tssci security

Looking back on 1 year of blogging

Today marks the 1 year anniversary of tssci security. I first started this blog last year with a goal to put my thoughts on security and technology in general out into the open. Since I started, I've learned a lot from other bloggers and people who read and comment on my blog. The blog has helped me develop relationships, make friends and establish contacts in the security industry. It makes for a great conversation starter with people, especially with those who recognize my name and my blog's title. It helped land me an internship with a Fortune 10 company and probably has been the best career move I've made so far being only 20 years old (21 just a couple days away!).

I plan on continuing to share with you all my experience and knowledge as I get older and learn more. To conclude today's post, I'd like to express my sincerest thanks to everyone whose read, subscribed, commented, emailed, IM'd, met and chatted with me over the last year. Special thanks to the Catalyst Community and to LonerVamp and dre -- you guys are awesome.

-Marcin

Bash Tab Completion with Similar Filenames Sucks

Add this to your .bashrc to make tab completion with bash more useful when handling multiple files with similar names:

bind '"\t":menu-complete'

Ctrl-D can be used to exit Bash. This can be very convenient and then again, almost too convenient. Specify it must be pressed twice before exiting by adding to .bashrc:

export IGNOREEOF=1

Immaterial Transfers with Material Consequences

Last year, a colleague pointed me to an article by Roland L. Trope in September/October 2006 IEEE Security & Privacy, Immaterial Transfers with Material Consequences. From the abstract:

The need for such regulations is clear, but many firms underestimate the challenges of complying with the defense trade controls embodied in the US International Traffic in Arms Regulations (ITAR). Companies hoping to enter into defense contracts must therefore redefine their basic approach to technical data because the ITARs require that they control the destinations of their communications. For example, the ITARs prohibit unlicensed communications of sensitive data to foreign destinations (another country or a foreign national).

Trope recounts a fictitious company's plans and their problems with ITAR and IT. Based on real events, in March 2006 The Boeing Company and L-3 Communications agreed to pay civil penalties of $15 million and $7 million USD respectively for not complying with ITAR. The consequences and fines for illegal exports are real. If the Directorate of Defense Trade Controls determines a violation(s) were unintentional, it can impose a civil penalty up to $500,000 per violation. If it determines violations to be intentional, it can impose up to $1 million for each violation. This can spell numerous violations and result in huge fines if for example, over the course of one day hundreds of emails are exchanged between engineers who are both US Citizens and foreign nationals.

The company planned to encrypt all sensitive traffic and use code names for email attachments containing sensitive data. They believed using code names to disguise data would minimize the risk, but in reality, engineers would select select names from a theme for one project, and names from another theme for another. It wouldn't take long for someone to group the emails into their respective project. Many companies adopt a policy and reliance on encryption for protecting their most sensitive data. If a laptop goes missing, it is deemed not a risk because it was encrypted with X algorithm. Not in the eyes of the ITAR, which must distinguish between procedures that retain control over data and procedures that relinquish control. By making it available to a foreign national to obtain a copy, you are committing an export. Encryption is not enough to comply with ITAR because it is not a durable safeguard. I think we can all agree on this, that given enough computing power and time, a determined attacker will crack the encryption.

The article also brings up the issue of disclosure and transfer of data. Data can be disclosed orally or visually through any number of means such as email, instant message, presentations, etc. If one makes it possible for a foreign national to obtain a copy of sensitive data during transmission, an export has occurred. The company in the story stored sensitive data in an unlocked closet at one of their locations. Foreign nationals visiting from other countries would be allowed to store their briefcases in that closet, and consequently give them access to ITAR-controlled data.

Protecting sensitive data, whether it be ITAR-controlled, classified, or restricted internal communication is important for every company. Much of the policies and solutions we implement ignore the problems that arise when people need to decide on the fly which files contain sensitive information. It's a huge undertaking to classify existing data, but you gotta start somewhere -- create a (scalable) data classification policy and start with all new data.

Back from BeanSec

beansec3.jpgThanks to everyone involved at making this a successful event. It was my first time out to BeanSec, but unfortunately will likely be my last this year (I am going back to school in September). I made the two hour drive all the way out from Hartford, CT, and it was a blast. There were about thirty people in attendance at The Enormous Room in Cambridge, Mass from 6:30pm up until 9:30~10pm.

It was fun hanging out with Chris Hoff (who btw, was an excellent host), Oliver Day, Mike, Tim from Arbor Networks, Christian and his fellow Cisco colleagues, and Joshua` <http://pbnj.sourceforge.net/>`_.

I'm sorry if I forgot to mention anyone. I know there are a couple of you, but I forgot/didn't catch your names. Just post here in the comments and leave a link to your personal site or blog. My next CitySec gathering that I'll be attending is SunSec in Phoenix.

8 Firefox extensions towards safer browsing

Web 2.0 has (re)introduced a wide variety of attack vectors that can be used against Internet users to steal sensitive information, control the web browser, and more. The security industry has seen a shift from concentrating on the servers that house data to protecting the data itself. Many web applications and social-networking sites today exhibit flaws that expose them to all sorts of attacks, with much focus on XSS, CSRF, exploiting the same-origin policy and malicious code execution.

With insight from a couple of web security experts and some further research, I've compiled a list of must-have Firefox extensions that help ensure safer and more secure browsing with Firefox. Many of us have agreed that the security "functionality" these extensions provide should be built right into Firefox (*cough*Mozilla Security Team*cough*). Below, I outline the risk and how each extension goes about mitigating it.

Adblock Plus

CS Lite

FoxyProxy

LocalRodeo

RefControl

NoScript

SafeCache

SafeHistory

Further Reading: *Protecting Browser State from Web Privacy Attacks

Edit: Changed No-Referrer extension to RefControl

« Newer entries — 26 — Older entries »

blog comments powered by Disqus