Security Advisory MA-2003-01     CISSP - Trojan Security Certification

Original Release Date: Thursday January 16, 2003
Last Revised: --
Source: --

Systems Affected

        o Information Security Community
        o Information Technology Employers
        o Information Security Consultants


Overview

It has recently been identified that The International Information Systems Security 
Certification Consortium (CISSP) has developed and released a potentially destructive 
trojan application, which masquerades as a valid standard for professional 
certification in the field of information security.


I. Description

Delivered in the benign form of a six hour examination, the CISSP prompts target user 
with a series of 250 questions regarding the following topics:

        o Access Control Systems & Methodology
        o Applications & Systems Development
        o Business Continuity Planning
        o Cryptography
        o Law, Investigation & Ethics
        o Operations Security
        o Physical Security
        o Security Architecture & Models
        o Security Management Practices
        o Telecommunications, Network & Internet Security

This rather large payload, commonly referred to as the Common Body of
Knowledge (CBK), may cause a Denial of Service situation, leaving the target 
overwhelmed and unable to respond to further requests during the duration of the 
attack.  If the target handles the Denial of Service attack appropriately, and is 
unaffected, the CISSP trojan discontinues this attack, and self-mutates into a 
certification of added IS credibility. If accepted by the target, this certification 
begins to cause the following symptoms:

        o Increase in self-confidence
        o Increase in salary requirements
        o False sense of accomplishment
        o False sense of self-improvement

Despite the symptoms, the target experiences no real benefit whatsoever.  The affected 
target then is made to transfer funds in excess of $2,000 (US) to a remote bank 
account owned by ISC2.  Finally, the affected target promotes itself to a "Certified 
Information Security Expert" sans authentication.  The affected
target may then infect others, eventually creating a massive army of unskilled, 
prefabricated, shrink-wrapped, not for resale, half-assed security engineers, 
consultants, and "research scientists".


II. Impact

An abundance of sub-par information security engineers, consultants, and "research 
scientists".

A negative impact on the economy, specifically within the Information
Technology sector.


III. Solution

Avoid any certifications issued by ISC2 until a patch is distributed.
Obtain information security related certifications from valid sources.
Employers are encouraged to recognize the CISSP as a trojan certification.


Appendix A - Vendor Information

International Information Security Certification Consortium, Inc.

(ISC)2 is the premier organization dedicated to providing information security 
professionals and practitioners worldwide with the standard for professional 
certification.




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2 

Big $$$ to be made with the HushMail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to