Enterprises worried about cybersecurity should pay more attention to their own employees than to the as-of-yet unrealised threat of cyberterrorism, two cybersecurity experts warned a group of IT professionals Tuesday.
Speaking at the Gartner IT Security Summit 2003, representatives of Gartner and the Center for Strategic and International Studies (CSIS) suggested that enterprises should worry more about their intellectual property leaking out through employees or small-time hackers than their entire networks crashing from attacks of organised cyberterrorists.
The threat of cyberterrorism to enterprises may be overstated, but the threat of less organised attacks may be understated in current discussions about cybersecurity, said CSIS director James Lewis.
While a host of security experts have called on the US and its allies to be vigilant against cyberterrorism, think tank director Lewis said he's seen no evidence of large cyberterrorist attacks yet.
The US has counted more than 1800 physical terrorism attacks since 1995, Lewis noted, but no major cyberterrorism in that time frame. "Kinetic weapons are much more effective right now," Lewis added.
However, enterprises should be worried about attacks, whether they are from inside employees or outsiders because they have more property than individuals do, and fewer ways to protect themselves than nations do. Enterprises are where the money is in cyber attacks, whether it be intellectual property, extortion or financial data, Lewis said, with loss of intellectual property and sensitive data the fastest growing cybersecurity loss.
"You get a lot of attention on cyberterrorism and Osama bin Laden sitting in front of a keyboard, but you ought to be more worried about insiders," Lewis said to close to 1,000 attendees of the Gartner conference. "The primary target is companies, and we probably put not enough effort into thinking about how to protect them."
Individual hackers will increasingly become another threat to both security and privacy because of their access to ever more powerful technology, added Richard Hunter, a vice president at Gartner and co-chairman of the conference. By 2008, Gartner estimates home computers will have 40-GHz processors and 1.3T bytes of storage, he said, leading to both beneficial and dangerous uses of home computers.
"That's enough to do data mining at home," Hunter said. "When we think about an environment that involves governments collecting information, that involves enterprises gathering information, we now have to think about an environment in which individuals are going to have significant power to gather and analyse and use information."
An enterprise's greatest strength and greatest weakness are often its employees, whether they make mistakes in not following security best practices or they have malicious intent, added Casey J Dunlevy, project lead at the CERT Analysis Center at Carnegie Mellon University. Because of that, it's difficult for companies to come up with accurate threat models that can show them where to put their resources.
Companies need to prioritise their critical assets and should look into creating multidisciplinary teams that consider other security challenges such as physical security when drawing up a plan to protect critical assets, Dunlevy recommended. No company has enough money to "take the fortress mentality and protect everything," he added.
Dunlevy agreed with Lewis that cyberterrorism on its own may not be the top worry of most enterprises, but he suggested that cyber attacks could be a way for terrorists to supplement physical attacks. For example, shutting down a major city's traffic lights would be an effective way to create gridlock and multiply the impact of a physical attack.
"We're not necessarily looking for the 10-foot-tall cyber hacker to come out of the basement," Dunlevy said. "We're talking about people that know enough about technology to utilise it for different ends."
David M Perry, the global director of education for security vendor Trend Micro, said in an interview that small businesses and individuals should look for the same security protection and attention from vendors that enterprises get. Small- and medium-sized businesses should demand that their Internet service providers act as their enterprise when getting deals with large security vendors, he recommended.
Separately, Gartner released a study Tuesday saying that 2003 will be the first year in history in which most industries will spend 5 per cent of their IT budgets on security. Security spending will have grown at a compound annual rate of 28 per cent between 2001 and the end of 2003, Gartner said, while IT budgets overall will have grown only 6 per cent during the same time.
It's in security vendors' best interest to focus on selling their products to enterprises, not to individuals or smaller businesses, Perry added. "They say (enterprise security) is where the danger is, but what they mean is that's where the money is to sell their products," Perry added.