The Cyber Security Handbook â Prepare for, respond to and recover from cyber attacks by Alan Calder
Author:Alan Calder [Alan Calder]
Language: eng
Format: epub
Publisher: IT Governance Publishing
Published: 2020-12-09T16:00:00+00:00
12.8.1 Security by design
The prominence of very basic security flaws led to the concepts of âsecure by designâ and âprivacy by design and by defaultâ becoming more widespread in recent years. They are also encouraged by governments, including those of the EU and the UK; the UK governmentâs initiative was driven by the growing number of IoT devices, which bring âhuge opportunitiesâ but many consumer devices âlack even basic security provisionsâ.68 The idea of security by design is that products and services are designed with security in mind from the earliest stages, whether it is something completely new or an innovative use of existing technology.
As an example, a state-of-the-art plug-and-play video conference room solution that includes interactive whiteboarding was found to have multiple major vulnerabilities. Given that it is extremely likely that this technology is used to discuss and display highly confidential information, it is reasonable for consumers to expect an adequate level of security to be built in. Unfortunately, a third party discovered that data was exposed via a publicly accessible Cloud service that lacked encryption, among other flaws, some of which were still not fixed five months after discovery.69
As security pioneer Bruce Schneier put it70:
These arenât subtle vulnerabilities. These are stupid design decisions made by engineers who had no idea how to create a secure system. And this, in a nutshell, is the problem with the Internet of Things.
Unfortunately, the problem is not limited to the IoT. Engineers are constantly coming up with innovative systems, whether in the form of a new mobile or web application, hardware, IoT or something else entirely, that are designed to make life easier. Of course, that is only the case if the system functions as it should â and with the cyber landscape as it is, achieving that means designing and executing the innovation with security in mind. For that, threat analysis is key. Conduct risk assessments (see 12.12), consider the threat landscape and your attack surface, and look at incoming intelligence (see 13.1). Consider how the proposed system might fail or be attacked, and how you can mitigate those failures and prevent those attacks without impacting functionality. Then, you can build the necessary security controls and measures into the system.
For example, if you wanted to develop a mobile application that could turn on the heating at home remotely â in other words, create Internet-controlled thermostats â you would need to put a network interface on the home thermostat and design a Cloud service that allows users (via their phones) to communicate with that thermostat. A secure-by-design approach would require you to think about points such as:
â¢Can the network interface support encryption?
Since supporting encryption takes processing power, is a more powerful processor needed?
An encryption solution adequate now might not be adequate later (as new vulnerabilities are constantly being discovered), so how can we update the firmware?
â¢How will authentication work?
If the switch has no means of putting in a password, authentication needs to happen differently, perhaps by allowing only approved end-user devices to communicate with the thermostat.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7652)
Grails in Action by Glen Smith Peter Ledbrook(7565)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(5779)
Azure Containers Explained by Wesley Haakman & Richard Hooper(5726)
Running Windows Containers on AWS by Marcio Morales(5246)
Kotlin in Action by Dmitry Jemerov(4918)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4468)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4323)
Combating Crime on the Dark Web by Nearchos Nearchou(4028)
The Age of Surveillance Capitalism by Shoshana Zuboff(3773)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3687)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3501)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3402)
Python for Security and Networking - Third Edition by José Manuel Ortega(3270)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3220)
Mastering Python for Networking and Security by José Manuel Ortega(3218)
Blockchain Basics by Daniel Drescher(3182)
The Ultimate Docker Container Book by Schenker Gabriel N.;(2945)
TCP IP by Todd Lammle(2864)
