Friday 31 July 2015

So, you are an online security expert are you?



This week researchers Ion, Reeder and Consolvo published a paper about online security [1] [10] which compared the security practices of 231 security experts against 294 non-experts. 

When asked “What are the top 3 things you do to stay safe online?” unsurprisingly the results differed between the two groups. I say unsurprisingly because I believe the two groups have a very different understanding and trust model for online security. The experts are more likely to think about and understand the potential risks, with sufficient understanding of technology to mitigate these risks to a level that is acceptable to themselves. Non-experts are less likely to fully understand the complete risks, so look towards so-called “trusted” sources for advice. These trusted sources may not so much be academic or industry researchers but are more likely to be a mix of companies with a vested interest (such as anti-virus suppliers) and media or online bloggers (who may or may not understand what they are doing). This becomes apparent when looking at the top 5 practices of non-experts (see figure 1). These non-expert practices are good advice, but tend to be older techniques the IT industry and press has been pushing for many years, rather than more modern practices that might be more applicable. This is no fault of the non-experts; security is not their focus. But everyone should realise that whilst the Internet is open for anyone to use (and long may it stay that way), as in the real-world there are people who will take advantage of the less mindful. Online security is as much the responsibility of the individual as it is the IT industry and government bodies, and security awareness needs to being from when users first start to use the Internet as children.

 














Figure 1 – Non-expert v’s expert top online security practices [11]

#1 Regularly patch your system.
The expert’s first choice practice is to "install software updates". I absolutely agree. Keeping systems patched is probably the best way to prevent unwanted visitors (malware, hackers, government agencies); akin to making sure all your windows are closed and doors locked when leaving the house. Too many times have I seen systems that have not been updated for a long time, or not at all! Patching systems can be a pain in the ass (I have spent too much of my life sitting there watching Microsoft install updates) but many companies provide an automated scheduler to painlessly update in the background (of which, according to the research, some non-experts (and maybe some experts) appear to be wary of). Software vulnerabilities are one of the easiest ways for malware to enter a system, and unfortunately most software contains holes. Various reasons exist for this – mainly poor programming techniques, but pressure to release software by a given date often means it has not been fully tested, hence developers rely on post-release patching to close these holes. Notorious for patching are Microsoft and Adobe. Not so much down to poor programming (although this may be a reason), instead, mainly because their products are so ubiquitous it is worth a hacker’s time to find vulnerabilities as this gives them millions of machines to target. This month Java had another zero-day vulnerability [2]. This was serious enough for security advisers to recommend disabling Java until a patch is released, yet even today, how many people continue to use the older vulnerable versions of Java? More to the point, how many users know they are using Java?

Non-experts had “using AV software” in first place. 42% of non-experts had this in their top 3, whilst only 7% of experts had this in their top 3. Yes AV does still provide some protection, however vendors estimate that AV software only catches about 40% of malware [3]. With estimates of 12 million new malware variants a month [4] AV can only provide so much protection. AV remains one tool for online security but not THE tool. Better online behaviour (see below) should come higher up the list than AV, but users need to be taught what good online behaviour actually is.

Not mentioned in the list is data back-up – possibly because the research was focused on online security practices. Even so, regular backups should form part of an individuals security posture. Information that has made it onto the Internet may well be impossible to permanently remove (see below) but should a device become compromised by malware, such as CryptoLocker, then any data on that device is probably gone for good.  Just how often to back up, how to back up and where to back up too is down to the value of the data being stored. But backups should form part of good online security practice when storing personal data on any Internet connected device.

#2 Passwords.
Both groups agree that password hygiene is important, but both groups differ on what this means. Non-experts are still constantly encouraged to use strong passwords and regularly change them. So, out comes the excuse "how can I remember strong passwords and change them regularly, it’s easier to use the same password for everything." Experts take a different approach. More important than strong passwords is using a different password for different accounts and to use 2FA; thereby reducing the emphasis on passwords and hence reducing the reliance on strong passwords and regularly changing them. With multiple online accounts the only way to reliably use unique passwords is through a password manager.

When it comes to passwords, you need to choose an access mechanism accordingly with the sensitivity of the data being protected. For sensitive data these passwords should be unique, and where 2FA is not used, ensure these passwords are as strong as necessary to protect the information. 

#3 Online behaviour.
Next on the non-expert top 5 list comes two behavioural practices; both of which I believe to be wrong – or more accurately, I believe to be incorrect. Again it comes down to understanding the risks. “Only visit websites they know” is poor advice. The Internet is a dynamic living creature. If you only visit websites you know you are missing out on all the websites you don’t know. The advice should be “be wary of which sites you visit, and trust no one”. Be aware of the risks when visiting ANY web site. If you must download anything, download it to a sandbox and then virus scan it before opening it. Online adverts are known to be riddled with malware or re-direct users to alternative sites. Since the introduction of real-time bidding for adverts, more and more sites are becoming exposed to malvertising [5] [6] [7]. To stay safe, don’t click on adverts. Better still install a good ad-blocker. Anytime you follow a link in a website – check the URL. Use HTTPS wherever it is available. HTTPS may itself be vulnerable, but it is much better than using regular HTTP.

Finally the non-experts advise “Don’t share personal information.” With half of the world’s online users using Facebook [8] badly, then clearly this is advice non-experts know about but don’t follow. The advice should be “Know who you are sharing your personal information with.” Yes, you can share personal information but be careful who with. Understand what can be done with your information and how it is stored. Don’t put all your personal information on Facebook. Don’t send something in an email that you might later regret. The best advice is if you post anything online, or send anything over the Internet, assume it can be read by anybody.  Because in most cases it can. And how long is that information retained for? A recent campaign to allow children to delete their online content [9] is aimed at helping protect children online. But does this give the wrong message? You should not post something that you may later regret in the first place (difficult to tell children, but also difficult for most adults to understand in the heat of the moment). Social media has made big noises about allowing people to permanently delete posts. Even if the social media giants and email providers do permanently delete information from their storage repositories (which I doubt) this information may well be on other user’s machines who might not want to delete it. That email you sent to your best friend about your boss being an arse – anyone could have seen this email in transit and have it stored on their machine, as became apparent when Snowden leaked "secret" politician's emails . Once it is out there it is very difficult to take it back.

Any of these practices from either the expert or non-expert group is sound advice, but for a top 5 list from a (paranoid) expert with a little bit of knowledge of what they are doing:

#1 Make an effort to understand the risks involved when using the Internet, and consequences of not doing things securely
#2 Trust no-one and be skeptical of EVERYTHING
#3 Update, update and update
#4 Use 2FA with unique passwords, managed via a password manager
#5 If you don’t use 2FA; assess the sensitivity against the replacement cost of what you are protecting and use passwords of a suitable strength that are changed in a time frame suitable to mitigate compromise. If you are not able to undertake this assessment then, seriously you need to question why you are using the Internet.

Oh and #6 – Back up!
 

No comments:

Post a Comment