Keeping the bad guys at bay

 

Connecting state and local government leaders

As you read this, there's probably a hostile packet headed for your network.

As you read this, there's probably a hostile packet headed for your network.There's little doubt that cyberattacks are becoming more technically sophisticated and are proliferating.How bad is it? 'It's a bad neighborhood,' declared David Nelson, NASA's deputy chief information officer for information technology security.Although a blitz of colorfully named viruses embedded in e-mail attachments, such as ILoveYou and Kournikova, sounded alarms and created havoc in the last year, it was the recent Code Red attack that really shook things up.Code Red is a malicious worm of a different sort and spectacularly insidious. It exploits a weakness in Microsoft Internet Information Server software, installs a copy of itself and then searches the Internet for systems running unprotected versions of IIS.It was followed shortly by Code Red II, an unrelated but even trickier worm that uses a similar exploit to gain access to systems and plant a back door in systems to propagate itself.The specter of similar self-propagating attacks coming down the pike is weighing heavily on the minds of top federal security executives.'We're looking at a new dimension in the past 80 days,' said Ronald Dick, director of the National Infrastructure Protection Center. 'Writers of malicious code are discovering ways to use software to locate thousands of other computers. They're taking advantage of vulnerabilities in operating systems, building massive network attacks and doing it in an automated fashion.'The Code Red attack 'was a good example of harnessing the enemy to be your agent,' Nelson said.John Gilligan, Air Force deputy CIO and co-chairman of the CIO Council's security committee, found out how a worm attack can disrupt an agency's ability to do business.'The impact to the Air Force of Code Red was enormous,' he said. 'We had very few systems that succumbed to the worm, but a policy decision was made to sever our connectivity to the Internet. That had a very large impact on our ability to operate because we are increasingly interdependent with industry and the suppliers who access our systems and provide us with services.'How great is the threat of malicious code?'It's a put-me-out-of-business threat,' said Alan Paller, director of the SANS Institute of Bethesda, Md. He estimated the cost of Code Red damages at $2 billion to $3 billion.In large part, the threat is exacerbated by the open nature of the Internet.'A lot of the problem is in the infrastructure,' said Tom Haigh, chief technology officer for Secure Computing Corp. of San Jose, Calif., which has Air Force, Marine Corps and Navy users. 'The Internet wasn't built to be used the way we're using it. When it started as Arpanet it was a bunch of researchers in labs and universities who all knew each other. Now we have hundreds of millions of people using the Internet, and they're certainly not one community of interest.'The Net is intrinsically insecure, Nelson agreed: 'The same Internet that provides us such a marvelous communications vehicle also allows news of vulnerabilities and exploits of them to spread quickly. So we see a discovered vulnerability quickly turn into an exploit.'The situation is made even worse by electronic commerce and electronic government, which are expanding access to systems via the Internet.'The big problem now is that we have more and more outsiders becoming virtual insiders,' Haigh said. 'That requires new security technologies that we haven't used in the past. Simply putting firewalls on the perimeters is woefully inadequate at this point. There's a big payoff to collaborative e-business or e-government, but there's also an awful lot of risk associated with it.'Security vulnerabilities in shrink-wrapped products, such as the one that Code Red exploited in Microsoft IIS, are also a growing concern among agencies' systems managers.'The rapid proliferation of malicious code can only be effective when there is a plethora of vulnerabilities to exploit,' said Dave Jarrell, technical director for the General Services Administration's Federal Computer Incident Response Center.Consumers are starting to demand basic security standards in computer products, Dick said.'For years, the public and private sectors demanded ease of use, high-speed processors and large storage capabilities,' he said. 'We really didn't demand in the past that security be built into these systems. We're now seeing a change in this attitude.'The lack of security standards for commercial products is especially vexing to Linda Burek, deputy CIO and assistant attorney general for IRM at the Justice Department.For Burek, there's more to life in IT than endlessly downloading patches to deal with the latest code threat.'These items are basically sold to us open and not secure,' she said. 'First, we have to have systems administrators lock them down, which is difficult enough, but then there are all these patches coming out, and updates have to be done. Even our very best security people are having great difficulty keeping up with this environment.'Burek and Kevin Deeley, Justice's assistant director for information security, are leading an effort to get vendors to build security standards into their products.'In the federal community, we want to buy a closed box,' she said. 'We want it secure the day we purchase it. I think there's a big disconnect between the vendor thinking we want open systems and those of us out here saying we don't.'Burek and Deeley recently met with a group of vendors, most of which do a large amount of business with Justice, about the lack of security standards in their products.'We wanted to get the message to them that we needed them to be more proactive in helping us solve the problem,' she said.The vendors are beginning to listen but 'it's a big job,' Deeley said. 'It's an evolving process.'Burek also said Justice is looking at putting security requirements into contracts.'We're going to work on some procurement language that we could include in our contracts to purchase equipment and software so that we're buying more software that's locked down when we purchase it,' she said.Feds also are looking at more systematic, proactive ways of coping with threats. There is growing interest in the use of metrics, for example.'I view metrics as an essential element of any effective government or private-industry information security program because, absent metrics, I don't really think you can assess how well you're doing,' Gilligan said.The CIO Council has drafted a set of metrics that will be released in late fall, Gilligan said.'We are now fine-tuning the metrics and trying to come up with an implementation strategy,' he said. The draft will reflect the types of weaknesses that commonly contribute to security vulnerabilities and how agencies can use metrics to gauge their systems' weakness.Although metrics and other strategies, such as more effective IT management, can help agencies manage the security environment, officials lose sleep over potential threats on the horizon as attackers begin to deploy more sophisticated technologies.'There are the ankle-biters, the hackers who don't necessarily know what they're doing,' Haigh said. 'They're a nuisance. Once in a while one will cause problems, like the ILoveYou virus.'But it's what Haigh calls the deep threats that worry security officials most. 'Our government customers worry about the people who are trying to turn computers into intelligence assets that can be used for espionage,' Haigh said. 'There is the concern foreign agents or terrorists may even now be installing Trojan horses in our critical infrastructure that will be triggered to go off at some time in the future.'Gilligan agreed: 'The threat that concerns me the most is the one we don't see. It's a threat from a true economic or military adversary who is doing reconnaissance at such a level of sophistication that we're just not seeing it. ' That keeps me up at times.'

Feds size up security







Source: GCN telephone survey

OVER THE LONG HAUL: Ferreting out and closing loopholes in systems over and over again is what makes security management a task of sustainment rather than an adrenaline-driven effort, NASA's David Nelson says.

Air Force deputy CIO John GIlligan says that the Code Red worm didn't affect many of the service's systems directly, but Air Force systems were severed from the Internet as a precaution.

Systems security demands that agencies prepare for worst-case scenario

















































































X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.