tssci security

Pandemic Influenza, Business Continuity Planning and You

Today Congress will ask the President for an update on National Strategy for Pandemic Influenza. This reminded me of an article I read in the December 2006 issue (pp 36-43) of Information Security Magazine. One of the feature stories, Don't Wait for Disaster, looks at what some security managers are doing to address the risk of an avian flu pandemic. A nation or even worldwide pandemic poses a risk to some organization's ability to operate, and one many of us overlook when creating a business continuity plan.

"You have to start planning," Klahn says. "Everything I've read from the Centers for Disease Control (CDC) and the World Health Organization (WHO) characterizes it as a real threat." The warnings from experts about the possibility of an avian flu pandemic are certainly ominous. According to WHO, the H5N1 virus--a strain of avian influenza--has "considerable" pandemic potential. If the virus becomes fully transmissible between humans, it will spread throughout the world in three months, the organization believes.

There are ways organizations are planning for such pandemics, but their solutions may introduce new problems on larger scales. Having employees telecommute via VPN can raise support costs for IT, who may need to improve current VPN capabilities, increase bandwidth and address privacy, security and regulatory concerns. How will paper processes be handled? And how about critical functions that need to be performed onsite?

...companies need to plan for how they'll take care of employees who must come into the facility to perform critical functions...

The article also raises economic issues a pandemic may present, such as food and other critical infrastructure. The study recognizes a possibility for increased demand in online shopping and home delivery; how will distributors get food to grocery stores and then to people?

If anyone has been involved in creating/maintaining a business continuity plan, what are your thoughts on this? Has your organization addressed the risk of a pandemic? Does your organization even have the resources or ability to even function in case of an outbreak?

InformationWeek, the site who thinks its readers are dumb

Thank you very much InformationWeek! I was reading an IW article, Adobe Patches Acrobat And Reader XSS Bug, 3 Other Flaws, hoping to get some useful information from it. The article contains 15 links, two of which are other IW articles and three direct to Adobe's website. The rest are "techweb" definitions for words like: PDF, bug, computer, OS, Linux, server, patch, download. What the hell!?! I know these might generate some advertising revenue, but seriously, defining bug? computer?

After hovering over several of the links, I almost gave up. The two most important links in the entire article, are easy to miss. They are:

I have noticed this with every article InformationWeek puts out, and it's incredibly annoying. I hope they read this. :mad:

This is horrible, this idea: "Phishing your own users"

I see Michael Farnum has responded to Terry Sweeney's blog post on Phishing your own users. I would just like to remind everyone that while intentions may be good, to remember the times people have tried this tactic with viruses. How many times did we hear about someone writing a virus that removes viruses or one that enables a security feature? Or how about testing the effectiveness of an anti-virus solution by distributing to users a file (containing a virus) that says "DO_NOT_OPEN_ME" ? Edit: see How not stop a virus attack.

I feel there are much better ways to measure the effectiveness of your security awareness training. In my opinion, this method of testing users by fake phishing will only confuse them. A couple suggestions for measuring effectiveness:

Simply coming up with a test would be a much better and less riskier way to measure results than seeing who clicks on your phishing scam and who doesn't. To sum it up, I edited a quote from one of the best movies ever made: Office Space.

Tom: What do you say we set up fake sites that entice our users to enter their personal information to measure the effectiveness of our security awareness training program? Michael: That's the worst idea I've ever heard in my life, Tom. Samir: Yes, this is horrible, this idea.

Foxit Reader (may be) vulnerable

I came across this today, a Multiple Vendor PDF Document Catalog Handling Vulnerability over at MOAB. I was curious, so I decided to check it out and download the POC exploit code. The document failed to open on my Windows XP workstation using Foxit Reader version 2.0 build 0922. I ran it through Visual C++ Express to see what I can get from debugging it, (unfortunately not much due to not having Foxit source code or the symbols) and got this:

First-chance exception at 0x0042a266 in FoxitReader.exe: 0xC00000FD: Stack overflow. Unhandled exception at 0x0042a266 in FoxitReader.exe: 0xC00000FD: Stack overflow.

I'll post updates as they become available.

Black out and smudge, but don't blur

I'm at the airport right now, after having gone through an extensive, supposedly random TSA security screening and came across this article at dheera.net. In summary, the article states blurring sensitive text in photos is a bad idea. The reason being, through trial and error anybody can derive the information that was blurred. I've had that same idea in my head for awhile now; it's interesting to see that the method works.

To mitigate this risk, black out text in an image or use the "smudge" tool in Photoshop. In a document, don't just set the text background to black... black text on black background is still text. A simple copy/paste into vi or notepad will show the text.

« Newer entries — 50 — Older entries »

blog comments powered by Disqus