Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    FBI Wishes for a Network Security Utopia That Can Never Exist

    Written by

    Wayne Rash
    Published October 24, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      WhenShawn Henry, FBI executive assistant director, suggested during a conference in Baltimore that a second, secure Internet be created to protect critical infrastructure against increasingly sophisticated attacks, he made a good point. A separate secure network could help reduce serious attacks. However, he’s wrong when he suggests that this mightsomehow insulate this infrastructure from attacks. All it means is they will come from a different direction.

      There are several holes in Henry’s plan. First of all, tocreate a secure network you can only allow secure organizations to connect to it. But Henry wants this network to be used by power plants, banks, and other companies and organizations where an attack could seriously damage the national interest. This might be a good idea, but you would have to keep the power plants and banks from using it.

      The big problem in creating such a secure version of the Internet is that it’s open to organizations that have no security capability of their own in the case of power plants or no effective network security in the case of banks.

      Right now, power stations hire people who are supposed to be very good at running power plants. There isn’t and never has been any significant effort to implement the necessary security infrastructure and required practices and training used by (for example) the FBI.

      This means that you’d have workers with no security clearance, no background check that relates to data security and no training in security with access to the supposedly secure network. How long do you think it might be before someone who works for a power company decides to fiddle with the secure network? Maybe a week?

      Financial institutions are supposed to have at least some level of security, but do they really? Let’s see if we cancount the number of data breaches that have happened to such institutions in the last 10 years or even in just the past 12 months. Can’t count that high? Neither can I.

      The problem with creating a secure network such as the one Henry envisions is that every part of it needs to be secure. It doesn’t help if the network itself is secure if the institutions attached to it are insecure. Even if these institutions are extremely careful, a leak is bound to happen, probably sooner rather than later.

      Henry’s other suggestion at the conference was that sensitive systems be taken completely off the Internet. This is the approach used by the Iranian government to protect the computers that controlled its uranium centrifuges. There was absolutely no connection between the computers that controlled the machines and the outside world. But then came Stuxnet. Someone should ask the Iranians how well that separation worked for them.

      A Stray USB Stick Can Ruin the Strongest Network Security

      The fact is that separating the network will not provide security. The most it will provide is the illusion of security, which is a lot worse. But after a little while people will get complacent, catastrophe will strike, the network will fall prey to the very people it’s supposed to protect against, and no one will be ready. After all, the network is secure, so why worry?

      The same was true with the Iranian centrifuges. They were not connected to any external network. But when an employee found a USB memory stick in a men’s room and plugged it in to see what was on it, Iran lost its nuclear program. Security, it would seem, is fleeting.

      Worse, the illusion of security is a trap. By making it seem as if the network or the computer is really secure, the operators or the users will drift away from good security practices and eventually they will plug in that fateful USB memory stick.

      While a secure internetwork does have some advantages, the bottom line is that it’s only secure as long as all of it is secure. Several federal agencies already know this and are using a highly secure network that allows them to share data. These agencies are usually known by their initials, and every part of them is highly secure. This is why you don’t hear about data breaches at the NSA or the NRO. Every part of that network and every person who uses it is secure and cleared for access. They have full background checks. And everyone watches everything they do.

      Such a massive security effort on a national, let alone a global scale isn’t just impractical, it’s probably impossible. Until the time comes when the banks and power companies are run by the intelligence agencies, such a thing will never happen. In some ways it’s probably better to live in the wilds of the Internet, know you’re in the wilds, and to take precautions and use great vigilance. If you design your systems right, you can minimize damage and slow down attacks.

      Henry is correct that attacks against critical infrastructure will become more frequent and the risks are high. But the problem with creating an allegedly secure network is that it won’t be as secure as its users think, but in the meantime the attackers will develop better weapons. Ultimately, the real choice is to realize that the world is dangerous and to train accordingly, take precautions and find ways to minimize damage. To pretend otherwise is to ask for catastrophe.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×