• No results found

IT Security in Germany - A Review

N/A
N/A
Protected

Academic year: 2021

Share "IT Security in Germany - A Review"

Copied!
20
0
0

Loading.... (view fulltext now)

Full text

(1)

Munich IT Security Research Group

Reality Check: Practical Limitations

of Technical Privacy Protection

Hans-Joachim Hof

MuSe - Munich IT Security Research Group Munich University of Applied Sciences

hof@hm.edu

(2)

2

Prof. Dr.-Ing. Hans-Joachim Hof

University of Karlsruhe, Germany

Karlsruhe Institute of Technology (KIT)

CS student, PhD student, lecturer

SAP Markets, Palo Alto, USA

Software Developer

Siemens AG, Corporate Technology

Research Center „IT Security“

Munich University of Applied Sciences

Full Professor

Leader Munich IT Security Research Group

-

Network Security

-

Software Security

German Chapter of the ACM

Vice Chair
(3)
(4)

4

Lax Privacy Today

Businesses value personal data

Businesses have strong lobby

Governments tend to paranoia

Study:

-

Users see growing need for privacy

-

However: they do not act privacy aware (e.g. more social network activities)
(5)

Drivers of Privacy Protection

Non-technical

privacy

protection

Technical

privacy

protection

Businesses & Government Users
(6)

6

Privacy Protection

Non-Technical

-

Data avoidance, data minimization, anonymization, special roles in companies (privacy officers)...

-

Often accompanied by technical privacy protection

Technical

-

Uses IT security means

-

Encryption, authentication, …

Technical privacy protection often presented as silver bullet, especially on user side
(7)

Effectiveness of IT Security Means

Many sources on IT security incidents

Focus on special aspects of IT security

Surprisingly hard to compare figures (timescale, metrics, approach,...)

Available sources of information:

-

Academia (e.g. Georgia Tech)

-

Governments (e.g. BSI, UK-Cert)

-

Security suppliers (e.g. Symantec, Kaspersky, McAfee)

-

Activists (e.g. Hackmageddon)

-

Personal communication (e.g. ACM IT Security Live)

-

Personal observation (e.g. B.Hive Honeypot)

-

Whistleblowers (e.g. Snowden)
(8)

8

Attack Numbers in 2014 (Latest Numbers)

Malware (viruses, worms, ...) can be used to bypass security

New malware pieces in 2014 (million)

-

317 (Symantec)

-

155 (McAfee)

-

80 (BSI - only Windows)

McAfee: Number of new malware per quarter is increasing:

0,00 10.000.000,00 20.000.000,00 30.000.000,00 40.000.000,00 50.000.000,00 60.000.000,00 2013 Q1 2013 Q2 2013 Q3 2013 Q4 2014 Q1 2014 Q2 2014 Q3 2014 Q4

(9)

New Attack Quality in 2014

 McAfee: serious attacks on cryptography (esp. SSL/TLS) in last year - E.g. Heartbleed attack allows to wiretap encrypted communication

with servers with little effort

 BSI: detected attacks by intelligence agencies on German infrastructure in business, research, and public administration

 BSI: 2014: > 1 million infections a month in Germany

(10)

10

Attack targets

BSI: Number of critical vulnerabilities in standard IT product remains high, for 13 products:

0 200 400 600 800 1000 1200 1400 2010 2011 2012 2013 2014 Vulnerable Of which critical

(11)

Defense

 Symantec: average time to patch top 5 zero-days: - 2013: 4 days

- 2014: 59 days

 Symantec: total days of exposure for top 5 zero-days: - 2013: 19 days

- 2014: 295 days

 McAfee: most vulerable high-traffic websites were quickly patched, many low-traffic sites and IP-enabled devices remain vulnerable (Heartbleed)

 Heartbleed study: 43 % of admins tried to fix vulnerability, only 14% succeeded

(12)

12

Defense

 ENISA: Over 50% of malware undetected by antivirus products

 McAfee: Multiple Android applications fail to properly validate SSL certificates (allows wiretapping)

- 18 apps from Top 25 downloaded mobile apps still vulnerable months after notification (!!!)

- Leak account data of third party services (social networks, cloud, ...)

Kaspersky: Analysis of home appliances, found a large number of vulnerabilities
(13)

To sum it up

Huge increase in number of attacks

Software quality (security) does not improve

Software developers have problems in providing patches in a reasonable time or do not provide patches at all

Service providers have problems proving secure services or do not care about security

Common defense means becoming more and more useless
(14)

14

Areas for Improvement

Software and service quality

Trustworthiness of software

Diversity for critical software components

Use of standard IT in new domains
(15)

Action Item: Software and Service Quality

 Software quality must be improved - Should target for zero vulnerabilities

- Should target for attack resilient systems - Should over-engineer security

 current risk-based approach may be wrong

 Usability of security means must be improved - Build usable software

- Security by default

- Automate: auto-update, …

 Incident management must be improved

- Software Developers: target for a very short time and good quality - Admins: detect problems fast, take countermeasures fast

 To improve situation, external pressure may be necessary (e.g. software liability law)

(16)

16

Action Item: Trustworthiness of Software

Developers and users have problems judging on the trustworthiness of software

-

Many third party components (and many version changes)

-

Hard to verify OS and hardware

Governments suspected to force developers to insert backdoors/vulnerabilities for surveillance (e.g. USA)

German or European hardware platform and OS is desirable

First steps: IT security made in Germany (However: limited approach)
(17)

Action Item: Diversity for Critical Software

Components

 Too little diversity in critical (=widely used) components (e.g. OpenSSL library)

 Obviously: many eyes looking on these components did not succeed in avoiding vulnerabilities

(18)

18

Action Item: Use of Standard IT in new

Domains

 Computer Science, standard IT, and connection to the Internet coming to new domains - Connected Car - Internet of Things - Industry 4.0 - Smart Homes - Smart TVs - ...

 Infects domains with new security problems

- Often out of expertise of developers of these domains - Observations:

o Domain experts often naive in considering risks

(19)

Action Item: Security and Privacy Education

 Education of software developers helps to avoid vulnerabilities - Example: OWASP

- Decline of SQL Injection and CSRF

 Security and privacy courses should be mandatory in CS education

 Teach

- respect for security problems (baseline: know when to ask a security expert)

- understanding of security problems, not recipes for security solutions - limitations of security means (e.g. certification)

(20)

20

References

Related documents

We hypothesized that: (1) learning goals would have stronger relations with DT applications (both personal use and classroom application) than would performance goals, and (2)

In comparison of the four (4) selected markets in the study area, the result shows that the maximum average selling price and as well as the average profit were obtained in

strategy in which a business rewards individuals or other businesses for each visitor or customer the affiliate sends to its website..

On motion and reasonable notice, the court may, on just terms, permit a party to serve a supplemental pleading setting out any transaction, occurrence, or. event that

연구설계 본 연구는 위장관암 환자의 극복력과 사회적 지지가 수술 후 회복에 미치는 영향을 규명하고 시간의 경과에 따른 수술 후 회 복 정도를 확인하기

In particular, it provides an overarching critical analysis of mass participation sport development policy and practice in England using research with national governing bodies,

This cost comprises of fixed and variable production costs of blood products derived from whole blood, apheresis production cost at different sites, transportation cost

Given the increasingly extensive bank customer needs Australian life insurers and banks are seeking to address via bancassurance, it is essential that the issues outlined thus far