Take A Deep Breath

In the midst of the recent surge of security hype and angst, a dose of perspective

Rich Mogull, Analyst & CEO, Securosis, Contributor

December 17, 2010

4 Min Read
Dark Reading logo in a gray background | Dark Reading

The past few weeks in the information security world have been some of the most visible, if not interesting, we've seen in a long time. From China's BGP routing incident, to WikiLeaks, to McDonalds, to Gawker, we've seen a spate of high-visibility incidents thrusting security to the forefront of the public consciousness. In the midst of this feeding frenzy we, the security industry, seem as likely to eat our own as we struggle to balance truth and context with the inevitable media hype.

Watching and reading the articles, tweets, and blog posts in highlights a problem I think we often struggle with as a collective group perspective. It's not an issue that's even exclusive to our industry; it's so common it's known as a standard cognitive bias called dformation professionnelle. The tendency to see the world through the eyes of your profession and forget the broader context.

This isn't an accusation; trust me, I struggle with career-induced bias on a daily basis. But it's important to take a step back sometimes, review our reactions, examine the context, and reset our perspective. There are a few specific examples from the past weeks I think well-highlight what I mean:

* Weak passwords on a throw-away site aren't a big deal. Who cares if 83 percent of Gawker readers use 123456 as their password? Unless they are using the same password for their email or financial accounts it doesn't matter. At all. The users aren't all stupid, they just don't consider Gizmodo comments something worth dedicating any mental resources to protect. Yes, some percentage of the users are really exposed due to password reuse, but in the end I suspect the number of people detrimentally affected will be fairly limited.

* No, 15 percent of Internet traffic wasn't routed through China, and the overall security exposure to the US was likely minimal. And yes, BGP routing mistakes happen all the time. But when such an error originates in a nation that we know for a fact is actively penetrating our systems, it's okay to be suspicious. And if a little hype gets us funding to secure our routing, so much the better.

* The preface "cyber" isn't evil, even when it's overused. It's cool, people like it, and it's part of the common lexicon. That said, a group of dedicated prankster activists executing a distributed denial of service attack against some businesses doesn't meet any definition of war.

* Someone always has a network that is bigger, more complex, or with different business/mission requirements than yours. It's easy to shoot from the sidelines, I do it all the time, but never assume even a "Security 101" control will work everywhere, for everyone. Not that we should excuse stupid mistakes, but especially in larger environments the issues around even seemingly minor changes are nearly seizure-inducing. (That might seem hypocritical coming from an analyst, but there's a difference between my writing for a broad audience and direct advice to individuals).

* You can't eliminate incidents like WikiLeaks. Yes, the DoD made Bradley Manning's crime easier than it should have been due to some lax controls, but even with all the best security in place leaks like this will happen. I don't care how much DLP or portable media blocking tools you put in place.

* Losing real names and a bunch of emails in a big phishing attack like the one against McDonalds' provider isn't great, but it isn't like not having that info ever slowed the bad guys down.

Security isn't failing. Banks are still in business (despite their best efforts), we can still shop on Amazon, and at least a few computers out there aren't pwned zombies selling Viagra. The real question we need to ask ourselves isn't if we've "won", but whether the percentage of the aggregate of fraud (online and off, financial and otherwise) is demonstrably bigger? If it's historically been at 2 percent and now it's at 5 percent, then we are failing. If it's about the same, perhaps we just have a migration from offline fraud to online. But at the end of the day the bad guys are going to get their 2 percent, like they always have.

Yes, it's a drag on the system and yes, we all collectively pay for that and it would be great to reduce it. But ultimately although the tactics have changed, the outcome remains the same, regardless of what the punditry tries to tell you.

Rich Mogull is founder of Securosis LLC and a former security industry analyst for Gartner Inc. Special to Dark Reading.

About the Author

Rich Mogull, Analyst & CEO, Securosis

Contributor

Rich has twenty years experience in information security, physical security, and risk management. He specializes in cloud security, data security, application security, emerging security technologies, and security management. He is also the principle course designer of the Cloud Security Alliance training class and actively works on developing hands-on cloud security techniques. Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team. Prior to his seven years at Gartner, Rich worked as an independent consultant, web application developer, software development manager at the University of Colorado, and systems and network administrator. Rich is the Security Editor of TidBITS and a frequent contributor to publications ranging from Information Security Magazine to Macworld. He is a frequent industry speaker at events including the RSA Security Conference, Black Hat, and DefCon, and has spoken on every continent except Antarctica (where he's happy to speak for free -- assuming travel is covered).

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights