Return of CISPA: Cybersecurity boon or privacy threat?
Rights groups fear widespread sharing of personal information; security managers at RSA see key new piece for corporate cyber defenses
Computerworld - SAN FRANCISCO -- Rights advocacy groups and security practitioners remain on opposite ends of the spectrum on the merits of sharing information as a means to improve cyber security.
The Electronic Frontier Foundation, the Center for Democracy and Technology and other groups have vigorously opposed the Cyber Intelligence Sharing and Protection Act (CISPA), contending that it's a major threat to privacy.
The proposed legislation would make it easier for companies to share threat information with other businesses and the government -- and offers liability protection and legal immunity for organizations that take part.
The bill passed the U.S. House of Representatives last year amid huge protests and a veto threat by the White House. The bill failed after stalling in the Senate.
CISPA was reintroduced last month, and since then has faced the same loud critics.
EFF and other privacy advocates insist that the proposed law -- pretty much unchanged from the original -- would let companies snoop on people and share all sorts of personal information under the pretext of cybersecurity.
"It's written so broadly that it allows companies to hand over large swaths of personal information to the government with no judicial oversight," the EFF cautioned in a CISPA FAQ it released this week.
According to the EFF and others opposed to the proposed legislation, CISPA as written would permit communications service providers to share stored emails, text messages and files with the government.
Information sharing only addresses a "small piece of the information security puzzle," the EFF noted in its FAQ, adding that CISPA "does nothing to, for example, encourage stronger passphrases, promote two-factor authentication, or educate users on detecting and avoiding social engineering attacks, which is the cause of a majority of attacks on corporations."
Security practitioners, however, view CISPA and information sharing in general quite differently.
At the RSA Conference 2013 here this week, several security experts said that threat information sharing is a vital piece of the effort to improve cyber security at a time when attacks against U.S. organizations are escalating sharply.
They insisted that the ability to share information on emerging threats and vulnerabilities freely without having to worry about liability, antitrust and other legal issues must be a key part of any cybersecurity strategy. Where privacy advocates see a threat, security practitioners see an opportunity to better deal with a fast changing threat environment.
"Information sharing -- having the means to share critical information, attack signatures, and detailed information is critical to [securing] critical infrastructure," said Christopher Pierson, chief security and compliance officer at financial services company LSQ Holdings.
Information sharing is not final step in cybersecurity, he noted. "The key to success here is not information sharing as a destination. Information sharing is something that has to be present as a part of a holistic program that has relevancy and is actionable."
Security practitioners also noted privacy protections are important and should be respected as part of any information sharing process.
IT security pros need to share non-personal information like IP addresses that used to launch targeted attacks, the addresses of command and control servers used to control botnets, or the indicators of a data breach or new malware program.
Such information can help companies and government agencies prepare stronger cyber defenses and gain a better understanding of emerging threats, said Wade Williamson, a senior security analyst at Palo Alto Networks.
The anti-virus industry has benefited substantially from sharing malware information with each other, Williamson said. But the industry lacks a standardized way to share compromise indicators and other information in a privacy-friendly manner, he said.
"Sharing threat intelligence and information on newly discovered attack techniques observed by other organizations and leveraging that information to improve and inform is of tremendous value," said Amit Yoran, general manager of the security management and compliance unit at RSA.
That task would require very detailed information on what is being shared, how it is being shared, with whom it is being shared and why. Organizations need to be able to describe clearly any information sharing process and how it could defend their organization against attacks, he noted.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- South Korea cyberattacks hold lessons for U.S.
- U.S. military networks not prepared for cyberthreats, report warns
- Return of CISPA: Cybersecurity boon or privacy threat?
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Cybercrime and Hacking White Papers | Webcasts