{"id":15031,"date":"2014-11-25T19:55:28","date_gmt":"2014-11-25T19:55:28","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2901"},"modified":"2020-02-26T18:50:46","modified_gmt":"2020-02-26T16:50:46","slug":"protecting-the-future-the-roots-of-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/protecting-the-future-the-roots-of-security\/15031\/","title":{"rendered":"Protecting the future: the roots of security"},"content":{"rendered":"<p>Today\u2019s information technologies are a rather mishmashed system comprised of top-notch innovations interspersed with <a href=\"https:\/\/business.kaspersky.com\/a-legacy-bug-in-a-legacy-code-todays-problem\/2863\" target=\"_blank\" rel=\"noopener nofollow\">legacy technologies<\/a>, some of which have been in use for decades and rarely changed. This \u201ccoexistence\u201d of new and old led to the discovery of dramatic bugs that had stayed below the radar for years.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p><strong>Haunted by the past<\/strong><\/p>\n<p>Earlier this year, we discovered <a href=\"https:\/\/business.kaspersky.com\/when-the-bug-bashes-you\/2649\" target=\"_blank\" rel=\"noopener nofollow\">Shellshock<\/a>, a big bad Bash vulnerability introduced back in 1992. Bash is an integral part of most of the Unix-like systems, whose code wasn\u2019t reviewed thoroughly enough to find a wide-open vulnerability. Its discovery led to a worldwide panic, especially since the first attempts to patch it <a href=\"https:\/\/business.kaspersky.com\/when-the-bug-bashes-you\/2649\" target=\"_blank\" rel=\"noopener nofollow\">failed for various reasons<\/a>.<\/p>\n<p style=\"text-align: left\"><\/p><blockquote class=\"twitter-pullquote\"><p>Protecting the future: the roots of #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FT1hT&amp;text=Protecting+the+future%3A+the+roots+of+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>More recently, Microsoft <a href=\"https:\/\/business.kaspersky.com\/a-legacy-bug-in-a-legacy-code-todays-problem\/2863\" target=\"_blank\" rel=\"noopener nofollow\">disclosed a bug<\/a> in Internet Explorer that existed since Windows 95. It is anyone\u2019s guess whether or not there were zero-day flaws in the popular software actively exploited by cybercriminals, unbeknownst to the developers of the software and white-hat security experts.<\/p>\n<p>Software vendors, especially operating systems developers, have to carry a huge load of legacy code in order to ensure backwards compatibility with legacy hardware and software for which popular demand exists. Occasionally, they may choose to keep support of the old versions of their operating systems to keep customers content. That was the case with <a href=\"https:\/\/business.kaspersky.com\/windows-xp-the-immortal-operating-system\/1621\" target=\"_blank\" rel=\"noopener nofollow\">Windows XP<\/a>, which stayed in use for too long \u2013 many users chose to stick with it along with its old-shoe interface\u2026 and old bugs. Those bugs won\u2019t be patched since Microsoft stopped their support of XP in April 2014. That means the aforementioned antique bug in IE isn\u2019t going to be fixed for the remaining (<a href=\"https:\/\/business.kaspersky.com\/survey-windows-xp-share-is-still-above-16\/2406\" target=\"_blank\" rel=\"noopener nofollow\">legions of<\/a>) Windows XP users, leaving them wide open for attacks. This isn\u2019t going to improve overall cybersecurity.<\/p>\n<p><strong>Roots and grafts<\/strong><\/p>\n<p>Yet another example of security problems due to the inosculation of the older and newer technologies is a troubling situation with critical infrastructure. The equipment is sometimes decades old. It was designed as \u201cclose box\u201d, and then \u2013 \u201call of sudden\u201d \u2013 Internet connectivity was added to the legacy equipment, which immediately decreased its security.<\/p>\n<p>Adam Firestone, president and general manager of Kaspersky Government Security Solutions, points out a silver lining: There\u2019s now a<a href=\"https:\/\/business.kaspersky.com\/businesses-should-strive-to-be-cyber-resilient\/2587\" target=\"_blank\" rel=\"noopener nofollow\"> unique possibility to upgrade security radically<\/a>, replacing the older systems with new ones, with security built-in by design.<\/p>\n<p>And that\u2019s what we mean by \u201croots of security.\u201d There are two approaches to security \u2013 \u201cadded\u201d and \u201cbuilt-in\u201d. The first one suggests security wasn\u2019t in place by design, and had to be introduced afterwards, usually with a very relative success. It\u2019s like grafting the trees: some yield to it, some don\u2019t, no matter how many attempts are made.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>\u201cAdded\u201d #security is like the grafting: no results guaranteed.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FT1hT&amp;text=%26%238220%3BAdded%26%238221%3B+%23security+is+like+the+grafting%3A+no+results+guaranteed.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>A more adequate and proper approach is \u201cbuilt-in\u201d security that had been taken into consideration since the very beginning of the development process.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/11\/06020211\/wide_1-2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2903\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/11\/06020211\/wide_1-2-1.png\" alt=\"wide_1-2\" width=\"1000\" height=\"436\"><\/a><\/p>\n<p><strong>The Smarternet<\/strong><\/p>\n<p>It\u2019s not news that the future lies in the <a href=\"https:\/\/business.kaspersky.com\/internet-of-things-vulnerability-and-security\/1471\" target=\"_blank\" rel=\"noopener nofollow\">Internet of things<\/a>, with the world increasingly interconnected. Every imaginable device will be \u201csmart\u201d one day, connected to the Web and remotely operable.<\/p>\n<p>What would living in such a world look like? We can only assume the variants. Definitely there will be more convenience, but more risks too. Would it be possible to \u201ctrigger an economic crisis\u201d with a single, well-placed click? Or turn critical infrastructures across the globe into shambles with a small piece of malware served to the proper vulnerability?<\/p>\n<p>With many technologies not fully understood (or capable of being handled), the dystopian predictions we spoke of <a href=\"https:\/\/business.kaspersky.com\/picturing-the-future-to-protect\/2851\" target=\"_blank\" rel=\"noopener nofollow\">in the previous post<\/a> seem probable. Is it inevitable? No.<\/p>\n<p>Slowly, the interested parties are coming to an agreement about the necessity of considering cybersecurity wherever information technologies are used, and they are used almost everywhere.<\/p>\n<p>Security must be \u2013 and hopefully will be \u2013 in the roots of the information technology \u201ctree\u201d, instead of being grafted to it. There will still be mishaps and errors, but cybersecurity vendors such as Kaspersky Lab will be around to <a href=\"http:\/\/kas.pr\/d1Eh\" target=\"_blank\" rel=\"noopener\">protect users no matter what the future holds<\/a>.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.kaspersky.com\/power-to-protect\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2904\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/11\/06020211\/wide_video2-2-1.png\" alt=\"wide_video2-2\" width=\"1000\" height=\"437\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today&#8217;s information technologies are a rather mishmashed system comprised of top-notch innovations interspersed with legacy technologies, some of which have been in use for decades and rarely changed. This &#8220;coexistence&#8221; of new and old led to the discovery of dramatic bugs that had stayed below the radar for years.<\/p>\n","protected":false},"author":209,"featured_media":15850,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[282,2237,838],"class_list":{"0":"post-15031","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-legacy-technologies","11":"tag-shellshock"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protecting-the-future-the-roots-of-security\/15031\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protecting-the-future-the-roots-of-security\/15031\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protecting-the-future-the-roots-of-security\/15031\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=15031"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15031\/revisions"}],"predecessor-version":[{"id":26413,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15031\/revisions\/26413"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15850"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=15031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=15031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=15031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}