The relativistic approach to safety - uptime versus
market share
London, UK - 5 November 2004, 11:30 GMT - The mi2g Intelligence
Unit in-depth study The world's safest
computing environment has sparked off an extensive global debate about
the safety and security of software by market share and its impact on the
absolute rankings of the mainstream computing environments based on: Microsoft
Windows, Linux flavours and BSD plus Mac OS X. mi2g has also received
thousands of emails in regard to "market share" perspectives via
www.mi2g.net for which we are thankful to all those who took the time to write
to us. The correspondents have focussed on the impact of market share on the
absolute safety assessment of a given computing environment. The essential
argument boils down to the following classical safety approach:
If the market share of Microsoft Windows, Linux and BSD + OS X based computing
environments is:
x%, which is much greater than y%, which is greater than z%, respectively,
then the absolute safety rankings can be easily derived from the breach percentages
just released by mi2g:
at 25.19%, 65.64% and 4.82% respectively,
for Windows, Linux and BSD + OS X.
With this classical safety approach of breach percentage divided by market
share percentage, as a measure of absolute safety and security, Microsoft
Windows may come first (lowest absolute safety), Linux may come second, BSD
plus Mac OS X may come third (highest absolute safety). [In absolute safety:
low is good and high is bad.]
The mi2g Intelligence Unit does not agree with the classical approach
because it is against the grain of common sense as observed by millions of
computer users in the real world every day. Bigger the market share, bigger
the risk profile of a given computing environment. More malicious malware
writers target that platform and more hackers with honed skills and automated
tools carry out their malicious activities. If the logic is robust and absolutely
correct, then why do any users complain about not being able to find highly
skilled Windows and Linux helpers or administrators as their computers come
under hacker or malware attack; shift away from Windows to Apple Macs - in
well chronicled cases to enhance productivity and minimise Downtime
- for their desk tops; or from Linux and Windows to BSD platforms for their
servers?
The simple reason for the mi2g Intelligence Unit disagreeing with the
classical approach is that it is completely vendor centric and not user centric.
The vendors may prefer the world market for computers to be looked at purely
in terms of quantity of units sold and over simplify "absolute safety"
down to market share sectors on a pie chart, where Microsoft Windows would
dominate, followed by Linux and then BSD plus Mac OS X. The vendors assess
their turnover and profits via the yard stick of units or licenses sold, so
it makes sense from their perspective to think of the computing eco-system
by the classical measure of quantity. But does the classical measure make
sense from the users' perspective? No, it does not, and neither does it make
any economic sense. For this reason, we recommend a relativistic approach
which is time based and takes into account the adverse impact of high market
share, system reliability, availability, maintainability and scalability within
a 24/7 online computing environment as part of a network on which mission
critical work may take place over an extended time period, say, a minimum
of 12 months, the duration of our study.
Any business, government department or individual will attest that what matters
to them over one year in terms of their computing resource is Uptime.
In a given year, how many times do they have to stop working to deal with
hard reboots, soft resets, dysfunctional processes, patching and system upgrades,
loss of valuable work, serious computer administration etc, or in other words,
Downtime, also known as, Productivity Loss. This issue of near
100% Uptime over one year is mission critical to 24/7 online computers
in many instances and most market share dominators by the classical measure,
when subjected to the litmus test of out of the box safety and security, do
not appear to score very well at all, be they Windows or most flavours of
Linux.
When applying the benchmark of Uptime on the full sample of permanently
connected 235,907 machines, the mi2g Intelligence Unit found that the
only computing environments left standing without the need for a single reboot
at the end of the 12 month period were either BSDs or Apple Mac OS Xs. This
finding is echoed by Netcraft's independent research page - Sites with longest
running systems by average Uptime in the last 7 days - http://uptime.netcraft.com/up/today/top.avg.html
On this basis, when it comes to the approach of relativistic safety and security
in computing environments, we consider the market share safety and security
debate to be looking through the wrong end of the binoculars. Instead of a
bigger market share being a positive and smaller being negative, it has been
shown that, bigger market share is a contributor to much higher risk profiles
and small may be beautiful.
Within financial services, government agencies and defence businesses - the
sectors we know and understand - the most important issue is about continuous
Uptime for the supply chain and customer chain. A computing environment
may have a high quantitative market share like 30% or 60% but because the
machines running it keep falling down as a result of hacker and malware attacks
or need reboots for other reasons more regularly in a given year, the continuous
Uptime share may be very very low. So within this qualitative perspective
of continuous Uptime share, most of the machines not requiring any
switch-off / switch-on regimes over 12 months have been either BSD or Mac
OS X based and neither Windows nor Linux. This could boil down to imperfect
administration according to vendors, and this is the other safety and security
argument we have received from entrenched supporters of Windows and Linux.
If the 24/7 online computer users had a good administrator and the computers
were configured as per the text book settings with alpha, beta, gamma etc
ports off and A, B, C etc services and processes killed there would have been
no successful breaches or downtime. How does this argument square with
what comes out of the box by way of default settings, without appropriate
patches and service packs? Most organisations may not be able to employ a
superior and therefore expensive administrator, who may also not be available
in their local community which is now on the internet all the time through
broadband connections and it therefore has a moderately high global digital
risk profile with new threats arising every hour of every day?
The one year reliability of a quality modern appliance, telephone dial tone,
electricity, gas or water utility supply is much greater than most computers
connected to a 24/7 online environment over the same period. As our study
has shown, the pain is greater for home users and small enterprises without
adequate resources and less for medium size enterprises and minimal for large
enterprises with huge resources available on demand. [See previous news alert
for statistics.]
Does one need an electric kettle administrator to be able to ensure that the
water on the boil will not bust the kettle because the electricity voltage
tends to fluctuate a little? In the near future, computing users will demand
that the classical vendor centric safety and security approach is out-moded
and has to be replaced by user-centric concerns which are relativistic and
play over longer time frames. The relativistic safety approach is not absolute
over a frozen time window snap shot, in which every computer test has been
designed to produce a smile for the camera to deliver a perfect yet "contrary
to common sense" picture postcard that aims to move more product and
does not begin to address user concerns.
"In simple terms, all we are saying is that the probability of getting
manually hacked for real, over one year, in the world in which imperfect computers
and malicious humans exist is greater for Linux than Windows and lowest for
Mac OS X and BSD. On the other hand, if the threat is from malware then it
is a big concern primarily for Windows users and not other computing environments
at this stage. The study included well configured working machines, badly
configured working machines and everything else in between. The sample consisted
of 24/7 online machines installed in real life within homes, small, medium
and large organisations over a 12 month period, forget artificially created
vendor sponsored laboratory set ups," said DK
Matai, Executive Chairman, mi2g.
"The vendors boil down safety to perception, huge marketing effort and
benchmark comparisons that deliver perfect security if it is a sunny day on
the internet, every day, all through the year. All safety is relative outside
a perfect environment such as a laboratory. There is no such thing as 100%
safety or security because there is normally no risk profile at 0% where productivity
is involved over time, which in turn requires being connected and communicating
with others. Maximising 'opportunity to sell' product is the vendor rationale
for a move to greater safety and security that delivers growth in market share
whilst ignoring the consequences of a rising magnitude of threats as well.
This in essence is the classical approach to computing safety."
"On the other hand, the users want to save time over their working lives,
minimise risk and multiply productivity by having as low a downtime of their
computing resources as possible. They are happy with an Apple Mac or BSD platform
if it means that they can do their work and worry less about mass malware
attacks or hacker breaches. Small market share does not concern the users
if the product will deliver standard, compatible applications and services
reliably. For the users, the total cost of ownership argument is about zero
headaches. Linux, for example, may have a low entry fee but what about the
headaches afterwards that have come from unbudgeted costs associated with
the higher number of hacker attacks, substantial learning curve, user training
and administration."
"This is the relativistic approach and it is based on thinking long term
for customer satisfaction and not in terms of quarterly profits that first
deliver short term gain by pushing product out and then long term pain for
both the vendors and the users. The computing community will eventually demand
vendors to deliver product with near 100% uptime, without the requirement
for very skilled intervention."
"For the moment, however imperfect, the safest option based on our recent
study over 12 months, is either Apple Mac OS X or BSD. This choice could reduce
the chances of being attacked and provide high continuous uptime without huge
additional cost burdens over time."
[ENDS]
Related Articles:
17th November 2004 - Full compendium
of mi2g speeches released on web
12th November 2004 - Exclusive interview of DK Matai
with Linux/Security Pipeline
12th November 2004 - Deep study: The ongoing Linux Attacks
fallout
6th November 2004 - Experts challenge mi2g security
study: mi2g response
2nd November 2004 - Deep study: The world's safest computing
environment
24th March 2004 - Five solutions to the rising identity
theft and malware problem
2nd March 2004 - Disturbing the sanctity of the Linux
Church
19th February 2004 - The World's safest Operating
System
Coverage:
Information
Security News: mi2g defends its Linux claims - Insecure.org
mi2g
defends its Linux claims - Virus.org
mi2g defends
its Linux claims - The Inquirer
Interviews:
DK Matai with Linux/Security Pipeline - Linuxtimes.net
Exclusive
interview of DK Matai with Linux/Security Pipeline - LinuxSecurity.com
Exclusive
interview of DK Matai with Linux/Security Pipeline - eBCVG IT Security
Apple's
Mac OS X is much more secure than Linux or Windows - MacDailyNews
Furore
over OS security survey - ITWeb
Sloppy
Sysadmins Leave Linux Security Lacking - InternetWeek.com
Sloppy
Sysadmins Leave Linux Security Lacking - CRN
Sloppy
Admins Leave Linux Vulnerable To Security Breaches - Information Week
Linux
is 'most breached' OS on the Net, security research firm says - ARNnet
Linux
is 'most breached' OS on the Net, security research firm says - LinuxWorld
Linux
is 'most breached' OS on the Net, security research firm says - ComputerWorld
Security
company defends Linux-is-vulnerable survey - HNS
The
worlds safest computing environment - TechCentral
mi2g response:
Experts challenge mi2g security study - eBCVG IT Security
PC
Pro: Security Company Defends Linux-is-Vulnerable Survey - linux today
Study:
Linux Is Least Secure OS - WindowsITPro
Linux
Most Breached OS, Says New Report - CXO Today
Survey:
Mac OS X most secure, Linux least - ITWeb
Mac
OS X, BSD Unix top security survey - Neowin.net
Mac
OS X, BSD Unix top security survey - Computer World
Study:
OS X World's Safest OS From Security Attacks - MacNewsWorld
Study
Recommends Mac OS X as Safest OS - Slashdot
Mac
OS X, BSD Unix top security survey - MacCentral
Security:
Mac OS X Good, Linux Bad - eBCVG IT Security
Study:
Apple's Mac OS X 'world's safest and most secure' operating system - MacDailyNews
Study:
OS X World's Safest OS From Security Attacks - the Mac Observer
The world's
safest computing environment - eBCVG IT Security
Mac
OS X - 'world's safest' - Macworld Daily News
The
world's safest computing environment - TechCentral
mi2g is at the leading edge of building secure on-line banking, broking
and trading architectures. The principal applications of our technology are:
1.
D2-Banking;
2.
Digital Risk Management; and
3.
Bespoke Security Architecture.
mi2g pioneers enterprise-wide security practices and technology to save
time and cut cost. We enhance comparative advantage within financial services
and government agencies. Our real time intelligence is deployed worldwide for
contingency capability, executive decision making and strategic threat assessment.
mi2g Research Methodology: The Frequently Asked Questions (FAQ) List
is available from
here in pdf. Please
note
terms and conditions of use listed on
www.mi2g.net
Full details of the October 2004 report are available as of 1st November
2004 and can be ordered from here.
(To view contents sample please click here).