CVE Home

Get CVE
CVE Home
About CVE
News and Events
Compatible Products
Editorial Board
Advisory Council
Press View
Free Newsletters
contact us
Alphabetical Index

eWeek Transcript

Transcript of the eWeek Vulnerability Summit interview

Taped: November 3, 2000
Interviewer: Deb Donston
Interviewee: Steve Christey

Donston: With me now is Steven Christey, senior software analyst at MITRE. Steve, you've mentioned several times during the summit that you think education is lacking. How is it lacking and how do you think it can be improved?

Christey: Education is a pretty big challenge because there are a lot of different types of organizations, and individuals within those organizations, that need to be educated. The problem stems from programmers who don't know all of the different bugs that they can introduce into their code that can allow hackers to exploit that code to break into systems. There are CIO's who do not necessarily understand the impact that these very low-level bugs can have on the security of their entire enterprise. There is education of system administrators who are often overworked and are given security as just one of many different responsibilities, and they don't necessarily have the support of management above them. System administration in some cases is sort of an afterthought with respect to the job that the person really needs to do. Maybe they're doing certain project work, or they're working on developing a new system or something like that, and system administration is just one of the tasks that they need to perform. So you have a lot of these different stakeholders in terms of education, each of whom needs a different type of education with respect to computer security.

Donston: Where should that education come from?

Christey: The education should come from a lot of different sources, one of them being the university system itself. Programmers, when they're learning how to program, should be taught secure methods for programming. With respect to the senior management in terms of enterprises, I think that's a good question. We've heard in today's discussion a lot that there is often a "prove it to me" sort of attitude that is taken by CIO's and by system administrators as well, in terms of really understanding that "OK, this is a problem, but it doesn't apply to me." If their system is proven to be vulnerable and they are shown concretely what that problem is, then they can better understand the true extent of the impact it has on security. However, who does that education is another question. There are services out there - security services - that will help to do that education. There are organizations that are starting to come out with educational programs, certification kinds of programs, although in most cases they're still fairly new. So, those are some of the different sources where the education can come from. Then there's also self-education, in terms of system administrators or programmers educating themselves. However, there's such a wealth of information out there, and it's not all in one easy-to-access location that even if someone is interested in learning more about security, it can be hard for them to select from all of the different options that are available to them.

Donston: There's a lot of information out there, and the information comes with different terminology. Sometimes the same thing is called two different terms. MITRE is working on a project to come up with a common naming system. Can you tell us about that?

Christey: Yeah. It's called Common Vulnerabilities and Exposures. Basically, what we're doing is, we are creating a list of all of the known vulnerabilities that are out there, and working with other people in the community to agree to a single name to use for each individual vulnerability. One of the problems that's out there is, because there's such a high volume of information and there are a lot of different security products and databases that are dealing with vulnerability information, everyone uses a different name to describe that particular vulnerability. So it makes it very difficult to integrate information from all of these different sources.

Donston: And more difficult to educate people about the problems.

Christey: It can also become more difficult to educate people about the problems as well because security vulnerabilities - sometimes there can be so many of them in the same system that you aren't necessarily sure which one you're even really talking about. So, the approach that we've taken is to come up with a common name for each vulnerability, and we've built up an editorial board, which consists of approximately 30 different organizations from government, academia, from the commercial world - both in terms of vendors of security products and vendors of software products - and other kinds of security experts, all of whom consult with us at MITRE to populate the list, to agree on the names, and then to distribute that list to the public.

Donston: Where can people find information on the CVE?

Christey: The CVE list and supporting information can be found at the URL: cve.mitre.org.

Donston: OK, thanks so much, Steve.

Christey: Thank you.






For more information, please email cve@mitre.org

Page last updated: Thursday, 14-Dec-00 15:22:29