SANS Top 20 List overlooks the people, legal and insurance
issues
London, UK - 22 November 2005, 17:00 GMT - The SANS Top
20 technical list announced in London today addressed vulnerabilities across
all layers in the computing environment as the primary source of digital risk
whilst making no significant mention of the other strategic digital risk areas
including people, legal and insurance issues. The technology, people, legal
and insurance domains together define the full realm of digital risk according
to the holistic security methodology of the mi2g Intelligence Unit.
For example, it is the lax approach of the community of end-users and administrators
- within and outside organisations - who knowingly or unknowingly offer inroads
to global organised crime and extremism. Such overt or stealth illicit operations
may benefit from software vulnerabilities, amongst other technical exploits,
only if the human touch points remain incapable, unaware or compromised. Strategically,
digital risk can be mitigated significantly through legal contracts, which
tie the suppliers down to specific Service Level Agreements (SLAs), and through
the initiation of appropriate business interruption insurance cover which
puts mandatory audits in place.
Many speakers at the SANS Top 20 conference held this morning at the Department
of Trade and Industry (DTI) talked about the complex array of computer software
vulnerabilities and software patch regimes without fully identifying the complex
interdependence of weak links in the human chain, legal contracts and insurance
or risk mitigation policies within corporations, government agencies and NGOs.
Those weak links can compound the software vulnerabilities manifold and to
the detriment of the affected organisation and its interlocutors. Given the
complexity of the patch regimes now needed, many small to medium size enterprises
are ill equipped to handle the complex tasks to hand, without specialist help
or proprietary tools. Such tools may not be easy to use or deploy across a
diverse computing environment.
"Lessons gleaned from the latest SANS-20
list, suggest that the cat and mouse game cannot go on because the lay user
and small to medium size enterprises possess limited resources. When dealing
with the plethora of software vulnerabilities at every level, it is quite
obvious that the problem is getting worse, not better. As the vulnerabilities
move up the food chain into applications, which do not have well defined patch
regimes or auto-update tools, the security risk gets amplified with multiple
touch points," said DK
Matai, Executive Chairman, mi2g. "The
human vulnerability side is a bigger issue than software vulnerability. We
must recognise the need for a paradigm shift in which the vendors have to
think about offering software as a constantly up-dated quality solution in
which the product is a first class trustworthy service and all the complexity
of applying patches is taken away from the average user. The lay person is
beyond solving this hierarchical dilemma. At the same time, the enterprise
has to look at digital risk holistically from a technical, people, legal and
insurance perspective."
Over the past year, attackers have been switching their focus to software
applications, according to the latest SANS-20 list of the most critical Internet
security vulnerabilities. Automated patching started making it harder to find
new vulnerable systems, so they went after applications that users are just
not patching. This correlates with mi2g Intelligence Unit research,
however, where very large scale attacks have taken place, with substantial
illicit financial movements or colossal economic damage, lack of human training
or awareness has played a significant part alongside software vulnerability
or system weakness to magnify the impact.
The SANS Top 20 list has been published annually since 2000. It is compiled
by representatives from a variety of computer security organisations including
the US Computer Emergency Response Team (US-CERT), the British Government's
National Infrastructure Security Co-Ordination Centre (NISCC) and the SANS
Internet Storm Center.
[ENDS]
mi2g is at the leading edge of building secure on-line banking, broking
and trading architectures. The principal applications of its technology are:
1. D2-Banking; 2. Digital
Risk Management; and 3. Bespoke Security
Architecture. For more information about mi2g, please visit: www.mi2g.net