Website - www.thirasystems.com
Email me - gins@thirasystems.com
Follow me on twitter - @daveginsburg

Friday, December 11, 2015

The Lone Wolf and the Enemy Within - 11 Dec 15 by gins




HACKERS now pose more of a threat to world security than nuclear weapons - 

Recent attacks and daily coverage of cyber-threats got me wanting to watch one of my all-time favorite movies, ‘Die-Hard 4.’  Almost nine years ago, it introduced the term ‘fire-sale’ to the masses.  More on this later….

Coverage of the ‘lone-wolf’, with expected focus on traditional terror vectors, underplays the potential damage from cyberterrorism.  Here, I’m not talking about state-sponsored, direct or indirect, but from the individual.  But the attack won’t come through the front door, the area of most focus.  It will come from the inside, and traditional perimeter security tools won’t offer protection.   Even newer tools offering interior protection will be hard pressed to combat a radicalized individual who has slowly moved up through the organization and now has the keys to the kingdom.   How to combat?

Segment It to Save It

At the Gartner Data Center I&O Management Conference this week, Theresa Payton, former White House CIO, did an excellent job of describing current threats and some harrowing statistics. 

  • 78% of cyber attacks start with tricking the user
  • Almost 100% will click on a phishing email
  • 50% will open attachments if they look relevant, such as:
  1. Create target list from attendees
  2. Select source of email from agenda, and attribute to someone important
  3. Use known phrasing and lingo.  Add urgency.
  4. Package trojan within and name ‘Notes from Meeting’ or some other relevant topic.
  5. Send.
The first step is therefore awareness, and a change in behavior that won’t happen overnight (and I’m the first to admit that many times I’ve come close to hitting ‘open’), but as I mention above, this won’t protect against a trusted insider.  The same tools used to radicalize individuals can also be used in the opposite way, helping them build expertise in gaining trust.

This requires more sophisticated ways to protecting data from the inside, not simple and implying an even greater level of control.  The days of ‘superusers’ may need to come to an end, with two-party control the rule.  True role-based access will need to filter down from the Fortune 500 into the smallest of enterprises.  Her suggestion was to start slow, selecting the few critical pieces of data that can’t be compromised at any cost.  She used the example of the presidential calendar, now split between five databases, and only aggregated within the Oval Office. 

The watchword was ‘segment it to save it,’ while including controls that will identify any out of the ordinary behavior.  The natural extension of this is a background process that checks all actions against known per-user heuristics, a curve of sort, flagging anything that looks wrong.  A new security abstraction layer.  Of course this begs the question ‘who watches the watchmen?’   Not insurmountable, but something else to worry about. 

Back to Die-Hard.   

I’m always amazed by how Hollywood portrays government IT infrastructure.   The National Data Administration.  Nice.   The Homeland Security NOC.  I want one.  Right out of Terminator.   When I was in the military, a primary backup site for the US Government looked like a school room, and for those who remember Desert Storm, it was laptops in trailers.  


To the industry’s credit, we’re getting better at portraying IT and hacking, as detailed in a recent Atlantic article, Hollywood is Finally Starting to Get Hacking Right.

And something I had forgotten.   The baddie was Maggie Q.   From the movie, and from a dinner a few years back just north of Toronto.