unix and linux operating commands

Protect or exploit?

 
Thread Tools Search this Thread
# 1  
Old 02-27-2010
Protect or exploit?

The perennial discussion about the value of risk analysis has broken out yet again over on CISSPforum.  It's close to being classed as one of our zombie topics - the ones that we think we've successfully killed off after getting nowhere but some time later they arise from the grave to haunt us again, over and over.  I wouldn't mind so much but we seem to dance around the same old handbags every time:
  • Quantitative versus qualitative risk analysis - the pros and cons of each, and innumerable associated methods, tools and techniques 
  • Risk-based versus experience and good practice-based security investment decisions
  • Risk- or experience-based versus compliance-based decisions
  • All of the above versus risk-based standards such as ISO27k
  • The futility of any form of information security risk analysis if management can undermine any argument versus the need for us to be "risk-focused", for various reasons expressed with varying degrees of hand-waving
This afternoon, I'm contemplating a different argument, the contrast between what general business and financial managers think of "risk" versus what it means to CISSPs.  For management, risk is something to be embraced and exploited, where appropriate, because risk brings opportunity.  For CISSPs, risk is something to be avoided, controlled/mitigated or transferred because it is BAD.  We're worlds apart.

So, how about we turn our argument on its head: instead of asking "How can we best minimize information security risk X?", ask "How much information security risk X can the organization stand before it becomes intolerable?" or, for kicks, "How lucky do you feel?".  I find this kind of approach quite liberating, in a funny sort of way, a bit like extreme sports.  Extreme CISSPs deliberately take chances and enjoy the thrill that entails.  I'm not talking about being totally reckless - we're still CISSPs at heart, so we understand the value of contingency measures - but knowingly pushing the boundaries where appropriate, in the full knowledge that some of our risk-taking will fail (just as it will even if we are ultra-conservative!).  The key to success, as in extreme sports, is to know when to stop the game, but the difference with this approach compared to the usual risk-averse-verging-on-paranoid traditional play is that we are not automatically saying "No!" to everything, so if and when we do actually say "No!", it inevitably has more impact. 

Taking this a step further, it is fascinating to discuss such an approach with management, particularly as they have more at stake being the information asset owners, accountable for their protection and exploitation.  It may be counterintuitive, but I suspect a CISO who asks "How much information security can we do without?" stands just as good a chance of getting the funding she needs for critical projects as her more traditional peers - but with a very definite additional advantage, namely the genuine management support that we stick-in-the-muds so often lack.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Cybersecurity

CVE_2015_1692-1 is that an UNIX / Linux day zero exploit number?

I can't imagine they number day zero exploits all through the open source software, like a CVE number can be for GIMP, LIBREOFFICE, (Ubuntu) LINUX, FireFox etc. Could be an exploit of LINUX through FireFox, since its an HTML exploit? One LINUX exploit I know has an CVE number (the exploit... (0 Replies)
Discussion started by: galien8
0 Replies

2. Cybersecurity

found exploit mailserver through mailq?

First of all an appeal on all specialists to be understandfull with me, newbie. I have a RaQ 550 that I have to admin bymyself. I have executed mailq and found out that there are mails in the queu that I did not sent. Is someone exploiting my server? Here is an example of the report: ... (1 Reply)
Discussion started by: rolandk
1 Replies

3. Shell Programming and Scripting

php http exploit method - pbsync hack question

I'm dealing with a website that was recently blocked by the webhost because pbsync was found on the server. I'd like for someone to give me 'a tutorial' if you will or guidance on how they are able to accomplish the below scenario.. index.php consist primarily of these tables with the following... (2 Replies)
Discussion started by: phpfreak
2 Replies
Login or Register to Ask a Question