Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: InfoSec Handlers Diary Blog - Are We Doomed? InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Are We Doomed?

Published: 2008-11-19
Last Updated: 2008-11-19 22:38:10 UTC
by Lenny Zeltser (Version: 4)
0 comment(s)

In no particular order:

We Are Doomed

There is Hope 

  1. Bot networks seem to be growing in size.
  2. Many web developers don't understand XSS, CSRF and SQL injection-type vulnerabilities.
  3. Anti-virus vendors are starting to send signature updates several times per hour.
  4. It takes a reboot to update Adobe Acrobat and updating VMware Workstation requires a 330MB download.
  5. Criminals are becoming more aggressive about protecting their enterpises via DDoS.
  6. Targeted attacks easily bypass organizations' defenses.
  7. DNS remains a weak link.
  8. Passwords suck.
  9. Wi-Fi is becoming more common, even though securing it remains a challenge.
  10. People are becoming anesthetized to security breaches, because they happen too often.
  11. It's too easy to ignore the findings of security assessments.
  12. First-time users throughout the world are flocking to the Internet, increasing the "low hanging fruit" attack surface.
  1. Prescriptive compliance requirements (e.g. PCI DSS) are making it harder for executives to ignore IT security.
  2. Security technologies are becoming smarter (e.g., web application firewalls) and more powerful (thanks to cheaper ASICs and disk space).
  3. Anti-virus vendors are paying more attention to behavioral protection and performance.
  4. The community's expertise in analyzing malware is becoming more sophisticated.
  5. Search engines are starting to warn users about potentially malicious sites.
  6. The law enforcement seems to be getting better at catching alleged cyber-criminals.
  7. It may be getting harder to host malicious sites on a large scale.
  8. The media is improving security awareness by advertising security breaches.
  9. The developers of operating systems and web browsers are paying more attention to security of their software, and are providing safer default settings.
  10. Microsoft is making a version of their anti-virus free for home users.
  11. Companies are starting to include security throughout the SDLC and offer developers training on security issues.

Any suggestions for the lists above? We'd love to hear them. It's probably easier to come up with the items for the "Doomed" column, but consider what we can build upon to tip the scales in the defenders' favor.

Update: Thanks to everyone who wrote in with their perspectives, including: Mark Buchanan, Chris, Swa Frantzen, Tom McFadden, Frank Mellon, Jeff Martin, and David Rundle.

 -- Lenny

Lenny Zeltser
Security Consulting - SAVVIS, Inc.

Lenny teaches a SANS course on analyzing malware.

Keywords:
0 comment(s)
Diary Archives