author photo
By Chahak Mittal
Tue | Nov 28, 2023 | 5:14 AM PST

In the ever-evolving landscape of computer security, many innovations flood the market, each boasting its efficacy. As a regular attendee of security conferences and contributor to security books, it's evident to me that the field remains a hot topic. However, despite the significant investments of time and money, persistent issues persist. Let's delve into six misguided notions undermining adequate computer security.

1. Default Permit: the illusion of safety

The concept of "Default Permit" is pervasive and enticing, akin to empty calories—pleasing but ultimately harmful. Whether applied to firewall rules or code execution permissions, Default Permit operates on the flawed assumption that allowing everything except known threats is a sound strategy. This approach leads to an endless arms race with hackers, where new vulnerabilities pose constant threats. Embracing the opposite, a "Default Deny" policy, requires dedication but ensures a more secure environment.

2. Enumerating Badness: an outdated approach

The "Enumerating Badness" era originated when the number of known security vulnerabilities was manageable. However, in the current landscape, the sheer volume of malicious entities outweighs the known benign ones. Relying on exhaustive lists of threats, as seen in antivirus and intrusion detection systems, is impractical. Instead, embracing "Enumerating Goodness" by focusing on known legitimate applications is a more effective strategy.

3. Penetrate and Patch: addressing vulnerabilities ad hoc

The "Penetrate and Patch" approach involves identifying and fixing emerging vulnerabilities. However, this method perpetuates a cycle of trial and error, merely polishing flawed code without addressing fundamental security design. A more sensible approach is to build secure systems from the ground up, adhering to sound design principles and minimizing vulnerabilities proactively.

4. Hacking is cool: misguided hero worship

Portraying hacking as a glamorous endeavor contributes to a social problem rather than addressing it as a technological challenge. Encouraging hackers inadvertently supports criminal activities, amplifying the negative impact of their actions. Shifting the narrative from "Hacking is cool" to "Good engineering is cool" is essential for altering societal perceptions.

5. Educating users: an ineffective strategy

While educating end-users about security seems logical, empirical evidence suggests it is an uphill battle. Users' susceptibility to phishing attacks and social engineering tactics remains a persistent challenge. Instead of relying on cybersecurity awareness training, adopting a "Default Deny" approach to email attachments and actively quarantining potential threats is a more pragmatic solution.

6. Action is better than inaction: thoughtful decision-making matters

The notion that immediate action is always better than inaction often leads to rushed and uninformed decisions. Evaluating new technologies, observing their real-world performance, and learning from others' experiences can save resources and prevent costly mistakes. Avoiding unnecessary actions and strategically implementing proven technologies is a more innovative approach.

In conclusion, the field of computer security must transcend misguided notions and embrace pragmatic, effective strategies. Questioning conventional wisdom and prioritizing security by design over reactionary measures are essential steps toward a more resilient and secure digital landscape.

Tags: Cybersecurity,
Comments