Wednesday, October 31, 2012

A binder full of security women executives

I just read a post on technet and it really reminded me of the binder full of women gaffe. ( by the way, I am non-political).
A quick excerpt from the blog post, the history of the founding of the Executive Women's Forum, now ten years old:"The prospect of finding a number of candidates to round out executive teams was a challenge too. In particular, Joyce was adamant that talented women existed for a spectrum of positions, while she also acknowledged that tracking down the talent and following the network wasn’t as easy as just going to security events."

Tuesday, October 30, 2012

Hurricane Sandy, physical security and rats

I just read that one of the side effects of hurricane Sandy was that the rats and mice that were in the subway tunnels, basements and parking garages had to come to the surface to escape the flooding.

Now they will be looking for two things, food and shelter. The unlucky buildings that give them both will have new residents. There is a great introduction here about why they are such a problem and what to do about it. Here is a more comprehensive discussion. Most of this I knew, but this article claims they can consistently survive a fall of 50'. Since they are now above ground, and they are good climbers, hmmmmm, I have an idea for an Indie horror film.

WA National Guard

I read a post on Richard Bjetlich's blog that Washington State National Guard was going to engage in cyber security.

Sure enough, here is a link to an article in the Bellingham Herald.

20 Critical Controls Reading List

Executive Summary:

The seminar papers required in your course of study are an opportunity for you to reflect on what you have learned in so far in The SANS Technology Institute's ISE 5100 and ISM 5100. You should view this first paper as a chance to establish a general theme for your studies, consistent with the overall goals you enumerated in the outcomes statement you submitted as part of your admission application.

Review your outcomes statement and if necessary, update it to reflect any changes in your goals. (Updates should be submitted to so that we always have your most recent version.) Review the technical material in the SANS class, and especially the aspects regarding practical implementation of the technology. Review the 20 Critical Controls, your paper must include at least one aspect of the appropriate controls. We have provided a list of readings below, a mix of threats and solutions illustrating various aspects of the critical controls which mention recent security related events. Choose to read the ones you feel might be relevant to your environment, and you are welcome to use other sources as appropriate. Your paper should discuss practical application of security technology in a context that is consistent with your stated outcomes. You paper should also serve to increase the knowledge of security and implementation and should have at least five sources not listed below. Your paper should be five to ten pages in length and should be the beginning of your research for your monograph, part 4 of this course.

Learning Outcome:

The student will demonstrate mastery of the 20 Critical Controls as a framework to implement enterprise security.

Grading rubric:

Relation of paper subject matter to student outcome statement 10 possible
Relation of paper subject matter to at least one control 10 possible
Paper contributes to the body of knowledge 10 possible
Length of paper is between five and ten pages, 1 point per page
Writing quality ( grammar, spelling, flow) 10 possible

Critical Security Controls - Version 3.1

  • Critical Control 1: Inventory of Authorized and Unauthorized Devices Exploiting Embeded Devices chips
    Michael Baxter stole hw from Verizon and Cisco
    Illegal imports of hw to Russia

  • Critical Control 2: Inventory of Authorized and Unauthorized Software Malware on medical devices
    Downloading trojan (phone)
    Mobile malware
    Malware spreading through Skype - Ransomware

  • Critical Control 3: Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers

  • Critical Control 4: Continuous Vulnerability Assessment and Remediation Security business- Tenable,0,7059459.story

  • Critical Control 5: Malware Defenses
    Microsoft report on root kits
    State sponsored mini=flame
    Attributes of Malicious Files
    Microsoft Report on Malware in Romania, Poland, Bulgaria

  • Critical Control 6: Application Software Security BEAST

  • Critical Control 7: Wireless Device Control Symantec consumer wireless guide
    NIST Checklist
    NIST Wireless Special Publication

  • Critical Control 8: Data Recovery Capability Computerworld overview
    One of the many Scott Moulton Youtube videos

  • Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps
    Why certify?

  • Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Router vulnerabilty

  • Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services Using SNORT for intrusion detection in MODBUS TCP/IP communication

  • Critical Control 12: Controlled Use of Administrative Privileges
    Admin privileges in Windows 8

  • Critical Control 13: Boundary Defense HSBC Social related hacking - null crew SCOCKS proxies

  • Critical Control 14: Maintenance, Monitoring, and Analysis of Security Audit Logs Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment Evil Through the Lens of Web Logs

  • Critical Control 15: Controlled Access Based on the Need to Know Jitterbit and Workbench

  • Critical Control 16: Account Monitoring and Control Shortened URLs Encrypted Disk Detector ( opportunity to help )

  • Critical Control 17: Data Loss Prevention Warantless wiretaps
    BYOD exposure
    Google in Europe New Zealand Job seekers

  • Critical Control 18: Incident Response Capability
    Ireland Domain Registry
    Facebook response to data breach
    Zappos unenforceable EULA

  • Critical Control 19: Secure Network Engineering
    Pacemaker attack Letter to energy producers ( Sen. Rockefeller) Secure OS for control systems

  • Critical Control 20: Penetration Tests and Red Team Exercises
    IPhone backup files. A penetration tester’s treasure trove?
    Systems Engineering: Required for Cost-Effective Development of Secure Products

    Technology forces at work, not sure how cloud fits 20 CC
    Fault Modeling for Cloud Services
    Cloud Security Alliance
    Google email under state sponsored attack
  • Monday, October 29, 2012

    My defibulator has a virus and will not start

    I met Tim Hoffman at the annual ISSA meeting and we were talking about the problem of malware on medical devices. There is a great article about that here.

    I pointed out that the devices mostly worked anyway and Tim wisely pointed out that if he is have a heart attack he doesn't want the defibulator to mostly work. So true.

    The article jumps straight to the heart of the problem, with an example from Beth Israel Deaconess Medical Center in Boston: "664 pieces of medical equipment are running on older Windows operating systems that manufactures will not modify or allow the hospital to change—even to add antivirus software—because of disagreements over whether modifications could run afoul of U.S. Food and Drug Administration regulatory reviews."

    Wednesday, October 3, 2012

    SHA 3 is announced

    NIST has chosen SHA 3 and announced it. As they put it in their announcement, one reason this is important is if SHA 2 falls hard we have an insurance policy. The algorithm is Keccak "(pronounced “catch-ack”)". I commend the winners and look forward to playing with the new technology after the reference algorithm is published. One of the things I am most excited about is to see how deterministic it is. We know that two different messages produce a different digest, but if they are very similar, will the digest be similar. There are some interesting security implications including finding modified copyrighted documents if the digest allows similar documents to produce similar digests.

    VOIP in the cloud

    I was updating my course, MGT 512 day 1 and there is a section on VOIP. Did some Google searches to see what is new for VOIP and just was not finding anything, then I found a page that pointed to Youtube videos. What an incredible resource. There was a great explanation of SIP trunking that any CIO of a mid-size business should see. The potential cost savings are impressive. But the big eye opener is how many VOIP cloud providers have sprung up. This could really save a startup company a lot of money, just buy the IP phones or even use software phones that can work from PCs, Macs, iPads and such. In just a decade, the sunk cost of hardware for voice communications has dropped by an overwhelming amount of money, they most of these solutions do want a monthly subscription per user, but I bet with some research it gets pretty cheap.