By Art Reisman, CTO, www.netequalizer.com, www.netgladiator.net.
I know that perception is reality, and sometimes it is best to accept it, but when it comes to security, FUD, I get riled up.
For example, last year I wrote about the un-needed investment surrounding the IPV4 demise, and, as predicted, the IPv6 push turned out to be mostly vendor hype motivated by a desire to increase equipment sales. Today, I am here to dispel the misplaced fear around the concept of having your data stolen in transit over the Internet. I am referring to the wire between your residence and the merchant site at the other end. This does not encompass the security of data once it is stored on disk drive at its final location, just the transit portion.
To get warmed up, let me throw out some analogies.
Do you fear getting carjacked going 75 mph on the interstate?
Most likely not, but I bet you do lock your doors when stopped.
Do you worry about encrypting your cell phone conversations?
Not unless you are on security detail in the military.
As with my examples, somebody stealing your credit card while it is in transit, although possible, is highly impractical; there are just better ways to steal your data.
It’s not that I am against VPN’s and SSL, I do agree there is a risk in transport of data. The problem I have is that the relative risk is so much lower than some other glaring security holes that companies ignore because they are either unaware, or more into perception than protecting data. And yet, customers will hand them financial data as long as their web site portal provides SSL encryption.
To give you some more perspective on the relative risk, let’s examine the task of stealing customer information in transit over the Internet.
Suppose for a moment that I am a hacker. Perhaps I am in it for thrills or for illegal financial gain, either way, I am going to be pragmatic with my approach and maximize my chances of finding a gold nugget.
So how would I go about stealing a credit card number in transit?
Option 1: Let’s suppose I parked in the alley behind your house and had a device sophisticated enough to eaves drop your wireless router and display all the web sites you visited. So now what? I just wait there, and hope perhaps in a few days or weeks you’ll make an online purchase and I’ll grab your cc information, and then I’ll run off and make a few purchases. This may sound possible, and it is, but the effort and exposure would not be practical.
Option 2: If I landed a job at an ISP, I could hook up a sniffer that eaves drops on every conversation between the ISP customers and the rest of the Internet. I suppose this is a bit more likely than option 1; but there is just no precedent for it – and ISPs often have internal safeguards to monitor and protect against this. I’d still need very specialized equipment and time to work unnoticed to pull this off. I’d have to limit my thefts to the occasional hit and run so as not to attract suspicion. The chances of economic benefit are slim, and the chances of getting caught are high, and thus the risk to the customer is very low.
For the criminal intent on stealing data, trolling the internet with a bot looking for unsecured servers, or working for a financial company where the data resides, and stealing thousands of credit cards is far more likely. SSL does nothing to prevent the real threats, and that is why you hear about hacking intrusions in the headlines everyday. Many of these break-ins could be prevented, but it takes a layered approach, not just a feel good SSL layer that we could do without.
May 8, 2012 at 10:44 AM
[…] Posts Nine Tips And Tricks To Speed Up Your Internet ConnectionSoftware UpdatesDo We Really Need SSL?Case Study: A Successful BotNet-Based AttackWhat Is Burstable Bandwidth? Five Points to […]
May 9, 2012 at 8:46 PM
[…] And Tricks To Speed Up Your Internet ConnectionWhat Is Burstable Bandwidth? Five Points to ConsiderDo We Really Need SSL?Case Study: A Successful BotNet-Based […]