{"id":2565,"date":"2020-07-28T09:20:51","date_gmt":"2020-07-28T13:20:51","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2565"},"modified":"2020-07-28T09:20:51","modified_gmt":"2020-07-28T13:20:51","slug":"invasive-species-and-security","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2565","title":{"rendered":"Invasive Species and Security"},"content":{"rendered":"\n<p>I just read an article about how&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/invasive\">invasive<\/a>&nbsp;species are presenting severe&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/threats\">threats<\/a>&nbsp;to the wildlife in the national parks here in the USA. It&#8217;s not just a problem in the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/usa\">USA<\/a>: regions around the world have to face the consequences of a more interconnected world when those connections bring in a non-native species that begins to take over the environment, destroying delicate ecosystems in the process.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/peerlyst\/image\/upload\/c_limit,dpr_2.0,f_auto,fl_lossy,h_513,q_auto,w_880\/v1\/post-attachments\/invasive_species_zalguz\" alt=\"\"\/><\/figure>\n\n\n\n<p>Of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/course\">course<\/a>, my thoughts made a connection to IT security. So, I&#8217;m going to write about my thoughts. \ud83d\ude42<\/p>\n\n\n\n<p>What makes an invasive species so invasive and dominant is that it doesn&#8217;t have a natural predator in the new region, so it is able to reproduce and consume&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/resources\">resources<\/a>&nbsp;without limit, until the land can&#8217;t support them any more. But, at that point, they&#8217;re pretty much dominant in that region. If a natural predator of that species is brought in, it could wind up being invasive in and of itself, wiping out other species that were already threatened by that first invasive species.<\/p>\n\n\n\n<p>In IT, we have&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/systems\">systems<\/a>&nbsp;that are created and maintained to provide a particular level of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/service\">service<\/a>&nbsp;with a particular level of security. We&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/expect\">expect<\/a>&nbsp;those systems to maintain equilibrium &#8211;&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/employees\">employees<\/a>&nbsp;are typically told not to bring in other&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/devices\">devices<\/a>&nbsp;and IT&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/staff\">staff<\/a>&nbsp;have to&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/comply\">comply<\/a>&nbsp;with standardized purchasing and acquisition&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/processes\">processes<\/a>&nbsp;to bring in new gear, typically chosen carefully to work well with all the other systems.<\/p>\n\n\n\n<p>An invasive species in IT is something, be it a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/hardware\">hardware<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/platform\">platform<\/a>, a website, or piece of software that allows employees or other&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/users\">users<\/a>&nbsp;of IT resources to evade security, go around processes, or even to create systems of their own that exist outside IT standards.<\/p>\n\n\n\n<p>Once introduced, there&#8217;s no stopping these invasive IT elements without some drastic measures. Consider a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/scenario\">scenario<\/a>&nbsp;in which a company wants to improve&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/productivity\">productivity<\/a>&nbsp;by&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/blocking\">blocking<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/youtube\">YouTube<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/facebook\">Facebook<\/a>&nbsp;on both employee and guest networks.&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/mobile-devices\">Mobile devices<\/a>&nbsp;become an invasive species, as employees bring those in and use&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/lte\">LTE<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/networks\">networks<\/a>&nbsp;to&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/access\">access<\/a>&nbsp;the prohibited material. If an employer wants to stop those&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/mobile\">mobile<\/a>&nbsp;devices, it&#8217;s looking at introducing discipline for their users &#8211; which would destroy morale &#8211; or introducing cell&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/phone\">phone<\/a>&nbsp;signal jammers &#8211; which will destroy morale and possibly violate local laws.<\/p>\n\n\n\n<p>While I&#8217;m aware that many would want to argue with the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/wisdom\">wisdom<\/a>&nbsp;of blocking YouTube and Facebook, we can all agree that employees deciding to start using resources outside of IT&#8217;s&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/control\">control<\/a>&nbsp;on a regular basis is an eventual trouble spot. What if there is a way to access company data in&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/the-cloud\">the cloud<\/a>&nbsp;via those mobile devices? Then it&#8217;s possible for the data, now on those mobiles, to be&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/shared\">shared<\/a>&nbsp;outside the purview of any&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/dlp\">dlp<\/a>&nbsp;software that exists on the company-managed&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/laptops\">laptops<\/a>&nbsp;and desktops. It&#8217;s easier for the employees to share data &#8211; properly or improperly &#8211; and they&#8217;ll keep doing it. Is there a way to shut down&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/cloud\">cloud<\/a>&nbsp;access to just company-owned devices? If so, does that then put a negative impact on the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/flow\">flow<\/a>&nbsp;of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/business\">business<\/a>, overall? Does this introduce another layer of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/complexity\">complexity<\/a>, and will this new scheme be stable? Scalable? All the other questions we ask about the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/viability\">viability<\/a>&nbsp;of a solution? Certainly, it&#8217;s an additional cost &#8211; is it worth it to implement, or does the company just abandon the cloud or DLP&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/solutions\">solutions<\/a>&nbsp;altogether?<\/p>\n\n\n\n<p>Abandon DLP? I&#8217;m sure some of the readers of that phrase would&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/react\">react<\/a>&nbsp;with shock, horror, and disappointment. But, if we think like an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/executive\">executive<\/a>, we have to ask the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/question\">question<\/a>, &#8220;Why should I pay for something that&#8217;s not able to get me what I want?&#8221;<\/p>\n\n\n\n<p>When I was a high school teacher, I saw these invasive IT species all the time. I confess even to participating in their spread. I was a user, then, not part of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/it-security\">IT security<\/a>, so I had other concerns on my mind &#8211; getting my&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/job\">job<\/a>&nbsp;done, for example.<\/p>\n\n\n\n<p>We all had to use software purchased by the school district to provide class information. The software allowed for teachers to&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/post\">post<\/a>&nbsp;links to online resources, contact information, class calendars, notes, and a discussion board. The software was also difficult to use and constantly crashed. I posted the bare minimum of information, never updated it, and ran a discussion&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/board\">board<\/a>&nbsp;on my personal website that had some solid uptime numbers, if I say so myself. My&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/students\">students<\/a>&nbsp;used it constantly and pretty much didn&#8217;t even look at the district system. After the district canned that system after 2 years and got another similar one that didn&#8217;t allow for teachers to port over their content from one to the other, that&#8217;s when the rest of the faculty revolted and either did the bare minimum, used an outside&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/resource\">resource<\/a>, or both.<\/p>\n\n\n\n<p>My school district also blocked YouTube and Facebook. In the days before mobile devices, students using school-provided PCs would go for&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/proxy\">proxy<\/a>&nbsp;buster sites. As fast as the district security could block one of those sites, another one would be discovered and quickly utilized. When I wanted to show a documentary on YouTube to my classes, it was much easier to go the route of the proxy buster than to submit the link weeks in advance for an official review. I knew the documentary on economics didn&#8217;t have any objectionable material in it, so I just went around the proxy&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/server-2009\">server<\/a>, just like everyone else did.<\/p>\n\n\n\n<p>When the district just blocked YouTube on district networks, that&#8217;s when I brought in my personal&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/pc\">PC<\/a>, joined it to the unscreened guest&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/wireless-network\">wireless network<\/a>, and plugged that into my display projector. Other teachers used their district-issued laptops, but connected them to mobile&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/hotspots\">hotspots<\/a>, making for the dreaded bridging between the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/internet\">Internet<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/office\">office<\/a>&nbsp;networks.<\/p>\n\n\n\n<p>All along, I wasn&#8217;t trying to do anything evil. I was just wanting to get my job done. Any&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/end-user\">end-user<\/a>&nbsp;facing a choice between finishing work or security is going to choose finishing work, and that can mean the introduction of an &#8220;invasive species&#8221; that gets adopted by many other users, once&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/word\">word<\/a>&nbsp;gets out about how it lets them do their work.<\/p>\n\n\n\n<p>Not all invasive species in IT are themselves IT. How many times have those annual&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-trainings\">security trainings<\/a>&nbsp;been foiled by lists of answers for the test at the end of the training? Given a choice between paying attention to the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/training\">training<\/a>&nbsp;or just clicking through it while getting real work done, nearly all employees are going to click through with the sound off and then go CBBADECCAE for the test at the end, just like the answer list tells them to do. Jumble up the questions? Not a problem, as the list of letters is annotated with notes like, &#8220;Question about mouse hovering &#8211; C&#8221;. Jumble the answers? &#8220;Question about mouse hovering &#8211; different link revealed.&#8221; Give them an honesty affirmation at the start? That gets clicked through, too, if the pressure is high enough to get stuff done.<\/p>\n\n\n\n<p>So how can we deal with invasive species? All I can think of are&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/proactive\">proactive<\/a>&nbsp;measures. Make sure that the only way to interact with the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/corporate-network\">corporate network<\/a>&nbsp;is with a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/corporate\">corporate<\/a>&nbsp;device, be it through&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/nac\">NAC<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vpn\">VPN<\/a>, or both. For situations where&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/employers\">employers<\/a>&nbsp;want to control online activities of employees, perhaps the solution lies with&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/human-resources\">human resources<\/a>&nbsp;and one-on-one meetings instead of proxy servers and firewalls. When employees complain about how lack of IT&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/response\">response<\/a>&nbsp;isn&#8217;t letting them get their&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/jobs\">jobs<\/a>&nbsp;done, listen to them and respond to their satisfaction. Once those complaints stop, it&#8217;s too late &#8211; they&#8217;ve found the invasive species and your&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-posture\">security posture<\/a>&nbsp;is likely&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/compromised\">compromised<\/a>, with a high chance it&#8217;s a severe compromise.<\/p>\n\n\n\n<p>There are reasons why nations highly dependent upon agriculture will fumigate your checked bags before you&#8217;re allowed to collect them. They don&#8217;t want any invasive species. We can&#8217;t fumigate our employees, so we instead have to be sure that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-policies\">security policies<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/practices\">practices<\/a>&nbsp;don&#8217;t create a need for an employee to introduce an invasive IT species.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I just read an article about how&nbsp;invasive&nbsp;species are presenting severe&nbsp;threats&nbsp;to the wildlife in the national parks here in the USA. It&#8217;s not just a problem in the&nbsp;USA: regions around the world have to face the consequences of a more interconnected world when those connections bring in a non-native species that begins to take over the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2565","post","type-post","status-publish","format-standard","hentry","category-general-stuff"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2565"}],"version-history":[{"count":1,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2565\/revisions"}],"predecessor-version":[{"id":2566,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2565\/revisions\/2566"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}