North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Control. (was Re: MS is vulnerable)

  • From: Jamie Reid
  • Date: Thu Jan 29 11:39:09 2004

While acknowledging that I am falling for a troll does not excuse the act
itself, I would like to float an idea I think is useful. 

If you look at security as control, then you can measure it as the ratio of 
controls to features. That is, for N in/egress points there are X active policy 
enforcement gateways. Similarly, for all functions in a peice of software, 
there are X configurable controls of their inputs and outputs and 
en/disabled-state. 

The reason we have "security" vulnerabilities is that we are building (or evolving)
systems that lack adequate controls relative to the sheer volume of their features. 

While access to source-code does not guarantee that the user will exercise their 
control over the software, it does provide more granular control than say, a config 
file, or a clickity-click-configurator. The idea behind commercial software is that it 
is a service in which responsibility for control is maintained by the vendor, with 
a few options available to the user to customize. Open source provides total
control to the user, limited only by their skills or access to information. 

Now, whether this control I am talking about is applicable to "security" as we 
understand it, I will leave that to the reader, but I would speculate that this 
simile could allow for something like cybernetics to be applied to evaluating 
the security of complex systems, and possibly offer more practical solutions 
than the political economy of security that characterizes alot of research in 
the field. 

Best, 

-j








--
Jamie.Reid, CISSP, [email protected]
Senior Security Specialist, Information Protection Centre 
Corporate Security, MBS  
416 327 2324 
>>> <[email protected]> 01/29/04 09:26am >>>

Microsoft software is inherently less safe than Linux/*BSD software.

This is because Microsoft has favored usability over security.

This is because the market has responded better to that tradeoff.

This is because your mom doesn't want to have to hire a technical
consultant to manage her IT infrastructure when all she wants to do is get
email pictures of her grandkids.

doug
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=windows-1252">
<META content="MSHTML 6.00.2800.1226" name=GENERATOR></HEAD>
<BODY style="MARGIN-TOP: 2px; FONT: 8pt Tahoma; MARGIN-LEFT: 2px">
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>While acknowledging that I am falling for a troll does not 
excuse the act</FONT></DIV>
<DIV><FONT size=1>itself, I would&nbsp;like to float an idea I think is useful. 
</FONT></DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>If you look at security as control, then you can measure it as 
the ratio of </FONT></DIV>
<DIV><FONT size=1>controls&nbsp;to features. That is, for N in/egress points 
there are X active policy </FONT></DIV>
<DIV><FONT size=1>enforcement </FONT><FONT size=1>gateways. Similarly, 
for&nbsp;all functions in a peice of software, </FONT></DIV>
<DIV><FONT size=1>there are X configurable controls of their inputs and outputs 
and </FONT></DIV>
<DIV><FONT size=1>en/disabled-state. </FONT></DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>The reason we have "security" vulnerabilities is that we are 
building (or evolving)</FONT></DIV>
<DIV><FONT size=1>systems that lack adequate controls relative to the 
sheer&nbsp;volume of their features. </FONT></DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>While access to source-code does not guarantee that the user 
will exercise their&nbsp;</FONT></DIV>
<DIV><FONT size=1>control </FONT><FONT size=1>over the software, it does provide 
more granular control than say, a config </FONT></DIV>
<DIV><FONT size=1>file, or </FONT><FONT size=1>a clickity-click-configurator. 
The idea behind commercial software is that it </FONT></DIV>
<DIV><FONT size=1>is a service&nbsp;in which&nbsp;responsibility 
for&nbsp;control is maintained by the vendor, with </FONT></DIV>
<DIV><FONT size=1>a few options available to the user to customize. Open source 
provides total</FONT></DIV>
<DIV><FONT size=1>control to the user, limited only by their skills or access to 
information. </FONT></DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>Now, whether this control I am talking about is applicable to 
"security" as we </FONT></DIV>
<DIV><FONT size=1>understand it, I will leave that to the reader, but I would 
speculate that this </FONT></DIV>
<DIV><FONT size=1>simile&nbsp;could allow for something like cybernetics to be 
applied to evaluating </FONT></DIV>
<DIV><FONT size=1>the security of complex systems, and possibly 
offer&nbsp;more&nbsp;practical solutions&nbsp;</FONT></DIV>
<DIV><FONT size=1>than the political economy </FONT><FONT size=1>of security 
</FONT><FONT size=1>that characterizes alot of research in </FONT></DIV>
<DIV><FONT size=1>the field. </FONT></DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>Best, </FONT></DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>-j</FONT></DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><BR>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>--<BR>Jamie.Reid, CISSP, <A 
href="mailto:[email protected]";>[email protected]</A><BR>Senior 
Security Specialist, Information Protection Centre <BR>Corporate Security, 
MBS&nbsp; <BR>416 327 2324 <BR>&gt;&gt;&gt; &lt;[email protected]&gt; 01/29/04 
09:26am &gt;&gt;&gt;<BR><BR>Microsoft software is inherently less safe than 
Linux/*BSD software.<BR><BR>This is because Microsoft has favored usability over 
security.<BR><BR>This is because the market has responded better to that 
tradeoff.<BR><BR>This is because your mom doesn't want to have to hire a 
technical<BR>consultant to manage her IT infrastructure when all she wants to do 
is get<BR>email pictures of her 
grandkids.<BR><BR>doug<BR><BR></DIV></BODY></HTML>