Sunday, March 27, 2016

Protecting your Environment: Threat Identification Sources

CYBR650 Week 2

I talk a lot about balance.  Security vs. access, freedom vs. privacy, cost vs. benefit.  But some things just have to be done, no balance required.

Security is about protecting information, and to do it well requires good information.  So what is a federal employee to do if they want to protect the data that has been entrusted to him or her? --The data of the millions of American citizens who depend on their government to protect them? This is a broad question that needs solid answers.  And I stress the significance of “federal employee” because I am one.  I have to work within the framework of regulations, policies and directives (and sometimes emails with strongly worded suggestions on what I should do).  Here is the list of useful information I look to for direction.  Many are Federal government specific; all but one are accessible to every American with an Internet connection.  So here they are in no particular order…

The NIST National Vulnerability Database – This is a repository of vulnerabilities that anyone can use to look for threats and vulnerabilities from very general to hardware or software specific.  NIST is a government agency charged with establishing standards for many government entities.  As of the date of this blog, there were 75,708 identified vulnerabilities.  The place to start looking is in the Vulnerability Search Engine, listed first under the NVD Primary Resources.  The title “Primary Resources” is accurate because it lists the most helpful ways to get information out of the database.

US CERT – The United States Computer Emergency Readiness Team’s National Cyber Awareness System (NCAS) provides a quick way to see current threats.  I would recommend subscribing to at least one of the choices they offer – Alerts, Bulletins and Tips, with the Current Activity link a good place to see what’s happening right now.

Security Blogs – I’m a big fan of Blogs.  They are a quick way to get relatively current information that has been compiled by a professional – if you use one of the reputable sites such as TechRepublic.  If you’re not sure, the Internet has some great suggestions like this blog from Marble Security listing the 10 Security Blogs You Should Be Reading.  Pick two or three to get a feel for what’s out there and then subscribe to the ones that are most helpful to you.

Directly Related to Your Work Environment – For me, this is the VA-NSOC –The Veterans Administration Network and Security Operations Center – While I can’t directly connect to the NSOC to show you what it’s about, it is a critical resource for me.  You should have a 24/7 resource within your organization you can call for help with urgent and critical security issues.  They are the first line of defense when you have an incident and they should be contacting you when they detect threats in your work environment so you can help them remove infected equipment or other action to deal with real-world threats to your network.

Data Breach analysis – One of the best resources you can look at when looking at what you need to defend against is a data breach analysis.  These reports tell you what has been attacked and also provides general guidelines for what you should be doing to defend against these attacks.

Education – You can do all of the above and you will be more effective at protecting your own network.  But one of the smartest moves you can make is to get a degree focused on cybersecurity.  These other resources will provide useful information and you will need to go to them often, but you also need to support it with a good general background in cybersecurity.  This will fill in the gaps in your knowledge so that you understand how the whole system works so you can better defend it.  
Security Requires Wisdom
CYBR650 Week 1




I’ve decided to change political parties this election season.  I’m pretty conservative in a lot of my viewpoints, but I’ve heard some good ideas presented by liberal politicians.  The problem is that the Republicans and Democrats are so busy trying to prevent the other side from getting their own way, they refuse to even consider reasonable discussion on practical matters.  For a while I thought the Green Party had some good ideas, but some of what they espouse was too socialist for me.  I also considered the Libertarian Party.  However, their focus on personal liberty seems a bit selfish or isolationist to me. 

So I declare my allegiance to the Centrist Party.  Centrists are traditional, but practical.  They balance individual rights with the greater good of all of society.  They hold the ideals of pragmatism over compromise.  The Centrists don’t have a candidate in the Presidential race that’s going on now, so I can’t vote for a declared Centrist, but I can choose a candidate who holds Centrist values.

So why all this talk about politics in a blog about security? 

Centrist ideals apply to the balancing act between freedom and security in politics, but they also apply to technology, the Internet and the Internet of Things.  We should embrace technology as it brings many benefits, but we have to do so with prudence and wisdom. 

The quote at the beginning of this post elegantly states that we have to use technology wisely, or we may end up destroyed by it.  We have to balance security and the freedom that technology brings.  In the ever escalating arms race of hackers vs. security practitioners, we need to balance protection with freedom.  Will there be casualties?  No doubt about it, but we have to be wise enough to build security into the Internet of Things and free enough to enjoy the benefits new technology brings.

Just as in our democracy we have to balance our personal liberties with the responsibility to our communities and fellow citizens, we can’t have perfect security and still travel around the world at will.  We can’t keep our airports and train stations completely terrorist free.  We can’t say no to all Muslims who want into our nation and we can’t throw the borders wide open.  We have to be wise in Centrist ways, not politicizing national security or Internet security, but seeking the greatest good for all.