Experts at Demo 2006 say products, implementations need to improve drastically. A panel discussion involving a group of experts held during Demo 2006 in Phoenix concluded that the state of security is not where it should be, but they also had suggestions about how to improve it.A panel discussion involving a group of experts held during Demo 2006 in Phoenix this month concluded that the state of security is not where it should be. Luckily, the panelists also had suggestions on how to improve it.During the conference, which is owned by Network World, former IBMer and consultant John Patrick called together a panel of industry and academic figures to answer the question: Will the good guys be able to stay ahead of the bad guys? But first Patrick asked the panel to assess the current state of security, and the responses showed that the good guys aren’t necessarily ahead of the bad.“The state of security is terrible . . . absolutely abysmal,” said Hilarie Orman, former research scientist and onetime member of Defense Advanced Research Projects Agency’s Information Technology Office. She now is CTO and vice president of engineering with Shinkuro, which makes file-sharing software. “It’s difficult to argue there’s a good state of security right now.” Another panelist reminded the audience that there’s no such thing as perfect security. “It’s a cat-and-mouse game [that the industry plays with hackers], but we need to bring [the threat] down to a level where we can live with it,” said Partha Dasgupta, an associate professor with Arizona State University’s Fulton School of Engineering.The good news, according to the third panelist, is at least the industry and users are beginning to think about security. Enterprise and consumer products need to find a balance between being secure and being useful, said Charles Palmer, manager of the security, networking and privacy departments at IBM’s Thomas J. Watson Research Center. “If [security] makes the system really hard to use or is done wrong, you’ve got a brick,” he said.One possible solution to the recent series of identity theft is biometrics, in which computers scan a finger, face, retina or other part of the body and save that image for authentication. The problem with biometrics, agreed the panel, is that once a thief learns how to reproduce a fingerprint, the owner can’t change the original.Technology is being developed that doesn’t take a picture of the finger but some small measurements of the finger’s characteristics, said Palmer, who added that 4% of people can’t produce good fingerprints and that pineapple juice can temporarily remove a person’s fingerprint.Another promising area is challenge-response biometrics, Dasgupta said. Instead of matching a spoken word or phrase to one previously recorded, the phrase is changed every time so a thief can’t record the phrase and replay it over and over to gain access to protected data. “That’s much more sophisticated, and much more complicated,” he said.Fingerprint biometrics are the best bet at the moment, because the technique has been in practice the longest, Dasgupta said.Another technology that can help improve security is encryption, the panelists agreed. However, most people don’t know how to use it, and even when it is employed, it is poorly managed, Orman said. “Encryption does protect data,” Orman said. “The weak point in this is almost always key management. Even when data’s been encrypted someone can find the key, since key selection and protections is so bad. . . . Usually the key is lying around somewhere.”“The problem is at the endpoints,” Dasgupta added. “When you’re using encryption, you have to encrypt at one end and decrypt at the other.”Another point of agreement among panel members was that security needs to be part of an application or operating system from the beginning, not an add-on or afterthought.“We continue to build systems without thinking about security from the beginning,” Palmer said. “What developers really want is [a tool that] looks at code and tells you if it’s evil, and that’s impossible,” Palmer added.“All code is evil, let’s face it,” Orman retorted, drawing chuckles from the audience. “It’s been interesting watching the evolution of network security protocols; it’s very difficult to change them” at this point, she said.Patrick asked the panel whether mobile devices were a particularly high security risk. Technically speaking, they’re not, the panel said, but it’s the way people use them today that creates vulnerabilities. Good security “requires you to take your BlackBerry and type your password in every time you open it,” Palmer said. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Industry Networking news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe