Return of CISPA: Cybersecurity boon or privacy threat?
Rights groups fear widespread sharing of personal information; security managers at RSA see key new piece for corporate cyber defenses
Computerworld - SAN FRANCISCO -- Rights advocacy groups and security practitioners remain on opposite ends of the spectrum on the merits of sharing information as a means to improve cyber security.
The Electronic Frontier Foundation, the Center for Democracy and Technology and other groups have vigorously opposed the Cyber Intelligence Sharing and Protection Act (CISPA), contending that it's a major threat to privacy.
The proposed legislation would make it easier for companies to share threat information with other businesses and the government -- and offers liability protection and legal immunity for organizations that take part.
The bill passed the U.S. House of Representatives last year amid huge protests and a veto threat by the White House. The bill failed after stalling in the Senate.
CISPA was reintroduced last month, and since then has faced the same loud critics.
EFF and other privacy advocates insist that the proposed law -- pretty much unchanged from the original -- would let companies snoop on people and share all sorts of personal information under the pretext of cybersecurity.
"It's written so broadly that it allows companies to hand over large swaths of personal information to the government with no judicial oversight," the EFF cautioned in a CISPA FAQ it released this week.
According to the EFF and others opposed to the proposed legislation, CISPA as written would permit communications service providers to share stored emails, text messages and files with the government.
Information sharing only addresses a "small piece of the information security puzzle," the EFF noted in its FAQ, adding that CISPA "does nothing to, for example, encourage stronger passphrases, promote two-factor authentication, or educate users on detecting and avoiding social engineering attacks, which is the cause of a majority of attacks on corporations."
Security practitioners, however, view CISPA and information sharing in general quite differently.
At the RSA Conference 2013 here this week, several security experts said that threat information sharing is a vital piece of the effort to improve cyber security at a time when attacks against U.S. organizations are escalating sharply.
They insisted that the ability to share information on emerging threats and vulnerabilities freely without having to worry about liability, antitrust and other legal issues must be a key part of any cybersecurity strategy. Where privacy advocates see a threat, security practitioners see an opportunity to better deal with a fast changing threat environment.
"Information sharing -- having the means to share critical information, attack signatures, and detailed information is critical to [securing] critical infrastructure," said Christopher Pierson, chief security and compliance officer at financial services company LSQ Holdings.
Information sharing is not final step in cybersecurity, he noted. "The key to success here is not information sharing as a destination. Information sharing is something that has to be present as a part of a holistic program that has relevancy and is actionable."
Security practitioners also noted privacy protections are important and should be respected as part of any information sharing process.
IT security pros need to share non-personal information like IP addresses that used to launch targeted attacks, the addresses of command and control servers used to control botnets, or the indicators of a data breach or new malware program.
Such information can help companies and government agencies prepare stronger cyber defenses and gain a better understanding of emerging threats, said Wade Williamson, a senior security analyst at Palo Alto Networks.
The anti-virus industry has benefited substantially from sharing malware information with each other, Williamson said. But the industry lacks a standardized way to share compromise indicators and other information in a privacy-friendly manner, he said.
"Sharing threat intelligence and information on newly discovered attack techniques observed by other organizations and leveraging that information to improve and inform is of tremendous value," said Amit Yoran, general manager of the security management and compliance unit at RSA.
That task would require very detailed information on what is being shared, how it is being shared, with whom it is being shared and why. Organizations need to be able to describe clearly any information sharing process and how it could defend their organization against attacks, he noted.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- DOJ's charges against China reframe security, surveillance debate
- Hacker indictments against China's military unlikely to change anything
- U.S. to formally accuse Chinese military of hacking
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts