Feeds

The Curmudgeon's Crystal Ball: security predictions for 2003

Never a dull moment

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

SecurityFocus logo Opinion For better or for worse, 2003 will be an exciting year for information assurance professionals and for the Internet in general, particularly on the policy and technical fronts. As always, the phrase "never a dull moment" will apply to us involved in the security field, which will hopefully mean that we'll stay gainfully employed.

White House Cybersecurity Strategy

Perhaps the single greatest item to make security headlines (barring a major Internet attack) will be the upcoming public release of the White House Cybersecurity Strategy in its second and final - for now - form. Having seen a draft of the latest version, I'm pleased to report that it's more focussed and less sensational than its predecessor ( released last summer). It also appears to contain much more realistic aspirations and security guidelines than the first version.

The White House Cybersecurity team sought feedback on the first draft from industry and the public. To its credit, it paid attention to the comments received, as evidenced in this latest version. Knowing that for any national information security strategy to succeed requires further and regular cooperation between industry and government, and knowing that this draft facilitates such cooperation, I believe it will be the major policy item for 2003. Of course, this assumes that all involved parties back up their security rhetoric with visible and effective action.
Security professionals will continue their game of digital futility as they scramble from one problem to another.

Increased Encryption

There will be increasing resistance to the increasing breadth and invasiveness of electronic surveillance powers granted to law enforcement under the controversial USA-PATRIOT Act. A growing underground community will be working to develop easier-to-use encryption and privacy-enhancing software that the average user can implement. PGP and other high-end privacy applications will continue to be used by power users.

In light of the shadowy "war on terrorism", it's likely that government officials will try and brand such tools as "supportive of terrorism" and attempt to stigmatize them in the public eye. Such efforts will mirror previous federal efforts to stifle digital privacy, such as the failed attempt to outlaw PGP in the mid-1990s.

DMCA

The Digital Millenium Copyright Act will become less of an anti-piracy legal mechanism and, as we're seeing now with the Lexmark case, will instead be used by large companies to ensure their marketplace dominance and force competitors out of business. Further, in light of the legal victories of Jon Johannsen and Dmitry Sklyarov, the courts and the public are more frequently realizing, and formally challenging, the lunacy of Hollywood's quest for domination of the digital environment. This will be a slow, arduous struggle. But it will be necessary to ensure the protection of freedom and innovation expected by consumers living in the Information Age. 2003 will be replete with DMCA-related stories making headlines around the world.

Corporate Security

Enterprises will continue paying lip service to information assurance. Unfortunately, they will continue to do nothing about it, as the prevailing sentiment amongst corporations is that securing systems detracts from profits instead of assuring them. As such, corporations will continue paying high-priced consultants to conduct vulnerability reviews, draft policies, and secure their systems while ignoring their recommendations on improving security.

Security of DNS Servers

Security of the Internet will continue to be a heated and highly politicized topic for 2003, as various special interests - governments, corporations, law firms, and ICANN, to name but a few - jockey to take control of securing critical DNS servers around the world. We'll see frequent references to the October 2001 attacks against several root servers as justification to make dramatic changes to how DNS works. While the ostensible motivation will be to improve the security of the Internet, the real objective will be to increase corporate profitability. Industry will lobby against the Internet community's easy and cost-effective proposals to improve DNS security, and will instead prolong the DNS security debate into 2004 and beyond, or until a pro-business solution is reached.

Vulnerabilities

With regard to technical vulnerabilities, I'm wagering that while the aggregate number of Windows and *NIX vulnerabilities will remain a tight race, the term "Microsoft product" will continue to be synonymous with "buffer overflow" and other such programming goofs. As well, the contentious debate over the full disclosure of vulnerabilities will continue to rage amongst security stakeholders. And Apple will continue to understate the significant out-of-the-box security features Mac OSX provides. By doing so, they will continue to overlook a major benefit of their product, particularly as they continues to try to entice Windows users to switch over.

Allocating Responsibility for Security Unfortunately, the practice of avoiding responsibility for information assurance will remain the single largest obstacle to effective security. The latest version of the Cybersecurity Strategy includes no provisions for making the producers of security products accountable for the failures of their programs. This is most likely due to industry lobbying in Washington. As a result, vendors will still have neither mandated accountability nor real incentive to provide products that are not easily exploited or abused.

Until CIO is fired or the US government issues a public "threat warning" suggesting folks avoid a specific product for security reasons - both of which steps would encourage and enforce accountability on security managers and product vendors - the state of information assurance really won't change much for the better. Instead, it will be business as usual. Security professionals will continue to be engaged in their traditional game of digital futility as they scramble from one problem to another.

Of Course, That's Just My Opinion...

These are a few forecasts for 2003 gleaned from my curmudgeonly crystal ball over the holiday season. Some may indeed come true, while others may prove me wrong. All things considered, I'll wager that these predictions are more accurate than anything you'll get from Miss Cleo or any other per-minute psychic.

Still, I'm holding out optimism that we'll see real change for the better this year. But, as comedian Dennis Miller is fond of saying, "that's just my opinion, I could be wrong."

© SecurityFocus Online

Richard Forno is the coauthor of Incident Response (O'Reilly) and The Art of Information Warfare (Universal). He helped to establish the first incident response team for the U.S. House of Representatives, and is the former Chief Security Officer at Network Solutions. Richard is currently writing and consulting in the Washington, DC area.

Related stories

America's National Cybersecurity Strategy
< a href="http://www.theregister.co.uk/content/4/28749.html">DVD Jon is free - official
Elcomsoft not guilty - DoJ retreats from Moscow

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.