Changed jobs
Since January 1st, 2007 I have accepted an new job. To prevent conflicts with my new job, I will be posting a lot less on this blog. Maybe I will pick it up again later.
Take care,
Aart
Labels: blogging
This Blog reflects my thoughts about some topics in the field of security management and infrastructure security.
Since January 1st, 2007 I have accepted an new job. To prevent conflicts with my new job, I will be posting a lot less on this blog. Maybe I will pick it up again later.
Labels: blogging
A group of enthusiastic security professionals have started a platform to document knowledge and visions on topics in the field of Information Security. It is modeled after the popular Wikipedia and thus named "IBpedia". Information security is "Informatie beveiliging"in Dutch, so that's the IB. It's goal is to improve sharing of knowledge and to stimulate discussion on subjects as security management, risk management, etc.
Symantec has found out that the number of new phishing sites drop with a considerable 30% during weekends. This indicates that phishers are working phishing as their regular job, according to Symantec. Cyber crime has moved from the domain of the lonely students to the professional criminals, making serious money with it and improving efficiency and stealth all the time. The statistics of Symantec shows us that it also moves to day time jobs.
Ubuntu, the Debian based Linux distribution targed at education and easy access, has it's own way of protecting against unwanted effects of using the root account: it dissables it. For me it was the first experience with a UNIX/Linux OS without a root account. Did Ubuntu really solve the handing of root privileges to users for administration tasks?
sudo -s -Hin a shell, which gives you root privileges until you type
sudo -kand invokes all risks of logging on as root
I have done a quick survey on best practices of measuring perfomance of security management. Since it is a quite interesting topic for many professionals in the field of Security Management, I have made a wrap up of what I found out.
Since one of my colleagues publisched a report about security considerations of Skype in a corporate environment and acknowledged my input for the report, I receive questions from around the world on this topic. People are attrackted to the tool for use a s a convenient and cheap communication channel over the internet, but are worried for consequences in corporate use.
Symantec has released its Internet Security Threat Report for the first six months of 2005. SANS summarizes:
The study found that 74 percent of the top 50 malicious code samples submitted to Symantec were of the sort that exposed confidential data. The report also noted a trend of attackers moving away from attacks on network perimeters and toward targeted attacks. Also noted was an increase in modular malicious code, which downloads additional functionality after initial infection. DoS attacks grew from 119/day to 927/day over the six-month period studied; this marks a 640 percent increase over the same period last year. The average time between disclosure of a vulnerability and the appearance of an exploit decreased from 6.4 days to 6 days, while the average length of time vendors took to release a patch for a vulnerability was 54 days.
The trend that attacks move away from the lonely nerd wanting attention towards criminal activities with the aim to earn money is underlined by this report. Other reports [2] [3] also show a more professional approach to attacks. For white hat security professionals, projects like Honeynet are crucial to keep realistic views on threats.
Standards and norms for information security are on the move. On June 23rd the ISO/IEC 17799:2002 has been replaced by ISO/IEC 17799:2005.
This code of practice for security management has had some visible changes, which impact professional security consultancy. The changes are a further development along the line which was started bij the previuos standard, but include some relevant differences. I have listed the most important changes below.
The number of information security areas has grown to 11 : information security incident management has now a chapter on its own. The controls in the area information systems development and maintenance is now called information systems acquisition, development and maintenance. The complete list of information security areas is now:
Seventeen new controls have been added, including vulnerability and patch management, provision of outsourcing and external service
delivery. Other controlls have been joined together or removed completely. The number of controls is now 134. The use of risk assesment as a basis to decide ont security controls and measures is now a requirement. In the new stanard this topic is removed from the introduction and placed in a separate chapter.
ISO is on its way to adapt the set of standards for information security, earlier adopted from the british standard 7799, to the existing standards on quality assuring, like the ISO 9000 set of standards. Information security will be covered bij standards numbered in the ISO 27000 range. The first one in this range will be the update of the requirements standard (now BS7799-2), which will be called ISO/IEC 27001 (BS 7799-2:2005). Later, in 2007, the recnetly released code of practice ISO/IEC 17799 will be renamed to ISO/IEC 27002. A complete new standard, covering the area for security metrics and measurements, will be called ISO/IEC27004. A release date is not defined, yet.
There ar no localized versions of the new standard, yet. E.g. the Dutch NEN 17799 or the adaption to Dutch legislation (ADV7799:2004 nl)
Consequences
If the new BS 7799-2 is released in November, this will be the only basis for certification or recertification. There may be some transition time, but this is decided by the local certification body and this has not been published, yet. Meanwhile, if you need to certify before the release in November, you need to use the current BS 7799-2, but now with the new controls published in ISO 17799:2005. this because of the fact that the old ISO 17799:2000 has been wthdrawn.
Evaluations of security management practice at client sites need to be done on the basis of the new code of practice. This means that the tools used for these evaluations need to be adapted. New formulated security policies, for which the client requires to be in line with the code, need also to be adapted to the new situation.
The impact of the new code is not too big, as attention to patch management and incident response was already paid in practice. But as certification processes are very precise it is good to get a good notion of the new standard when you coach a client to certification.
What The Hack, the hacking conference organized on a campsite in Liempde, The Netherlands, is over and according to participants a success. Many lectures and workshops have been given. An interesting presentation is the one about Car Whisperer: trifinite.blog: Introducing the Car Whisperer at What The Hack:
"After introducing the various Bluetooth security flaws (old and new ones) that were identified mainly by the trifinite.group also a new toool has been released. This new toool is called The Car Whisperer and allows people equipped with a Linux Laptop and a directional antenna to inject audio to, and record audio from bypassing cars that have an unconnected Bluetooth handsfree unit running. Since many manufacturers use a standard passkey which often is the only authentication that is needed to connect."
The Honeynet Project has released several papers in which they uncover techniques and working methods of hackers and spammers. The latest version is about phishing. The papers are based on observations and data collected with so called honeynets, servers that simulate more or less vulnerable networks or services. They attract malware and hackers that exploit vulnerabilities of a service and record the activities during an exploit of the honeynet. The collected data and the following research provide insight in techniques, developments and tactics.
Why a weblog? And why on security? Personally I think internet publishing is a weird kind of thing. You start with a blank page and think 'what do I have to say?'. Until you realize that in social live this is a killing question for conversation or interaction. I have published my progress on hobby robots since 1999, just because I got inspired by other amateur pages and I did it just a little different. The page is more or less retired, but still I receive now and then questions about how I did this and that.