Top five reasons for security FAIL

The weakness is often peripheral to the main part of the solution that you know or believe is solid

The Internet security industry has seen every type of security solution fail. While there are exceptions, one can learn some general principles as to why things fail. Below are some observations. The weakest link"Security is only as good as its weakest link." This is probably the most well-known adage. Surprisingly however, many security solutions fail because of it, as the weakest link is often not obvious. This is best demonstrated with a couple of examples from the encryption world.

Take the best encryption algorithm you can find with the largest key length possible. Let's assume it is totally secure. Did you use the same level of sophistication when choosing the encryption key? If your encryption key is based on a password, for example, it is likely based on just a small number of bits and is expanded into the larger key size by the encryption software. However, it is still dependent on this small number of bits and is much weaker than you think.

Then there's the question of how you communicate that key to another party. Often times, communicating is the weakest link. A classic example is the use of One Time Pad (OTP), which has been in use since World War II. The OTP "key" is basically as long as the plain text is being encrypted, and theoretically it can be proven that OTP provides perfect security. Is that so? The weakness lies in how you communicate that OTP to the other party, and how you use it afterwards. Even if you send a messenger carrying that key to the other party and you're sure it hasn't been breached, common problems in operating such a system can render it extremely weak. If for some reason, you use some of the OTP more than once, there are simple cryptographical methods that would enable a third party to intercept and read your communications easily. The US was able to intercept communication of a Soviet spy ring by leveraging this principle.

As you can see, the weakness is often peripheral to the main part of the solution that you know or believe is solid.

Industry standard vs. proprietaryResorting to proprietary solutions may give a small advantage due to "security by obscurity," however, it is dangerous to use solutions that are not widely scrutinized. Encryption is again a great example.

Using industry standards like AES means numerous experts have reviewed the algorithm and did not find serious issues. And if they do find them, you will know about it. Take first generation WiFi encryption (WEP). This method was very quickly shown to have serious vulnerabilities. Since it was a standard, the word quickly got out and it was replaced by stronger methods.

Be especially wary of vendors who do not expose their algorithms and make strong claims as to their strength without backing up those statements.

The right solution to the wrong problemThe problem needs to be clearly defined if security is to be effective. Otherwise, you can find yourself with a good solution that does not address your real issues.

Take the firewall, for example. While it may be a good solution for some issues, if you have a database running behind the firewall it will not block application-level attacks such as SQL injection. These are common and dangerous attacks, but most firewalls do not address them, and dedicated solutions are required.

The human factor"If you leave it to the human factor, it will break." If you rely on the end user, and the end user is not knowledgeable enough or cannot be bothered, security is seriously lacking. A couple of examples can make this clear.

First, I find most personal firewalls useless. What good is a firewall that asks a novice user, "Do you want to allow Microsoft MAPI protocol?" What should the user say? Yes? No? If you answer wrong, either you block a vital service, or you open up for attack.

A more serious issue is that of phishing scams. These are probably the hardest to defend against. Basically, if someone can fool you into entering the password for your bank account into some fake form on the Web, or even over the phone, that's a sure recipe for identity theft. Why is this so difficult to prevent? Because it comes to the human factor. Today you have no control or knowledge of such a scam being perpetrated, and if you only have your password for authentication that's too bad. Even if you put two-factor authentication into the bank's Web site, you still may have given valuable information such as your social security number to the wrong person.

UsabilitySecurity must be usable in order to succeed. The best security is to cut off all connectivity, however this is extreme and not workable. So, ease of deployment and use is what makes it secure. After all, if you can't or won't use it, there's no security in place.

One example that springs to mind immediately is intrusion detection systems (IDS). While obviously important, many have forsaken them because they generate so much output and logs. So, unless you have enough bandwidth (i.e., personnel) to go over all these logs, the solution is not really effective. Similarly, many intrusion prevention (IDP) and data loss prevention (DLP) solutions generate false positives, thereby blocking authorized traffic. This is why many companies don't use them "in-line." Typically, just the basic, most obvious traffic is actually controlled "in-line," and most of the traffic is just logged to be reviewed later by an administrator. Obviously, again this is not an ideal solution.

SummaryThe above are all easier said than done. Security is elusive and constantly changing. However, it is worth keeping these principles in mind when making security decisions. Define your problem well, find the weakest links, go with industry standards, minimize user involvement and keep it simple.

Adi Ruppin is vice president of marketing for Confidela.

Join the CSO newsletter!

Error: Please check your email address.

Tags security

More about Adobe SystemsAES EnvironmentalDLPLPMicrosoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Adi Ruppin

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place