It Doesn't Have to Be Like This: Cybersecurity Vulnerability Trends
نویسندگان
چکیده
It often seems that every newly announced major data breach sets a record for the depth and size of impact. Internet users, nearly everyone these days, naturally wonder: Why is this happening, and how much worse can it get? In the inaugural article for this column, published in January 2009, we reviewed trends in vulnerabilities for the previous eight years [2]. Our goal, then as well as now, is to improve the understanding of cybersecurity vulnerabilities so that we can prevent them. One Moore's Law generation later, we followed that article with another review of trends, finding some encouraging results [3]. In this article, we review some of those earlier findings, plus what has happened since then, and prospects for the near future. Our data source is the US National Vulnerability Database (NVD) [1], which collects nearly all publicly reported vulnerabilities since 1997, using the Common Vulnerabilities and Exposures (CVE) dictionary. It is developed and run by the US National Institute of Standards and Technology, with support from the Department of Homeland Security's National Cyber Security Division. As of 2017, the NVD includes more than 85,000 vulnerabilities, and the collection is expanded daily. With two decades of data, the NVD is an invaluable resource for security analysts. One of the primary observations from the January 2009 analysis was that the total number of vulnerabilities per year had begun to decline, from a peak of nearly 7,000 in 2006 to about 5,500 in 2008. It appeared that developers and security administrators had begun taking security seriously, including it as a key component in development, and staying up to date on mitigation techniques. Code flaws that were widely used in system exploits in the 1980s and 1990s, such as format string vulnerabilities and race conditions, were appearing in only a dozen or two cases each year, accounting for less than 1% each of the vulnerabilities in thousands of applications. Better development methods and tools had begun to make a difference. But the 2009 analysis also revealed a trend that we see repeatedly in all aspects of security new information technology produces new challenges to secure it. During the previous decade, e-commerce and other web-based services had proliferated, producing new challenges for protection and new opportunities for attackers. While buffer overflows and misconfigurations had long been the main sources of weaknesses in systems defenses, SQL injections and cross-site scripting were respectively the #1 and #2 vulnerability types in 2008 (Fig. 1). (Note that the analysis is limited to the distribution of primary vulnerability categories; another 10% 15% each year are classed as either "other" or "insufficient information".) As we will see later in this article, the trends for these two vulnerability types illustrate an important lesson for managing cybersecurity.
منابع مشابه
تحلیل آسیبپذیری خانوارهای روستایی بخش مرکزی شهرستان دنا: کاربرد چارچوب معیشت پایدار
Sustainable livelihoods approach as one of the new sustainable rural development approaches is one way of thinking and attempting to achieve development which arose in the late 1980s with the aim of progress and poverty alleviation in rural communities (Sojasi Ghidari et al.,2016). Five critical concepts to understand sustainable livelihoods framework include the concept of vulnerability, live...
متن کاملLinking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism
To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...
متن کاملAn Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities
Software vulnerabilities represent a major cause of cybersecurity problems. The National Vulnerability Database (NVD) is a public data source that maintains standardized information about reported software vulnerabilities. Since its inception in 1997, NVD has published information about more than 43,000 software vulnerabilities affecting more than 17,000 software applications. This information ...
متن کاملCybersecurity Through Secure Software Development
Reports about serious vulnerabilities in critical IT components have triggered increased focus on cybersecurity worldwide. Among the many initiatives to strengthen cybersecurity it is common to see the establishment and strengthening of CERTs and other centers for cybersecurity. On the other hand, strengthening education in IT security and applying methods for secure systems development are met...
متن کاملA Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework
As ICT and cyberspace become sources of impressive innovation, the reliance of organizations, governments, and people on them will increase. However, with this vast reliance, hazardous vulnerabilities have emerged. These vulnerabilities may be exploited, resulting in information and cybersecurity issues at the national as well as the international levels. Cybersecurity is critical for sustainin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IT Professional
دوره 19 شماره
صفحات -
تاریخ انتشار 2017