http://securityblog.verizonbusiness.com/2010/04/22/redefining-security-researcher/

This should cause some nice stirring of the preverbal pot.

Have you ever heard of a terrorist referred to as a "demolition engineer?" How 
about a thief as a "locksmith?" No? Well, that's because most fields don't 
share the InfoSec industry's ridiculous yet long-standing inability to 
distinguish the good guys from the bad guys. Perhaps we're just in one of those 
moods lately but it seems to be getting worse. It's far too easy for anyone who 
has anything to do with information security to be labeled (by themselves or by 
others) a "security researcher" without regard to their behavior. "Security 
Researcher Breaks This" and "Security Researcher Exposes That" say the 
headlines. Ugh; we really need to clean up our language. This begins with 
setting a few principles and regularly using more accurate descriptors in our 
publications and daily conversations.

Why does this matter? Well, it's a matter of principle: One is either part of 
the problem or part of the solution. Problem-makers and Solution-makers should 
no more have the same label as terrorists and engineers. Sure, they both 
interact with explosives in their daily business but they put their skills to 
vastly different uses. Is there a reason we must continue to label people by 
the elements of their trade rather than the merit of their deeds? We think not.

We at Verizon Risk Intelligence do hereby adopt and resolve to faithfully use 
the following definitions:

    * Security Researcher: One who studies how to secure things and/or how 
things are not secure in order to find a solution.
    * Security Practitioner: One who applies the findings of the Security 
Researcher in order to make things more secure.
    * Narcissistic Vulnerability Pimp: One who - solely for the purpose of 
self-glorification and self-gratification - harms business and society by 
irresponsibly disclosing information that makes things less secure (or 
increases risk).
    * Criminal: One who actively subverts security without authorization or 
deliberately creates ways for others to do so.

It's time to draw a line in the sand. If you too are tired of seeing criminals 
elevated to a podium of legitimacy and bestowed the same job title you possess, 
join us. We'd be grateful to have the company.

*****

Update: I put this as a comment but I felt it needed to go as an update to the 
main article. I enjoy (many of) the comments and healthy debate on this 
important topic...but please stop using analogies that compare the disclosure 
of software/hardware vulnerabilities to auto part defects and sharks in the 
water. Whatever your stance on disclosure, this line of logic simply does not 
apply. If you make known an auto defect or shout a warning to people about a 
shark in the water (I avoided a shark attack as little boy bc of this, btw), 
you DO NOT INCREASE THE LIKELIHOOD OF ATTACKS OR THEIR SUCCESS RATE. Other 
drivers will not start crashing into you at higher rate and more sharks will 
not swarm from across the ocean to attack you because of this 
knowledge/warning. You can deal with the vulnerability (defect/exposure) 
without an increase in the likelihood of attacks or incidents.

If you tell the world about a flaw in operational software/hardware, you 
increase the pool of threat agents that know about it, increase the likelihood 
they will attack, and increase the chance they will be successful. All of this 
happens when you make the information known. Therefore, risk is increased 
unless the problem is addressed beforehand. No way around it. Argue as you 
wish...just pick a different line of reasoning (notice I'm not even mentioning 
the fact that auto defects and imminent shark attacks aren't typically 
announced under a spotlight). -Wade




 Protected by Websense Hosted Email Security -- www.websense.com 

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to