The Current State of IT Security
Transcription
The Current State of IT Security
Current State of IT Security Fourth Annual Benchmark Study 2006 Report Carol Balkcom Product Manager, CompTIA Security+ securityplus@comptia.org Who is CompTIA? • CompTIA is a global trade association representing the interests of companies and individuals in the information technology industry • With approximately 20,000 members, CompTIA provides research, networking and partnering opportunities in 112 countries • Offers 11 “vendor-neutral” certification programs ranging from entry-level to two years of experience • CompTIA A+, Network+ and Security+ alone account for 788,000 certifications worldwide • Not just certification, special area-of-interest groups: Convergence, IT Services, e-Commerce, Public Policy Annual Security Research • Research into security issues since 2002 • TNS Prognostics, a professional research company, and an independent industry panel of IT professionals in varying industries and varying company size • 574 respondents for 2006 report Top Security Issues • Virus/worm attacks continue to be the most prevalent issue mentioned by IT workers (65% of respondents, just as in 2004 • Lack of user awareness was mentioned second most frequently (58%) • Remote access (e.g. VPN) and browser-based attacks were 3rd in importance at 48% of respondents Most Frequent Attacks On the other hand, the areas where attacks had actually occurred most frequently were weighted somewhat differently, as shown on the next slide… IT Security Breaches: Areas that most often experience security attacks in your organization In what area (s) does your organization most often experience security attacks? For example, in the area of VoIP, wireless, IM, etc. Denial of Instant None Service Remote Messaging 5% 4% access 3% 9% Virus/Worm 10% Sample comments: Web server Internet, email Email spam Virus infection from email Email with attachments Web portal, unauthorized user or attacks Other 29% Causing downtime Viruses Spyware Internet 10% Antivirus Wireless access 12% Wireless IM Email attachments 18% Wireless, outside vendors, virus, firewall problems VPN Worm, desktop security No. of Responses = 481 Remote access Email virus and worm intrusion From Symantec’s IMLogic Threat Center – Instant Message Threat Profile… “Last year had a dramatic increase in the number of instant messaging threats. With over 2,400 threats discovered in 2005, the year over year increase [over 2004] is nearly 1700%. IM worms are the driving force behind this spike. These threats are particularly fast to propagate and mutate making them an attractive option for malware authors.” Personnel and Policy • There was a 27% increase over 2004 in the number of companies that now employ a security administrator to enforce security policy, with 57% positive responses • But 41% of respondents still do not have a “comprehensive written security policy” Security breaches and their origin • The number of serious security breaches remained consistent between 2003 and 2005. • Irrespective of security policy status, four out of five serious IT security breaches in the last year were blamed on human error or combined human error and technical malfunction • Of the human error, 30% was attributed to lack of security knowledge or training 0-49 Employees IT Security Training: Staff with Computer Security Related Certification – By Company Size 50-249 Employees < 25% 18% < 25% 34% 25 - 49% 3% 50 - 74% 3% None 73% 75 - 100% 3% 25 - 49% 4% 50 - 74% 4% 250-999 Employees < 25% 39% 1,000-6,999 Employees 25 - 49% 10% 50 - 74% 6% < 25% 68% 25 - 49% 5% 75 - 100% 4% None 23% None 37% 75 - 100% 8% None 55% 75 - 100% 3% 7,000 Or More Employees 25 - 49% 16% < 25% 60% 50 - 74% 7% 75 - 100% 3% None 14% Range of Responses: 86 to 121 Question: What percentage of the IT staff at your organization have received security related certifications (such as CompTIA Security+, CISSP, SCP or CISM)? According to new research from IDC, the detection and prevention of outbound content that violates corporate policy and government and industry regulations is critical. This new security market segment, which IDC has termed outbound content compliance (OCC), will swell to $1.9 billion in 2009. IDC, November 30, 2005 Reporting, Training The Computer Crime and Security Survey for 2005, the 10th year of a study by the Computer Security Institute (CSI) and the FBI published the following: • On Training: Respondents from all sectors but hightech and federal government do not believe their organization invests enough in security awareness. • On Reporting: 38 percent of respondents experienced security intrusions but did not report them. – Reporting to law enforcement has declined over the years to 20 %. (Key reason: negative publicity.) Security Breaches and their cost • Consider the impact that specific breaches could have on customers: Network downtime (Virus / Denial of Service) Loss of productivity (Virus / Denial of Service / Spam) Lost data (Trojan Horse / Virus / Worm) Stolen data (Spyware / Social Engineering / Key Logger) Loss of competitive intellectual capital (Social Engineering) Increased IT support and troubleshooting overhead (All Breaches) Damaged Company reputation (All Breaches) Loss of customer confidence and loss of customers due to poor data protection (All Breaches) Non-compliance with regulations (such as SOX or HIPPA) resulting in punitive action (All Breaches) IT Security Breach: Cost of Security Breaches While respondents are most likely to indicate that there was no cost associated with their breaches, the median cost figure is put at over $11,000 for the last security breach and nearly $35,000 within last 12 months. Last Security Breach >$50,000 3% $10,001 - $50,000 5% Last 12 Months >$50,000 5% $0 49% $5,001 - $10,000 6% $10,001 - $50,000 8% $0 51% $5,001 - $10,000 6% $1,001 - $5,000 13% $501 - $1,000 9% $1,001 - $5,000 12% $1 - $500 15% $501 - $1,000 8% $1 - $500 10% No. of Responses = 494 No. of Responses = 493 Median = $11,460.69 Median = $34,885.12 Question: In actual dollars, what was the cost of your last security breach? (Please provide your best estimate) Question: In the last 12 months, how many major security breaches have occurred at your organization? Right to know IT Security Breach: Internal Policies Two-thirds indicate that they have a policy in place that addresses social engineering issues, and the same portion indicate that statistics regarding breaches are only available at the IT and Executive levels. Does your organization have an IT security policy in place addressing the issue of social engineering (e.g. not giving passwords out to someone over the phone)? How are statistics on information security breaches distributed within or by your organization? Confidential only IT/Exec access 67% Yes 66% Confidential employees only 22% No 34% Only anonymous information shared 8% No. of Responses = 557 Not confidential shared outside org 3% No. of Responses = 495 IT Security Overview: Security Enforcement Respondents are most likely to point to antivirus and firewalls/proxy servers here. There has been growth in those mentioning dedicated security administrators, compared to 2003; though respondents with these administrators tend to return results that are in line with the overall averages. 2005 95.8% Antivirus Disaster recovery plan 43.9% Intrusion Detection Systems 43.2% Required security training 29.4% Physical access control 29.1% Required security experience 20.6% Required security certification 19.5% Multi-factor authentication 19.3% Regular incident response drills 45.0% 42.3% 52.7% 49.2% 30.2% 35.6% 35.3% 35.4% 34.5% 21.8% 28.0% n/a n/a 24.4% 12.4% 23.5% 11.2% 9.4% 20% 40% 49.0% 30.2% 11.7% 9.8% 14.6% n/a Other 0.9% 0% 48.2% 51.5% 24.9% Penetration Testing 56.5% 44.7% 52.8% Change control process 90.8% 62.3% 56.5% Written IT Security Policy 95.5% 93.7% 62.4% Dedicated security administrator 2003 96.7% 90.8% Firewalls/Proxy Servers ISO 17799 Compliance 2004 60% 80% 100% No. of Respondents = 574 0% n/a 20% 40% 60% 80% 100% No. of Respondents = 427 0% 20% 40% 60% 80% 100% No. of Respondents = 888 Question: What technologies or practices are being employed at your organization to enforce security requirements? (Check all that apply) IT Security Overview: Security Services Outsourcing Firewall administration is the most commonly offshore outsourced security service – and respondents are most likely to indicate that this is done because it is more cost effective for their business. What types of security services are outsourced offshore? 54% Firewall administration Physical access control 29% Training 29% Other 0% No. of Respondents: 28 68% 21% More reliable Not enough resources to handle internally 21% Intrusion detection Forensics More cost effective for our business 32% Security architecture design Audits/penetration testing What were your reasons for outsourcing offshore? Not enough trained individuals on staff to handle 11% 14% 4% 4% Other 11% 20% 40% 60% 80% % of Yes Responses 100% 0% No. of Respondents: 28 11% 20% 40% 60% 80% % of Yes Responses 100% How do companies help mitigate security risk? IT Security Overview: Current Security Monitoring Measures This year, audits/penetration, lessons learns, and awareness/education tie as the most commonly mentioned measures currently in place for monitoring security performance over time. Systems baselines are much less prominent than in 2003. 2005 Audits/penetration 51.3% Lessons Learned 48.3% Awareness/education 48.3% Change control tracking Other 0% 53.4% 53.4% 54.9% 34.1% 44.3% 41.9% 19.5% 51.4% 20.6% 12.3% 15.0% 17.6% 18.5% n/a 2.8% 20% 40% 61.0% 56.4% 36.0% No measures currently in place 2003 48.7% 38.0% Systems baselines Forensics 2004 60% 80% 100% No. of Respondents = 503 0% 20% 40% n/a 60% 80% 100% No. of Respondents = 296 0% 20% 40% 60% 80% 100% No. of Respondents = 659 Question: What types of measures are currently in place at your organization for monitoring general security performance over time? (Check all that apply) Respondent Profiles: Budget Respondents are most likely to report that about 5% of their IT budget is spent on computer security, which is consistent with 2004 and 2003. The percentage of respondents indicating that they have spent nothing on security training/certification is slightly reduced from 2004. Percentage of IT Budget Spent on Computer Security 12% 12% 10% 0% 0% 35% 5% 42% 39% 18% 19% 19% 10% 5% 4% 5% 9% 11% 13% 2% 51-100% 1% 51-100% 0% 3% 0% 10% 9% 11% 20-50% 3% 45% 46% 29% 29% 31% 5% 15% 23% 15% 19% 20-50% 39% 10% 9% 11% 10% 15% Percentage of IT Budget Allocated for Security Training/Certification 2% 10% 20% 30% 40% % of Yes Responses 2005 2004 Range of Responses: 227-565 2003 50% 0% 10% 20% 30% 40% % of Yes Responses 2005 2004 Range of Responses: 223-560 2003 50% IT Security Training: Staff with Computer Security Related Training Administrator-level employees continue to be the most likely to receive security training. 77% Administrator Level Manager Level 53% 2003 77% 80% 54% 51% Director Level 50% 49% 34% Engineering Level 49% 49% 51% 41% 36% 37% 34% 42% Help Desk technicians Manager Level Project Managers 39% Product Developers 32% 27% 26% Executive Staff 31% 34% 26% 25% 20% 18% Other users 0% No. of Respondents = 477 2004 20% 40% 60% 80% 100% % of Yes Responses Question: What levels of staff generally receive security training at your organization? (Check all that apply) n = 291 n = 606 IT Security Awareness Training: Has It Reduced Number of Major Security Breaches? The overwhelming majority of respondents indicate that IT security awareness training has reduced the number of major security breaches suffered. Yes 84% No 16% No. of Responses = 183 Question: Do you think the number of major security breaches in your organization have been reduced since your organization’s security awareness training/education? (A major security breach is one that causes real harm, has confidential information taken, or if business is interrupted.) IT Security Awareness Training: One Thing to Improve (Sample Comments) More frequent reinforcement Understanding importance of maintaining privacy of customer data Keep records of scores and give more training to those that score low. Outlined accountability Recurring training Retention Keeping ahead of everyone else Emphasis on email and internet use. Pshing, scams, email virus's etc Security awareness training/education seems adequate. Tracking scores Enforcement of rules People could pay attention and make sure the physical security rules are followed Making it mandatory for users and administrators Ensure that everyone is serious about security. Comprehension Question: What is the most important thing that can be improved about your organization’s security awareness training/education? Training/Certification ROI • As a rule, respondents believe that there is significant return on investment (ROI) for security training and certification, with the median ROI at $10,000 or more. IT Security Training: ROI Median results for estimated ROI on security training and certification are similar, at $10,000 and $11,555; respectively. Average Response in US Dollars ROI on IT security training (193) $10,000 $6,135,334.80 ROI on security certification (148) $7,093,050.80 0 ( ) = No. of Responses Median Response 2000000 4000000 6000000 8000000 $11,555 10000000 US Dollars ($) Question: In your opinion, how much money has your organization saved, in total, by the improvement of IT security due to IT security training for the above issues? IT Security Training: Certification and Improved Security Nearly 60% indicate that staff certification has improved IT security – and in much the same ways as training (increasing awareness, boosting abilities at identifying potential risks, improving security measures, and increasing staff response time). Has staff security certification improved IT security? How has security certification improved IT security? Ability of staff to identify potential security risks 69% Increased awareness No 42% 65% 63% Better security measures 60% Ability of staff to respond quicker Yes 58% Fewer incidents 52% Better security policies No. of Responses = 278 Other 50% 1% 0% 20% 40% 60% % of Yes Responses No. of Respondents = 161 80% 100% CompTIA Security+ What is it? • A CompTIA Security+ certification validates technical knowledge required of foundation-level security practitioners. Who is it for? • Those with two years experience in networking • Those who hold CompTIA’s A+ and Network+ or equivalent certifications • Those who conduct daily, hands-on security analysis and prevention/remediation activities Employee benefits • Proven understanding of security best practices and proof of transferable skills. • Viable career path leading to high-level security jobs in enduser, security-specific and consultative organizations. Employer benefits • Increased employee job satisfaction, and reduced turnover. • Assurance that security will be handled by qualified professionals, leading to higher sales through enhanced customer trust. Security+ Founding Organizations • • • • • • • • • • • • • • • • VeriSign Symantec Entrust RSA Security Microsoft Sun Microsystems IBM / Tivoli Software Group Novell Olympus Security Group Motorola VCCS - Institute of Excellence for Information Technology Information Systems Security Association (ISSA) Information Systems Audit and Control Association (ISACA) • • • • • • • • • • • • • • • National Institute of Standards & Technology (NIST) Argonne National Laboratory U.S. Secret Service Federal Bureau of Investigation Cybersmuggling Center – U.S. Customs New Horizons Computer Learning Centers Course Technology Tech-Connect Ascendant Learning Marcraft International ElementK Sybex Security+ Recognition CompTIA Security+ is recognized as a requirement, recommended option or applicable credit in leading organizations and programs (partial list) • • • • • • • • • • • • • Microsoft • MCSA, MCSE, MCSA: Security, MCSE: Security Symantec Security Technology Architect IBM - Tivoli Software Sales and Security Staff Information Systems Audit and Control Association (ISACA) – CISM certification Information Systems Forensics Association (ISFA) – CIFI certification Network General – SCM (Sniffer Certified Master) Olympus Security Group – Professional Consultants Ascendant Learning – Security Certified Professional (SCP) Sun Microsystems – Professional Security Consultants Planet 3 Wireless HIPAA Academy CHSS program Hitachi Information Systems Verisign Detail: CompTIA Security+ • • Vendor-neutral (not product-specific) certification Developed with input from industry, academia and government from over 30 countries worldwide and covers these domains: • • • • • General Security Concepts Communication Security Infrastructure Security Basics of Cryptography Operational / Organizational Security Goal: Provide validation of two years practical experience with security on the path toward greater career advancement Discussion, questions Thank you!