Home / Blogs

Anonymous, LulzSec, and the Option of Internet Security

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads. The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was only a matter of time.

Releasing the personal information of innocent users is not responsible hacktivism, nor required to trumpet a successful hack. There are other ways to air bragging rights and teach a lesson about system security than potentially causing personal and financial harm to the users of the system. Showing the weaknesses in the state of online security, however, is something that can be agreed with and both Anonymous and LulzSec should be commended for their actions in that regard. Yes, commended. Thanked. Appreciated.

Regardless of the motive behind their actions, these groups are demonstrating publicly what we in information security have been saying for years: not enough is being done to secure Internet accessible systems. In information security it can be difficult to convince people of a risk until they see someone else fall victim to that same risk. The publicized successes of these hacker groups help to build a case for enhanced Internet security, hopefully opening the minds and eyes of those that are most difficult to convince. But to truly understand why the information security community owes these groups a token of gratitude, you must first understand why so many vulnerable systems exist on the Internet.

Thanks in large part to Hollywood, the technical prowess of the computer hacker is often exaggerated and shrouded in mystery. It may be easier to imagine that it takes a great deal of skill and years of experience to breach computer security, but in truth it can be quite easy to hack a system. There is no real mystery or special skill required in exploiting a security weakness or vulnerability, with a hacker needing only to understand which tools to utilize and where to look for the weakness. In many cases this weakness occurs in the configuration of a given computer system, the result of two primary factors: the failure to properly fund the necessary level of security technology to protect the system, and the failure of the system administrator to understand how to secure the system.

Any technology professional with a few years of experience in the field can tell you that information security is not about security, it is about profit. Organizations do not pay for security that negatively impacts the bottom line, and will pay for only the bare essentials required to protect their ability to make a profit or meet budget. All too often security decisions are not made by technical professionals, instead middle and upper level business managers who have little or no experience in information security render these security decisions, viewing IT security spending as a black hole through which they refuse to pour money. All too often private organizations deploy only those security measures required by government regulation, and only to meet the passing requirements of internal or external audits. More sophisticated security measures are viewed as too costly, and thus become “optional.” This decision to make enhanced security optional can be directly correlated to the large number of security incidents, and contributes greatly to the global pandemic of security issues that impact the Internet as a whole.

Compounding the problem, and again rooted in the lack of financial support for information security, are the actions (or inactions) of the technical personnel responsible for the security of Internet-facing systems. It is not uncommon for a computer server or network-accessible application to be installed and configured by someone with only a cursory level of security knowledge. The repercussions of selected configuration options are not well understood, often resulting, for example, in default administrator level passwords and privileges left in place on the system. The necessary administrative and security knowledge to manage these servers and applications can only be obtained through advanced levels of training, often a rarity in information technology budgets. Typically, IT managers can fund only the technical training necessary to meet the bare minimum of skill required to maintain system uptime and support profitability.

Computer hackers have known for years that an Internet connected organization subject to a budgetary constraint will only be as difficult to hack as their budget allows. Even when properly funded, weaknesses can be found in a well-protected system if the skill level of administrative and support personnel is not sufficient to properly install, configure, and manage the system. A company that invests in advanced security technologies and training for administrative personnel will be much more difficult to compromise than one with limited funding and little security skill. This is the point that groups such as Anonymous and LulzSec are proving to the world: security of Internet connected systems is too weak and too easily compromised. This is a result of a decision being made at some point, either directly or indirectly, that enhancing the security of these systems was optional.

Making their point to the world, however, does not require harming an unsuspecting and innocent Internet public, whose personal and confidential data should not be used as fodder to boast of their achievements. Anonymous, LulzSec, and other groups can execute their manifesto, display their trophies, and make their point in a way that does not harm the general public, instead turning the public eye towards the managers and operators of the systems and services failing to secure our personal information. Gathering public support for their cause could be a powerful weapon for Internet security, one harnessed simply by saying, “we could easily release your personal data for all to see, but we won’t.”

The Internet has not yet seen this type of hacker, a “black hat” who champions the “white hat” cause, one that will limit their impact to avoid harming the masses of innocent victims who play no role in the game. Until private organizations, governments, and those responsible for information security decisions rethink how they approach and prioritize Internet security, the game will continue with the winners pre-determined by the inaction of the losers.

By Mike Dailey, IT Architect and Sr. Network Engineer

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC