News

Current Web Security Standards Not Enough, Study Finds

Application security company Cenzic's recent report on Web security trends relayed a damning assessment of the IT security landscape that's prompting some to suggest the government should step in to give enterprises and individuals guidance on how to protect themselves.

One notable finding in Cenzic's "Web Application Security Trends Report," released Wednesday, is that the number of vulnerabilities reported in Q3 and Q4 of 2008 increased by 10 percent from the first half of the year to 2,835. Of those bugs, "a staggering 80 percent" pertain to Web applications, Cenzic said.

The report identifies 10 major vulnerabilities on the Web affecting Microsoft, Mozilla, Adobe and others, as well as the most common "vulnerability types," which include cross-site scripting holes, buffer overflows, orphan accounts, subpar session management and bad application configuration management.

Most of these vulnerabilities should be covered in the management-level mandates under Sarbanes-Oxley, HIPAA and Payment Card Industry (PCI) security standards. But each of these compliance objectives has been criticized in one form or another. PCI, for instance, came under criticism after a security attack last year at Hannaford Bros. and another one in January at Heartland Payment Systems. Both of those organizations were PCI standards-compliant -- and got hit anyway.

Mandeep Khera, chief marketing officer at Cenzic, said in an e-mail that Internet-based application weaknesses represent a virtual "gold mine" for hackers. The big problem, he contended, is the lack of centralized oversight of the national cybersecurity matrix.

"Perceived leniency from regulatory compliance bodies, coupled with lack of awareness about tools to prevent it, have allowed Web application vulnerabilities to become a blind spot for many organizations," Khera said.

Phil Lieberman, president of Los Angeles-based security vendor Lieberman Software, agreed that the current security environment warrants more unifying legislation that would allow individuals and organizations to fight back against those who attack their systems in real-time. 

"In effect, we need the creation of the concepts of self-defense, castle laws, as well as Good Samaritan laws for those that push back criminals and those that attempt to disrupt commerce and communication on the Internet," he said. "These would be laws that cover all civilian users of the Internet. As it now stands, civilians are prohibited from taking any action to stop attackers, and so are ISPs. We are all told to buy better firewalls, anti-virus, anti-malware, intrusion detection devices, and just take the punishment."

Pointing to Cenzic's findings that more than 75 percent of security attacks happen over the Web and over 80 percent of Web sites are severely vulnerable, Khera added, "We as a nation have to question our cybersecurity priorities."

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

comments powered by Disqus

Featured

  • Compare New GitHub Copilot Free Plan for Visual Studio/VS Code to Paid Plans

    The free plan restricts the number of completions, chat requests and access to AI models, being suitable for occasional users and small projects.

  • Diving Deep into .NET MAUI

    Ever since someone figured out that fiddling bits results in source code, developers have sought one codebase for all types of apps on all platforms, with Microsoft's latest attempt to further that effort being .NET MAUI.

  • Copilot AI Boosts Abound in New VS Code v1.96

    Microsoft improved on its new "Copilot Edit" functionality in the latest release of Visual Studio Code, v1.96, its open-source based code editor that has become the most popular in the world according to many surveys.

  • AdaBoost Regression Using C#

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the AdaBoost.R2 algorithm for regression problems (where the goal is to predict a single numeric value). The implementation follows the original source research paper closely, so you can use it as a guide for customization for specific scenarios.

  • Versioning and Documenting ASP.NET Core Services

    Building an API with ASP.NET Core is only half the job. If your API is going to live more than one release cycle, you're going to need to version it. If you have other people building clients for it, you're going to need to document it.

Subscribe on YouTube