Research on Information Assurance

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • AgentDarkApple
    Public Security Section 9
    • Aug 2009
    • 224

    #16
    Re: Research on Information Assurance

    Originally posted by streaker69
    If we could eliminate the people from the equation, computers really wouldn't have a problem.
    Very true - after all these years, they still have not found a patch that will fix "stupid".

    I know end users can wreck things in no time, but personally, I always point to the programmers when things go wrong. Not all programmers suck, but too many of the ones making commercial OS's and software apparently do.
    "Why is it drug addicts and computer afficionados are both called users? " - Clifford Stoll

    Comment

    • streaker69
      • Mar 2008
      • 1141

      #17
      Re: Research on Information Assurance

      Originally posted by AgentDarkApple
      Very true - after all these years, they still have not found a patch that will fix "stupid".

      I know end users can wreck things in no time, but personally, I always point to the programmers when things go wrong. Not all programmers suck, but too many of the ones making commercial OS's and software apparently do.
      Actually it's not programmers, it's all those damn hackers that keep breaking perfectly well written software.
      A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

      Comment

      • Drauko
        Member
        • Nov 2009
        • 4

        #18
        Re: Research on Information Assurance

        Xor - I totally get your line of questioning. I take no offense. I re-searched Information Assurance and got much better results. I think the problem I had was that I wasn't vague enough to allow the right stuff through the search filter.

        To clarify my college class, it's the 2nd week of the first course, and we've been tought nothing in the field of IT as of yet. I have no background in IT, so I'm not familiar with any of the issues that exist anywhere in the IT industry, much less in IA specific areas.

        AgentDarkApple - I found your research list from the post you started a month or so ago. I started looking through it and found a few places to start researching information in specific areas, so I thank you for that.

        Thanks for the posts everyone. I'll post what I finally pin down soon ( I hope).

        Comment

        • KernelConflag
          Member
          • Dec 2009
          • 16

          #19
          Re: Research on Information Assurance

          Try this link:
          http://www.infosyssec.net/infosyssec...ty/intdet1.htm

          You should be able to find what you're looking for through here.
          Just because you're paranoid it doesn't mean they aint out to get ya!

          Comment

          • heisenbug
            Member
            • Dec 2009
            • 53

            #20
            Re: Research on Information Assurance

            Originally posted by streaker69
            Actually it's not programmers, it's all those damn hackers that keep breaking perfectly well written software.
            This may have been intended as an ironic statement, but when I looked at that I thought, "He is right." (I am assuming by percentages of computer professionals that you are a male. I apologize if I am wrong on that.)

            Older code may have been at one point very secure. It may no longer be secure for many reasons. Below I made a list of just a very limited few:
            • There is a vulnerability in third party code that will let you manipulate the system.
            • There is a vulnerability in the language that was used itself
            • That particular vulnerability was unknown or not even discovered yet
            • Ridiculous tight deadlines force the developer to make the software "just work"
            • The vulnerability is in the database and not the software
            • The vulnerability is in the business rules the programmer is forced to use
            • The vulnerability is in the protocol used. (ie. SSH vulnerabilities)
            • The programmer is informed the software is intranet only, and upper management finds security unimportant
            • Security is not budgeted, and upper management finds it unimportant

            Comment

            • AgentDarkApple
              Public Security Section 9
              • Aug 2009
              • 224

              #21
              Re: Research on Information Assurance

              Originally posted by heisenbug
              • There is a vulnerability in third party code that will let you manipulate the system.
              • There is a vulnerability in the language that was used itself
              • That particular vulnerability was unknown or not even discovered yet
              • Ridiculous tight deadlines force the developer to make the software "just work"
              • The vulnerability is in the database and not the software
              • The vulnerability is in the business rules the programmer is forced to use
              • The vulnerability is in the protocol used. (ie. SSH vulnerabilities)
              • The programmer is informed the software is intranet only, and upper management finds security unimportant
              • Security is not budgeted, and upper management finds it unimportant
              You are right that all of these are contributing factors. I think inherent problems with the programming languages used are a big one. And the fact that the compiler sometimes screws things up. I also think that not enough of the training materials for programmers stress the importance of making security a priority. It's all about the money and the deadline.

              Still, I feel that once a vulnerability is discovered, too many software companies would rather issue patches and kick some dirt over it rather than performing a causal analysis and actually fixing the true problem.
              "Why is it drug addicts and computer afficionados are both called users? " - Clifford Stoll

              Comment

              • heisenbug
                Member
                • Dec 2009
                • 53

                #22
                Re: Research on Information Assurance

                Originally posted by AgentDarkApple
                I also think that not enough of the training materials for programmers stress the importance of making security a priority. It's all about the money and the deadline.
                Ha, there are rarely training manuals for software developers. O'Riley is often their only manual. There is rarely any formalized training at all. In most companies they put you next to a PC (with 512MB of memory) in a bland cubicle, and say, either "build me feature X on product Y using the existing technology" or "Build me product Y." (Note the lack of requirements) Still they get a whole lot done.

                I would say that the biggest problem in the system; however, is project management. Too many companies try to develop "agile" methods without actually knowing what that means. They use the wrong method for the wrong project. Some sections can not be coded until other sections are complete.

                Due to bad planning over 70% of software projects fail. Over 80% are behind schedule, and many go out corrupt and half finished. Near the end of development, when a product is obviously going to be behind schedule, the upper management will start cutting features in order to meet deadlines. Security is often considered a "feature" by upper management. Do you see where I am going with this?

                Comment

                • AgentDarkApple
                  Public Security Section 9
                  • Aug 2009
                  • 224

                  #23
                  Re: Research on Information Assurance

                  Originally posted by heisenbug
                  Ha, there are rarely training manuals for software developers. O'Riley is often their only manual. There is rarely any formalized training at all. In most companies they put you next to a PC (with 512MB of memory) in a bland cubicle, and say, either "build me feature X on product Y using the existing technology" or "Build me product Y." (Note the lack of requirements) Still they get a whole lot done.

                  I would say that the biggest problem in the system; however, is project management. Too many companies try to develop "agile" methods without actually knowing what that means. They use the wrong method for the wrong project. Some sections can not be coded until other sections are complete.

                  Due to bad planning over 70% of software projects fail. Over 80% are behind schedule, and many go out corrupt and half finished. Near the end of development, when a product is obviously going to be behind schedule, the upper management will start cutting features in order to meet deadlines. Security is often considered a "feature" by upper management. Do you see where I am going with this?
                  Good point - it sounds like there is a breakdown in communication and a lot of the project managers have no idea what is involved in the actual coding, therefore giving them unrealistic expectations, especially where time is concerned. It just baffles me that security is not given higher priority though

                  By "training materials", I was referring to O'Reilly books. It seems that even formal college programming classes often rely on O'Reilly. The O'Reilly programming guides I have read drove the point home about deadlines and customer expectations but did little to push security.
                  "Why is it drug addicts and computer afficionados are both called users? " - Clifford Stoll

                  Comment

                  • streaker69
                    • Mar 2008
                    • 1141

                    #24
                    Re: Research on Information Assurance

                    Originally posted by AgentDarkApple
                    Good point - it sounds like there is a breakdown in communication and a lot of the project managers have no idea what is involved in the actual coding, therefore giving them unrealistic expectations, especially where time is concerned. It just baffles me that security is not given higher priority though
                    After next month, I can probably talk a little more publicly about an issue I've been working with regarding exactly this issue. Security was never implemented, not at the programming level or at the IT level of the provider of the software. I discovered glaringly obvious security deficiencies in their system and reported it to them. They've been working with this exact same system for more than 10 years, and not one person at their company apparently ever gave security a thought. Even with all the news reports over the past decades that directly addressed all the issues I found.

                    When I presented them with my findings, they were absolutely gobsmacked, and actually admitted that they knew about most of the issues I presented, but had never done anything about it. Now they're trying to play catch up. What's worse, is their marketing department had posted a 'security statement' on their website saying that things were being done, but in reality their IT department wasn't doing, nor did they know they were supposed to be.

                    It's basically a lack of communication between departments that causes many issues. IT many times is aware of security issues, but fails to relay those concerns to development, plus I've found that developers many times know very little about computer technology in general. They know how to write code, but that's about the extent of their knowledge.
                    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

                    Comment

                    • Thorn
                      Easy Bake Oven Iron Chef
                      • Sep 2002
                      • 1819

                      #25
                      Re: Research on Information Assurance

                      Originally posted by streaker69
                      After next month, I can probably talk a little more publicly about an issue I've been working with regarding exactly this issue. ...
                      /me snickers like Muttley
                      Thorn
                      "If you can't be a good example, then you'll just have to be a horrible warning." - Catherine Aird

                      Comment

                      • heisenbug
                        Member
                        • Dec 2009
                        • 53

                        #26
                        Re: Research on Information Assurance

                        Originally posted by streaker69
                        When I presented them with my findings, they were absolutely gobsmacked, and actually admitted that they knew about most of the issues I presented, but had never done anything about it. Now they're trying to play catch up.
                        It's so much easier and cheaper to place security in programs at design. After implementation, it takes so much more work to make software secure.

                        There is a 1-10-100 rule in software development. If it costs $1 or 1 hour to develop in planning, it will cost $10 or take 10 hours to fix after design, and $100 or 100 hours to fix after implementation. So a $500 fix in security at planning will end up costing the company $50,000 after implementation.

                        These companies don't realize that it is actually much cheaper for them to put the security in the software in the first place.

                        Comment

                        Working...