前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
圈层
工具
发布
首页
学习
活动
专区
圈层
工具
社区首页 >专栏 >细致管理不严的风险和后果

细致管理不严的风险和后果

作者头像
柴艺
发布于 2020-12-18 06:00:25
发布于 2020-12-18 06:00:25
4680
举报

:虽然软件补丁对企业和个人用户来说都是不方便和麻烦的,但是这些修复程序在保护现在对日常生活至关重要的计算机系统方面起着重要作用。

本月早些时候,杜塞尔多夫市一家大医院的IT系统遭到黑客袭击,一名有生命危险的妇女去世。

由于杜塞尔多夫大学诊所的系统因一次明显的勒索软件攻击而中断一周后,该急诊病人无法接受治疗。结果,这名妇女被送往20英里外的一家医院,那里的医生在一个小时内无法开始治疗。她后来死了。

为了破坏医院系统,黑客利用Citrix ADC CVE-2019-19781漏洞,攻击者可以在被黑客攻击的服务器上执行自己的代码。据黑客的勒索报告,这起“误导性”攻击原本是针对海因里希海涅大学(Heinrich Heine University)的。

Citrix于1月24日发布了针对该漏洞的补丁,但医院似乎尚未安装修复程序。

据意大利网络安全公司SecurityOpenLab称,9月9日,同样的Citrix漏洞被利用来攻击意大利眼镜巨头Luxottica集团的服务器。那次袭击迫使陆逊梯卡公司关闭了在意大利和中国的业务。

网络安全优先事项

这样的事件引发了这样一个问题:为什么软件制造商一发布修复程序,企业就不立即修补漏洞。

Point3Security战略副总裁ChloéMessdaghi告诉TechNewsWorld:“太多的组织过度依赖扫描仪来发现需要修补的内容。”。这些“只提供最基本的信息”

许多扫描仪不是最新的,也没有优先考虑问题,Messdaghi说他们无法提供可靠的观点来了解哪些是需要立即修补的关键,哪些是优先级较低但需要及时采取行动的,哪些可能风险较小。”

她指出,即使是当IT人员修补漏洞时,他们也可能无法完全测试这些补丁。

在消费者方面,用户在多个网站上使用相同的密码,或未能实施基本的网络安全措施,如安装防病毒或反恶意软件,及时更新该软件及其操作系统;避免点击嵌入的链接或附件,他们没有验证发件人的电子邮件,或者他们访问的网页上的链接。

网络安全公司Stealthbits Technologies的技术产品经理Dan Piazza告诉TechNewsWorld:“用户一次又一次证明他们会无视专家的建议,重复使用凭据,选择简单的密码。”。

美国联邦调查局(federalbureauofinvestigation)本月早些时候向金融业发出的一份私营行业通知中称,跨多个账户使用密码的现象普遍存在。

美国证券交易委员会(SEC)在9月15日发布的风险警报中称:“当个人对各种在线账户使用相同的密码或相同密码的细微变化,和/或……使用容易猜到的登录用户名,如电子邮件地址或全名,则更容易发生成功的攻击。”。

各级自我执行

长期以来,用户未能遵循简单的安全程序一直困扰着网络安全专家和供应商。

2004年,微软时任首席执行官史蒂夫·鲍尔默(Steve Ballmer)呼吁个人用户为自己的网络安全负责。2010年思科系统公司宣称网络安全是每个人的责任。

多年来,高科技和网络安全软件供应商、银行和其他组织一直试图让消费者遵守基本规则来保护自己的网络安全,但“公司现在应该假设,当涉及到证书时,用户的行为将违背他们的最大利益,并开始强制要求用户养成良好的密码和安全习惯,“秘密比特”的广场建议道。

从程序上来说,公司应该考虑使用Piazza软件来保护他们的安全,因为这是一个很好的解决方案,他们建议Piazza能够及时有效地保护他们的网络

美国国土安全部下属的美国网络安全与基础设施安全局(CISA),9月18日,该公司发布了一项紧急指令,强烈建议公共和私营部门修补Microsoft Windows Netlogon远程协议CVE-2020-1472中的一个关键漏洞,从而朝着加强漏洞修补迈出了一步。

Netlogon漏洞,微软在8月份发布了一个补丁,可能让攻击者接管受害者网络上的域控制器

CISA给公共部门的IT部门一个周末——直到9月21日午夜——安装补丁,删除无法修补的域控制器,并实施技术和管理控制。

网络安全公司Guruchul的首席执行官Saryu Nayyar告诉TechNewsWorld,“事实上,一些公共部门的系统将从裂缝中掉出来是不可避免的”即使是运行最好的环境也会有偏差。”

至于私营部门,“一些组织很可能会权衡组织成本,并基于假定的风险或资源担忧推迟执行该指令,”Nayyar补充道。私营公司可能被迫修补Windows Netlogon漏洞。

Stealthbits Technologies的安全研究员Joe Dibley告诉TechNewsWorld,微软将于2021年2月9日开始实施新的设置,以提高Netlogon远程协议的安全性。这个缺陷必须先修补一下。

公司责任

托管安全服务提供商Cerberus Sentinel解决方案体系结构副总裁Chris Clements告诉TechNewsWorld:“几乎所有组织都有确保其Windows系统自动及时收到修补程序的流程和程序,但很少有组织有针对其环境中任何其他产品的策略。”网络设备打补丁的状况往往令人憎恶,仅仅是因为责任没有明确界定。”

Juniper威胁实验室的负责人Mounir Hahad告诉TechNewsWorld,也就是说,公司“绝对可以为自己的网络安全承担更多的责任。”。

专业网络服务公司和会计师事务所毕马威(KPMG)今年5月对全美1000人进行的一项在线调查发现,在消费者方面,用户对网络安全只是口头上说说而已。

调查显示,约75%的受访者认为对多个账户使用同一密码、使用公共WiFi、或将一张卡保存到网站或在线商店都有风险,但超过40%的受访者会这样做。

“当涉及到网络安全时,消费者是他们自己的最后一道防线,”Stealthbits的Piazza评论道尽管企业和政府有责任保护其拥有的敏感数据,但最终消费者可以通过自己遵循网络安全最佳实践来确保其数字福祉。”

“当新的安全功能被添加到一个网站或软件中时,用户通常只有在没有受到任何阻碍的情况下,或者如果他们能看到一个直接的、切实的好处,他们才可以接受这些功能。

Piazza说:“大多数个人网络安全的最佳实践都不会给消费者带来强大、直接的激励因素,除非他们着眼于全局。”。

Juniper'sHahad认为,消费者不应受到责备。”网络安全专业人士希望争取消费者的帮助,限制或减轻网络安全风险,但我们不能让他们对他们不理解的事情负责。”。

他认为,企业有责任为自己和消费者确保网络安全。

密码标准更高

哈哈德说:“我们希望消费者不要保留默认密码,但我们更希望公司不要让默认密码持续存在。”。

“我们可以要求消费者选择更强的密码,但我们宁愿让服务机构拒绝弱密码。他解释说:“我们可以要求消费者不要重复使用密码,但我们更希望有一个财团来检查密码是否被跨网站或服务重用。”。

Piazza评论说,解决这一问题的一种方法是通过设计实现隐私,这是设计软件、网站和服务时的新常态。

“虽然不能从法律上强制消费者遵循安全最佳实践,但政府法规将迫使组织采用更好的保护措施,这反过来将导致围绕用户密码选择、多因素身份验证的使用以及消费者授权工作流程的其他方面实施更严格的政策,”他总结道。

原文题:The Risks and Consequences of Lax Patch Management

原文:Although software patches can be inconvenient and cumbersome for both enterprises and individual users, these fixes serve an important role in protecting computer systems which are now vital to everyday life.

Earlier this month, a woman with a life-threatening condition passed away after hackers crashed the IT systems of a major hospital in the city of Dusseldorf.

The emergency patient could not be admitted for treatment because the Duesseldorf University Clinic could not access data after its systems had been disrupted for a week by an apparent ransomware attack. As a result, the woman was sent to a hospital 20 miles away where doctors were not able to begin treatment for another hour. She subsequently died.

To sabotage the hospital systems, the hackers exploited a Citrix ADC CVE-2019-19781 vulnerability which can let attackers execute their own code on hacked servers. The "misdirected" attack reportedly was originally intended for Heinrich Heine University, according to an extortion note from the hackers.

Citrix issued a patch for the vulnerability on January 24, but it appears that the hospital had not yet installed the fix.

The same Citrix vulnerability was exploited September 9 to attack the servers of Italian eyewear giant Luxottica Group, according to Italian cybersecurity firm SecurityOpenLab. That attack forced Luxottica to shut down operations in Italy and China.

Cybersecurity Priorities

Incidents like this raise the question of why corporations do not patch vulnerabilities as soon as software manufacturers issue a fix.

"Too many organizations are overly dependent on scanners to discover what needs to be patched," Chloé Messdaghi, VP of Strategy at Point3 Security, told TechNewsWorld. These "provide only the extreme bare minimum of information."

Many scanners are not up to date, and don't prioritize issues, Messdaghi said. "They can't provide a trustworthy view into what's critical to patch immediately, what may be a lower priority but requires timely action, and what may have less risk."

Even when IT staff patch vulnerabilities, they may not fully test those patches, she pointed out.

On the consumer side, users employ the same passwords on multiple sites, or fail to implement basic cybersecurity measures such as installing antivirus or antimalware software, updating that software and their operating systems in a timely manner; and refraining from clicking on links embedded in, or attachments to, emails whose sender they have not verified, or links on web pages they visit.

"Time and again, users have proven they'll disregard expert advice, reuse credentials, and select simple passwords," Dan Piazza, Technical Product Manager at cybersecurity firm Stealthbits Technologies, told TechNewsWorld.

Using passwords across multiple accounts is widespread, the United States Federal Bureau of Investigation stated in a private industry notification to the financial sector earlier this month.

"Successful attacks occur more often when individuals use the same password or minor variations of the same password for various online accounts, and/or...use login usernames that are easily guessed, such as email addresses or full names," the U.S. Securities and Exchange Commission said in a risk alert issued on September 15.

Self-Enforcement at Every Level

Users' failure to follow simple security procedures has long vexed cybersecurity experts and vendors.

In 2004, Microsoft's then-CEO Steve Ballmer called on individual users to take responsibility for their own cybersecurity. In 2010 Cisco Systems asserted that cybersecurity is everyone's responsibility.

High-tech and cybersecurity software vendors, banks and other organizations have been trying to get consumers to follow basic rules to protect their cybersecurity for years, but "Companies should now assume users will act against their best interests when it comes to credentials, and start forcing good habits for passwords and security," Stealthbits' Piazza advised.

Piazza recommended that firms trying to protect their networks against breaches consider real-time threat detection and response solutions, and password policy enforcement software, because "Convincing users to adhere to credential best practices is an uphill battle, so companies should start forcing good habits programmatically."

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), part of the Department of Homeland Security, on September 18 took a step toward enforcing vulnerability patching when it released an emergency directive strongly recommending both the public and private sectors patch a critical vulnerability in Microsoft Windows Netlogon Remote Protocol called CVE-2020-1472.

The Netlogon vulnerability, for which Microsoft issued a patch in August could let attackers take over domain controllers on a victim's network.

CISA gave public sector IT departments the weekend -- until midnight September 21 -- to install the patch, remove domain controllers that could not be patched, and implement technical and management controls.

It's "virtually inevitable" that some public sector systems will fall through the cracks, Saryu Nayyar, CEO of cybersecurity firm Gurucul told TechNewsWorld. "Even the best run environments have strays."

As for the private sector, "It's likely that some organizations will weigh the organizational costs and delay addressing this directive based on assumed risk or resource concerns," Nayyar added. Private companies may be forced to patch the Windows Netlogon flaw.

On February 9, 2021, Microsoft will begin to enforce new settings that will improve the security of the Netlogon Remote Protocol, Joe Dibley, security researcher at Stealthbits Technologies, told TechNewsWorld. The flaw will have to be patched first.

Corporate Responsibility

"Nearly all organizations have processes and procedures for ensuring their Windows systems received patches in an automated and timely matter, but very few have strategies for any other products in their environment," Chris Clements, VP of Solutions Architecture with managed security services provider Cerberus Sentinel, told TechNewsWorld. "The state of patching for network appliances is often abhorrent, simply because the responsibility hasn't been clearly defined."

That said, corporations "can absolutely be made to take more responsibility for their own cybersecurity," Mounir Hahad, head of Juniper Threat Labs, told TechNewsWorld.

On the consumer side, users pay lip service to cybersecurity, an online survey of 1,000 people across the U.S. conducted in May by professional network services and accounting firm KPMG found.

About 75 percent of the respondents consider it risky to use the same password for multiple accounts, use pubic WiFi, or save a card to a website or online store, but more than 40 percent do these things, according to the survey.

"Consumers are their own last line of defense when it comes to cybersecurity," Stealthbits' Piazza remarked. "Although businesses and governments have a responsibility to protect sensitive data in their possession, ultimately consumers can ensure their digital well-being by following cybersecurity best practices themselves."

"When new security features are added to a website or software, users are typically only OK with them if they're not impeded in any way, or if they can see an immediate, tangible benefit.

"Most best practices for personal cybersecurity don't come with strong, immediate motivating factors for consumers unless they look at the big picture," Piazza said.

The consumer is not to blame, Juniper's Hahad contends. "Cybersecurity professionals would like to enlist the help of consumers in limiting or mitigating cybersecurity risk, but we cannot hold them responsible for things they do not understand," he said.

The onus, in his view, is on businesses to ensure cybersecurity, for themselves and consumers.

Higher Standards for Passwords

"We would like consumers not to keep default passwords, but we'd rather require companies not to allow default passwords to persist," Hahad said.

"We can ask consumers to choose stronger passwords, but we'd rather have services refuse a weak password. We can ask consumers to not reuse passwords, but we'd rather have a consortium checking passwords are not being reused across sites or services," he explained.

One way around this is to implement privacy by design, which is the new normal when designing software, websites and services, Piazza commented.

"While consumers can't be legally forced to follow security best practices, government regulations will force organizations to employ better safeguards, which in turn will result in more enforced policies surrounding user password selection, the use of multifactor authentication, and other aspects of the consumer authorization workflow," he concluded.

作者:Richard Adhikari

原文网站:https://www.technewsworld.com/story/86863.html

本文系外文翻译,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文系外文翻译,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

评论
登录后参与评论
暂无评论
推荐阅读
编辑精选文章
换一批
MySQL 8.0 之Index Skip Scan
MySQL 8.0.13开始支持 index skip scan 也即索引跳跃扫描。该优化方式支持那些SQL在不符合组合索引最左前缀的原则的情况,优化器依然能组使用组合索引。
用户1278550
2020/06/10
2.6K1
第19期:索引设计(哈希索引数据分布与使用场景)
哈希索引显式应用主要存在于内存表,也就是 Memory 引擎,或者是 MySQL 8.0 的 Temptable 引擎。本篇的内容上都是基于内存表,MySQL 内存表的大小由参数 max_heap_table_size 来控制,其中包含了表数据,索引数据等。
爱可生开源社区
2021/01/13
3520
第21期:索引设计(函数索引)
通常来讲,索引都是基于字段本身或者字段前缀(第 20 篇),而函数索引是基于字段本身加上函数、操作符、表达式等计算而来。如果将表达式或者操作符也看做函数的话,简单来说,这样的索引就可以统称函数索引。
爱可生开源社区
2021/02/26
8150
第21期:索引设计(函数索引)
MySQL中的自增列
当然基于MySQL自增列的实现,确实是不够优雅,在新的版本还在持续引入新的特性。比如MGR里面,自增列的步长大了许多,默认是7了,这是在设计的时候考虑了MGR的节点数,提前做了预留,大多数情况下我们可以避免大量的预留值浪费。
jeanron100
2018/07/26
2.5K0
MySQL中的自增列
第24期:索引设计(多值索引的适用场景)
多值索引和基于多个字段的联合索引完全不同,联合索引是基于多个一维字段,比如字段 r1 int, r2 int,r3 int,这三个字段的组合是联合索引。一般用于三个字段的联合查找,比如 r1 = 1 and r2 = 2 and r3 = 2 等等。
爱可生开源社区
2021/04/07
6980
新特性解读 | 8.0 新增 DML 语句(TABLE & VALUES)
资深数据库专家,专研 MySQL 十余年。擅长 MySQL、PostgreSQL、MongoDB 等开源数据库相关的备份恢复、SQL 调优、监控运维、高可用架构设计等。目前任职于爱可生,为各大运营商及银行金融企业提供 MySQL 相关技术支持、MySQL 相关课程培训等工作。
爱可生开源社区
2020/03/26
7070
第20期:索引设计(前缀索引)
这里主要介绍 MySQL 的前缀索引。从名字上来看,前缀索引就是指索引的前缀,当然这个索引的存储结构不能是 HASH,HASH 不支持前缀索引。
爱可生开源社区
2021/02/01
6560
第22期:索引设计(组合索引适用场景)
建立在多个列上的索引即组合索引(联合索引),适用在多个列必须一起使用或者是从左到右方向部分连续列一起使用的业务场景。
爱可生开源社区
2021/03/16
3180
第22期:索引设计(组合索引适用场景)
第23期:索引设计(组合索引不适用场景改造)
上篇文章已经详细介绍 MySQL 组合索引的概念以及其适用场景,这篇主要介绍 MySQL 组合索引的不适用场景以及改造方案。
爱可生开源社区
2021/03/16
2610
第23期:索引设计(组合索引不适用场景改造)
MySQL重大Bug!自增主键竟然不是连续递增
AUTO_INCREMENT=2,表示下一次插入数据时,若需要自动生成自增值,会生成id=2。
JavaEdge
2021/12/07
3.6K0
MySQL重大Bug!自增主键竟然不是连续递增
MySQL8索引篇:性能提升了100%!!
今天我们一起来聊聊MySQL 8.x版本中新增的三大索引。MySQL 8.x中新增了三种索引方式,这三种索引方式直接让MySQL原地起飞了,如下所示。
冰河
2022/06/15
2.7K0
第08期:有关 MySQL 字符集的注意事项
创建数据库时,显式指定字符集和排序规则,同时,当切换到当前数据库后,参数 character_set_database,collation_database 分别被覆盖为当前显式指定的字符集和排序规则。举个简单例子,创建数据库 ytt_new2,显式指定字符集为 latin1,同时排序规则为 latin1_bin。之后在切换到数据库 ytt_new2 后,对应的系统参数也被修改。
爱可生开源社区
2020/07/13
7140
浅析MySQL存储引擎序列属性
墨墨导读:为了达到标识的目的,许多应用程序需要生成唯一编号,比如:商品编号、交易流水号等。MySQL数据库同样能够支持这样的需求场景,AUTO_INCREMENT就是为MySQL实现序列的方式,它会自动生成序列编号。
数据和云
2020/09/14
1.5K0
第 49 期:根据 EXPLAIN EXTRA 栏提示进行优化(一)
经过前面篇幅的持续阅读,相信大家对 MySQL 的执行计划已经有了一个较为深入的理解。本篇将对传统执行计划输出结果里的 Extra 栏进行逐步解析,从而使得大家更进一步的了解 MySQL 的 SQL 优化过程。
爱可生开源社区
2025/01/15
380
第 49 期:根据 EXPLAIN EXTRA 栏提示进行优化(一)
MySQL 8.0 之不可见列
可以看到,我们的SQL里面创建了一个表t2的字段有id、name和age,其中,age字段设置了不可见属性。
AsiaYe
2021/06/09
1.5K0
MySQL 8.0 之不可见列
第09期:有关 MySQL 字符集的乱码问题
相信大家通过前几篇文章,已经了解了 MySQL 字符集使用相关注意事项。那么数据乱码问题在这儿显得就非常简单了,或许说可能不会出现这样的问题。
爱可生开源社区
2020/07/24
1.4K0
mysql8.0性能_oracle scan ip
MySQL从8.0.13版本开始支持一种新的range scan方式,称为Loose Skip Scan。该特性由Facebook贡献。我们知道在之前的版本中,如果要使用到索引进行扫描,条件必须满足索引前缀列,比如索引idx(col1,col2), 如果where条件只包含col2的话,是无法有效的使用idx的, 它需要扫描索引上所有的行,然后再根据col2上的条件过滤。
全栈程序员站长
2022/08/04
5390
innodb锁机制再探
当我们使用如上所述的语法的时候,这两种方式在事务(Transaction) 进行当中SELECT 到同一个数据表时,都必须等待其它事务数据被提交(Commit)后才会执行。
AsiaYe
2019/11/06
4220
innodb锁机制再探
第 50 期:根据 EXPLAIN EXTRA 栏提示进行优化(二)
接着上一篇继续,依然是举例说明 EXPLAIN EXTRA 提示栏里的相关释义,这些提示将有助于我们更好的理解 SQL 语句在 MySQL 里的具体执行计划。
爱可生开源社区
2025/01/22
740
第 50 期:根据 EXPLAIN EXTRA 栏提示进行优化(二)
mysql轻快入门(3)
有一种情况,你忘记数据库密码啦,你怎么办,砸电脑吗?no..... 请见下: select host,user,password from mysql.user; update mysql.user set password=password('123') where name='root';
py3study
2020/01/09
3250
推荐阅读
相关推荐
MySQL 8.0 之Index Skip Scan
更多 >
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档
查看详情【社区公告】 技术创作特训营有奖征文