Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Securing Source Code Should Be a Priority

    Written by

    David Coursey
    Published November 4, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The efforts of the “Source Code Club” to sell the source code to Cisco firewalls may be despicable, but they may also be a blessing in disguise. By making a public show of Ciscos inability to keep its secrets to itself, these desperados may actually be doing us all a big favor.

      This is not the first time Cisco has been targeted by source code thieves. In May, its IOS 12.3 code was compromised. IOS (Internetwork Operating System) is used in Cisco routers from home offices to branch offices, enterprise networks, and the Internet backbone itself.

      The most recent theft involves source code for the firmware for Ciscos PIX 6.3.1 firewall, which the thieves are now offering to sell for $24,000 per copy.

      Presuming these people have what they say they have, which seems fair enough, were much better off knowing that Cisco cant keep its crown jewels safe than not knowing. This is not a case where ignorance is bliss, though knowing the source code is out there doesnt directly point at what we should do about it.

      Where the source code was stolen from, whether a partner, customer, or Cisco itself, doesnt really matter in terms of the potential damage. But it does highlight the difficulty vendors have in securing source code that other companies feel the need to evaluate on their own.

      Its understandable that some organizations that depend on Cisco products would want to have a deep understanding of the software that runs them. Keeping that source code secure, however, can be a problem. Microsoft learned that in February, when partial copies of Windows NT 4 and 2000 source code were apparently stolen from a partner and posted on the Internet.

      The theft of this Microsoft code doesnt seem to have resulted in any serious damage. Nor has the Cisco loss caused problems that we know of, though the potential damage is so great that even people who dont know a Cisco router from a toaster oven should be concerned.

      /zimages/7/28571.gifClick here to read about the fallout from the theft of Ciscos IOS source code.

      Given the broad use of Cisco routers, a hacker with access to source code could theoretically take down the entire Internet with an uncertain timetable for resumption of service. How would you patch all those routers if the Internet itself could not be used to deliver the patches?

      As important as the Internet has become to global communications and commerce, such a failure could only be looked upon as a major calamity. Indeed, Ciscos source code is of such importance that its likely on a par with our top military secrets.

      Ciscos loss of its PIX firewall source code is probably less serious, but only slightly given what a hack specifically engineered to take advantage of specific firewall vulnerabilities might accomplish.

      Some people say these thefts point out the impossibility of keeping important software locked up and away from the bad guys. These same people say that if you cant guarantee 100 percent security, youre better off with no security at all.

      At least, that is how I understand the argument that security software should be open source, allowing the broadest possible community to work on finding and solving vulnerabilities.

      While I understand the attractiveness of such a scheme to its proponents, Id want to give it a lot of thought before turning over Internet security to such a utopian scheme. Its not so much that I am opposed to the idea, but I think the decision is important enough that it cant be taken lightly.

      Until we discover some way to truly lock down (or completely open) source code, customers may have to accept that they wont get to evaluate such things as router operating systems for themselves. The danger of this software leaking out from customers may simply be too great.

      Ciscos troubles are likely the result of attacks on the company itself rather than lax security by its customers or partners. Still, it only makes sense that the fewer targets that exist, the harder it will be for thieves to grab infrastructure source code.

      As for securing Cisco itself, I wont try to tell the company how to stop losing its source code. It just has to be done and if Cisco wont do it, the government will eventually step in and impose its brand of secrecy in order to protect the Internet as a piece of our countrys—even the worlds—critical infrastructure.

      But since security is never total and because the stakes are so high, we ought to look at how we design our networks and make them more resilient to attacks, even by people who know all the secrets. And if we have to, maybe the best approach really is to have no secrets at all.

      Contributing Editor David Coursey has spent two decades writing about hardware, software and communications for business customers. Before joining eWEEK.com, David was executive editor of ZDNet AnchorDesk and has been a columnist for PC World, ComputerWorld and other publications. Former executive producer of DEMO and other industry events, he also operates a technology consulting and event management business. A full bio and contact information may be found on his Web site (www.coursey.com).

      /zimages/7/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      David Coursey
      David Coursey
      One of technology's most recognized bylines, David Coursey is Special Correspondent for eWeek.com, where he writes a daily Blog (blog.ziffdavis.com/coursey) and twice-weekly column. He is also Editor/Publisher of the Technology Insights newsletter and President of DCC, Inc., a professional services and consulting firm.Former Executive Editor of ZDNet AnchorDesk, Coursey has also been Executive Producer of a number of industry conferences, including DEMO, Showcase, and Digital Living Room. Coursey's columns have been quoted by both Bill Gates and Steve Jobs and he has appeared on ABC News Nightline, CNN, CBS News, and other broadcasts as an expert on computing and the Internet. He has also written for InfoWorld, USA Today, PC World, Computerworld, and a number of other publications. His Web site is www.coursey.com.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.