You are on page 1of 5

68 comms SECURITY

fragile web
As society becomes reliant on the Internet, the need
to secure it has grown urgent. but the vulnerability of
cyberspace may be intrinsic, writes David sandham

Engineering & Technology 22 November - 5 December 2008 www.theiet.org/engtechmag

068-071_ET_issue20.indd 68 12/11/08 15:29:59


69
‘There is concern
ENGINEERING’s
GRAND cHALLENGE
about the level of
SECURE CYbERSPACE access obtained that
would allow an
adversary to become
disruptive at a time and
place of their choosing’

COMMUNICATIONS networks and led to about 1,800 frauds. is also a significant concern
underpin modern society like Ironically, on the day it was about the level of access
the nervous system of a living discovered, Hannaford received obtained in some cases that
organism. The public switched a certificate saying it was fully would allow a potential adver-
telephone network, the Internet, compliant with the Payment sary to become disruptive at a
VoIP, cable television, Card Industry standard, which time and place of their choosing.
submarine cables, and satellite obliges retailers to encrypt data This is a huge concern.”
communications form the major sent over publicly accessible Cyber skirmishes have
information pathways that keep networks, but not over private already begun. In 1998 the
society functioning. lines. Both supermarket chains Internet Black Tigers, a
This system is under daily thought they were safe. But the guerrilla organisation, flooded
attack. Viruses, unauthorised cyber-criminals intercepted Sri Lankan embassies with
access, security breaches, spam, unencrypted credit-card data as 800 emails a day for two weeks.
phishing, illicit electronic it travelled from shop tills to The first cyber war between
surveillance, denial of service corporate servers, from where it nations may have occurred last
attacks and cyber terrorism are would have been encrypted and year, when the digital infrastruc-
on the increase. The very inter- routed to credit-card company ture of public institutions in
connectedness that the modern servers for authorisation. Estonia, including the parlia-
world depends upon has become The extent of the problem ment, ministries, banks,
one of its major weaknesses. is hard to measure, because newspapers, broadcasters and
Recent events illustrate the reporting is largely voluntary. telecommunications companies,
threat to commercial and govern- Victims of cyber-crime don’t was attacked. Estonian
ment networks, and the informa- like to discuss it, because hacked networks were blasted with up
tion that flows over them. systems damage reputations to 90Mbit of traffic a second for
“I’m not sure that most and cost customers. The US up to ten hours. Most of the
law-abiding citizens understand Treasury Department has traffic was part of a distributed
the magnitude of the threat estimated the annual profits denial of service (DDoS) attack,
from cyber-criminals,” says from cyber-crime at $105bn. in which a network of
Colonel Gary A McAlum, “I believe that is on the low end,” computers, perhaps one million
formerly Chief of Staff, Joint says McAlum. strong, was hijacked and used to
Task Force for Global Network flood the Estonian networks
Operations at the US Strategic WAR with requests for services such
Command, who recently joined In addition to organised crime, as web-page transfers. The
Deloitte Touche Tohmatsu, a there are other murky presences attacks happened after Estonia
global financial services lurking in cyberspace: spies. offended Russia by relocating a
company. “There is a thriving intelligence agencies, the Russian Second World War
cyber-crime market for personal shadowy groupings that assist memorial. The attacks origi-
and financial information.” them, and the military of several nated from computers allegedly
In March, thieves stole nations, are all interested in traced to Russia, but the Russian
4.2 million credit and debit card mining information from the government has denied any
numbers from Hannaford and networks of target countries. involvement.
Sweetbay, supermarket chains “A significant amount of data This year’s conflict between
in north east US and Florida, [has been taken] from federal Russia and Georgia had a
respectively. The cyber-crimi- networks over the past few cyber-war component. DDoS
nals put software on computers years. I don’t think we will ever attacks disrupted access to
to capture credit-card informa- know the true extent of how many Georgian websites,
tion. The breach went much and exactly what was including that of the Ministry
undetected for three months taken,” says McAlum. “There of Foreign Affairs. 

www.theiet.org/engtechmag 22 November - 5 December 2008 Engineering & Technology

068-071_ET_issue20.indd 69 12/11/08 15:31:27


70 comms SECURITY
‘We cannot secure
cyberspace any
more than we can
completely secure
the oceans or the
airspace’
Colonel Gary A McAlum,
Deloitte Touche Tohmatsu

spare key that they can use to prevention systems run on a


decrypt any message they want. remote desktop or mobile laptop,
It’s the kind of ‘solution’ that protecting the machine
holds the seeds of its own wherever it goes. Instead of
destruction – it wouldn’t be used hiding behind the castle walls,
by those it seeks to expose, and and only being safe there,
also raises tremendous civil individual machines are given
liberties issues. their own armour.
“Cyberspace cannot be Cyberspace security has also
secured 100 per cent without become an active, rather than
radical and fundamental passive, discipline. Instead of a
changes in the architecture and guard patrolling a perimeter
implementation of governance fence, think of a roving investi-
models that would never fly,” gator seeking out threats before
says McAlum. “We cannot they cause damage. Hackers are
secure cyberspace any more lured out of hiding by tempting
than we can completely secure them with ‘honeypots’ and
the oceans or the airspace.” ‘honey-clients’, apparently
Toralv Dirro, security analyst unprotected machines that can
at McAfee, says: “Because of its be used to detect threats.
nature, cyberspace is very diffi- However, it takes two to make an
The Russia/Georgia conflict was waged in cyberspace as well as in the streets cult, maybe even impossible, to arms race. Advanced viruses
secure. There is no real central fight back by constantly
instance controlling it, each changing their attributes to
F The United States is also SOLUTIONS country has different laws that outwit security technology.
under continual attack. In a The US National Academy of apply, and it is growing at a rapid Clever hackers learn to side-step
recent statement to Congress, Engineering has recognised the pace. The best hope is to make honeypots.
Jim Lewis, of the Center for importance of securing some vital parts as safe as Malicious software (malware)
Strategic and International cyberspace by declaring it one possible, to allow business to be is becoming so prevalent that it
Studies, said: “Cybersecurity is of 14 Grand Challenges for done in a reasonably secure is beginning to outnumber legit-
now one of the most important Engineering, alongside issues manner, and to protect the users imate software. At that point, it
national security challenges such as providing energy from as well as possible.” is easier to create ‘white lists’ of
facing the US...this is not some fusion, preventing nuclear Dr Guy Bunker, chief scien- legitimate software than to
hypothetical catastrophe. We are terror and making clean water tist of security software and maintain the blacklists of
under attack and taking accessible to all. It is right to services company Symantec malware. Hyppönen recom-
damage.” focus on the problem, especially Corporation, says: “Cyberspace mends a blend of whitelists and
More than 30 nations are now because it cannot be overcome as we know it is, in some places, blacklists for best effect.
believed to have information by a single approach. It’s just not very insecure. So it is relatively
warfare programmes. And that simple. simple for fraudulent behaviour INTELLIGENCE
individuals with technical As Hyppönen says: “The to occur. We could secure it very Fighting a war demands a
expertise have found their power and growth of cyberspace rapidly, but that would shut it good map of the battlefield.
power to disrupt their enemies is due to it being an open system. down for most people.” Symantec runs a Global
transformed in cyberspace. ‘Open’ doesn’t always equal Intelligence Network that has
In March 2000, a disgruntled ‘secure’. How can you secure ARMS RACE more than 40,000 sensors around
Australian employee used the cyberspace? Close it – but then Most experts agree that there is the world and more than
Internet to release one million you might also end up killing it.” no single answer to securing two million dummy email
litres of raw sewage into the Complete solutions, even if cyberspace. Instead, think accounts – all of which are
river and coastal waters of they could be built, could have evolution. Think arms race. monitored all day, every day.
Queensland. The same year, a unwanted consequences. In Progress will come by Hundreds of millions of users
university student in the today’s open cyberspace, anyone incremental improvements to contribute statistics on
Philippines created the ‘Love or anything can connect to the many technologies. malware.
Bug’ virus, which caused Internet. It might be possible to The traditional model of “This means that outbreaks
damage estimated at up to introduce controls that cyber-security is to use a perim- can be readily spotted and
$15bn world-wide – or about guarantee that all the endpoints eter defence, the classic firewall. contained,” says Bunker. “It also
as much as a major hurricane in the network are known to be But perimeters often have holes. means that new virus or
disaster. ‘safe’. But that would destroy the Today, a perimeter defence is malware definitions can be
The problem is growing fast. Internet as it is today, reducing seen as just one component of a quickly and effectively written
Mikko Hyppönen, chief it to a closed system. multi-layered defence: it will not and rolled out to prevent the
researcher at antivirus The US government has keep out a determined adver- infection spreading.”
software company F-Secure proposed another solution using sary, but reduces minor threats McAlum would like to see
Corporation, says: “We are now ‘key escrow’, in which informa- so that effort can be concen- more than just lots of sensors.
seeing tens of thousands of tion is handled under the same trated on more sophisticated “There are sensors all over
unique malware samples each kind of public-key cryptography exploits or insider threats. the place and most feed back to a
corbis

day. It was nothing like this even that protects Web commerce, but Today, machines get their own particular security information
three years ago.” government agencies hold a firewalls. Host-based intrusion management application or a

Engineering & Technology 22 November - 5 December 2008 www.theiet.org/engtechmag

068-071_ET_issue20.indd 70 12/11/08 15:31:31


71
EXPLoITING WEB 2.0
Facebook is becoming
increasingly popular as a
target for virus attacks.
Some Facebook users are
currently receiving a mes-
sage that appears to be
from a ‘friend’. Upon click-
ing the link, they are redi-
rected to an enticing
video. The video will not
play, and they are told
they need to update
Adobe Flash. It’s a virus.

derivation of such a system,” he


says. “What I’d like to see is If you lose your laptop, you
could lose a lot more than
more effort placed on capabili-
just the hardware
ties that provide a holistic
picture of the enterprise that is
more than just an integration of
existing views and [which] helps
develop the risk picture based
on current threats, vulnerabili-
ties, and anomalous activities.
And I think there needs to be a
‘cause-effect’ aspect that helps
leadership understand the
impact of actions they may take,
for example blocking a port or
disabling a service.”
Cyberspace will get more
secure as software learns more
about how we behave. Suppose
an employee, who typically uses
a company database to access
individual customer records,
suddenly looks at the top 1,000
customers: software could be
written to highlight this
anomaly. Or suppose an Internet
user goes to a website he or she
has not visited before: software
could warn them that they may
have misspelled the address,
helping counter malware
infections caused by downloads
from web pages masquerading
as popular sites. Dirro believes
that behaviour-based technology
is “very important, the next
big thing”. reputations can be inflated. it has started encrypting chink in cyberspace’s armour –
Take an online auction seller customer credit-card data as ordinary people and their
TRUST – BUT VERIFY who sells and promptly delivers soon as the card is swiped. ordinary working practices.
Companies today tend to rely on 100 pencils at £1 each, gaining a Other low-technology activity, According to a study by
implicit trust to control access great reputation. They then such as creating information- Compuware, only 1 per cent
to their networks: employees are offer a car for £100,000, and sharing mechanisms between of recent corporate data losses
given a username and password abscond with the payment. The affected groups such as banks, were due to hackers. The biggest
and then expected to do the right reputation system was who are notoriously shy about culprits were negligent
thing. This will change. perverted to abet the crime. revealing their cyber-crime employees, with outsourcing and
Companies will keep closer tabs Systems will get smarter. losses, could also help. Just malicious employees being
on what their employees are “Neural networks and other locking equipment up can help among the other causes of
doing and how they are doing it. artificial intelligence technolo- a lot: laptop computers and significant breaches. Worryingly,
Behaviour-based technology gies have a place in learning PDAs are increasingly a target of the 1,112 practitioners
“can look at things such as what is good, bad or indifferent for thieves who want them for surveyed, 79 per cent said their
typing speed or style as an about networks and systems to as much for the value of the organisation had experienced at
additional means of help administrators make intel- data they may carry as for what least one data breach.
authentication,” says Bunker. ligent decisions to enable them they might get by selling the Dirro of McAfee thinks that
Advanced reputation services to fix problems,” Bunker says. hardware down the pub. what’s needed to secure cyber-
may also help secure But let’s not get “In many cases, particularly space for the long run is
cyberspace. carried away. A lot of when it comes to industrial progress on many fronts,
“Reputation-based progress can be made espionage, employees of partic- including technology, aware-
technology helps by getting on with the ular companies may be targeted ness, legal redress and human
people browse the drudge work of imple- for the opportunity to snatch a behaviour.
Internet safely and menting current laptop,” warns McAlum. Given the complexity of the
engenders trust between security techniques. The As the UK civil service is issue, is there any sign that we
consumers and Hannaford super- learning, you shouldn’t leave are winning the cyber-security
businesses, as well as market chain says that laptops on a train, or put war yet?
between businesses,” since its security unencrypted data on a CD in the “No,” says McAlum.
says Bunker. However, breach earlier this year, post. Perhaps this is the biggest “We’re not even close.” 

www.theiet.org/engtechmag 22 November - 5 December 2008 Engineering & Technology

068-071_ET_issue20.indd 71 12/11/08 15:31:39

You might also like