Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How Sharing Thwarts Hacks

    Written by

    Dennis Fisher
    Published January 13, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Two Harvard University security researchers have developed a model showing that enterprises that share their sensitive data about network attacks and security breaches are less attractive targets and, hence, less likely to be attacked.

      The paper, to be presented later this month at the Financial Cryptography conference in Gosier, Guadeloupe, supports the U.S. governments contentions about the importance of sharing attack data. But it also concludes that many of the benefits that can accrue from such an arrangement wont be realized soon.

      “I absolutely believe that theres value in information sharing, and I think that value will grow,” said Stuart Schechter, a doctoral candidate in computer science at Harvard, in Cambridge, Mass., and co-author of the paper. “I think the change [toward information sharing] will be driven by insurance companies, who will offer lower premiums for companies that share.”

      Schechters paper, written with Michael Smith, a professor of computer science and electrical engineering at Harvard, asserts that attackers exploiting vulnerabilities in off-the-shelf software will be less likely to attack a particular company if that organization is known to share attack data with other enterprises and/or the government and law enforcement. The reason is that attackers who spend time, and in some cases money, finding and exploiting vulnerabilities in common applications will not want information about their attacks shared, as it would reduce their chances of compromising other potential targets.

      Government security officials in recent months have talked often of their desire to gather more attack data from enterprises. Presumably, the information the government would gather would be analyzed and then passed to the general public to warn of ongoing attacks and potential threats.

      The next draft of the National Strategy to Secure Cyberspace, due early this year, is expected to include language encouraging CIOs to forward more information to the government.

      But not everyone agrees with the governments proposal.

      “There are better ways to do that than requiring it,” said Mark Rasch, senior vice president and chief security counsel at Solutionary Inc., a security vendor based in Omaha, Neb. “What they need is incident data, and the problem there is that it generally requires a person to recognize the attack and make the decision to share the information. It could be set up in an automated way, but the government would have to fund it, and the political question is the level of the governments involvement. What will they do with this data?”

      And that is what concerns enterprises most. Security specialists and CIOs worry that sharing sensitive data with anyone, especially the government, will expose them to embarrassment and potential lawsuits from customers.

      “How about sharing the technical details of successful intrusions in a more public way, via an organization that would be perceived as neutral? Perhaps an additional role for CERT [Coordination Center], SANS [Institute] or even BugTraq—an expansion of the way we now share reports of vulnerabilities in specific products,” said Karl Keller, president of IS Power Inc., a custom software developer in Thousand Oaks, Calif. “No new bureaucracy need arise. The victim could remain anonymous. What is important is the publicity for infrastructure-specific vulnerabilities and countermeasures. Thats an extension of the present component/vendor-specific vulnerability and patch reporting were used to.”

      SHARE AND SHARE ALIKE

      Conclusions of the forthcoming Harvard paper:

      • Companies that share attack data can become less attractive targets
      • Clients of monitoring companies that publish attack data are less attractive targets
      • Government monitoring of network traffic may be necessary to limit widespread data theft
      • Customized security tools are more valuable and effective than packaged solutions

      The governments hunger for attack data is partially due to the creation of the Department of Homeland Security, which is scheduled to be up and running in the next few weeks. Nearly all the federal information security capabilities will be consolidated in the new agency, which will be responsible for early warning and analysis. However, government sources say the consolidation effort has been disorganized, and many workers who are moving to Homeland Security are unclear what their duties will be.

      “Its kind of a mess right now. No ones said whos going where and whos doing what,” said one government security employee, who asked to remain anonymous.

      A current version of the national strategy making the rounds in Washington is short on details and recommendations and long on broad policy pronouncements, according to people with knowledge of the document. Despite the governments fondness for information sharing, dont expect to see any mandates along those lines, sources said.

      “There will be a lot of rhetoric about it because thats one of the few things that we can actually do,” Rasch said. “Its impossible for [the government] to set a standard of care in this area because they dont do it themselves. They talk about leading by example in there, but thats not happening.”

      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×