Trusting Code that Was Never Designed to Be Secure

Trusting Code that Was Never Designed to Be Secure

Our 40 plus year dependence on code – that was never designed for security – has finally caught up with us.–PC Pitstop

By Stu Sjouwerman, for KnowBe4.com Security Awareness Training

Vint Cerf, who together with Bob Kahn created TCP/IP, the protocol that routes Internet traffic, is often called the “father of the Internet”. Cerf was interviewed about TCP/IP recently in a book called Fatal System Error and admitted “We never got to do the production engineering.” In software design language that essentially means “we never got out of beta”.

Cerf explained: “My thought at the time, thirty-five years ago, was not to build an ultra-secure system, because I could not tell if even the basic ideas would work.” The focus at the time, as it was an ARPANET Defense project, was on fault tolerance, not security. The message was supposed to automatically reroute around atomic bomb blast sites, not protect you against identity theft or keep hackers out of your network.

Cerf has stated many times over, the only way the Internet is going to be truly secure is to rebuild it from the ground up. That is difficult, but can it be done? Absolutely. But it’s going to take agreement, a lot of time, and a lot of money. And looking at the state of the planet, it’s doubtful if it will ever be done. Especially as some powerful players prefer things to stay as they are because they are in control now.


How did it get to be this bad?

There actually are security technologies that are far superior to what is being used today. So how come they are not being deployed in production? The answer has to do with people, not technology. Hackers and the NSA are far ahead in their offensive technology, they can essentially break into any piece of code. And then there is that pesky end-user. Machine-to-machine communications are easy, but once you throw in hundreds of workstations, dozens of servers, and thousands of devices and apps that are being driven by humans, things get very hairy, very quick. Fancy mathematical security algorithms start to break down or get overwhelmed.

How does NSA Monitoring fit with all this?

As Cerf stated, the basic transmission protocols were not built with security in mind. This allows organizations with access to centralized Internet traffic hubs to “hoover” up the data they deem critical. The NSA claims that they only “touch” only 1.6% of daily internet traffic. If the net carries 1,826 petabytes of information per day, then the NSA “touches” about 29 petabytes a day. IT pros are very interested in what that actually means. Store? Analyze?

Article continued here

This excerpt appears with permission from knowbe4.com.

140 total views, 2 views today

(Visited 8 times, 1 visits today)

4 thoughts on “Trusting Code that Was Never Designed to Be Secure

  1. You can not secure feelings or human emotions or prevent people to act on it, but severe punishment like automatic life time prison sentence would curb it.

  2. There is no such thing as network or computer security as long as people are involved. Remember Private Manning and Edward Snowden released the most "secured" government information because of their personal feelings. How do you secure feelings or human emotions of your lowest level employees?

    • @Stephen James:
      Snowden and Manning may have been low level, but somebody gave them too much access authority. It’s much easier to give employees open access whether they really need it or not. Software security systems can control access, but that takes an administration dedicated to data protection. Many companies including government agencies decide to not pay for the overhead and monitoring tight security demands.

      Even if someone has access to information, how do they manage to get it out ? Insecure email or file transfer, a management issue.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.