Home  Articles  Preparedness  The Mayflower  Go Navy  Self-Defense  Photography


  Gonzo's Photography Pages   




Terms & Conditions    Disclosure    Privacy Policy    Cookie Policy    Disclaimer    Copyright Notice

 

     ~ Microsoft TechEd 2007 - Orlando, Florida ~     

Day 1 Day 2 Day 3 Day 4 Day 5

In Review Photos

 

"The annual Microsoft TechEd conference is to computer geeks what the Sturgis bike rally and Daytona Bike Week events are to the bikers - minus the half naked women, of course.  The aviators have Osh-Kosh, the drag racers have 'The Big Go' and the NASCAR people have Daytona.  We make our pilgrimage to TechEd!"

Day 1:  6/4/07

The first day of any event like this is always the most – well – hectic.  People everywhere!  Thousands of computer geeks all trying to go in different directions through a convention center, but at the same time all trying to get to the same place – the place where the food is and the opening keynote speech.  Once the keynote was done, things sort of calmed down as people went to the various breakout sessions.  This convention center is huge!  They could fit a few football practice fields in this one building alone.  In the main building where the breakout sessions were held, it is a quarter of a mile from one end to the other.  And given that some sessions were on one end, and some on the other, we walked this quarter mile span several times a day.  The images of the main expo area don’t begin to do this place justice, insofar as giving a good depiction of the size of this facility.  The building we were in was around a million square feet, according to sources we asked.  And it was carpeted from wall to wall.  Has to be one big, honkin’ vacuum cleaner they use in that place!

The keynote by Bob Muglia started the conference.  He specifically made a point of downplaying Microsoft’s “vision” of the future, and instead discussed what they are doing now.  Security is a big theme this year, and is being discussed in some way in many of the sessions being offered this year.  Many of the breakout sessions if not directly dealing with security, touched on security in some aspect.  One very important idea being brought up this year is that risk analysis is a large part of any program.  Everything should be looked at in terms of how much risk there is in losing the asset – in this case data - and how much it costs to protect that asset.  I was reminded of the old saying that you shouldn’t “…protect a $10 dollar horse with a $50 dollar fence…” 

 Another important idea lending itself to these concepts is the fact that criminals and the reasons for attacking computer systems have changed, and therefore our security strategies must change.  It used to be that the reason for stealing a computer was just because the computer itself was a valuable asset and could be re-sold for a lot of money.  This was the same mentality, for example, exhibited by someone who broke into your house to steal your television set, stereo and music collection – they can quickly resell those items because of their high intrinsic value.  Nowadays, it is the data that is the important target of attack.  If someone can get your social security number or credit card information, that is worth more in terms of reusable long-term gain than the one-time sale of the computer.  And if they can get that same information about hundreds or thousands of people, then they can sell that information for large sums of money, and they can sell it over and over again.   In a recent news article it was revealed that a thief can sell one person's identity for anywhere from $4 to $40 because the thieves buying this information can then easily open fraudulent credit accounts under the victim's names.  In other words, your identity and personal information are the targets of attack – they don’t want your new laptop, they want your identity.            

 There were a number of new tools being introduced and discussed in depth.  The problem with this conference is that we geeks were like kids in a candy store – so many presentations, but how to decide which ones to attend was a real challenge.  I think I changed my schedule a thousand times!


Day 2:  6/5/07

Two recurring themes are emerging from the sessions so far:  User awareness and risk analysis are key elements of the security of any system.  Many of the technologies that continue to surface still have the interesting aspect of the “man-to-man” factor.  That is to say: no matter how secure any new software code developments have become, the weak link is still the human.  For example, if a human still clicks on every email link presented to them, then they are still putting their systems and data at risk.

Steve Riley’s presentation on “Being Secure Versus Getting Work Done” brought out very important ideas – that of offering a way to help the IT professionals in the trenches get more management buy-off on security projects by expressing the need as a matter of cost.  Or, as he stated, by not putting things in “propeller-head” terms, but rather in business terms, it would be easier to get management buy-in for security projects.  For example, we don’t need a new antivirus solution because of all the cool technical bells and whistles that it will give us, but rather we need it because it will save thousands of dollars per incident in IT staff costs and lost worker productivity costs.  Everything that is expressed in terms of how much it will cost if we don’t do it, or how much it will save, or especially how much it will result in increased sales and revenue will immediately get management’s attention.

One of the other main points in Steve’s presentation that I thought interesting was that the numbers of attacks by WORMS have actually decreased, but the number of attacks related to identify theft has increased.  The attackers have changed.  Malware has become more sophisticated, attacks are useful longer, and vulnerabilities discovered in software now have a street value.  If someone discovers a system’s vulnerability, they can sell that information to malware writer’s, who can then turn around and write an attack against that vulnerability. 

Being secure, according to Riley, is then boiled down to three main tenets:  Being SECURE, being USABLE, or being CHEAP.  You get to pick any two.  If your systems and solutions are secure and usable, the solution won’t be cheap.  And if you want your systems and solutions to be cheap and usable, they definitely won’t be secure.  This is where risk analysis comes into play to ensure that you are evaluating the cost of securing versus the cost of losing the information that is being protected.

On a final note, Steve made an interesting point by asking the question:  “Is email even useful anymore?”  He gave a (not too surprising) statistic that stated that 82% of all email is SPAM - unsolicited email to either sell you something, or just discover if your email address is active.  I might even classify the endless forwarding of jokes, hoaxes, and other misinformation in this category as well.  I mean really – of the 20 or 30 emails I get at home per day, maybe three of them are information I can use, or are “real” correspondence from a friend or relative.  I never really hear from people anymore – I just get forwarded jokes on a daily basis.  Oh well – at least I know there are still alive and well, which is a bonus.

But this made a very strong case, as Steve pointed out, for the idea that email should become subject some sort of “postmark” process, whereby sending an email would “cost” you in terms of a few extra seconds that it would take to generate an electronic postmark and attach it to outgoing email messages.  Yeah, I know – you are all up in arms about being charged a penny to send an email.  But Steve’s idea is a cost in terms of computer processing, not monetary cost.  In terms of us regular users, it would take a few extra seconds to send an email – in other words, no impact, unless of course your email is that joke that you are forwarding to 50 friends – then you may be waiting a few extra seconds for it to clear your outbox.  But for a spammer, who generates thousands (millions) of emails at a time, this would tie up their computers forever, and make spamming impossible.  This would (almost) make the need for email junk and spam filters a thing of the past.  I, for one, would wholeheartedly endorse this method for eliminating email spam.


Day 3:  6/6/07

One of the most interesting presentations so far:  “I Can Hack Your Network in a Day” by Marcus Murray.  He gave live demonstrations of the various ways to infect a computer with a Trojan horse, take over a computer, and potentially an entire network. The striking thing about this presentation is that he demonstrated how easy it is to create a Trojan horse program, send it to a gullible user and get them to execute it on their computer.  One of the big reasons I harp so much on the dangers of clicking on unknown links in emails, and opening email attachments.  This is exactly how these attacks get perpetrated and proliferated.  This also made a very heavy argument for patching.  There are exploits for everything, and growing by the day.  Keep your patches up to date, and stay on top of information about new threats.  And quit clicking on unknown email attachments!

Folks – the tools to do this are free and easily obtained on the Internet.  There are lots of malicious little hackers out there using them every day, and sending these things via email attachments and email web links to unknowing and unaware people.  These are the same people who will click on every link they get, and who will furthermore forward these things to everyone they know.  They are risking themselves, and if they are in a corporate network environment, are risking the company network and the data on it.   It is so simple for an attacker to send you an email, and “own” your computer within minutes. (The term “own” in the computer world means that someone else can come into your system, often remotely, and do anything they want with your system).  And don’t be so sure your antivirus and firewall programs will protect you from all of these types of threats.  The back-door Trojan that Marcus demonstrated (a program called “Beast”) has the ability to disable your firewall, antivirus, and anti-malware programs.   

Marcus went on further to discuss common attacks using USB flash drives and iPods – these devices get left “laying around” (translation:  planted by a hacker), and some curious passerby picks it up.  People just can’t resist the temptation to put that flash drive or iPod on their computer to see what’s in it, and BAM!  They are infected.  A malicious program is secretly planted on the computer and “phones home” to the hacker’s server.  The hacker can then control the computer, steal information, install the rest of their hacking tools on it, turn the computer into a “zombie” to launch attacks on more computers, and a wide variety of other bad things.

His final comment was simply that the OS itself is not bad, it is just poorly configured.  What that means to us is that once we build machines, or buy them new already built for us, we should be applying an aggressive program of hardening them.  Apply all the patches, install antivirus and anti-malware solutions, install and configure firewall software, and above all, keep updating the configuration with new patches and new antivirus signatures.

Marcus Murray’s Blog Site: 
http://truesecurity.se/blogs/murray/default.aspx

A presentation on Microsoft threat research by Vinny Gullotto revealed that 3,700 distinct malicious WMF files exploited the part of Windows fixed by MS06-001 patch.  This really puts this in perspective, because I remember the scramble we went through in early 2006 to get this patch deployed as soon as possible.  Vinny mentioned that 38 million+ pieces of potentially unwanted programs (PUPs) currently existed, which includes adware, viruses, remote control programs, Trojans, bundled software, and other modifiers.  This is staggering, as it really illustrates just how big our job as security professionals has become.  Some resource that Vinny mentioned are the Virus Information Alliance (VIA), the “Wildlist” for viruses, and the Anti Spyware Coalition (ASC).

The Wildlist: 
http://www.wildlist.org/

The Virus Information Alliance (VIA):
http://www.microsoft.com/technet/security/alerts/info/via.mspx

The Anti Spyware Coalition (ASC):
http://www.antispywarecoalition.org/

Another extremely interesting and energetic presentation was given by Laura Chappell, using Wireshark for troubleshooting a slow network.  Like the Marcus Murray presentation, she ditched the PowerPoint slides and showed live demonstrations of packet trace files and showed how to use the Wireshark packet sniffer to analyze packets to get to the bottom of network and computer communications problems.  The presentation was extremely interesting and she did a good job explaining the tools and methodologies.  It was amazing to find out how much traffic is being generated in the background by an infected computer, just during the boot-up process.  Her methodologies illustrated how looking at TCP/IP traffic can tell a lot about what is causing problems with an individual computer, as well as those on an entire network.

Laura’s expertise is in computer and network security analysis, and she went on to mention the same tactics mentioned in Marcus’ presentation: That of dropping a supply of USB flash drives or iPods all over the place and seeing how many phone home.  She tests this often, and fortunately her USB devices do not contain malicious software.  But in one example she gave, she dropped 128 USB devices in a parking lot; 124 of them phoned home to her server.  That is a clear example of how unsuspecting and unaware people really are.  This represents that almost 97% of these people took the newly found device and just popped it right into their computer.

For anyone interested in Laura’s materials, her lab kit and various articles are available on her web sites:  http://www.packet-level.com and http://www.wiresharku.com.  Laura is also doing amazing work with a project she started called the Internet Safety for Kids (ISK) project, which can be found here.  http://www.packet-level.com/kids/

The day closed with a thunderstorm and soaking rain.  I had to duck into a local Perkins to wait out the rain and get some dinner.  A little earlier than I like to eat, but it was pouring rain and I had a bag full of electronics with me:  laptop, Blackberry, cell phone, and camera – which I really didn’t want to ruin. So I hung out, got a burger, and waited out the rain.  Florida in Spring!


Day 4:  6/7/07

Today started with a presentation to get an insight into how Microsoft deals with IT security internally within their company.  With over 500,000 computers and 120,000 to manage, security is not an easy task, but Microsoft appears to have some sound strategies in place to handle it, whereby information security is process driven and based on industry standards.  The IT security staff at Microsoft makes up approximately 4% of the entire IT staff.  Much of what is done related to IT security within Microsoft revolves around the Enterprise Risk Management Framework and the Trustworthy Computing Initiative.  Policies are published, and industry standards are put into place to ensure security.  Executive sponsorship of the IT security tenets is very strong at Microsoft as well, which is one leading factor in the success of such programs.  In many organizations, IT security is viewed as a “tax to the business.”  That is to say that users view the security practices as burdensome and preventing them from doing their jobs. 

Price Waterhouse Coopers, Enterprise Risk Management Framework:
http://www.erm.coso.org/Coso%5Ccoserm.nsf/frmWebCOSOHome?ReadForm 

Trustworthy Computing Initiative:
http://www.microsoft.com/mscorp/twc/default.mspx

http://www.microsoft.com/mscorp/twc/twc_whitepaper.mspx

Technology, such as implementing network access protection (NAP), BitLocker (Windows Vista’s encryption implementation) on laptops, and implementation of two-factor authentication are some of the things that are used at Microsoft to ensure security security.  These technologies provide sound and secure methods to keep an environment secure, but still enable people to do their jobs.

What most impressed me about Microsoft’s internal information security stance was that they made their employees sign acceptable use policy acknowledgement statements, and that non-compliant (i.e. un-patched) machines were denied access to the network until they became compliant.  If a company like Microsoft can implement these types of processes, then why are so many of our other companies having such a hard time doing it?  I think part of the answer rests with the fact that many users are unaware, many users view the IT staff as the “network janitors” and many people simply view IT security as a tax (burden) on business processes. 

Mark Russinovich presented a talk on the changes in the Windows Vista kernel.  Some of the notable new features in Vista include user access control (UAC) and some features that provide better performance.  This includes such things as the ability to delay services so that they don’t all try to start up at once.  Many who run current and older versions of Windows can attest to the fact that all the services that try to start up at the same time can really make the boot process painful. 

The user access control feature is a big security enhancement provided by Vista.  This will eliminate the need for users to always run in the context of a computer administrator.  Those who have run OS’s such as Linux in the past have already experienced this type of environment, so those users won’t feel that UAC is a foreign concept.  If you are doing something that requires administrative privileges, you will be prompted as such with a grayed out desktop and a pop-up box that asks you to confirm administrative elevation.  The interesting thing is that the grayed out desktop in the background is only a graphic representation of a desktop, not the real desktop – this actually prevents malware from doing its job.
 


Day 5:  6/8/07

The final day of the conference!  On one hand, I want to hurry up and get this over with so I can just go home.  I have been on travel a lot lately – three trips (including this one) since the middle of April.  Living out of a suitcase and eating at Denny’s is getting old. On the other hand, there were so many presentations I wanted to see, but didn’t get to because of conflicts with other presentations, and wanting to visit the vendor expo.  The crowd has really thinned out by now, but there are still quite a few people here.  I will be interested to find out how many people were in attendance this year – had to be well into the tens of thousands.

They saved the best for last.  I attended a few Mark Russinovich talks on the internals of Windows Vista, and using some of his Sysinternals tools to troubleshoot systems.  There are a number of free tools that fall under the former Sysinternals umbrella, but are now distributed by Microsoft.  Mark Russinovich’s tools are extremely easy to use and leave a very small footprint on the system because they don’t get installed.  By developing some troubleshooting skills and using these tools, the average IT technician should be able to better troubleshoot systems.  Troubleshooting is all about investigating and trying to see what should or should not be happening.  Process Monitor and Process Explorer give a much more in-depth picture of what processes are running, how much of an impact they are placing on resources, and even what malicious processes are trying to spawn processes that can harm your system.  Many of Mark Russinovich’s presentations from past TechEd conferences can be found on the web (see resources at the end of this article. – definitely worth a look.
 


The Conference in Review:

So what do most computer geeks take away form conferences like this?  Well, I took away some very important ideas from this year’s TechEd conference:  1) The attackers, as well as their motivations and methods have changed; 2) Everything in security must be approached from a risk analysis and economic standpoint; 3) People are still security unaware and must be educated; 4) Microsoft is (still) not the problem, as I have indicated in my blogs a number of times.

The attackers have changed:  Notoriety and getting attention used to be enough for the bad guys.  They just wanted to inflict damage, interrupt people’s lives, and get noticed for it.  But they figured out that this kind of deviant behavior pays, so they are out to make a buck by finding vulnerabilities, writing exploit code, and stealing data.

Risk analysis is everything:  It isn’t enough to simply say that you want to be secure.  It is important to find out how high a priority your risks really are and implement appropriate protections.  Security professionals have said it a million times:  “Don’t protect a $10 dollar horse with a $50 dollar fence.”  And in order to pursue projects to put appropriate protections in place, it is important to illustrate to management to economic benefits of these protections.  Otherwise, they will just view security as another expense for which they won’t realize any benefit.  As Steve Riley and Jesper Johansen mention in their book “Protecting Your Windows Data From Perimeter to Network”:  You are implementing security "so that nothing will happen."  Meaning that the goal is for nothing to happen to your data, other than it being safe and accessible. 

People are security unaware:  It’s not that people are blatantly against doing the right thing, it is mostly a case of them not knowing what the right thing is.  Further, they need to know how being secure will benefit them, not just that security is a mandated process.  If people have some insights into why they need to be secure, the benefits and consequences to them personally, and how to do it, it will be much easier to get their buy-in.

The TechEd experience was unique.  Not that I will be anxious to do it again (once is enough), but it was time well spent, and very informative.  I got to see live presentations from some well respected names in the computer security biz, and had a chance to see some of the new technologies that Microsoft is producing.

 

TechEd Photos:


Orange County Convention Center:

 

Keynote and Sessions:

 


 

 

Vendor Expo and Main Floor:

 

Orlando Airport and Flight Home:

 




 

Full Policy Pages    Terms & Conditions    Privacy Policy    Cookie Policy    Disclaimer    Copyright Notice

 

MOBILE USERS:  For best viewing - Turn Mobile Device Sideways
(Apologies - My coding to make mobile friendly not working yet)