All computer security defense ultimately comes down to managing risk.
Security admins implement various defenses, each of which should have its own
cost/benefit analysis. The cost of the defense should not outweigh the estimated
damage of the attack or exploit. For example, if buying anti-malware software
for a 100 PCs costs $3,900 per year, but cleaning up the damage from a malware
attack would cost only $2,000 per year, implementing the anti-malware software
wouldn't make sense.
On the other hand, perhaps it would be reasonable to deploy anti-malware only on
an external gateway server for the cost of $1,500 per year while being prepared
to absorb the potential $250 cost of cleaning up a PC that gets infected by a
USB storage stick. Computer security is rarely a binary decision -- it's shades
of gray analyzed across the spectrum using risk analysis.
[ Learn how a rough economy creates opportunities for better IT security. | Tune
in to the InfoWorld Security Central channel for the latest IT security news and
reviews. ]
Lately, while working on several forthcoming product reviews, I've come across
some software products that make risk assessment easier to visualize and to
present to management. Probably the best example is Bit9's Parity whitelisting
application-control program. Parity comes with a service that automatically
recognizes 5 billion different files (according to Bit9) based upon their hash
signature and other file attributes. Parity can recognize every relatively
recent file made by Microsoft, Adobe, and Macromedia, as well as waves of
lesser-known programs, including common hacking tools, such as Nmap, Pwdump,
Cain & Abel, and so on.
Here's how it work: Parity first compares computers to a baseline "gold
standard" image established by the administrator. As users install new software
(or malware exploits), Parity is able to calculate a "drift" score for the
computer. By accumulating all the drift scores for all the computers on the
network, Parity can calculate an aggregate drift score.
Even better, Parity also calculates a file's threat risk. For example, if it
were to find a new text editor, it would give the program a low threat rating,
because it's unlikely to be involved with an exploit. But if Parity discovers an
unauthorized peer-to-peer or popularly exploited program, that program's risk
rating would be higher. And if it happens upon a hacking tool -- say pwdump,
used to dump Windows password hashes -- that program would have a high risk
rating, as would any identified malware program.