13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015Of course, one can always argue that the bad guys get more attention because they are bad, andthat it is merely human nature to take an interest in things that might be harmful. But, we askedourselves, do people actually learn anything from all the excitement? Once again we turned toour data, asking which breaches and vulnerabilities caused the most excitement in 2014.We saw human nature at work—particularly the parts of human nature easily bored when thesame thing (or nearly the same thing) happens repeatedly, as well as the parts that like lookingat unclothed people. Our comparison of four high-profile breaches (Target, Home Depot,Goodwill, and the theft of certain celebrity photos from Apple’s iCloud service) indicated thatthe photo scandal utterly dwarfed the others in public interest. More interestingly, of the otherthree breaches, Target (chronologically the first of the four) garnered the most attention, eventhough each of the remaining two were similar in either size (Home Depot) or demographic(Goodwill). Discussion of Target during the 2014 holiday season—a full year after the initialattack—far outstripped that of the other breaches. We expected to see that Target had raisedconsciousness about breaches; instead, a sort of burnout appeared to take place, with presspaying less attention to subsequent events but looping back near the anniversary of the originalbreach to reflect.[Editors’ note: As noted, our data was gathered and analyzed during the first eleven monthsof 2014. Ironically, at the time we were putting the Report together for publication, the Sonybreach dominated not only tech but entertainment and political headlines. We have no doubtthat with all that going on it would have posted some impressive numbers, but we concludedthat far too much was in motion to provide a fair assessment of its impact for this Report.]Despite the strong showing of malware and related terms, we found that the Internet as a wholetook more interest in specific breaches than in specific vulnerabilities. Heartbleed, the mostreferencedvulnerability of the year by several orders of magnitude, barely garnered the levelof interest attracted by a moderately attention-getting breach such as that of JPMorgan Chase,and nothing like that of a Home Depot or a Target. In turn, Target at its most interesting wasput in the shade by the celebrity-photo story. We did note that the photo story caused interestin celebrity photos themselves to spike, causing references to such things to spike by about athird.What can <strong>security</strong> practitioners learn from this exercise? Where might one go with a Big Datafueledanalysis of <strong>security</strong> trends? One obvious path would be to deep-dive in tech-supportthreads and other venues where bugs are described, in search of <strong>report</strong>s that are not justbugs but probable <strong>security</strong> holes. At the moment, such forums can be useful reading to canny<strong>research</strong>ers, but the signal-to-noise ratio is poor; introducing efficiencies into sifting that datacould be fruitful and might help companies with popular software to spot potential troublebefore it spots them. Taking a more proactive tack, robust data analysis is already a powerfultool in the hunt to sift actual attacks from the avalanche of noise the average network’sparameter defense “hear” every day. As the <strong>security</strong> industry waits for automated <strong>security</strong> dataexchange platforms to truly come to life, data analysis can provide us what those not-yet-viablesystems cannot.On the other end of the complexity spectrum, as we considered the possibilities for this RiskReport, one of our colleagues noted with disgust that some journalists seem to treat Google’ssearch-autocomplete function as some sort of Big Data-driven hivemind oracle. However, whatmakes for lazy journalism can provide an excellent reminder of the foundational questions atthe base of <strong>security</strong> practitioners’ work:Indeed. As we present our analyses of the threat landscape throughout this Report, we arereminded that what we examine, decide, and do is important. And a management problem.And, truly, so important.7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!