website, and how to take steps to minimise the issues. Go to Page 11…
News Cybersecurity: Obama takes care of business
1
Kyrgyzstan comes under cyberattack
2
Cost of breaches rises
3
Features Password protection: the next generation Passwords and access codes are the core foundations to protect access to computer systems. This article looks at how these passwords are constructed, the underlying technical details and lessons to enhance them as security threats increase. 4 De-perimeterisation: inevitable and essential Mobile working and ebusiness have blurred the boundaries of the corporate network. Alastair Broom of Dimension Data explains how networks must adapt to cope with new security requirements. 7 A window to the world? New web publishing techniques are improving consumer experience but when built on insecure platforms or principles, are they wide open doors into corporate networks? 11
Cybersecurity: Obama takes care of business
From vulnerability to patch: the window of exposure
P
The gap between the identification of a vulnerability and the release of a patch is a crucial period. Aditya Sood explains how researchers and product vendors navigate it.
resident Obama treated federal cybersecurity as one of his first points of business after taking office last month. Within a month of his inauguration, he set out a cybersecurity policy, and appointed a former key national intelligence executive to conduct a wideranging review of federal cybersecurity.
The president appointed Melissa Hathaway, former top cybersecurity advisor to the director of national intelligence under former president Bush, as acting senior director for Cyberspace for the National Security and Homeland Security Councils. She will develop a strategic framework to ensure that cybersecurity initiatives are properly integrated and
resourced, said a White House statement, and will also co-ordinate cybersecurity efforts between the federal government, Congress, and the private sector. Hathaway’s appointment makes her a likely candidate for permanent ‘cyberczar’, in which she would oversee the federal Government’s entire cybersecurity effort. Obama laid out the position when he transferred his cybersecurity strategy from his election campaign site to the White House site. In addition to a national cybersecurity advisor, he also vowed to promote research and development into safe computing, with an emphasis on “a new generation of
14
Three tips for your network Bruce Potter outlines three must-do tips for securing your network. 16 The death of MD5 Existing research had already rendered the MD5 hashing algorithm suspect. More recent work has confirmed its inadequacy. Dario Forte discusses what researchers found – and what happens next. 18 Regulars News in brief Events
3 20
ISSN 1353-4858/09 © 2009 Elsevier Ltd. All rights reserved This journal and the individual contributions contained in it are protected under copyright by Elsevier Ltd, and the following terms and conditions apply to their use: Photocopying Single photocopies of single articles may be made for personal use as allowed by national copyright laws. Permission of the publisher and payment of a fee is required for all other photocopying, including multiple or systematic copying, copying for advertising or promotional purposes, resale, and all forms of document delivery. Special rates are available for educational institutions that wish to make photocopies for non-profit educational classroom use.
NEWS
Editorial Office: Elsevier Ltd, The Boulevard, Langford Lane Kidlington, Oxford OX5 1GB, United Kingdom Programme Editor: Steve Barrett Tel: +44 (0)1865 843239 Fax: +44 (0)1865 853933 Email:
[email protected] Web: www.networksecuritynewsletter.com Editor: Danny Bradbury Email:
[email protected] Senior Editor: Sarah Gordon International Editoral Advisory Board: Dario Forte, Edward Amoroso, AT&T Bell Laboratories; Fred Cohen, Fred Cohen & Associates; Jon David, The Fortress; Bill Hancock, Exodus Communications; Ken Lindup, Consultant at Cylink; Dennis Longley, Queensland University of Technology; Tim Myers, Novell; Tom Mulhall; Padget Petterson, Martin Marietta; Eugene Schultz, Hightower; Eugene Spafford, Purdue University; Winn Schwartau, Inter.Pact Production Editor: Lin Lucas Subscription Information An annual subscription to Network Security includes 12 printed issues and online access for up to 5 users. Prices: 1052 for all European countries & Iran US$1177 for all countries except Europe and Japan ¥139 600 for Japan (Prices valid until 31 December 2009) To subscribe send payment to the address above. Tel: +44 (0)1865 843687/Fax: +44 (0)1865 834971 Email:
[email protected], or via www.networksecuritynewsletter.com Subscriptions run for 12 months, from the date payment is received. Periodicals postage is paid at Rahway, NJ 07065, USA. Postmaster send all USA address corrections to: Network Security, 365 Blair Road, Avenel, NJ 07001, USA Permissions may be sought directly from Elsevier Global Rights Department, PO Box 800, Oxford OX5 1DX, UK; phone: +44 1865 843830, fax: +44 1865 853333, email:
[email protected]. You may also contact Global Rights directly through Elsevier’s home page (www.elsevier.com), selecting first ‘Support & contact’, then ‘Copyright & permission’. In the USA, users may clear permissions and make payments through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA; phone: +1 978 750 8400, fax: +1 978 750 4744, and in the UK through the Copyright Licensing Agency Rapid Clearance Service (CLARCS), 90 Tottenham Court Road, London W1P 0LP, UK; tel: +44 (0)20 7631 5555; fax: +44 (0)20 7631 5500. Other countries may have a local reprographic rights agency for payments. Derivative Works Subscribers may reproduce tables of contents or prepare lists of articles including abstracts for internal circulation within their institutions. Permission of the Publisher is required for resale or distribution outside the institution. Permission of the Publisher is required for all other derivative works, including compilations and translations. Electronic Storage or Usage Permission of the Publisher is required to store or use electronically any material contained in this journal, including any article or part of an article. Except as outlined above, no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission of the Publisher. Address permissions requests to: Elsevier Science Global Rights Department, at the mail, fax and email addresses noted above. Notice No responsibility is assumed by the Publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. Because of rapid advances in the medical sciences, in particular, independent verification of diagnoses and drug dosages should be made. Although all advertising material is expected to conform to ethical (medical) standards, inclusion in this publication does not constitute a guarantee or endorsement of the quality or value of such product or of the claims made of it by its manufacturer.
02158
2
Printed by Mayfield Press (Oxford) Limited
Network Security
secure hardware and software”. The agenda also calls for new cybersecurity standards, anti-corporate cyber-espionage systems, and a cohesive strategy to fight cybercrime. He also promised to mandate standards to secure personal data, along with data breach notification rules.
Kyrgyzstan comes under cyberattack
that many different groups and motives may have perpetrated the attack, for any number of personal or commercial reasons. The DDoS traffic abated during the first week of February, a few days before a meeting between the Kyrgyz president and Russian officials to thrash out the details of the investment deal.
Cost of breaches rises
S
T
Don Jackson, senior security researcher at SecureWorks, was convinced that the Russian government was behind the attack, which he theorised was an attempt to block western access to independent media sites in the country. The opposition to the Kyrgyz Government had been using the sites to oppose the suggested closure of a US airbase in the country, which had been debated as a sweetener for a Russian investment deal. Jeffrey Carr, CEO of private sector cyber-intelligence firm GreyLogic, believed that the Kyrgyz Government could have stopped the attack at any time. Instead, he suggested that it had paid Russian hackers to instigate the attack, with the same suggested motive: to quash the opposition’s voice. Rafal Rohozinski, principal investigator for the OpenNet Initiative, argued that neither theory could be proven, and suggested
The Ponemon Report, 2008 Annual Study: Cost of a Data Breach, also revealed that data breaches as a result of outsourced functions had increased over previous years, and that first-time victims suffered greater costs than those that had already experienced a breach. The per-victim cost of a data breach was $243, compared to $192 for those who had suffered breaches in the past. The 69% of data breach costs stemming from lost business was reflected in an increase in the average customer churn rate suffered by companies that were victims of data loss. The 2008 churn rate was 3.6%, up from 2.67% last year. The healthcare industry was the most affected, with a 6.5% churn rate, followed by finance at 5.5%. The percentage of breaches down to third-party organisations such as contractors, customers, and outsourcers increased to 44% in 2008, over 40% in 2007, and 29% in 2006. The survey examined the experiences of 43 US companies across 17 different sectors that had suffered from data losses.
ecurity experts were musing over the perpetrator of a DDoS attack on the former soviet state of Kyrgyzstan last month, following a flood of traffic from Russian networks that pounded the country’s relatively underdeveloped network infrastructure. High-up officials in the Kyrgyz ISP community reported the attack on 18 January to intelligence groups in the West.
he average cost of data breaches is rising, according to a report from the Ponemon Institute, which says that lost business is the biggest expense for companies that have their data pilfered.
Average cost of a data breach (Source: Ponemon 2008 annual study: Cost of a data breach).
February 2009