<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; server</title>
	<atom:link href="https://javacard.vetilles.com/tag/server/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Live from JavaOne: Making the Business Case for Security</title>
		<link>https://javacard.vetilles.com/2010/09/21/live-from-javaone-making-the-business-case-for-security/</link>
		<comments>https://javacard.vetilles.com/2010/09/21/live-from-javaone-making-the-business-case-for-security/#comments</comments>
		<pubDate>Mon, 20 Sep 2010 22:54:22 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[server]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=601</guid>
		<description><![CDATA[This session is about selling security internally. This was my first session from Oracle OpenWorld, by Oracle people, and I expected it to be from the database&#8217;s point of view. It was true, but the part I liked most was in fact from a business guy, with no relationship to databases. The database view was [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This session is about selling security internally. This was my first session from Oracle OpenWorld, by Oracle people, and I expected it to be from the database&#8217;s point of view. It was true, but the part I liked most was in fact from a business guy, with no relationship to databases.</p>
<p>The database view was a bit confirmed from the data they selected to explain their point, from a <a href="http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf" class="lipdf">study about data breaches</a> conducted by Verizon Risk team together with U.S. Secret service.</p>
<p>In this report, the two standout types of hacking responsible for the majority of breaches and stolen records in 2009 are SQL Injection and Stolen Credentials. Both are involved in a very large proportion of breached records (<em>i.e.</em>, really successful hacks).</p>
<p>In addition, the report outlines that high value target systems are databases and file servers, rather than Web Apps or mail servers. The presenters also pointed at www.datalossdb.org, which actually looks quite interesting.</p>
<p>Now, here is the part of the presentation I liked most, delivered as almost raw notes:</p>
<p>The main issue is that business people don&#8217;t realize the potential costs of security breaches, because of classical fallacies:</p>
<ul>
<li>No breaches will affect us</li>
<li>Regulations don&#8217;t move</li>
<li>Data breaches don&#8217;t hurt the brand</li>
</ul>
<p>The first problem is that high-level managers often have never experienced a problem directly. They think that their data is safe. But their data is not safe.</p>
<p>The second problem is ROI is hard to prove for security. We get stuck in potential losses, and probabilities, which are a hard sell.</p>
<p>Let&#8217;s start by the first problem. On a personal basis, we contract insurance, we install burglar alarms, <em>etc</em>. We do that because we can visualize a house burning down or a burglar coming in. That&#8217;s why we will do what it takes. But organizations don&#8217;t visualize. People visaulize. So, the first step is to make it personal.</p>
<p>The first question about data breaches used to be: &#8220;what would happen if you had an information breach&#8221;? Now, it is &#8220;What would you do <em>personnally</em> if you have to deal an information breach? To your job, your life?&#8221;. Get the guys thinking about potential effects on themsleves.</p>
<p>For the second problem, remember who the enemy is. The enemy is not the hacker at that time; the enemy is ignorance, confusion, doubt, complacency, ROI.</p>
<p>In the art of war, Sun Tzu says &#8220;to defeat the enemy, you have to defeat their plan&#8221;.  To the ignorant and confused, education is the key, and there is a lot of material our there. Complacents and doubters are more difficult, and they can&#8217;t be taken directly. You need to find allies, figure out who else cares about data security. For instance, internal audit can be powerful; the owners of the data can also be concerned. And remember, take them personnally. And when you have the army, you can confront your complacent/doubter. This can work on everybody, because everybody, even a CEO, listens to someone; you just need to find the right person.</p>
<p>Now, for ROI, we need to look at the ways in which an investment may be rewarding.</p>
<ul>
<li>The easiest case is compliance, when there is a standard. There may also be cutting costs, increasing revenue, improving processes, or reducing risks. How do we do it?</li>
<li>Increase revenue. Possibly by better leverage data, share it with partners, add more confidential data. Security is needed there.</li>
<li>Cutting costs, or increase efficiency. Things can go better if payment information is readily available, which means abiding to more compliance standards.</li>
<li>Improving processes. For instance, by outsourcing IT: f your data is sourced in the EU, you better be able to prove that you respect EU privacy policies.</li>
<li>Reducing risk. This is our usual favorite, still present. Breaches are costly, so this gets back to cost reduction.</li>
</ul>
<p>Finally, three reminders:</p>
<ul>
<li>We need to escape from strict ROI, because if we don&#8217;t, we are missing four out of five reasons that justify investments.</li>
<li>We also need to make things personal, to make people visualize potential issues.</li>
<li>Finally, we need to remind that many processes can be slowed down/hampered by missing data security. Associate security with real projects.</li>
</ul>
<p>The last part of the presentation was about mitigating the problem. There has been many Oracle product references, which are not mentioned here.</p>
<p>It started with stolen credentials: keyloggers/spyware, social engineering/guessing, network sniffer, â€¦ What can we do about these attacks?</p>
<ul>
<li>Frequent password rotation. Come on, we wll know it doesn&#8217;t work, at least not by itself.</li>
<li>Strong and/or multi-factor authentication. Will work, but often unpractical, and sometimes expensive, especially is specific hardware is required. I guess that the smart card industry has some communication to do about the benefits of smart cards; maybe that the business part of this presentation can help us.</li>
<li>Stronger credentials. Reduce number of passwords, so it&#8217;s possible to make them stronger, and possibly change them  on a reasonable basis. In another direction, use certificates.</li>
<li>On another diimension, use multi-factor authorization (acces granted only if from the right user, right location, right time, â€¦); this reduces the potential exploitation of stolen credentials.</li>
<li>On a similar direction, encrypt data at rest and in motion. That can block illegal accesses, even from DB administrators.</li>
</ul>
<p>For SQL injection, things are a bit easier. Threat vectors are mostly input validation failure and inadequate access control. The first one is under the responsibility of the application, and the second one gets us back to the access control. One interesting idea is to use behavior profiling on applications, in order to create a white list of actions allowed for a given application.</p>
<p>Overall, a very interesting session. In the questions, a Gartner guy noted that there were only about 50 persons in the room, which shows that nobody cares about security. I replied to him that most security-related sessions in Oracle Develop and JavaOne were full, in particular if their description includes the word &#8220;threat&#8221;. This actually proves the usefulness of the session: technical people are aware, suits aren&#8217;t.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/09/21/live-from-javaone-making-the-business-case-for-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
