Skip to main content

2002 - The Year Security Changed

Trustworthy Security was born on a regular Tuesday afternoon, during the month of January in the year of 2002. The security would be about to change drastically, with its front line commander, Bill Gates, telling his troops about his plans. It all started with an email:

From: Bill Gates
Sent: Tuesday, January 15, 2002 5:22 PM
To: Microsoft and Subsidiaries: All FTE
Subject: Trustworthy computing 


The internet was being heavily attacked by many viruses, worms and other applications such as Code Red, Nimda, and LoveLetter. They were about to face a new enemy: Trustworthy Computing 

[0001] What is Trustworthy Computing?


Bill Gates first introduced Trustworthy Computing by sending out an e-mail to more than 50,000 Microsoft employees, defining the moment for both the company's future and the industry.  It is an approach to computer software and hardware aimed to enable security, reliability, privacy and business integrity.  In Bill Gates email, he states one of the primary reasons to push the project forward:

 "In the past, we've made our software and services more compelling for  users by adding new features and functionality, and by making our  platform richly extensible. We've done a terrific job at that, but all  those great features won't matter unless customers trust our software. " - Bill Gates 2002

Trustworthy Computing was introducing a new mindset for software and hardware business: the choice between adding features and resolving security issues.   Creating a Trustworthy Computing environment requires several steps which can be challenging and a slow process. 

[0010] The Four Pillars of Trustworthy Computing

Microsoft when first introduced the concept of Trustworthy Computing specified four core areas in which build up the idea: Security; Privacy; Reliability; and Business Integrity.

Security


This image has an empty alt attribute; its file name is computerworld_security_icon.png


" Information Security- the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measure necessary to detect, document, and counter such threats "   - National Information Systems Security Glossary

Information security applies to many aspects or ideas regarding securing data, not matter in what form ( such as databases, credentials, sensitive data, etc).  It is crucial that companies learn how to manage the vulnerabilities found in their systems, software or hardware products, and how to properly protect their data.  This pillar of Trustworthy Computing depends heavily on three widely accepted elements of information security: Confidentiality, Integrity, and Availability. 

Privacy


This image has an empty alt attribute; its file name is slice432-512.png


 " Privacy- a) the quality or state of being apart from company or observation b) freedom from unauthorized intrusion " - Merriam-Webster 

Microsoft has privacy as the second pillar for Trustworthy Computing. The world of internet has always been the target of many threats. Spam, hackers, malware, unwanted pop-ups. Lack of privacy, created a lot of concern back in 2002, about insecurities of personal information being shared on the internet. PrivacyRights.org list some of the concerns about such topic:

  1. Hackers penetrating the most secure facilities of the military and financial institutions
  2. Identity thieves are able to shop online anonymously using the credit-identities of others. 
  3. Web-based information brokers sell sensitive personal information, including Social Security numbers. 
Privacy is important for computer users, and making them feel empowered with the tools and computing products, such as software when it comes to protecting their personal information is one of the targets for this pillar. Microsoft helped to create and contribute to standards and policies, for privacy which was widely used by other industry organizations and government.

Reliability 

This image has an empty alt attribute; its file name is reliability-and-security.png


 Reliability is an attribute of any computer-related component (software,  or hardware, or a network, for example) that consistently performs according to its specifications.  - Margaret Rouse 2005

In the security world, reliability is not anything newly introduced. Microsoft however, presented a new approach to redefine reliability by defining it in one of their four core areas of Trustworthy Computing.  Microsoft " believes it means being a reliable business partner, maintaining an open dialogue with our customers and industry partners, and seeking feedback about how we can improve our software and services "  (Powers 2005).  It was introduced six key attributes for a reliable system: Resilient, Recoverable, Controlled, Unpredictable, Predictable.

Bill Gates explains in his email about the importance of their system be available to their costumers: " Our products should always be available when our costumers need them." Systems outages were common, and Microsoft decided to focus on change their software architecture that supports automatic recovery.  Today, self-management systems are everywhere, where it allows for a service resumption without user interaction in almost every case.

Business Integrity

This image has an empty alt attribute; its file name is data-integrity-1024x583.jpg

 "In looking for people to hire, you look for three qualities: integrity,  intelligence, and energy. And, if they don't have the first, the other  two will kill you." – Warren Buffett 

Microsoft's fourth pillar of Trustworthy Computing is business integrity. It heavily relies on two things:

  • Be responsive
  • Be transparent

Bill Gates believed that everyone should be responsive to their actions. Take responsibility for problems and take action to correct them.  People are afraid to take responsibility for mistakes, especially within a large corporation. However, the lack of communication and responsibility can result in a larger loss.

He also believed that his employees should be transparent. Be open in dealing with costumers, keep motives clear, keep promises, and make sure costumers know where they stand in dealing with the company.

[0011] Implementing Trustworthy Computing

The Bussiness Aspect

Image result for business security

The term of Trustworthy Computing has been applied to computing systems that are inherently secure, available, and reliable. Conducting a Security Risk Assessment, allows companies to assess security-related risks from internal and external threats to an entity, its assets, or personal. Based on the core idea of Trustworthy Computing, businesses should be able to identify the people and assets at risk, while prioritizing assets that support the business's primary goal. Understand the loss events, where the company is aware of threats that could occur, such as DDoS, or inside threat. On top of that, the impact of events, for example, if a threat has a minor impact on the business or could it keep the business from being functional for a long period of time. Taking into consideration of options to mitigate and feasibility of options of implementing mitigation on vulnerable, such as ensuring every computer in the company is protected by some type of anti-malware software. It is important to contain a Security Policy. The core meaning of a Security Policy is what it means to be secure for a system. It outlines what needs to be done to ensure security but not how to do it. It brings another important step: the enforcement of Security Policies. For example, if a written policy states that a password must be changed every 30 days, then all systems should be configured to enforce this policy automatically. Least but not least, educating employees. They must be educated about the importance of security, so they will understand how security is crucial for their environment and motivated to follow security policies.

Resources

https://searchsecurity.techtarget.com/opinion/Trustworthy-computing-Dont-compromise-security-for-convenience
https://www.wired.com/2002/01/bill-gates-trustworthy-computing/
https://www.giac.org/paper/gsec/4243/pillars-trustworthy-computing-displayed-patch-management/106837
https://en.wikipedia.org/wiki/Trustworthy_computing
https://www.merriam-webster.com/dictionary/privacy
https://cybersecurity.seas.wustl.edu/ning/teaching/F19cse569s/paper/BootstrappingTrustBook.pdf

Comments

Popular posts from this blog

Angr: A Multi-Architecture Binary Analysis Toolkit

This blog is quoted from several angr blogs and documentations, click  here  and  here . angr is a multi-architecture binary analysis toolkit, with the capability to perform dynamic symbolic execution (like Mayhem, KLEE, etc.) and various static analyses on binaries. We've tried to make using angr as pain-free as possible - our goal is to create a user-friendly binary analysis suite, allowing a user to simply start up iPython and easily perform intensive binary analyses with a couple of commands. That being said, binary analysis is complex, which makes angr complex. This documentation is an attempt to help out with that, providing narrative explanation and exploration of angr and its design. Several challenges must be overcome to programmatically analyze a binary. They are, roughly: Loading a binary into the analysis program. Translating a binary into an intermediate representation (IR). Performing the actual analysis. This could be: A partial or full-prog...

SWAPGS Attack: A Spectre Variant

With the recent developments of Spectre [1] and Meltdown [1] as we discussed in class, it should come to no surprise that various odd methods of accessing kernel memory through user level permissions have popped up.   One such interesting method utilizes the SWAPGS instruction, called the SWAPGS Attack, found by Bitdefender researchers just a few months ago [2].   This article will explore what the attack is, how to exploit it on existing hardware and operating systems, and what mitigations can be implemented for current hardware. SWAPGS Attack Overview The SWAPGS Attack, as the name implies, utilizes the SWAPGS instruction.   This instruction swaps two Model Specific Registers (MSRs), IA32_GS_BASE and IA32_GS_KERNEL_BASE, which point to the user mode's per-thread data structure and kernel mode per-thread data structure respectively.   In Windows, the addresses stored in these registers are used to quickly access information about the current Thread Informa...

Remote Attestation

Introduction The number of information technologies, such as IoT devices and mobile Internet, are rising and therefore also the need for trustworthy computing environments. The digital community is seeing more and more threats to their secret information, threats such as computer viruses and malware. Any company or individual with sensitive information will want to be able to keep it in a secure environment that preserves the integrity, authenticity, confidentiality and reliability of the data. Not only does the information need to be secure in an individual server but will need to travel through trusted channels. While firewalls and virus defense mostly protect the server side of a computing platform, the client side is vulnerable, which is where trusted computing comes in.  There are many organizations that have attempted to establish a standard definition for trusted computing, but there are many different ways of understanding a trustworthy environment. The Trusted Compu...