<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spire Security Viewpoint &#187; Identity Management</title>
	<atom:link href="http://spiresecurity.com/?cat=3&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Fri, 14 Nov 2014 00:11:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Why Check Point should buy RSA</title>
		<link>http://spiresecurity.com/?p=1183</link>
		<comments>http://spiresecurity.com/?p=1183#comments</comments>
		<pubDate>Mon, 13 Sep 2010 20:16:58 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Vulnerability Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1183</guid>
		<description><![CDATA[Well, things have changed from almost 10 years ago, but I was taking a trip down memory lane with the new HP &#8211; Arcsight acquisition and came across this. I suppose nowadays perhaps RSA (EMC) should be buying Check Point,&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1183">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Well, things have changed from almost 10 years ago, but I was taking a trip down memory lane with the new HP &#8211; Arcsight acquisition and came across this. I suppose nowadays perhaps RSA (EMC) should be buying Check Point, and clearly OPSEC is nothing like what it was back then, but I found it intriguing. It was a Hurwitz Group Trend Watch.</p>
<h4>Security Strategies &#8211; January 31, 2002</h4>
<p class="MsoNormal"><strong><span>Why Check Point should buy RSA</span></strong></p>
<p><em><span>By: Pete Lindstrom, Director &#8212; Reply to:plindstrom@hurwitz.com [not active anymore]</span></em></p>
<p class="MsoNormal"><span>It is no secret that the security space is highly fragmented. Hundreds of companies vie for market share and mindshare amidst hundreds of others, all with a bit of a unique spin – operating within the Four Disciplines of security management (Identity, Configuration, Threat, and Trust Management). Even within Operational Security (Authentication, Access Control) choices and configurations abound.<span> </span>There is no true “security” company because there is so much to do and so many ways to do it.</span></p>
<p class="MsoNormal"><strong><span>THE HURWITZ TAKE</span></strong></p>
<p class="HGPara">The company that can consolidate solutions and provide broad coverage in the areas described above will own the security market. But who will that be? Right now, Symantec has a strong story in the Threat Management and Configuration Management space, with ISS close behind. Tivoli has a strong presence in Access Control and is working on mindshare in Identity Management and Threat Management. Netegrity and Verisign have interesting plays in Access Control and Trust Management, respectively. CA has products in just about all of these areas, but no solid mindshare. That leaves Check Point and RSA.</p>
<p class="HGPara">Check Point and RSA – at its most basic level, there doesn’t seem to be too much in common. But a second look reveals plenty of similarities, in both their businesses and solutions:</p>
<p class="MsoListBullet"><span><span>n<span> </span></span></span>Both Check Point and RSA own the markets and the minds in firewalls and authentication, respectively.</p>
<p class="MsoListBullet"><span><span>n<span> </span></span></span>Both have strong indirect channels. In fact, they share many of the same resellers.</p>
<p class="MsoListBullet"><span><span>n<span> </span></span></span>There are two basic prerequisites to selling a security solution – if you support authentication, you must support RSA’s SecurID; if you have a network security solution, you must join Check Point’s OPSEC Alliance.</p>
<p class="MsoListBullet"><span><span>n<span> </span></span></span>Check Point provides Access Control at the network layer. RSA provides Authentication at the network and application layers. Authentication and access control are always linked, with the common denominator for networks being the VPN.</p>
<p class="MsoListBullet">But wait, there’s more.<span> </span>From that position, they could roll up the authentication space by adding biometrics and dedicating effort toward smart cards and single sign-on (with RSA’s RADIUS server). They can take the Securant solution that RSA acquired and integrate it with firewalls –increasingly important in the continual blend of the network and application layers.</p>
<p class="MsoListBullet">There are other reasons to consider this, but the end result is the same: A Check Point – RSA merger would result in an operational security powerhouse that could own and define the security space in years to come.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1183</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Whenever I read a post like this&#8230;</title>
		<link>http://spiresecurity.com/?p=16</link>
		<comments>http://spiresecurity.com/?p=16#comments</comments>
		<pubDate>Mon, 14 Sep 2009 15:37:23 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=16</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=16">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Bruce Schneier <a href="http://www.typepad.com/site/blogs/6a00d8345207f669e200e5505db4f48833/post/compose">posts</a> on how he signs guest registers using somebody else&#39;s name:</p>
<div class="blockquote" style="margin-left: 40px;"><em>Since I read that, whenever I see a tourist attraction with a guest<br />
register, I do the same thing. I sign &quot;Robert J. Sawyer, Toronto, ON&quot;<br />
&#8211; because you never know when he&#39;ll need an alibi.</em></div>
<p>This type of thing goes on all the time among friends &#8211; it is juvenile humor at its finest. But it makes me (mildly) uncomfortable to read something like this. I guess I can&#39;t understand how someone who respects privacy so much could violate someone else&#39;s so easily.</p>
<p>I believe the core issues of privacy revolve around loss of control and misperception. This has both.</p>
<p>I find it even more interesting to consider the outcome of exercises like this on a broader scale &#8211; let&#39;s say many people start doing this many times&#8230; assuming there are also many who value authenticity, it only increases the demand for a national ID program.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=16</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Social Security Numbers don&#8217;t have to be predicted &#8211; they are known</title>
		<link>http://spiresecurity.com/?p=37</link>
		<comments>http://spiresecurity.com/?p=37#comments</comments>
		<pubDate>Tue, 07 Jul 2009 12:13:12 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=37</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=37">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>A few researchers have done some work in predicting Social Security Numbers. I haven&#39;t read the report yet, but am not sure how significant this news is. I think it is fairly common knowledge that there are geographic and time elements to social security numbers.</p>
<p>More importantly, we don&#39;t really have to predict SSNs, because they aren&#39;t secret. In a typical lifetime, over <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2006/04/a_modest_propos.html">150,000 people will have legitimate access</a> to your SSN (my estimate). No need for predictions, it is just available information.</p>
<p>Treating SSNs as secrets is part of our ongoing identity crisis.</p>
<p>More: <br /><a href="http://A%20Modest%20Proposal%20to%20Eliminate%20the%20SSN%20Fa%C3%A7ade">A Modest Proposal to Eliminate the SSN Façade</a><br /><a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2006/05/is_the_ssn_a_go.html">Is the SSN a good identifier?</a><br /><a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2007/03/ssns_rerererevi.html">SSNs Re-Re-Re-Revisited</a></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=37</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A Few &#8220;Favorite&#8221; Security Metrics &#8211; RSA 2009 Edition</title>
		<link>http://spiresecurity.com/?p=47</link>
		<comments>http://spiresecurity.com/?p=47#comments</comments>
		<pubDate>Thu, 21 May 2009 18:55:08 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Metrics]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=47</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=47">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>I moderated a &quot;Security Metrics Exchange&quot; peer-to-peer roundtable at <a href="http://www.rsaconference.com/2009/us/index.htm">RSA 2009</a>. Here is the abstract:</p>
<div class="blockquote" style="margin-left: 40px;"><em>&quot;Many metrics sessions never actually get to metrics. In this p2p, we will<br />
discuss real-world metrics in use. To participate, you must bring your own &quot;Top<br />
5&quot; metrics and be ready to discuss their value proposition and use cases. We<br />
will interactively evaluate the metrics and everyone will leave with the group&#39;s<br />
list of the most useful metrics in today&#39;s enteprise security environments.&quot;<br /></em></div>
<p>So, the goal was a simple one, and it is clear that there is no overarching structure to the metrics, but I think it is useful to see what metrics were top-of-mind at the session. Here are the ones we came up with (and discussed) during the session:</p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">% of Managers that Certify User Roles</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Password Resets</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Cost per Password Reset</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Failed Logins</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Stale Accounts</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Dead but Active Accounts</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Login Spoof Attempts</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Avg Time to Provision</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Privileged User Accounts</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of VPN Connections per Week</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">User Account Growth Rate</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">% Systems Patched {OS; Platform use}</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">% Bandwidth Change</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Viruses</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Avg Time to Recover</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Avg Vulns per Host</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Applications</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Ports Open</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Servers</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Desktops</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">% of Systems with AV Installed {turned on;<br />
up-to-date}</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Number of Exploitable Vulns</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">% of Security-related Defects</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Avg Time to Find Vulns</span></font></p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;">Incidents per Month</span></font></p>
<p class="MsoNormal" style="font-family: Trebuchet MS;">I am not a fan of some of these metrics, but they are interesting nonetheless. I hope to find time to analyze them further in the future.</p>
<p class="blockquote MsoNormal" style="margin-left: 40px; font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;"></span></font></p>
<p class="MsoNormal" style="font-family: Trebuchet MS;"><font size="3"><span style="font-size: 12pt;"><br /></span></font></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=47</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>A Minimalist View of Security</title>
		<link>http://spiresecurity.com/?p=141</link>
		<comments>http://spiresecurity.com/?p=141#comments</comments>
		<pubDate>Wed, 20 Aug 2008 20:17:09 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=141</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=141">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Day to day, the things we do as security professionals can be pretty complex. From a control perspective, it is fairly common to take a product category-like view and work from there. But nowadays, the security functions being performed have all been defined and anything &quot;new&quot; really is a flavor of something we&#39;ve already done (this is why those of us who&#39;ve been in the industry for awhile lament that everything&#39;s been done before). </p>
<p>The resulting maturity of the security market creates a situation where thinking in terms of product categories becomes increasingly difficult as any new category feels vaguely familiar and existing categories extend into adjacent territory. In short, we spend a lot of time getting better at what we are doing, adapting to new technology, and improving deployment options more than we are fundamentally changing the rules of the security game.</p>
<p>It may be useful to have a set of &quot;atomic security functions&quot; that act as building blocks so that all other solutions can be shown to be combinatorial or derivative of these functions. All of these functions are inline &#8211; between source consumer and target provider.</p>
<p>Here&#39;s a start:</p>
<ol>
<li>Authenticate
<ul>
<li>source (e.g. user | machine | program | message)</li>
<li>destination</li>
</ul>
</li>
<li>Filter
<ul>
<li>source (e.g. access control based on source identity)</li>
<li>destination</li>
<li>traffic characteristics (non-deterministic)</li>
</ul>
</li>
<li>Obfuscate (e.g. encrypt, usually)</li>
<li>Validate (e.g. check integrity of program | data | content)</li>
<li>Monitor (I am not convinced this one belongs, but have included it given our propensity to monitor. I think in the end, this is really another form of filter.)</li>
</ol>
<p>I am not convinced this list is complete for inline functionality, so please feel free to offer up your own. When you think about it, it can be surprisingly difficult to factor out what we think we know about security functions, especially in the face of existing mature product categories.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=141</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Things that confuse me, volume 1</title>
		<link>http://spiresecurity.com/?p=147</link>
		<comments>http://spiresecurity.com/?p=147#comments</comments>
		<pubDate>Thu, 14 Aug 2008 18:21:46 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=147</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=147">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Just felt compelled to document my ignorance in a handful of posts I read last night and this morning:</p>
<ol>
<li>&quot;<a href="http://blogs.technet.com/robert_hensing/archive/2008/08/12/happy-patch-tuesday-random-thoughts.aspx">IE Protected Mode, while not a true defendable security boundary</a>&quot; So what exactly <em>is </em>a true defendable security boundary, and why doesn&#39;t IE protected mode fit the bill? Are there other examples of truly defendable security boundaries out there?</li>
<li>&quot;<a href="http://www.digitalbond.com/index.php/2008/08/13/arming-attackers/">As security through obscurity does not exist</a>&quot; What&#39;s your password again? and your firewall configuration? And does security without obscurity exist?</li>
<li>&quot;<a href="http://www.veracode.com/blog/?p=189">Shouldn’t the MBTA be suing the vendor who sold them the flawed system?</a>&quot; Hmmm, I don&#39;t know &#8211; is there such thing as a perfect (non-flawed) system?</li>
</ol>
<p></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=147</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Other Side of Privacy</title>
		<link>http://spiresecurity.com/?p=200</link>
		<comments>http://spiresecurity.com/?p=200#comments</comments>
		<pubDate>Sun, 03 Feb 2008 03:11:33 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=200</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=200">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>I wish people cared more about privacy. Sometimes, there is stuff you just don&#8217;t want to know. At some point, we&#8217;ll be paying people just to stay quiet about their personal lives.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=200</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Protection Rackets</title>
		<link>http://spiresecurity.com/?p=210</link>
		<comments>http://spiresecurity.com/?p=210#comments</comments>
		<pubDate>Fri, 18 Jan 2008 15:38:24 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<category><![CDATA[disclosure]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=210</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=210">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><strong>Update: </strong>Clarified my question and point in second to last paragraph.</p>
<p>The Guardian had an <a href="http://www.guardian.co.uk/technology/2008/jan/17/computersecurity">article yesterday</a> about how vulnerability auctions are essentially protection rackets and it is all bad for security:</p>
<blockquote><p class="MsoNormal"><em>This year computer users will be more exposed to<br />
cybercriminals than ever before. It&#8217;s not just because online crime is so<br />
attractive to identity theft gangs but, ironically, because the computer<br />
security industry that is supposed to protect users has deteriorated &#8211; from one<br />
which shared everything about newly discovered weaknesses to what some within<br />
it now call a &quot;protection racket&quot;.</em></p>
<p class="MsoNormal">&#8230;<br /><em><o:p></o:p></em></p>
<p class="MsoNormal"><em>&quot;The security industry is fast becoming a protection<br />
racket. There&#8217;s no other word for it,&quot; Henry says. &quot;The tradition has<br />
always been for vendors to share information on vulnerabilities so we can all<br />
protect our customers. Now you&#8217;ve got hackers being given a so-called<br />
legitimate route of selling vulnerabilities to a single company who then<br />
protect their own.</em></p>
</blockquote>
<p class="MsoNormal">People love certainty, even when the knowledge may increase the risk, which it does with broader disclosure. You see, the vulnerability already exists in your environment, so you have already accepted that risk. The only thing that changes the equation, then, is the threat side &#8211; and more people knowing about it equals greater threat, and therefore increased risk.</p>
<p>Mitigation techniques that are tied to specific knowledge of specific vulnerabilities (e.g. patches) are inherently flawed. The benefit is greatly outweighed by the cost, when you look at a) the proportional allocation of resources across ALL vulnerabilities (including unidentified ones) in an environment, and b) the number of vulnerabilities that are actually exploited.</p>
<p>Ask yourself this question: why <del>do</del> would you think bugfinders are finding ALL of the exact same vulnerabilities that the bad guys are finding and using? There are so many vulnerabilities to choose from, the &quot;collision&quot; rate could easily be very low (and is low, according to security professionals who subscribe to the belief that the black hats are winning). In order to be sufficient, an explicit discovery strategy must find every vulnerability.</p>
<p class="MsoNormal">The industry must either increase vulnerability discovery by (probably) a factor of 10x or more to even attempt to catch up with every single vulnerability ever created and being created in real-time&#8230;. or come up with new methods for protection.</p>
<p class="MsoNormal">For further reading, see my original post <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2007/08/on-vulnerabilit.html">on vulnerability auctions</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=210</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>If Everyone in the U.S. has their SSN stolen&#8230;</title>
		<link>http://spiresecurity.com/?p=216</link>
		<comments>http://spiresecurity.com/?p=216#comments</comments>
		<pubDate>Thu, 10 Jan 2008 15:06:06 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=216</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=216">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>&#8230; what is the impact on the overall risk of identity fraud?</p>
<p>This occurred to me when I read a<br />
prediction that by the middle of this year this would be the case [at least I think that was the prediction, and I can't find it right now - please forward to me if you find it. thanks.]</p>
<p>I don&#8217;t recall any discussion about this, and I think it is trickier than it sounds. I inferred from the point that this was entirely &quot;A Bad Thing&quot; but that is not obvious to me. It seems like it would be in the best interest of anyone who <em>has</em> had their SSNs stolen to hope for more of the same, in an attempt to reduce their own risk of fraud (because there are more identities to choose from). Of course, this assumes that there is some satiating level for fraudulent activity.</p>
<p>I think the real question may be one of supply and demand &#8211; are there enough SSNs out there to meet the demand from buyers/perpetrators, or not? If yes, then the assumption holds and I think the overall risk reaches some sort of equilibrium point. If not, then everyone&#8217;s risk may have slightly increased.</p>
<p><strong>Update:</strong> Links to previous posts on this topic.</p>
<p>- Estimate the number of people with defendable access to your SSN <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2007/03/ssns_rerererevi.html">here</a>.</p>
<p>- Learn about why we should just publish all SSNs and get it over with <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2006/04/a_modest_propos.html">here</a>. </p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=216</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Has anyone seen my $180 billion recently?</title>
		<link>http://spiresecurity.com/?p=239</link>
		<comments>http://spiresecurity.com/?p=239#comments</comments>
		<pubDate>Mon, 10 Dec 2007 03:04:23 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Vulnerability Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=239</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=239">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>(must have spent it on insecure software&#8230;)</p>
<p>Dark Reading: <a href="http://www.darkreading.com/document.asp?doc_id=140184">Insecure Software Costs US $180B per Year</a>, according to David Rice in his book, Geekonomics. [Me: I wonder how he came up with that?]</p>
<p>Here&#8217;s the nut graph from the Dark Reading article:<br /><img width="18" height="1" border="0" src="http://img.lightreading.com/images/spacer.gif" /></p>
<blockquote><p><em>He estimates that the actual cost of insecure software to<br />
the U.S. is at least $180 billion per year, although he acknowledges<br />
that such numbers are &quot;soft.&quot; He based his estimates on other numbers<br />
&#8211; including a recent General Accounting Office report that says the<br />
U.S. cybercrime market is around $117 billion &#8212; as well as other<br />
reports, such as estimates of worldwide phishing operations of $350<br />
billion per year.</em></p>
</blockquote>
<p>Here&#8217;s the pertinent part of his book (p. 37):</p>
<blockquote><p><em>In the case of software, the National Institute of Standards and Technology (NIST) the cost of inadequate software testing cost the United States roughly $60 billion, which is just under 1% of GDP. This cost does not account for other social costs associated with software usage such as cyber crime and related identity theft, however. A 2007 report by the Government Account [sic] Office (GAO) estimated cyber crime costs the U.S. economy approximately $117 billion a year.</em></p>
</blockquote>
<p>Given that $117 and $60 make $177 ~ $180 billion, I am going to assume these are the sources the DR article (and other parts of the book) reference:</p>
<ol>
<li>The NIST study in 2002, which was actually done under contract by RTI: <span class="bluetext"><a href="http://www.rti.org/abstract.cfm?pid=5272">Economic Impacts of Inadequate Infrastructure for Software Testing</a></span>.</li>
<li><span class="bluetext">The $117 billion estimate, which actually comes from an article written about the GAO report in E-commerce Times: </span><a href="http://www.ecommercetimes.com/story/58517.html">Cybercrime Costs US Economy at Least $117B Each Year</a>. The GAO report itself is available as well: <a href="http://www.gao.gov/docsearch/abstract.php?rptno=GAO-07-705">Cybercrime: <strong></strong>Public and Private Entities Face Challenges in Addressing Cyber Threats</a>.</li>
</ol>
<p>Though I&#8217;ve been known to employ my own back-of-the-envelope estimates on occasion, I have a number of reservations about the approach employed by Geekonomics:</p>
<ol>
<li>The RTI study employed interview techniques and included all faults, not just security-related ones. In addition, the estimate was actually a range from a &quot;feasible&quot; $23 billion to the $60 billion identified in the book. </li>
<li>The GAO report is all secondary research; it simply aggregates the information from other studies. The $117 billion amount was derived from 3 of the identified reports totaled together. One main source for the $117 billion ($67.2 billion) was the <a href="http://www.digitalriver.com/v2.0-img/operations/naievigi/site/media/pdf/FBIccs2005.pdf">2005 FBI Computer Crime Survey</a>. This survey includes, for example, losses associated with laptop/PDA theft that were not caused by &quot;insecure&quot; software. </li>
<li>The second largest report cited by the GAO is an <a href="http://www.javelinstrategy.com/2007/02/01/us-identity-theft-losses-fall-study/">identity theft report</a> that cites $49.3 billion in losses. Unfortunately, the full report costs $2500 so I could only work with press reports. In any case, to source identity theft of all types back to insecure software is a huge leap. In at least one account (<a href="http://www.acxiom.com/AppFiles/Download18/Javelin_ID_Theft_Consumer_Report-627200734724.pdf">the &quot;consumer version&quot;</a>) only 2% of the incidents are Internet-related.</li>
<li>Btw, I believe all of these numbers (certainly most of them) are for the U.S. only.</li>
</ol>
<p>I don&#8217;t know if this number is too high or too low, but I do know that this estimate doesn&#8217;t get us any closer to knowing the true cost of insecure software.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=239</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
	</channel>
</rss>
