SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible.
Spend five minutes per week to keep up with the high-level perspective of all the latest security news. New issues are delivered free every Tuesday and Friday.
Volume IV - Issue #12
March 20, 2002
The President's Critical Infrastructure Protection Board has released
the first phase of the US National Strategy to Secure Cyberspace - a
list of the key questions to be answered in the Strategy. By releasing
the questions first, the Board hopes to encourage interested parties
to suggest innovative and thoughtful answers to each of the questions.
You'll find the questions and instructions on providing suggested
answers at http://www.sans.org/nationalstrategy.php
Oracle security problems may be more prevalent than previously
reported. Pete Finnegan, with the help of many of the other Oracle
security gurus around the world, has completed a first draft of SANS
new Oracle Security: Step-by-Step guide. We are distributing the
list of Oracle security problems to be sure we have addressed all the
known issues. We'll share the solutions sections with those people who
provide substantive feedback on the problems. If you know a lot about
Oracle security and will provide feedback, please email email@example.com
with the subject "Oracle security problems" and we will email you
a copy. Include your name, organization, city, state, and country.
TOP OF THE NEWS13 March 2002 Alleged Defacer/Extortionist Charged
12 March 2002 Admin Chastised for Using Vulnerabilities to Warn of Infection
11 March 2002 CIA Networks Mapped
15 February 2002 ISPs and DDoS Liability
THE REST OF THE WEEK'S NEWS14 March 2002 PGP Difficult to Use, Says Gartner
14 March 2002 Fbound Worm is Bilingual
14 March 2002 Cable Modem Vulnerability
13 March 2002 More Security Professionals Needed
11 & 12 March 2002 Zlib Compression Library Vulnerability
14 & 15 March 2002 Zlib Vulnerability Affects Other OSes
11 March 2002 Virus Alert Standards Would be Helpful
11 March 2002 Security Manager on SNMP Patching, IM Virus
8 March 2002 DoT Plans to Address GPS Vulnerabilities
8 March 2002 New Issues Facing Corporate Security
TUTORIALS4 March 2002 Facial Recognition Technology
21 February 2002 Security FAQ
*********** FREE Seminar from Internet Security Systems ************
You have heard about the need for online security. You know your
systems may be at risk. Now it's time to ask the question, "Am I
Vulnerable?" Join Internet Security Systems for our FREE Seminar
Series, "Are You Vulnerable?" and learn how to determine if your
network, servers and desktops are open to attack. Attend this FREE
seminar and learn how to secure your online assets with the latest
protection solutions from Internet Security Systems.
Register Today! http://www.issfeedback.com/areyouvulnerable?SANS
TOP OF THE NEWS
13 March 2002 Alleged Defacer/Extortionist ChargedA Kansas teenager who in 2000 allegedly offered to help secure a California city's web site that he had defaced in exchange for a laptop computer has been charged with felony computer crimes.
--12 March 2002 Admin Chastised for Using Vulnerabilities to Warn of Infection An Australian systems administrator has been criticized for writing a script to warn users that their computers had been infected; his program used the same software flaws exploited by the worms he warned about.
11 March 2002 CIA Networks MappedA UK computer security consulting company used entirely legal means to compile a detailed map of non-classified CIA networks and gather names, e-mail addresses and phone numbers of a handful of agency employees. While a CIA spokesperson discounted the significance of the study, others say the information could be used to gain access to classified information.
15 February 2002 ISPs and DDoS LiabilityThis article describes the liability ISPs could face as a result of distributed denial of service (DDoS) attacks. ISPs need to be especially careful about claims they make when marketing and promoting their services. ISPs need to be especially careful about claims they make when marketing and promoting their services; they should also employ effective security practices that are continually monitored and updated as necessary.
[Editor's (Murray) Note: The problem here is that the contracts are being drafted by the vendors and the buyers are not asking, do not even know how to ask, for security. Even if the ISP thinks he is doing a good job of security, he will try to disclaim it in the contract if he can get away with it. He knows that he cannot protect the user from everything and, particularly, from his own errors. A good contract will describe what the user can rely upon the ISP to do and what the ISP relies upon the user to do. The emphasis should be on agreed actions, not on responsibility and certainly not on results. ]
************************ SPONSORED LINKS *****************************
(1) Stop Hackers DEAD with Continuous Intrusion Prevention provided
(2) Dorian Software Creations: Automate Event Log Archiving, Analysis,
THE REST OF THE WEEK'S NEWS
14 March 2002 PGP Difficult to Use, Says GartnerGartner believes that the main reason Network Associates had trouble selling PGP encryption to businesses is that they did not make the product easy to use.
[Editor's (Schultz) Note: The Gartner Group has once again missed the real point, namely that security products in general are deficient when it comes to useability. ]
14 March 2002 Fbound Worm is BilingualThe Fbound worm spreads itself through Outlook and deletes itself; the worm carries no malicious payload, but can arrive either in English or Japanese, depending upon the recipient's e-mail address or computer language setting.
14 March 2002 Cable Modem VulnerabilityA man who fiddled with the settings in his cable modem when he felt his service was too slow says he has discovered a vulnerability in DOCSIS-compliant cable modems that could expose their configuration files.
13 March 2002 More Security Professionals NeededExperts say a dearth of experienced security professionals is the greatest threat to the security of the country's computer networks.
11 & 12 March 2002 Zlib Compression Library VulnerabilityA "double-free" vulnerability in the Linux zlib compression/decompression library could allow malicious code onto an affected machine. No exploits have been reported, and patches are available.
14 & 15 March 2002 Zlib Vulnerability Affects Other OSesThe security hole in the zlib compression/decompression library affects not only Linux but all operating systems that use zlib code.
11 March 2002 Virus Alert Standards Would be HelpfulWhen a new virus begins making the rounds, users are faced with a bevy of warnings and alert ratings from various anti-virus vendors.
11 March 2002 Security Manager on SNMP Patching, IM VirusThe security manager plans to install patches for the SNMP vulnerability because he expects that someone will soon write code to exploit it; he also confesses to being impressed with the MSN Instant messenger virus
8 March 2002 DoT Plans to Address GPS VulnerabilitiesThe Transportation Department's (DoT) plan to address security vulnerabilities found in the Global Positioning System (GPS) includes maintaining GPS backup systems, using anti-jamming technology, and educating state and local agencies about the vulnerabilities.
8 March 2002 New Issues Facing Corporate SecurityAs security has become more complex, corporations need to integrate information security throughout the enterprise, address the convergence of physical and information security and prepare to deal with biometrics and the attendant privacy concerns.
[Editor's (Schultz) Note: Has security really become more complex, or do consultancies make it appear more complex to the point that demand for their services grows? Perhaps if we began viewing security as not so complex, we would actually make some headway in improving defenses. ]
4 March 2002 Facial Recognition TechnologyThis article describes how facial recognition systems work, their attendant privacy concerns, and the four main types of facial recognition technology. Organizations considering using facial recognition need to consider not only the implementation costs, but also whether the system will be used for access control or surveillance. Finally, the article reviews several different products.
[Editor's (Murray) Note: The big growth in the application of this technology is not in I&A but in automated surveillance. In the short run this application relies upon the fact that the database of targets is small. In this application the concern is false positives. ]
21 February 2002 Security FAQThis article offers a primer of information security advice, answering questions about firewalls, outsourcing, insurance, and reporting security incidents. It also lists ten important elements of good information security, which includes identifying risks, developing and implementing a security policy, and hiring an independent third party to conduct a security audit.
Please feel free to share this with interested parties via email,
but no posting is allowed on web sites. For a free subscription,
(and for free posters) e-mail firstname.lastname@example.org with the subject:
Kathy Bradford, Dorothy Denning, Roland Grefer,
Bill Murray, Stephen Northcutt, Alan Paller,
Marcus Ranum, Howard Schmidt, Eugene Schultz