官术网_书友最值得收藏!

Foreword – Why Mobile Security Matters

Information security programs frequently begin with the best of intentions: to coolly analyze risks and then to design, prescribe, and deploy security solutions for developers. The reality is that information security, writ large, usually devolves into a taillight-chasing exercise. These taillights are the vapor trails left by the latest breach or big name vulnerability.

On the Internet, information security has been playing a decades-long game of catch up. Developers innovate and the security teams rush behind to clean up as many vulnerabilities as they can find and solve. Yet, this fact has not clobbered businesses, many of whom are still able to carve out very profitable niches despite the threats on the Internet.

One of the reasons that the catchup game on web security has not proven fatal is the pace of development. When the web began in the mid-1990s, the security pros of that era quickly realized that they needed to ensure that they could separate the good stuff in the enterprise from the bad stuff on the web. To do this, they used a network firewall and set up the famous demilitarized zone (DMZ) pattern. To secure the last mile from the web server to the browser, they used SSL:

The firewalls + SSL pattern was not particularly resilient against threats such as SQL injection or cross-site scripting; however, it proved effective enough to protect the sites in the 1990s. The reason for this is that the websites in the early days were mainly brochureware. Therefore, as the developers continued to innovate dynamic websites with ASP and JSP, along with three-tier architecture, web services, and so on; the security teams had some lag time to revisit, revamp, and refresh their security services.

This is precisely what makes mobile security so dangerous. The early use cases for web apps were brochureware, and interactive databases were considered advanced (Paul Graham, the co-founder of Y Combinator, still dines out on this decades later), the net result here is that the security teams had time to catch up as early deployments were low-risk assets and as higher-risk items were added, there was some lag for the security to innovate.

In the case of mobile, it's the opposite. The early mobile use cases and apps are not low-risk, they are among the highest-risk use cases that you can imagine—mobile banking, connecting to medical devices, mobile payments, and direct access enterprise backends. The knock-on effect here is that the old information security catch up game, where the developers incrementally innovate and the security teams catch up, cannot work any longer. The move to mobile is not the developers and businesses dipping toes in the water, its jumping headlong off the diving board; security needs a fresh approach. Security teams cannot be bystanders, interested observers, or walking behind the elephant with a broom any more.

For mobile, the security teams must be the core engineers, deeply intertwingled with design, development, and deployment of the effective security capabilities.

Gunnar Peterson

Security Architect and blogger

http://1raindrop.typepad.com

主站蜘蛛池模板: 新野县| 永嘉县| 若羌县| 资兴市| 永顺县| 合川市| 南木林县| 牟定县| 益阳市| 横峰县| 衡水市| 米泉市| 九江市| 措美县| 惠来县| 浦江县| 双辽市| 和硕县| 咸丰县| 嘉义市| 安塞县| 宜都市| 正安县| 辽宁省| 安溪县| 裕民县| 专栏| 沅陵县| 集安市| 托克逊县| 江陵县| 巨野县| 麻江县| 沐川县| 巩义市| 钟祥市| 南木林县| 历史| 古浪县| 筠连县| 旬阳县|