Edward Amoroso is the chief security officer at AT&T in Florham Park, N.J., as well as a professor who has written several textbooks on information security. Amoroso spoke with Network World's Jon Brodkin this week in Boston, where he delivered a keynote about network security during Forrester's Security Forum.
NWW: What are your biggest security challenges at AT&T?
Amoroso: The biggest challenge right now is sensitive personal information being all over the place, Social Security numbers, credit card numbers. It's an IT problem. I'm not even convinced it's appropriate to call it a security problem, it's just IT infrastructure has developed in a way where that stuff is all over the place. We're encrypting the whole company. That's a pretty heavy-handed approach to solving the problem, but that's really the only option.
NWW: Have you lost any sensitive data?
Amoroso: We've had some laptops that have been lost just like anybody else. So we report those and move on. That's been the extent of it, it could be worse.
NWW: You also spoke about network security and defending against botnets and denial-of-service attacks in your keynote.
Amoroso: That's our second-biggest challenge. Keep in mind, we're a service provider, so the availability threat is way more important than if we were selling software. If Microsoft.com is down for an hour, it wouldn't be good but it's not a stock-price-affecting problem. If our network services are down for an hour, that is a very big problem.
NWW: Will AT&T be able to successfully defend against these botnets?
Amoroso: We do it now. These things we see, a lot of them are aimed at us all the time. Any carrier that says 'we're not under attack' is lying to you.
Last December, we saw some pretty significant increases in traffic aimed at our host. We think that somebody was aiming big denial of service attacks at our hosting DNS services. We just filter the traffic, we survive it. It's just the normal course of business for that stuff to be lobbed at you, and you block it.
NWW: You're an adjunct professor of computer science at the Stevens Institute of Technology. What can we expect from the next generation of computer scientists?
Amoroso: They're good hackers, that's for sure. They come in and they've been reading hacking magazines since they were little kids. There's a lot of foolishness in youth so a lot of young people do design attack tools. They're better [than previous generations]. But they're also better as computer scientists. I would say there's a general uplift in capability, good and bad. It keeps me sharp. They let me have it if I don't know the answer to something.
NWW: If this new generation of computer scientists is smarter, what kind of impact will they have when they enter the workforce?
Amoroso: I'm in my 40s. When I was growing up technology wasn't generally available. Young people today are growing up with technology and they speak it fluently the way you speak French in Paris.
My kids, I buy them these complex gaming systems. My son, he'll go online and buy these hacking devices, and expanded memory and a way of bridging Wi-Fi to our video, and to his camera. There's no manual, there's no anything, he's just sort of natively doing it, and it just works.
When he gets into the workforce, I don't know if he's going to be an engineer, a lawyer, a doctor or whatever. But whatever he's doing he brings that capability to bear. If he goes bad and decides he wants to be a hacker then we've got a problem because that's a kid who knows what he's doing.
NWW: Back in 1999, you helped lead security for the White House's Y2K Information Coordination Center. What was that like?
Amoroso: That was cool. I got a jacket.
Actually, it's interesting. In October of 1999 a group of us got called up to Carnegie Mellon University to get a briefing on something called a DDoS [distributed denial-of-service] attack tool. They showed us how you could drop DDoS zombies into a bunch of PCs and then the zombies can attack a site. We looked at it and I freaked out and I said the Y2K center would be an awesome target for a DDoS attack.
NWW: So what happened?
We went whoa - this is not fake, it's real, it really can happen. Nobody did it to us, I don't know why, they could have.
NWW: How did you prepare?
Amoroso: I had no idea what to do. We were watching. If they were overwhelming a server we were ready to turn the server off and on, ready to pull the plug on the connection and pop it back in. That kind of stuff, just like in your home if your PC's going nuts. That's all we could think of.
This story, "Biggest Security Challenges" was originally published by Network World.