Vulnerabilities Trend

advertisement
CAPSTONE – IT 4444
Threats to Information
A Study of SANS and Educause
Brady Martin, Thomas Graham, Kezron Caines
4/13/2011
This paper discusses the trends and lifecycles of “threats” to information and systems over the past 10
years, with an eye towards analyzing” where we came from”, ”where we are”, and “where we are
going”. Using data recorded by SANS and Educause correlated with statistics, the analysis will compare
what threats were, and are, when and why they became important, when they were downgraded, and
why. This paper will pay primary attention to the factors that pushed each of these threats to the top of
the lists making them noteworthy.
Contents
Introduction ......................................................................................................................... 3
Where we came from .......................................................................................................... 7
Where we are ...................................................................................................................... 9
Where we are Going ......................................................................................................... 12
Conclusion ........................................................................................................................ 16
References ......................................................................................................................... 19
Table of Figures
Figure 1 Web Excerpt ......................................................................................................... 5
Figure 2 - Web Excerpt ....................................................................................................... 6
Figure 3 - Major Computer Developments ......................................................................... 8
Figure 4 - Population Growth Trend ................................................................................... 9
Figure 5 -Users in the United States ................................................................................... 9
Figure 6 -World vs. United States Complete Comparison -2010 ....................................... 9
Figure 7 - Incident Tracking -2000-2007.......................................................................... 11
Figure 8 - Dell Inc. Financials .......................................................................................... 13
Figure 9 - Educause It Security Challenges – 2001 .......................................................... 14
Figure 10 - Educause It Security Challenges – 2010 ........................................................ 15
Figure 12 - Attacks on Critical Microsoft Vulnerabilities (last 6 months) ....................... 18
Figure 11 - Number of Vulnerabilities in Network, OS, and Applications ...................... 18
1
2
Introduction
This paper discusses the trends and lifecycles of “threats” to information and systems
over the past 10 years. Using data recorded by SANS, Educause, and Internet World Stats, our
analysis will show past threats, current threats, their importance to the security community, and
the why they fade in and out of sight. Where trends are moving towards in respect to the future,
and advances in Information Technology will also be discussed. This paper will pay primary
attention to the factors with an eye towards analyzing” where we came from”, ”where we are”,
and “where we are going”, and attempting to answer what pushes these factors to the forefront
making them noteworthy.
Over the past 10 years, Threats to Information and Systems have been evolving. As
the number of systems and users increases, so too does the number of targets available for
exploitation. Something interesting to note is that although, the types of targets and attacks
change, categories remain the same; exploiting human weaknesses, hardware resources, and
software weaknesses.
Ten years ago, the threats were as different as the attackers. Attacks on information
systems were driven by ideology and curiosity, now as the world becomes more connected the
motive of profitability is added. In the past, the attacks were not sophisticated or stealthy.
Today, in alignment with emerging technology, the attacks are both sophisticated and stealthy.
The “Social” network phenomenon has given attackers completely new avenues of attack
through improved “social engineering.”
3
The charts below illustrate that the categories of reported attacks in 2001 are very general
in nature. As data collection progresses through 2007, the numbers increase and become more
specific.
Table 2 - SANS 2001 Platform Comparison
(Phil Benchoff, 2001)
Table 1 - SANS 2007 Platform Comparison
(Rohit Dhamankar, 2007)
Some of the old attacks have fallen by the wayside as technology and education systems
improve. Exploitable targets have become numerous and profitable as the world continues to
move towards being more interconnected. As new devices are developed that connect us further,
we are also left more vulnerable. As technology continues evolving, the problems created are
overwhelming the IT community’s ability to solve them.
Even with all the changes, much of
the previous and current problems remain the same. Attackers exploiting the bad habits of users:
leaving servers and workstations unsecured, operating systems and software left unpatched, and
4
routers, firewalls, and switches left in autonomous states largely unmonitored. Until these and
other hurdles are overcome, the attacks will continue unabated. We began this project with the
purpose of identifying the top threats to information and quickly discovered that there were no
“all-inclusive” sources that clearly identified what those threats were. We also found widespread
disagreement between what educators, governmental agencies, and corporate leaders considered
their top threats. These realizations forced our team to reshape our premise to make use of the
data collected. The sheer volume of data available referencing threats to data and information
system is overwhelming until you look at the underlying metrics with a much simpler premise.
To illustrate the disagreement:
Figure 1 Web Excerpt
(Infosec Island, LLC.)
5
Figure 2 - Web Excerpt
(Dennis Publishing Limited, 2010)
The two excerpts above come from the business side of threat analysis and clearly show
different priorities and focus surrounding the same problem of Information Security.
6
Where we came from
The beginnings of threats to information began with a need to communicate and
collaborate for the purpose of speeding and simplifying research. On October 29, 1969 the first
message was sent over the Arpanet. The intended message was “login” to SRI from UCLA
however after the first two letters were transmitted, the system crashed. (Leonard Kleinrock,
2009) Up until this time, the cost of computers was so high that only the government and major
corporations could afford them. Those that needed them for research were often geographically
dislocated. Arpanet was developed to overcome this problem. As with any problem, when one is
solved, potentially another is created, as is the case here. The phenomena now called the
“Internet,” very unexpectedly, began here.
Up until this stage, the computer resources were few and controlled by a select group of
researchers. To access these devices, one had to go to where the resource was located and be
granted access for a specific purpose. Once interconnectivity of these resources was established,
it wasn’t long before remote access was possible. It was at this point that centralized physical
control shifted toward decentralized control ceded to many. This was the first window of
opportunity provided for any “outsider” to manipulate system resources without the need to be
sitting physically at a co-located terminal.
It wasn’t long after the creation of Arpanet that businesses realized a real profit potential
in the development of smaller, more powerful computer systems and innovative ways to
interconnect them. The period between 1969 and 1985 was marked with several major
developments that contributed substantially toward this goal as illustrated on the following page:
7
Figure 3 - Major Computer Developments
(Bellis, 1997)
All of this activity was primarily profit driven but benefitted educators, researchers,
government, business, and consumers. These developments had finally brought the per unit
price within reach of the common man’s budget and served as the second push towards decentralized control. There were now computer resources in the hands of general consumers and
they were demanding utility and connectivity to services. Businesses were only too happy to
oblige and services such as CompuServe® and AOL® filled that need. CompuServe® being the
defacto leader from 1977 through the mid 1980’s (The Gale Group, 2011). CompuServe® had
all but disappeared with the introduction of AOL® in 1989 (Admin, 2010).
8
Where we are
Fast forwarding past other major developments and the introduction of cellular
technology for the masses, we come to the beginning of the 21st Century. By this time the
majority of American households contained at least one computing device and a mobile phone of
some kind. The charts below were generated with data obtained from Internet World Stats:
Millions
Market Pentration
300
250
200
150
100
50
0
Users
Figure 5 -Users in the United States
(Miniwatts Marketing Group, 2004 - 2011)
Figure 4 - Population Growth Trend
(Miniwatts Marketing Group, 2004 - 2011)
Data collected from Internet World Stats indicate that technology has proliferated into
most countries regardless of economic status as a direct result of the previous 15 years spent
globalizing the “Internet” and creating vast communications network.
Figure 6 -World vs. United States Complete Comparison -2010
(Miniwatts Marketing Group, 2004 - 2011)
9
During this period, many avenues of electronic intrusion were encountered. Both
hardware and software had provided ample targets. Hackers, motivated either by curiosity,
ideology, malevolence, or simple greed, enjoyed relative anonymity. The explosion of
computing devices connected to the “Internet” here and abroad and the relative lack of laws
available to prosecute electronic intrusions, work stoppage, theft, or destruction made the
“Internet” the “Wild, Wild West” of the Information Age. The Internet is considered the major
threat to organizations because access valuable information in criminal’s hands can be
disastrous. Many “weaknesses in operating systems (OS), network operating systems (NOS),
default configuration of network devices and firewalls, encryption, and poorly written
applications are the cause.” As security threats continue to evolve and become more complex,
organizations must take steps to prevent losses caused by these threats. Removing threat and
eliminating vulnerability is nearly impossible as long as organizations are connected to the
internet and hackers are breathing.” (Alshboul, 2010)
The North America population data we collected when compared to market saturation of
the same, establishes a Pearson’s linear correlation coefficient of 0.972. We attempted, and were
unable to calculate a correlation coefficient between user penetration and growth of incidents due
to unavailability of data to provide scale. Based on the data we collected and extensive reading
on the subject, we believe a correlation does exist between the trends. As more users become
connected, the simple fact that more doors are being opened and exploited supports this
assertion. When the data is compared with incident reports collected from Educause and SANS,
they don’t follow the same trend lines as seen graphed on the following page:
10
Figure 7 - Incident Tracking -2000-2007
(Phil Benchoff, 2001) (Rohit Dhamankar, 2007)
11
Where we are Going
It is a well-accepted fact that our world is becoming more and more globalized. As our
economies and cultures merge, there is an ever increasing need to connect to one another.
Competition for finite resources has become intense. Competition between corporations for
market share and profitability is also fierce. New markets are opening in areas once considered
to be Third World. This explosive market expansion is accompanied by new consumers, hungry
to enter the world stage.
In simplest terms, globalization can be defined as the blending of economies, cultures,
and traditions across the globe. It is evidenced by increased communication and the
intermingling and exchange of ideas between various countries across the world. It is a
continuous socio economic process; a major step towards the development of a country. The
primary aspect of globalization is the mutually beneficial establishment of business and trade
links between countries that has given rise to the globalization of markets. (MapsOfIndia.com,
2004)
The business of providing consumer electronics in these emerging markets has become
big business. Companies producing devices capable of Internet connectivity are tapping into
these emerging markets. Of note is Dell Inc. with numbers listed on the next page:
12
Figure 8 - Dell Inc. Financials
(Dell: Information from Answers.com, 2011)
As populations around the world continue to grow, businesses like Dell Inc. will continue
to compete in these new markets for customers. This trend shows no signs of abating as noted in
the Market Penetration graph previously cited in this document. The difficulty comes as these
companies rush product to market to meet customer demand. With each wave of supply, new
users are created, often under educated, often un-sophisticated. Each new user becomes a
potential threat or an un-witting accomplice by providing another attack pathway that can be
exploited. As mentioned earlier, as long as there is a hacker breathing, organizations will have to
secure their networks. Simply stated, there aren’t enough IT professionals to keep up with all the
potential threats created by pace at which the business cycle operates. It generally takes four
years of higher education to train an IT professional and a lifetime of continuous learning to be
effective in the field. With a two to three year life cycle for mobile devices and three to four
years for desktop, replacing old technology with new happens faster than the education system
can produce newly trained professionals to manage and secure them.
13
“According
to Rich Cheston, an executive director and distinguished engineer at Lenovo,
the most accurate method for choosing an effective life cycle involves dividing the company into
a set of user groups. For example, the fact that other enterprises choose company-wide desktop
life cycles of four years doesn’t make the same strategy right for other companies, such as
financial services companies, where seconds of performance difference between PCs could
represents millions of dollars of lost profits to bonds traders. For those companies, the desktop
life cycle might be every six months, as long as processing power continues to ramp upward.
“The net result is [that] many factors drive life cycle rates, and each corporation is unique, but
on average, the life cycle of a mobile device is two to three years—driven heavily by the
introduction of new technologies over time—whereas desktops are three to four years because
they are used inherently differently than notebooks,” Cheston says. (Perry, 2006)
A look at Educause data collected supports the assertion that education is not
Figure 9 - Educause It Security Challenges – 2001
Implemented numbers used to illustrate proper ratings. Raw data was not available.
(Roberta L. Lembke, 2001)
14
Figure 10 - Educause It Security Challenges – 2010
Implemented numbers used to illustrate proper ratings. Raw data was not available.
(Bret L. Ingerman, 2010)
There hasn’t been much change in the focus of Educators over the past 10 years. The
majority of their assessment centers on funding strategy, personnel, and the management of both.
Therefore, it is a fair assumption that this trend will not abate and the insufficient numbers of IT
professional will not be able to keep up with the globalization process. We believe that this will
continue into the foreseeable future because the education system simply cannot keep pace with
the business cycle producing devices and software.
Barring any changes to the current climate or some new breakthrough in computer
security, managing threats to information will continue to be a tenuous process of maintaining a
balance priorities and assumption of risk. With limited resources, IT professionals will continue
to be called upon to provide management with the capability to make informed decisions about
which assets require heightened vigilance.
15
Conclusion
In this paper we looked at SANS, Educause, Internet Usage world statistics to chart and
find trends prevailing in the Information Technology industry. For research purposes, we
maintained the simple premise that the desires of consumer far outpace the abilities of IT
professionals to deliver and secure the internet and associated products. We paid special attention
paid to “where we were”, “where we are”, and “where we are going”. Looking at the type of
attacks starting in 2000 (Table 1) to 2007 (Table 2) and evaluating the most current data
available in similar, useable formats, we noticed the breakdown and classifications of the
problem had grown increasingly complex. This is what we face as IT professionals in today’s
market. Continuing on, we took a snapshot of two different websites claiming top 10 issues in
information technology (Figure 1 Web Excerpt and Figure 2 - Web Excerpt to illustrate the lack
of standardization. We wrap up our introduction by showing that even organization of a similar
purpose cannot agree on a list of top threats to information and systems.
The “where we came from” section is based on a mini timeline of significant
developments to illustrate what that we believe helped shape a lot of the issues today (Figure 3 Major Computer Developments). Without the creation of connectivity and affordable equipment,
there would be no discussion about information security.
The “where we are” section looks at past trends showing how population data (Figure 4 Population Growth Trend) and market penetration (Figure 5) for North America compare. We
demonstrated that these trends have a Pearson’s correlation coefficient of 0.972 which supports a
strongly positive correlation, and therefore, are directly related to each other. This explosive,
continued growth of users has outpaced the IT communities’ ability to fix the issues. In Figure 6,
16
we assert that the disproportionate population of users in the United States as opposed to the rest
of the world has created an environment where the U.S. has become a target of both access and
opportunity. In simplest terms we are outnumbered. In Figure 7 we attempt chart the actual
number of Common Vulnerabilities and Exposures (CVE) and Candidates for CVE (CAN) from
2000 to 2007. We do not actually address the number of specific attacks, instead choosing to
represent them as the number of issues found in each heading.
The “where we are going section,” globalization is addressed. Globalization coupled with
the vast profits companies are posting (Figure 8), provide opportunity and motivation to threaten
information and the trend is ever increasing.
Figure 9 and Figure 10 addresses the education side of the house to balance out the
government and business interest previously shown and we see is that very little has changed in
the way of thinking about how best to attack the problem of securing information assets in
respect to how the education community views things. All in all, the data collected for this
project reflect problems that have been with us for a very long time. Overall the issues addressed
within have enjoyed little in the way of progress towards solution. The individual communities
(Government, Educators, and Business) seem stuck in the defining stage of problem solving with
little progress towards real solutions. We conclude that there is no real interface between all the
parties and the problems will remain until real communication between them is realized.
As a final illustration we offer Figure 11 and Figure 12 gathered from the 2009 Sans
report to reinforce the point that both vulnerabilities and frequency of attacks are on the rise.
17
Figure 12 - Number of Vulnerabilities in Network, OS, and Applications
(SANS Institute, 2009)
Figure 11 - Attacks on Critical Microsoft Vulnerabilities (last 6 months)
(SANS Institute, 2009)
18
References
Timeline of Microcomputers(1977-1980). (2002, 03 05). Retrieved 04 13, 2011, from Timeline of
Microcomputers(1977-1980): http://pcmuseum.tripod.com/comphis3.html
Dell: Information from Answers.com. (2011). Retrieved April 3, 2011, from Answers.com:
http://www.answers.com/topic/dell-technology
Admin. (2010, 09 26). America Online (AOL) ENGLISH ARTICLES. Retrieved 04 13, 2011, from America
Online (AOL) ENGLISH ARTICLES: http://www.englisharticles.info/2010/09/26/america-onlineaol/
Alshboul, A. (2010). Information Systems Security Measures and Countermeasures: Protecting
Organizational Assests from Malicious Attacks. IBIMA Publishing, 2010(Article ID 486878), 9.
Bellis, M. (1997). The History of Computers - Computer History Timeline. Retrieved March 15, 2011, from
About.com, Inventors: http://inventors.about.com/library/blcoindex.htm
Bret L. Ingerman, C. Y. (2010, June). Top 10 IT Issues - 2010. Retrieved February 15, 2011, from Educause
Review: http://net.educause.edu/ir/library/pdf/ERM1032.pdf
Dennis Publishing Limited. (2010). Top 10 Threats for IT Security - 2011. Retrieved April 13, 2011, from IT
PRO - Fit for Business: http://www.itpro.co.uk/613333/top-10-threats-for-it-security-in-2011
Infosec Island, LLC. (n.d.). Imperva Releases Top 10 Security Threats for 2011. Retrieved April 13, 2011,
from Infosec Island: https://www.infosecisland.com/blogview/9613-Imperva-Releases-Top-10Security-Threats-for-2011.html
Leonard Kleinrock. (2009). Leonard Kleinrock's Home Page - History. Retrieved Apr 1, 2011, from
University of California Los Angeles: http://www.lk.cs.ucla.edu/internet_first_words.html
MapsOfIndia.com. (2004). Globalization of Markets. Retrieved April 3, 2011, from MapsOfIndia.com:
http://business.mapsofindia.com/globalization/market.html
Matteo. (2009, 10 14). Brief History of AOL and its Instant Messenger Program. Retrieved 04 13, 2011,
from Brief History of AOL and its Instant Messenger Program:
http://www.brighthub.com/office/collaboration/articles/4107.aspx
Miniwatts Marketing Group. (2004 - 2011). North America Internet Usage, Population and
Telecommunication Report. Retrieved March 27, 2011, from Internet World Stats:
http://www.internetworldstats.com/stats14.htm
Nelson B. Heller & Associates. (2001, August). bNet - The CBS interactive business network. Retrieved
February 15, 2011, from EDUCAUSE identifies campus IT challenges:
http://findarticles.com/p/articles/mi_m0BTY/is_2_7/ai_77378640/
19
Perry, C. (2006, October 13). Processor Editorial Article - Hardware Life Cycles Enter a New Era. Retrieved
March 13, 2011, from Processor - Products, News & Information Data Centers Can Trust:
http://www.processor.com/editorial/article.asp?article=articles/P2841/23p41/23p41.asp
Phil Benchoff, e. a. (2001, October 1). The Top 20 Most Critical Internet Security Vulnerabilities - 20012002 Archive. Retrieved February 10, 2011, from SANS: http://www.sans.org/top20/2001
Roberta L. Lembke, J. A. (2001). Top Campus IT Challenges for 2001. Retrieved February 15, 2011, from
Educause: http://net.educause.edu/ir/library/pdf/eqm01211.pdf
Rohit Dhamankar, e. a. (2007, November 28). Top 2o Internet Security Problems, Threats and Risks.
Retrieved February 10, 2011, from SANS: http://www.sans.org/top20/2007/
SANS Institute. (2009, September). SANS: Top Cyber Security Risks - Vulnerability Exploitation Trends.
Retrieved April 10, 2011, from SANS: The most trusted site for computer security training,
certification and research: http://www.sans.org/top-cyber-security-risks/trends.php
The Gale Group, I. (2011, 04 13). H & R Block, Incorporated -- Company History. Retrieved 04 13, 2011,
from H & R Block, Incorporated -- Company History:
http://www.fundinguniverse.com/company-histories/H-amp;-R-Block-Incorporated-CompanyHistory.html
20
Download