Multinational consensus pegs top 20 net vulnerabilities
Experts from the U.S., Canada, the U.K., Singapore and Brazil name the top Windows, Unix and Linux flaws.
Computerworld - WASHINGTON -- The U.S. Department of Homeland Security, along with its Canadian and British counterparts and the SANS Institute, today released a list of the 20 security vulnerabilities most often exploited by criminal hackers.
The creation of the Top 20 list of commonly exploited Windows, Unix and Linux flaws marks one of the first times that a multinational consensus has been reached on critical Internet vulnerabilities that must be fixed to meet a minimum level of security protection for computers connected to the Internet.
"Basing the Top 20 on a multinational government/industry consensus endows the list with more authority and makes it easy for each of our agencies to persuade owners and operators of the critical infrastructure to eliminate these vulnerabilities," said Steve Cummings, director of the U.K.'s National Infrastructure Security Co-ordination Centre, in a statement.
Sallie McDonald, director of outreach programs at the DHS, called the Top 20 project, "a useful example" of how the U.S. National Strategy for Securing Cyberspace is being implemented.
Alan Paller, director of research at SANS, said the list is a consensus of the knowledge of experts from around the world who are fighting cybercrime. In addition to contributors in the U.S., U.K. and Canada, experts from Singapore and Brazil also helped develop the list.
Paller said the security industry has put its support behind the Top 20 list. Two of the leading suppliers of vulnerability testing software, Qualys Inc. and Foundstone Inc., announced that their customers will be able to test for the top 20 vulnerabilities. Qualys is also offering a free network auditing service that lets anyone test Internet-connected systems for evidence of the vulnerabilities, Paller said.
"The list reflects the combined experience of many of the folks who have to clean up after attacks," said Paller. "It couldn't be developed by any individual organization because different sites face different automated and targeted attacks."
SANS started the process of issuing a Top 10 list of vulnerabilities three years ago, when it released its first list with the National Infrastructure Protection Center. The updated SANS Top 20 is actually a combination of two Top 10 lists: the 10 most commonly exploited vulnerable services in Windows and the 10 most commonly exploited vulnerable services in Unix and Linux.
"Although there are thousands of security incidents each year affecting these operating systems, the overwhelming majority of successful attacks target one or more of these 20 vulnerable services," according to the final consensus document.
|The Top 20 Consensus Guide|
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Malware and Vulnerabilities White Papers | Webcasts