You are on page 1of 1

information security technical report 11 (2006) 159

available at www.sciencedirect.com

www.compseconline.com/publications/prodinf.htm

Editorial for v.11 n.4 of the Information Security Technical


Report: ‘‘Windows Security Revisited’’

In the current climate, it is almost impossible to discuss within the Vista security architecture, demonstrate that the
any security relevant threat and countermeasure without insider threat is not lost in the hubbub of looking outside for
turning to end-host (and ultimately Windows) security. With our threats. Dealing with insiders intelligently – in particular
the planned release of the new Vista Operating System sched- contractor and third-party insiders – is clearly only going to
uled for early 2007 it is interesting to see, through a number of become more important as processing environments become
the articles in the current edition of the journal, the progres- increasingly pervasive and accessible.
sion in security design within the Windows architecture. Defence in depth is something which has been preached
A few key themes emerge through this edition of the ISTR: by many over the years. However, achieving it without leav-
the changing security landscape; the insider threat; providing ing unintended holes is clearly a difficult task. Providing
defence in depth; treating security design as a process, not an security mechanisms at the device interface, and intrusion
end tool. While these topics are in evidence throughout the detection at the application layer highlights the need for gen-
articles collated here, for us it is interesting to see how their uine end-to-end security in any environment. It is good to see
inclusion reflects concerns that go beyond the provision of that the design process for Vista has this as one of its core
a secure computing environment within Windows. It is our themes.
belief that these issues are integral to current thinking Finally, as Vista becomes the first operating system from
throughout the wider security community. Thus, when we Microsoft to be designed under its new Security Development
reflect upon the discussions in the current articles, we should Lifecycle, will it make a significant difference to security in
be able to gain insights into the ongoing challenges facing the what is inevitably the most targeted platform on the Internet?
security community at large. Will Vista genuinely make it easier to manage security at the
The changing security landscape is reflected in three ways: desktop, and will the impact of defence in depth and easier
the need for a new security API within Vista; the requirement management be enough in the face of attackers who are
for increased security at the device interface; and the discus- becoming more financially motivated? Only time will tell.
sion on virtualisation. In combination, these articles highlight Geraint Price is a lecturer in Information Security at Royal
how important it is to do two key things in security: consis- Holloway, University of London. He lectures on the underlying
tently analyse how the threat model changes in our computing security technologies of relevance in distributed security envi-
environments, and ensure that our protection mechanisms are ronments. In addition he researches in the areas of PKIs and
able to change at a pace that is consistent with those changing distributed systems’ security.
threats. The threats we face in any computing environment are
limited only by the inventiveness of the attacker. As these arti- Dr. G. Price
cles demonstrate, if we are not able to change at a similar pace, Information Security Group,
then our efforts could all be in vain. Royal Holloway,
While most security surveys for the past decade highlight University of London
the importance of the insider threat, virtually all common- E-mail address: geraint.price@rhul.ac.uk
place tools on the market are designed to mitigate the external
threat. The article on device interface security highlights the 1363-4127/$ – see front matter
risks faced by those with easy access to hosts. This analysis, ª 2006 Elsevier Ltd. All rights reserved.
coupled with the adoption of the principle of least privilege doi:10.1016/j.istr.2006.09.003

You might also like