أخبار
Risk-analysis tools provide the big security picture 
10/17/2009

All computer security defense ultimately comes down to managing risk. Security admins implement various defenses, each of which should have its own cost/benefit analysis. The cost of the defense should not outweigh the estimated damage of the attack or exploit. For example, if buying anti-malware software for a 100 PCs costs $3,900 per year, but cleaning up the damage from a malware attack would cost only $2,000 per year, implementing the anti-malware software wouldn't make sense.

On the other hand, perhaps it would be reasonable to deploy anti-malware only on an external gateway server for the cost of $1,500 per year while being prepared to absorb the potential $250 cost of cleaning up a PC that gets infected by a USB storage stick. Computer security is rarely a binary decision -- it's shades of gray analyzed across the spectrum using risk analysis.

[ Learn how a rough economy creates opportunities for better IT security. | Tune in to the InfoWorld Security Central channel for the latest IT security news and reviews. ]

Lately, while working on several forthcoming product reviews, I've come across some software products that make risk assessment easier to visualize and to present to management. Probably the best example is Bit9's Parity whitelisting application-control program. Parity comes with a service that automatically recognizes 5 billion different files (according to Bit9) based upon their hash signature and other file attributes. Parity can recognize every relatively recent file made by Microsoft, Adobe, and Macromedia, as well as waves of lesser-known programs, including common hacking tools, such as Nmap, Pwdump, Cain & Abel, and so on.

Here's how it work: Parity first compares computers to a baseline "gold standard" image established by the administrator. As users install new software (or malware exploits), Parity is able to calculate a "drift" score for the computer. By accumulating all the drift scores for all the computers on the network, Parity can calculate an aggregate drift score.

Even better, Parity also calculates a file's threat risk. For example, if it were to find a new text editor, it would give the program a low threat rating, because it's unlikely to be involved with an exploit. But if Parity discovers an unauthorized peer-to-peer or popularly exploited program, that program's risk rating would be higher. And if it happens upon a hacking tool -- say pwdump, used to dump Windows password hashes -- that program would have a high risk rating, as would any identified malware program.

 

4