Overcomplicating Security Is Your Greatest Weakness

Improved Essays
Previously I stated that “Overcomplicating Security is Your Greatest Weakness” [1] and now I would like to expand a little more on this issue. I will state that I have a lot of professional respect for many of my peers, but I know factually that many have been on the wrong security path for some time. Initially I tended to blame certification bodies for putting forth less than stellar explanations of “real world security”, then I began blaming those tasked with frameworks, guidelines and standards for what I feel (not felt), are “less than stellar” explanations and or fixes for issues in the networks. Prior to discussing security issues, I’d like to point out “conditioning.”

clas·si·cal con·di·tion·ing - a learning process that occurs when
…show more content…
We all know signs, signals, and so forth. We are all are that red means stop, yellow means slow down, and green usually means all is well (good to go). In the security realm, it is no different. Head over to the SANS Internet Storm Center [2], and you will notice a bar across the top of the page. Red, Orange, Yellow, and Green. These colors to SANS indicate “Loss of connectivity” (red), “Major Disruption” (orange), “Significant Threat” (yellow), and “Everything is normal” (green). The same applies for the “Homeland Security Advisory System.” [3] Now that I have explained this, let’s have a look at three of the most absurd security rated flaws I have encountered during my penetration testing these last few months. These three are repeat offenders, and I see them in over eighty percent of my …show more content…
Some may chant: “Threat Intelligence!” to which that too can fail:

[minemeld]

[sofacy]

For all the chest thumping, high fives, guidelines, standards, and baselines oh my… We continue down this path of not understanding a risk, a threat, and a vulnerability. Forget about the threat actors here. It is all about security awareness. Professionals need to be aware of what their environment is supposed to do, and how to look for the things it is NOT supposed to do. We need to stop this self-induced mechanism of making our security insecure. Last example:

[ssl-cert]

Who doesn’t love this picture? During my penetration tests, I see this error come up whenever I have logged into printers, cameras, phones, you name it. How many of your employees do you suppose have seen this? How many employees have you unwillingly trained to ignore an SSL certificate warning? Do you think for a moment I will not create a man in the middle attack, and be successful at it during my penetration testing engagements? I know it will work, and attackers also know a MiTM will work. Many individuals have been groomed to just hit: “ok… Go take me there

Related Documents

  • Improved Essays

    Abstract Stephen Flynn believes that there are goals of homeland security that are crucial to America’s bureaucracies and he senses that the country is wasting the chance to really protect the United States. Stephen discusses two crucial mistakes that he feels America has made and the first mistake is that he discusses is how homeland security is separated from national security. The two key intelligence agencies are not communicating. The second issue, he discusses is how our infrastructure is penetrable. In this lesson Stephen Flynn sees a problem with tactical thinking within the Department of Homeland Security (DHS).…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The red color maintains continuity throughout the poster by deterring…

    • 777 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Flash And Arrow Logos

    • 1606 Words
    • 7 Pages

    The constant use of green in the advertisement is used to symbolize the constant presence of the Green Arrow. In contrast, the Flash uses mostly red and yellow colors. Colloquially, the colors yellow and red are associated with caution and stopping. This is ironic is considering that the superpowers of the hero and villain are super speed. Figuratively, the use of color suggests that red represent The Flash’s strict moral reservations.…

    • 1606 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    I agree that the comparison of the cybersecurity to the healthcare system is a great analogy, although not perfect. Professor provided examples where a cybersecurity breach and healthcare system are similar and could be treated in a similar way to stop or prevent a different outbreak. Even though most cyber-attacks are minor, there will time when all the information gathered from those small attacks that could be formulated into recipe of a major attack. Also, you pointed out that it is important to realize that it is impossible to prevent all and any cyberattacks, and that they evolve at a fast rate.…

    • 157 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Metasploit Case Summary

    • 1006 Words
    • 5 Pages

    impact on the sufferer system. Meterpreter also makes use of a centralized communication system. (Offensivesecurity.com). Unlike other penetration testing tools like core impact, Metasploit Framework continues to be the free and open source, notwithstanding being acquired by Rapid7. The Express versions of Nexpose and Metasploit start at $2,000 and $5,000, respectively, with the full-featured Pro version starting at $15,000 per year.…

    • 1006 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    As we continue through the 21st century there are numerous missions that the DHS encourages to anticipate terrorist acts, secure the wellbeing of our country, and to save our opportunity and thriving. There are an extensive variety of missions that the division oversees, for example, anticipating terrorism and improving security, overseeing U.S. outskirts, controlling movement laws, securing the internet, and guaranteeing calamity versatility. Our central goal is to organize a far reaching and strong office to battle demonstrations of fear, react in an auspicious way to calamities and to secure the U.S. against acts that are completed to annihilate us. In counteracting terrorism and improving security the office considers this the most astounding…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The use of the intelligence method is prominent with the AFP through collecting information and data to produce intelligence. The AFP also employs the use of both strategic and Tactical intelligence in their practices, theoretically being that strategic intelligence uses long-term initiatives, strategies on emerging problems and structures of serious organised crime while tactical intelligence focuses on short-term initiatives, looking closely at criminal groups and activities (Buckley 2013). A practical example is the Specialist Response group that provides tactical strategies through intelligence operational priorities for a diverse range of AFP operations and building missions (AFP 2016). A difference identified through analysing the AFPS initiatives compared to the academic intelligence methods is the AFP’s use of public relations through educating the public with critical matters and receiving information from the public to improve statistics and crime prevention techniques. This is initiated through the AFPs virtual global taskforce for cyber crime, focusing on informing the public on risks and preventative actions (AFP Corporate Plan 2015-2019).…

    • 1017 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Secret Service

    • 1262 Words
    • 6 Pages

    The Secret Service special agents duties include both investigations and protection. Special agents investigate financial crimes such as counterfeiting of currency, false identification, credit and debit card fraud, computer fraud, forgery or theft of U.S. They also have to protect the president in certain situation as well like, when he's on the move to go somewhere they are with him at all times. Just to make sure nothing were to happen to him or so he doesn’t get assassinated at that time as well. Abraham Lincoln was the one who created the secret service as part of the Treasury Department 150 years ago, he signed the bill the day he was shot.…

    • 1262 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    The goal of an APT is to gain access into the power grid network and collect as much information as possible. They use the exfiltration techniques that allow them to transfer sensitive information to their data-miner area also know as Command and Control Center. It is important for the APT to mask the data to resemble normal network traffic so that it detection can be made difficult or almost impossible (Cruz, 2013). Method for data exfiltration includes: Backdoors: This method used by the attacker to capture keystrokes, as well as video and audio of the system’s environment, using attached audio microphones and video cameras File transfer protocols Abuse: Attackers can abuse legitimate Windows features as well.…

    • 1307 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    A RISK-BASED APPROACH TO VULNERABILITY REMEDIATION Introduction When it comes to data security, nothing is more important than understanding where you are most vulnerable. This is why many companies have realized that annual vulnerability assessments aren’t sufficient. Under a new vulnerability management model, successful companies have moved to monthly or quarterly scanning. Vulnerability assessments are still only a small part of the battle, though.…

    • 727 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays