Yankee Group: Caught between the devil and the deep
blue sea?
London, UK - 7 April 2005, 14:30 GMT - In what appears
to be a growing trend of radicalism within the Open Source community,
the Yankee Group analyst - Laura DiDio - has been criticised and pressurised
out-of-office hours and at home for her analysis reports on Open Source and
proprietary software. Her most recent report was released on Monday which
compared Microsoft Windows Server 2003 favourably to Linux in terms of quality,
performance and reliability. She has also been accused of partiality and bias,
which she denies. This accords with mi2g's experience with certain
fringe elements of the Linux Community recorded in the news alert from 2nd
March 2004, which is reproduced below.
mi2g released its deep study in regard to mainstream operating systems
on 2nd November last year. The most comprehensive study ever undertaken by
the mi2g Intelligence Unit over 12 months had revealed that the world's
safest and most secure 24/7 online computing environment - operating system
plus applications - was proving to be the Open Source platform of BSD (Berkley
Software Distribution) and the Mac OS X based on Darwin. The last twelve months
at that stage had witnessed the deadliest annual period in terms of malware
- virus, worm and trojan - proliferation targeting Microsoft Windows based
machines in which over 200 countries and tens of millions of computers worldwide
have been infected month-in month-out.
"The danger of these heavy handed unsophisticated protestations is that
perfectly good alternatives to proprietary software from the Open Source environment
may pick up a bad reputation as well," said DK Matai,
Executive Chairman, mi2g.
Re-release: Disturbing the sanctity of
the Linux Church
London, UK, 16:30 GMT 2 March 2004 - Any empirical evidence
pointing to a high level of online Linux breaches is immediately shot down
by religious zealots as if a church had been desecrated. mi2g believes
in the Open Source revolution and the safety and security that comes from
peer review. However, mi2g maintains that no OS is perfect including
Linux. The mi2g Intelligence Unit is made to feel like Martin Luther
at the Imperial Diet of Worms in 1521 where he expressed his concerns about
Catholicism but not about the Gospel of Christianity.
Martin Luther dealt the symbolic blow that began the Reformation when he nailed
his Ninety-Five Theses to the door of the Wittenberg Church. That document
contained an attack on papal abuses and the sale of indulgences by church
officials. Linux is being adopted today as a secure operating system even
by those who do not understand the basics of how to maintain it. This indulgence
is encouraged by the myth that Linux is 100% secure. There is no divine right
that Linux possesses of being 100% secure. Poor administration and bad configuration
can lead to breaches of any Operating System (OS).
There is a widespread reluctance to accept criticism in the Linux community
even when it is genuinely in regard to the scarcity of skills available to
administer Open Source OS servers or desktops. The critical flaws which were
identified in the Linux kernel in late February demonstrate that Linux, like
any other OS, is not perfect and is on a long journey to build trust, as is
Windows. However, because it is permissible to say that Windows has vulnerabilities
and administrators are aware that critical patches are issued from time to
time, Windows systems are maintained and kept up-to-date much more than Linux
systems. This is the main reason why server breaches of Windows systems have
been broadly falling over the last year.
There are shades of grey in regard to the level of vulnerability seen in Linux
as in Windows, BSD and other operating systems. The sooner the Linux community
accepts this, the faster it will be able to suggest and implement best practices
for Linux denominated solutions and allow major project sponsors to budget
appropriately for the hidden costs of training and migration.
The mi2g Intelligence Unit has noted a high level of interest from
the Linux community, some of it hostile, ever since it published the results
of two studies - "The World's safest Operating System" and "February
breaks digital risk records worldwide" - on 19th February and 1st March
2004 respectively. Both studies came out in favour of the safety and security
of BSD and Mac OS X whilst also showing Windows to be less breached at the
server level than Linux.
The management of mi2g has been threatened with damage to reputation
and online property unless more is preached in favour of Linux. mi2g
would like to record that it carries no bias in favour of BSD or Apple Mac
OS X, nor does it maintain any bias against Windows or Linux. Various allegations
have been made in a variety of forums that mi2g is somehow biased in
favour of proprietary software vendors. This is not true.
For the record, it should be noted that mi2g has been committed to
an Open Source architecture - Linux, Apache, MySQL, PHP (LAMP) - for over
six years whether it is in regard to the official web site, the Security Intelligence
Products and Systems (SIPS) engine or mi2g's Bespoke Security Architecture
(BSA). BSA has also integrated components from Windows and BSD alongside Linux.
mi2g has implemented bio-diversity within some of the large-scale roll-outs
to cut costs and to save time in retraining users.
The mi2g Intelligence Unit research shows that with the correct administration
procedures, set up and appropriately configured defences it is possible to
protect a Linux, Windows or BSD server from hacker attack. In most cases,
the Operating System (OS) does not let the server system down but inappropriate
configuration management, incapacity to prepare for the impact of third party
application vulnerabilities and the maintenance of default configurations
and unnecessary processes is partially responsible for the high level of attacks
against a particular OS at server level.
DK Matai, Executive Chairman, went on record to state mi2g's commitment
to LAMP architecture in October 2001 at IBM as well as Lloyd's of London through
two talks delivered to Chief Executives within banking, insurance and reinsurance:
1. Developing the Linux business case for financial services; and
2. The coming Linux tsunami, an Open Source revolution
Judging by the way in which malware variants are spreading in early 2004,
it is likely that proprietary software solutions may succumb to the equivalent
of the 1665 Great Plague and then the Great Fire of London in the following
year brought about in cyber space by trans-national criminal syndicates perpetrating
spam, phishing scams and zombie orchestrated DDoS attacks. Within five days
in 1666, the City of London was destroyed by fire. In destroying the closely
packed houses - mostly wooden - and other buildings it is also thought likely
that the fire finally put an end to the Great Plague that had devastated the
city in the previous year, which proliferated as a result of poor hygiene
and a low sense of civic responsibility. Today the global epidemics of malware
- like The Great Plague - only target computer architecture of one kind and
feed off social engineering ruses and poor respect for computer hygiene.
What emerged from The Great Fire of London were new best practices both in
terms of building architecture as well as public policy, health and safety.
The same may happen within the computing industry. Linux and the Open Source
community must not lose the chance to be at the start of the new revolution
post a cataclysmic cyber event by refusing to be self-critical at this stage.
[ENDS]
mi2g is at the leading edge of building secure on-line banking, broking
and trading architectures. The principal applications of our technology are:
1. D2-Banking;
2. Digital Risk Management; and
3. Bespoke Security Architecture.
mi2g pioneers enterprise-wide security practices and technology to
save time and cut cost. We enhance comparative advantage within financial
services and government agencies. Our real time intelligence is deployed worldwide
for contingency capability, executive decision making and strategic threat
assessment.
mi2g Research Methodology: The Frequently Asked Questions (FAQ) List
is available from here in pdf. Please
note terms and conditions of use listed on
www.mi2g.net
Full details of the March 2005 report are available as of 1st April 2005
and can be ordered from here.
(To view contents sample please click here).