SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
LAZgroup SA - Business and Technology Solutions
                                                      www.lazgroup.com support@lazgroup.com +41794822839
                                                      Rue du Cendrier 15, 1211 Geneva, Switzerland




    IT risks associated with outsource of Penetration Testing
                        (Ethical Hacking)

                                                   Written by Dr.Kretov Kirill from LAZgroup SA



Introduction
Presently, the idea that information governs the world is not anything new. The swifter and
quicker business develops its technological and information framework, the higher is the risk
of malicious access to the information. Commercial, financial, managerial, HR and other
information is of interest not only for the company where it is created and used, but also for
its competitors, and for people who can take hold of it for the purpose of further unauthorized
usage and resale. The need for data security is always growing.
Data security is a state of data protection when their integrity, availability and confidentiality
are ensured. Information integrity means that the information does not change when it is
stored or transmitted; availability means that authorized persons can use the information and
access it at any time; confidentiality means unavailability of information for those who are not
authorized for sufficient and lawful access to it.
Information audit can be used to ensure data security. Generally, audit is performed to
estimate the current level of data security, to assess possible risks during information storage
and use in the company, and also to determine high-priority measures that will minimize the
risks and information leakage threat. During audit, we reveal the security level provided in the
automated system, and collected statistics helps determine further steps to reach complete
information security in the company.
Security audit types include penetration tests (or "pentests") aimed at determination of various
vulnerability search methods and ways for intrusion into company' information systems from
the outside, for example, via the Internet. Penetration tests are mainly performed to estimate
the overall company level of protection from external threats and directed attacks, and also to
document the actions and to create a report on them.
In most cases, the testing procedure consists of three steps, and each of the steps includes a
number of quite specific jobs. The first step covers operations planning and preparation. The
second step includes penetration into the automated system itself, and the third step is report
creation and, possibly, recommendations to improve data security.
More often, a company admits penetration testing when it needs to evaluate possible damage
from malicious activities, to estimate the security level of specific company information
assets, to determine the most vulnerable places in the information security system or to assess
the measures taken by the company staff members in case of penetration attempts.
However, one must not think that the testing procedure guaranties complete security for the
company. Sometimes this is not true, as long as any penetration attempt may cause
unexpected and crucial results for the audited company. This article is intellectual property
lazgroup.com. There are two major groups of risks we should always keep in mind.
LAZgroup SA - Business and Technology Solutions
                                                     www.lazgroup.com support@lazgroup.com +41794822839
                                                     Rue du Cendrier 15, 1211 Geneva, Switzerland


Risks due to the Testing Company
The first group of risks is caused directly by the company that performs the security audit in
the customer company. In other words, a company wishing to have reliable data security
checks whether the information is accessible from the outside by intentionally making it
accessible, because a lot of vulnerabilities are usually revealed during pentests and testers
access the protected data.
Is it actually so bad? If the customer wishes to have penetration tests performed, the Customer
signs a non-disclosure agreement with the testing company. Despite that the most of
companies think this is enough, each penetration test brings additional risks. We should keep
in mind that each auditor group consists of persons, and the human factor cannot be ignored.
First of all, it is the human factor that makes different penetration testing companies perform
pentests differently. Thus, vulnerabilities that can be revealed by one group will remain
unknown for another group, and vice versa. That is why, logically, you cannot completely
rely on the results of penetration tests to ensure information security. Real penetration threat
exists anyway, as long as different groups and different hackers can apply various methods to
the revealed vulnerabilities. In other words, such testing will not fully guarantee security in
the customer company.
Even when the testing is finished and vulnerabilities have been found in the customer
automated system, the testing company can simply save the obtained information on the
software, network structure, etc. or conceal some vulnerabilities from the customer. Also, the
tested company will now be open to all risks of the auditing company.
The point is that it is too hard to maintain security within the company. And the risk that
employees of the testing company – for example, after they're fired – will use the information
to their own benefit or to the benefit of competitors. This is not a rare situation, and the
statistics for such cases, unfortunately, do grow.
Often, client information leaks from companies that trust too much to their IT service
providers (the latter can be outsourcing companies, processing centers, security audit
companies). According to the American telecommunication company Verizon
Communications, more then a half of all known information leaks in restaurant and retail shop
networks and other organizations that, for whatever reasons, cannot afford high-grade IT staff,
are due to unfair partners from the outside or the companies offering information security
audit services.
Here is a specific example. In 2009, the owner of a large IT company in the USA engaged in
information audit and outsourcing services was accused of theft of confidential data of more
than 8 million people. All information was coming from large serviced companies, and the
investigation revealed that the created database was intended for sale to competitors. Details
of what data had been stolen, and the list of the aggrieved organizations were not published in
the interests of the investigation, but it was known for sure that during the audit, information
on the organizations network operation was carefully gathered for the purpose of further
illegal use and theft.
As illustrated by the examples, unfair companies among those who can render information
audit services are not a rare exception. And though data leakage due to own company
employees or insiders seems the most probable, it usually does not make sense to impose the
company to additional risks for the sake of false safety feeling.
LAZgroup SA - Business and Technology Solutions
                                                      www.lazgroup.com support@lazgroup.com +41794822839
                                                      Rue du Cendrier 15, 1211 Geneva, Switzerland


Even when you do need penetration testing from the outside, you must first carefully examine
reputation of the company to conduct the research. But the company's reputation is not
enough. Find out as much as possible about the company management and technicians.
Because even a perfect-reputation company that provides high-quality security audit services
might employ persons who secretly help competitors with the main intention of accessing the
protected information without testing interruption.
Part of information being used internally by the company has a long lifespan, meaning that if
such information becomes available to anyone else even after a few months, the company will
still suffer essential losses. Thus, one must be very careful when attracting external human
resources and pay attention not only to their skills, cost and quality, but also to potential
consequences of granting them access to the company information assets.
Another threat during penetration tests is the investigation of various attack scenarios.
Employees of the auditor company can document only some of the vulnerabilities revealed in
the information protection system, while the remaining vulnerabilities can still be used by
hackers.

Technical Risks
Even when penetration tests bring good results, eliminating lots of vulnerabilities, they still do
not guarantee that information will remain inaccessible in a few days, weeks, or months. The
point is that new vulnerabilities arise every day, new types of attack are used, and even some
old vulnerabilities can be utilized a-new with the course of time. No information security
organization can possess the complete information on all vulnerabilities. That is why
vulnerabilities that will be used tomorrow may strongly differ from the existing ones.
By providing fast operation in data networks and using the Internet in daily activities,
companies make their business more effective and flexible, on the one hand, but at the same
time, increase the risks, because absolutely secure systems do not exist. Failures of network
protocols and services, faults in network equipment operation may cause not only direct
financial losses to the company, but also loss of reputation, the latter being a more serious
harm for many large companies means as compared to financial losses. Information security
becomes more and more important, since more and more services allow maintaining customer
relations directly via the Internet.
Usually, vulnerability means that the malicious user can make the application perform
operations for which user has insufficient or no rights at all by issuing a corresponding
command. And though there are detection tools for different types of vulnerabilities, they can
never substitute a person's experience during information security research.
In the attempts of security provision, management of many companies often makes severe
errors that may result in further serious consequences for the company. Among them are:

      The company's staff is excessively confident in reliability of the security technologies
       used.

      Accurate technical information on the security level does not exist.

      There is no clear information security policy.

      IT department staff qualification is insufficient.
LAZgroup SA - Business and Technology Solutions
                                                      www.lazgroup.com support@lazgroup.com +41794822839
                                                      Rue du Cendrier 15, 1211 Geneva, Switzerland


      This article is intellectual Property of Dr. Kretov Kirill, the founder of LAZgroup SA

      The personnel wrongly think that there is no important information for hackers in the
       company's information system.

      The personnel wrongly think that company's web site/server cracking will not result
       in serious losses.

Based on of last-year statistics gathered during analysis of almost 12 thousand of various
programs and web applications, more than 97 thousand vulnerabilities has been found. They
differ in their threat level, but more than a half of them are urgent and critical, the data from
13% of systems can be automatically compromised. In the course of detailed testing, the
probability of revealing critical vulnerabilities reaches extreme rates – from 80% to 96%.
Any company can suffer from cyber attacks regardless of its business. Of course, hackers are
mainly interested in large organizations, but small companies usually suffer more severe
damages from such illegal activities. Small companies, as well as mid-sized businesses, often
suffer from harmful software and viruses, which are becoming harder to neutralize. Note that
data security companies themselves are often the target for directed network attacks.
Interesting statistics has been published by Ponemon Institute. The research, in which the
information received from 45 large American companies had been used, showed how great
are the losses of a company from attacks using the vulnerabilities in the information system.
On the average, companies lose a little less than four million dollars per year due to such
faulty conditions, and this figure ranges from one million for medium-scale companies to 52
million dollars. Struggle against network data leakages, attacks of companies' web sites and
online services, and also harmful software distribution, constitutes the lion share of costs for
information security maintenance. But nevertheless, the studied companies had been exposed
to more than 50 successful attacks per week during which hackers could have plundered the
data.
As proved by the above impressive statistics, hackers do their criminal business with
impunity. While competition in this field grows, prices for computer network cracking and
information theft fall, but hackers' proficiency continues to increase. Among all hackers, no
more than ten persons are exposed to criminal liability a year, and for some frauds with a
mullions-strong turn the hackers are subject to conditional prison sentence. Experts think that
such avalanche-like growth of criminality in information technologies is a considerable threat
for any business.

Conclusion
In conclusion, we have to emphasize the fact that the situation in the field of information
protection is rapidly changing, and a company must response to each change as promptly as
possible. Any new vulnerability revealed, any weakness of an anti-penetration system may
result not only in direct financial losses, but also in irrevocable loss of partner reputation,
which is often much more important.
Hackers' arsenal grows with new complicated software and hardware, and their proficiency
has long ago advanced the proficiency of an average employee in an IT or information
security department. A company can protect itself from possible threats only by constantly
paying attention to network and other resources integrity and security. As for now,
LAZgroup SA - Business and Technology Solutions
                                                      www.lazgroup.com support@lazgroup.com +41794822839
                                                      Rue du Cendrier 15, 1211 Geneva, Switzerland


vulnerabilities have been found out in all operating systems. Once again, this is to prove that
no absolute security can be guaranteed, and will not be guaranteed in the nearest future.
But you can keep your risks at a minimum. For this purpose, prompt staff response in case of
threat detection is crucial, as well as timely installation and update of anti-virus software and
firewalls, installation of all critical and essential operating systems updates. Staff overall
awareness on the recent known vulnerabilities, viruses and harmful software is also important.
Many organizations resort to penetration tests as the last possible measure. But now, this
measure is expensive and ineffective. During such test, only part of existing vulnerabilities
will be discovered, meanwhile new methods for information security breaks appear almost
every day. One must understand that even a large company providing computer audit services
may be exposed to its own internal data leakage risks. Entrusting such company with detailed
information about network structure, operations and protocols basically means taking and
covering all risks of the company. So, penetration tests usually grant you false, illusory safety.
Internal network audit methods are more effective than penetration testing. A company must
use software for access restriction, user activity monitoring and data encryption, and also
network activity logs must be monitored on a regular basis. This is a necessary condition for
keeping the information loss risk at an acceptable minimum.

                          Written in January 2010 by Dr.Kretov Kirill specially for LAZgroup SA

Más contenido relacionado

Destacado (9)

Evaluation 3
Evaluation 3Evaluation 3
Evaluation 3
 
Artículo evaluation of air heater performance and acurracy of the results
Artículo   evaluation of air heater performance and acurracy of the resultsArtículo   evaluation of air heater performance and acurracy of the results
Artículo evaluation of air heater performance and acurracy of the results
 
Childcare subsidies
Childcare subsidiesChildcare subsidies
Childcare subsidies
 
Secretele Siluetei super
Secretele Siluetei superSecretele Siluetei super
Secretele Siluetei super
 
evaluation-(5/7)
evaluation-(5/7)evaluation-(5/7)
evaluation-(5/7)
 
Acmanual ww8
Acmanual ww8Acmanual ww8
Acmanual ww8
 
CÉCS - Rapport financier - 2015/2016
CÉCS - Rapport financier - 2015/2016CÉCS - Rapport financier - 2015/2016
CÉCS - Rapport financier - 2015/2016
 
CÉCS - Annual Report 2015-2016
CÉCS - Annual Report 2015-2016CÉCS - Annual Report 2015-2016
CÉCS - Annual Report 2015-2016
 
Marty, You're Just Not Thinking Fourth Dimensionally
Marty, You're Just Not Thinking Fourth DimensionallyMarty, You're Just Not Thinking Fourth Dimensionally
Marty, You're Just Not Thinking Fourth Dimensionally
 

Lazgroupcom_Itrisksassociatedwithpenetrationtesting

  • 1. LAZgroup SA - Business and Technology Solutions www.lazgroup.com support@lazgroup.com +41794822839 Rue du Cendrier 15, 1211 Geneva, Switzerland IT risks associated with outsource of Penetration Testing (Ethical Hacking) Written by Dr.Kretov Kirill from LAZgroup SA Introduction Presently, the idea that information governs the world is not anything new. The swifter and quicker business develops its technological and information framework, the higher is the risk of malicious access to the information. Commercial, financial, managerial, HR and other information is of interest not only for the company where it is created and used, but also for its competitors, and for people who can take hold of it for the purpose of further unauthorized usage and resale. The need for data security is always growing. Data security is a state of data protection when their integrity, availability and confidentiality are ensured. Information integrity means that the information does not change when it is stored or transmitted; availability means that authorized persons can use the information and access it at any time; confidentiality means unavailability of information for those who are not authorized for sufficient and lawful access to it. Information audit can be used to ensure data security. Generally, audit is performed to estimate the current level of data security, to assess possible risks during information storage and use in the company, and also to determine high-priority measures that will minimize the risks and information leakage threat. During audit, we reveal the security level provided in the automated system, and collected statistics helps determine further steps to reach complete information security in the company. Security audit types include penetration tests (or "pentests") aimed at determination of various vulnerability search methods and ways for intrusion into company' information systems from the outside, for example, via the Internet. Penetration tests are mainly performed to estimate the overall company level of protection from external threats and directed attacks, and also to document the actions and to create a report on them. In most cases, the testing procedure consists of three steps, and each of the steps includes a number of quite specific jobs. The first step covers operations planning and preparation. The second step includes penetration into the automated system itself, and the third step is report creation and, possibly, recommendations to improve data security. More often, a company admits penetration testing when it needs to evaluate possible damage from malicious activities, to estimate the security level of specific company information assets, to determine the most vulnerable places in the information security system or to assess the measures taken by the company staff members in case of penetration attempts. However, one must not think that the testing procedure guaranties complete security for the company. Sometimes this is not true, as long as any penetration attempt may cause unexpected and crucial results for the audited company. This article is intellectual property lazgroup.com. There are two major groups of risks we should always keep in mind.
  • 2. LAZgroup SA - Business and Technology Solutions www.lazgroup.com support@lazgroup.com +41794822839 Rue du Cendrier 15, 1211 Geneva, Switzerland Risks due to the Testing Company The first group of risks is caused directly by the company that performs the security audit in the customer company. In other words, a company wishing to have reliable data security checks whether the information is accessible from the outside by intentionally making it accessible, because a lot of vulnerabilities are usually revealed during pentests and testers access the protected data. Is it actually so bad? If the customer wishes to have penetration tests performed, the Customer signs a non-disclosure agreement with the testing company. Despite that the most of companies think this is enough, each penetration test brings additional risks. We should keep in mind that each auditor group consists of persons, and the human factor cannot be ignored. First of all, it is the human factor that makes different penetration testing companies perform pentests differently. Thus, vulnerabilities that can be revealed by one group will remain unknown for another group, and vice versa. That is why, logically, you cannot completely rely on the results of penetration tests to ensure information security. Real penetration threat exists anyway, as long as different groups and different hackers can apply various methods to the revealed vulnerabilities. In other words, such testing will not fully guarantee security in the customer company. Even when the testing is finished and vulnerabilities have been found in the customer automated system, the testing company can simply save the obtained information on the software, network structure, etc. or conceal some vulnerabilities from the customer. Also, the tested company will now be open to all risks of the auditing company. The point is that it is too hard to maintain security within the company. And the risk that employees of the testing company – for example, after they're fired – will use the information to their own benefit or to the benefit of competitors. This is not a rare situation, and the statistics for such cases, unfortunately, do grow. Often, client information leaks from companies that trust too much to their IT service providers (the latter can be outsourcing companies, processing centers, security audit companies). According to the American telecommunication company Verizon Communications, more then a half of all known information leaks in restaurant and retail shop networks and other organizations that, for whatever reasons, cannot afford high-grade IT staff, are due to unfair partners from the outside or the companies offering information security audit services. Here is a specific example. In 2009, the owner of a large IT company in the USA engaged in information audit and outsourcing services was accused of theft of confidential data of more than 8 million people. All information was coming from large serviced companies, and the investigation revealed that the created database was intended for sale to competitors. Details of what data had been stolen, and the list of the aggrieved organizations were not published in the interests of the investigation, but it was known for sure that during the audit, information on the organizations network operation was carefully gathered for the purpose of further illegal use and theft. As illustrated by the examples, unfair companies among those who can render information audit services are not a rare exception. And though data leakage due to own company employees or insiders seems the most probable, it usually does not make sense to impose the company to additional risks for the sake of false safety feeling.
  • 3. LAZgroup SA - Business and Technology Solutions www.lazgroup.com support@lazgroup.com +41794822839 Rue du Cendrier 15, 1211 Geneva, Switzerland Even when you do need penetration testing from the outside, you must first carefully examine reputation of the company to conduct the research. But the company's reputation is not enough. Find out as much as possible about the company management and technicians. Because even a perfect-reputation company that provides high-quality security audit services might employ persons who secretly help competitors with the main intention of accessing the protected information without testing interruption. Part of information being used internally by the company has a long lifespan, meaning that if such information becomes available to anyone else even after a few months, the company will still suffer essential losses. Thus, one must be very careful when attracting external human resources and pay attention not only to their skills, cost and quality, but also to potential consequences of granting them access to the company information assets. Another threat during penetration tests is the investigation of various attack scenarios. Employees of the auditor company can document only some of the vulnerabilities revealed in the information protection system, while the remaining vulnerabilities can still be used by hackers. Technical Risks Even when penetration tests bring good results, eliminating lots of vulnerabilities, they still do not guarantee that information will remain inaccessible in a few days, weeks, or months. The point is that new vulnerabilities arise every day, new types of attack are used, and even some old vulnerabilities can be utilized a-new with the course of time. No information security organization can possess the complete information on all vulnerabilities. That is why vulnerabilities that will be used tomorrow may strongly differ from the existing ones. By providing fast operation in data networks and using the Internet in daily activities, companies make their business more effective and flexible, on the one hand, but at the same time, increase the risks, because absolutely secure systems do not exist. Failures of network protocols and services, faults in network equipment operation may cause not only direct financial losses to the company, but also loss of reputation, the latter being a more serious harm for many large companies means as compared to financial losses. Information security becomes more and more important, since more and more services allow maintaining customer relations directly via the Internet. Usually, vulnerability means that the malicious user can make the application perform operations for which user has insufficient or no rights at all by issuing a corresponding command. And though there are detection tools for different types of vulnerabilities, they can never substitute a person's experience during information security research. In the attempts of security provision, management of many companies often makes severe errors that may result in further serious consequences for the company. Among them are:  The company's staff is excessively confident in reliability of the security technologies used.  Accurate technical information on the security level does not exist.  There is no clear information security policy.  IT department staff qualification is insufficient.
  • 4. LAZgroup SA - Business and Technology Solutions www.lazgroup.com support@lazgroup.com +41794822839 Rue du Cendrier 15, 1211 Geneva, Switzerland  This article is intellectual Property of Dr. Kretov Kirill, the founder of LAZgroup SA  The personnel wrongly think that there is no important information for hackers in the company's information system.  The personnel wrongly think that company's web site/server cracking will not result in serious losses. Based on of last-year statistics gathered during analysis of almost 12 thousand of various programs and web applications, more than 97 thousand vulnerabilities has been found. They differ in their threat level, but more than a half of them are urgent and critical, the data from 13% of systems can be automatically compromised. In the course of detailed testing, the probability of revealing critical vulnerabilities reaches extreme rates – from 80% to 96%. Any company can suffer from cyber attacks regardless of its business. Of course, hackers are mainly interested in large organizations, but small companies usually suffer more severe damages from such illegal activities. Small companies, as well as mid-sized businesses, often suffer from harmful software and viruses, which are becoming harder to neutralize. Note that data security companies themselves are often the target for directed network attacks. Interesting statistics has been published by Ponemon Institute. The research, in which the information received from 45 large American companies had been used, showed how great are the losses of a company from attacks using the vulnerabilities in the information system. On the average, companies lose a little less than four million dollars per year due to such faulty conditions, and this figure ranges from one million for medium-scale companies to 52 million dollars. Struggle against network data leakages, attacks of companies' web sites and online services, and also harmful software distribution, constitutes the lion share of costs for information security maintenance. But nevertheless, the studied companies had been exposed to more than 50 successful attacks per week during which hackers could have plundered the data. As proved by the above impressive statistics, hackers do their criminal business with impunity. While competition in this field grows, prices for computer network cracking and information theft fall, but hackers' proficiency continues to increase. Among all hackers, no more than ten persons are exposed to criminal liability a year, and for some frauds with a mullions-strong turn the hackers are subject to conditional prison sentence. Experts think that such avalanche-like growth of criminality in information technologies is a considerable threat for any business. Conclusion In conclusion, we have to emphasize the fact that the situation in the field of information protection is rapidly changing, and a company must response to each change as promptly as possible. Any new vulnerability revealed, any weakness of an anti-penetration system may result not only in direct financial losses, but also in irrevocable loss of partner reputation, which is often much more important. Hackers' arsenal grows with new complicated software and hardware, and their proficiency has long ago advanced the proficiency of an average employee in an IT or information security department. A company can protect itself from possible threats only by constantly paying attention to network and other resources integrity and security. As for now,
  • 5. LAZgroup SA - Business and Technology Solutions www.lazgroup.com support@lazgroup.com +41794822839 Rue du Cendrier 15, 1211 Geneva, Switzerland vulnerabilities have been found out in all operating systems. Once again, this is to prove that no absolute security can be guaranteed, and will not be guaranteed in the nearest future. But you can keep your risks at a minimum. For this purpose, prompt staff response in case of threat detection is crucial, as well as timely installation and update of anti-virus software and firewalls, installation of all critical and essential operating systems updates. Staff overall awareness on the recent known vulnerabilities, viruses and harmful software is also important. Many organizations resort to penetration tests as the last possible measure. But now, this measure is expensive and ineffective. During such test, only part of existing vulnerabilities will be discovered, meanwhile new methods for information security breaks appear almost every day. One must understand that even a large company providing computer audit services may be exposed to its own internal data leakage risks. Entrusting such company with detailed information about network structure, operations and protocols basically means taking and covering all risks of the company. So, penetration tests usually grant you false, illusory safety. Internal network audit methods are more effective than penetration testing. A company must use software for access restriction, user activity monitoring and data encryption, and also network activity logs must be monitored on a regular basis. This is a necessary condition for keeping the information loss risk at an acceptable minimum. Written in January 2010 by Dr.Kretov Kirill specially for LAZgroup SA