Archive for June, 2011

Cyber Cyber Cyber

The industrialisation of cyberwar and cyberespionage using techniques developed in the last decade of massive expansion in cybercrime has presented a serious challenge to the security industry.

The myriad breaches, whether at the lulz end of the scale or at the national security end of the scale, has highlighted the fact that while we as an industry may have been doing the component parts of information security for a long time we haven’t done it very well.

Cyberwar what is it good for? Absoutely nothing?

Cybersecurity is a very hot topic right now, for example:

· A contact in the UK government agency responsible for government information security has reported anecdotally that they have had more ministerial visits in the last 12 months asking about cyber than in the last 10 years for any purpose.

· A friend who is an audit partner in a Big4 accountancy firm in the UK has spent many years trying to get boards to consider information security, in the last six months he has seen an unprecedented groundswell of interest from board members asking about cyber. It’s one of their hot topic items right now and every board is asking him his opinion.

Zones of Trust

The key security design decision is the balance to be taken at every step of a system design between trust and inconvenience.

For every system to system, subsystem to subsystem and component to component connection a decision must be made as to whether either side of the connection will trust the other, and to what degree. Trust is in some ways analogous to coupling. The higher the level of trust, the more likely that a compromise of one side of the connection will lead to the compromise of the other.

Twitter RSS