Feeds

Gummint security is utterly hopeless

Auditor strolls through West Oz networks

Providing a secure and efficient Helpdesk

In the kind of report that really spoils your day, Western Australia’s Auditor-General has presented the findings of a study into that state’s government network security. The finding? Fourteen out of the 15 agencies subjected to “hostile scans” of their networks failed to notice anything amiss.

The Auditor-General also went further, penetration-testing three agency networks using known vulnerabilities. All three failed to detect the intrusion, the report says.

And when the agency left USB keys lying around in department offices, curiousity beat caution most of the time. “Eight agencies plugged in and activated [the] USBs,” the report said, which “sent information back to us via the Internet”.

The report also questions the value of consultants’ penetration testing. Nearly all agencies had conducted recent penetration tests, with some scheduling repeat tests four times a year, yet the Auditor-General’s office was able to use known vulnerabilities to attack or penetrate their networks.

In a curious snippet, the report also highlights the value of price-benchmarking for external services: some agencies could get their useless pen-tests for as little as A$9,000, while for others, the price tag was A$75,000.

The Auditor-General, Colin Murphy, said: “The failure of most agencies to detect our attacks was a particular concern given that the tools and methods we used in our tests were not sophisticated.”

The report also identified inadequate risk assessment in agencies. As a result, 12 out of the 15 agencies had not recognized threats either from the Internet or from social engineering; nine agencies had conducted no risk assessment; and seven agencies had neither a response plan nor “procedures for managing cyber threats”.

The penetration tests were conducted by researchers from Edith Cowan University, who were not briefed on the networks they were attacking before-hand. In the two-stage pen-tests, an initial scan identified vulnerabilities, and only those vulnerabilities revealed by the scan could be used to launch an attack.

In one case, the report notes, the test included a brute-force attack on a Web server that generated several million attempts to gain access, and degraded the server’s performance – without being noticed by the server’s owner.

“All of the agency Web servers allowed technical information to be collected, and poorly configured firewalls and IDPs failed to prevent this information being returned to the source of our scan,” the report notes. “This information included operating system and version, the type of firewall in use, and what software was running.”

Meanwhile, in the three agencies for which the testers were given permission to launch a full intrusion, attackers were able to obtain administrative usernames and passwords and copy files.

The full report is available here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Turnbull: NBN won't turn your town into Silicon Valley
'People have been brainwashed to believe that their world will be changed forever if they get FTTP'
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.