The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main as well.


the other viewpoint was that the software was designed as dedicated,
disconnected tabletop operation ... and allowed numerous applications
(games, etc) to take over the whole machine. a little later the
software was extended to support desktop operations with some local
area business network (non-hostile and non-adversary).  it was
designed very well to do what it was intended to do (and in fact a
great deal of countermeasures to machine take-over would have been
counter productive to its original target market).

it was when those pesky users started attaching the product
(originally designed for totally stand-alone operation) to open (and
potentially extremely hostile) networks, that you started having
problems. it is somewhat like taking a Model T and asking why it
doesn't have crush zones, safety belts, airbags, rollbars, safety
glass, padded dashes, headrests, etc.

for slight drift ... in the mid to late 90s, a lot of the threats were
buffer overflow related to the use C language programming conventions
... lots of past posts discussing buffer overflow issues
http://www.garlic.com/~lynn/subintegrity.html#overflow

then automatic scripting (much of which had been originally targeted
at closed, non-hostile, cooperative environments) exploits started to
drastically increase until buffer overflow exploits and automatic
scripting exploits were about equal. the potential for automatic
scripting vulnerabilities was something that had been identified on
the internal network in the 70s.

a couple years ago, there was an estimate that 1/3rd of the exploits
were buffer overflow related, 1/3rd automatic scripting related, and
1/3rd social engineering related.

for other drift ... recent lengthy discussion on open networks and
SSL related vulnerabilities
http://www.garlic.com/~lynn/aadsm26.htm#1

the latest seems to be a big upswing in *phishing* ... which can be
considered a form of *social engineering* ... i.e. convincing victim
to do something for the attacker (frequently involves divulging
sensitive information).

lots of past posts related to fraud, exploits, vulnerabilities, and
threats
http://www.garlic.com/~lynn/subintegrity.html#fraud

and as a complement ... some number of past postings related to
assurance
http://www.garlic.com/~lynn/subintegrity.html#assurance

a major objective of *phishing* attacks is to obtain sensitive
information that is frequently used in *something you know*
authentication (that can be turned around and used by the attacker in
replay and/or impersonation exploits).

from 3-factor authentication model
http://www.garlic.com/~lynn/subintegrity.html#3factor

* something you have
* something you know
* something you are

this is particularly applicable to pins, passwords "something you know"
shared-secret authentication
http://www.garlic.com/~lynn/subintegrity.html#secrets

or account numbers ... where attackers can turn around and use the
account numbers in transactions requiring little or no additional
information ... misc. posts mentioning account number harvesting for
fraudulent transactions
http://www.garlic.com/~lynn/sbuintegrity.html#harvest

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to