![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]()
"It is
impossible for ideas to compete in the marketplace if no forum for SECURITY IN INFORMATION TECHNOLOGY Contributed by Sierra Systems Inc. � � Introduction
Security starts with
the mundane. Loss prevention, damage control, and prevention of liability are
the initial targets of security planning. However, security in the context of
information technology (IT) is not just the prevention of loss or damage. It
is a business enabler that is increasing in prominence, especially with
companies for whom communication and collaboration lead to increased
functionality and revenue. Even for older organizations with well-established
business practices, good information security allows safe and profitable
ventures into activities that would have been foolish not long ago. Being able
to perform legacy communications and transactions in a more secure way may not
be the most captivating and seductive ability, but it forms the foundation for
performing modem and progressive secure communications and transactions that
set organizations apart from their competitors.
In this context,
security is a process that allows you to maintain a level of
confidentiality, integrity, and access
appropriate
to the resources you want to protect, such as systems, information, processes,
or any other personal or organizational asset. By the same token, security is
not a constant state, nor is it a tool. It cannot be purchased in a piece of
software or hardware. It is an approach and a process of continuous control
and improvement that must be considered along with any other requirements. It
must be integral to the design, creation, operation, and retirement of any
business�-critical resource.
Once the basics of
IT security are addressed, security tools and processes help to create and
optimize business processes and avenues that may not have previously been
open. Appropriate security can allow you to enter regulated or controlled
markets that are otherwise inaccessible.
Compliance with
regulatory and industry security standards can become a competitive advantage
if it is achieved in ways that enhance operational efficiency and
effectiveness.� Customers that are wary of electronic transactions can be won over if
the information security practices and infrastructure arc demonstrably
dependable — especially if they can be audited by a known auditor. This
paper explores these basic risks faced by any organization that depends on IT,
and provides perspective and potential approaches to the business benefits
that can he attained through better security.
Essential Security Risks
There are many risks
faced by an organization that relies on its information technology for
business-critical activities. These risks may include functional loss through
direct electronic intrusion, functional, financial or intellectual damage
through an information security breach, or indirect damages and liabilities
that may fatally cripple an organization. It is important to recognize the
differences in progressive degree of damage. A direct intrusion against an
organization may be a serious affair, but indirect damages may be more
damaging and less obvious. Indirect third-party damages may have far-reaching
functional, financial and legal consequences.
“We
have been Hacked!”
This distressed
announcement indicates a direct intrusion event:
This is the classic
security incident — an electronic intrusion. You may not know who is behind
the incident, or even if it is manual or automated. You may not know where the
intruder is, or even if they are inside your organization. You don’t know
their plans or extent of actions they’ve already taken. What is known is
that you have lost control of your resources. This may lead to an immediate
interruption of normal business and possibly lead to other consequential
internal or external damages. Unfortunately, discovery of this type of event
is comparable to finding the lock broken on the door to your office; while it
maybe the work of vandals who made no entry, it often signals further damage
inside.
“Hacker Accesses
Patient Records” (The Washington Post) “A hacker gained access to
confidential medical information at the University of Washington Medical
Center, using the Internet to download thousands of files containing patient
names, conditions, home addresses and Social Security numbers, hospital
officials said yesterday. "The intruder ... tapped into two databases
containing 4,000 or more patient records. [A] Web site in the Health Sciences
Department of Pathology, which served as the platform for the hacker,
previously had about as much security as a computer dedicated to history or
literature, even though it was linked to databases containing patient
records.”
“How
did they know that?”
Strange events maybe
your only clue to an incident that results in serious indirect damages:
This sort of
information security incident may be facilitated by anything from clerical
errors to an undetected intrusion, and can be very damaging to an
organization. In more complex forms, an intrusion that leads to the loss of
sensitive information may undermine every action taken by the company — yet
go undetected for long periods. Many organizations that fall victim to this
choose not to publicize it, fearing additional loss of credibility and good
will.
“Hacking of Web game
EverQuest linked to local teen” (The Seattle Times) ... [A teenager’s
hacking gave him] access to personal information on hundreds of thousands of
players and Sony employees. The hacker.. .was able to access the home
computer of the company’s vice president of product development, Brad
McQuaid, and downloaded documents for an as-yet-unreleased version of the
popular role-playing fantasy game. Sony, which declined comment on the
investigation, says the game is played by as many as 400,000 people worldwide
and reaps more than $50 million a year in revenue.”
“They are suing us!”
If consequential
damages from an incident proceed to the point where they affect other parties,
you may find yourself in a most serious situation:
Direct intrusions and
cracks with ongoing damage may not be the worst events an organization faces.
Consequential damages such as the loss of personal information confidentiality
may lead to a loss of continued access to business. Loss of financial or
medical records that you are legally mandated to protect could mean stiff
penalties. Losing control of critical systems in certain environments may lead
to secondary or tertiary consequences that include the loss of life. These
third-party liabilities can lead to loss of market share, loss of good will,
and even to issues of criminal liability. Many people are unaware that company
principals can actually be jailed for criminal negligence or other liability
charges if poor company security practices are to blame for serious loss or
injury.
“Mounting a
Defense” (Government Executive Magazine) “In 1992, a reclusive young man
from Portland, Ore., used his computer to gain [root-level] access to the
control systems for all the dams in northern California. He first penetrated
the Bureau of Land Management’s computers in Portland, which provided the
system connections he needed to enter the dam controls. PhantomDialer, or
PhantomD as he was known among hackers, could have opened the gates of the
Oroville Dam and flooded the surrounding region, causing incalculable damage
and loss of life. .. .60 miles south [of Oroville Dam] is metropolitan
Sacramento with its 1.5 million people.”
Key Security
Benefits
IT security that
effectively balances the needs and risks faced by an organization should
provide a number of functional benefits to the organization. These may
include:
Well-designed security
architectures provide these benefits as well as risk reduction. While it comes
as no surprise that good news never gets as much airplay as bad news, being
recognized as having a good security infrastructure usually goes along with
recognition for strategic and effective use of technology in general.
Conversely,
poorly-designed architectures invite subversion of security measures and
practices if they are not synchronized with the day-to-day reality of how the
organization works. If individuals in an organization need to thwart or bypass
standard security tools and pohcy m order to do their work, the current
architecture and business activities are in need of re-examination and
coordination. Generally this sort of internal lack of synchronization is
evident to external parties as well, if only as an appearance of
disorganization.
“We
could not do that before!”
Just a few years ago,
it would have been considered too risky to share networked resources with
vendors, partners, and customers. With a good security architecture and
compliant infrastructure, it is now possible to have shared collaboration
systems available over the Internet to international partners, using
encryption and authentication tools that make it even more secure than the old
manual methods.
“M.D. Anderson
Cancer Center details plans to beef up wireless LAN security” (Computerworld)
“The MID. Anderson Cancer Center in Houston plans to beef up security for a
wireless LAN pilot project with technology that can rapidly and dynamically
change encryption keys to block hackers from accessing private information....
Technical papers published this summer pointed out the vulnerability of
encryption keys to over-the-air sniffing [and in response] the center has
decided to augment WEP with dynamic key management [that can] change keys
‘as often as every three minutes, if that’s what they want.’ [B]ecause
of security concerns and the strict privacy mandates of the federal Health
Insurance Portability and Accountability Act (HIPAA), Anderson is
‘proceeding cautiously’ with its wireless LAN pilot pixject. [Thel system
offers ‘a near-term solution to secuflty issues,” adding that other issues
with WEP “must be addressed in the two-year window prior to HJPAA
compliance’ ... ‘which requires data to be secure in transit and
storage.”’’
“We
can make money with this?”
“Security—Building
Trust to Enable eConimerce” (IDC) “... No longer just insurance, security
is the foundation on which e-conimerce will be built, as security coupled with
new business processes allows for the creation of trusted business
relationships, whether business-to-business or business-to-consumer. [..j The improvements
m a number of security technologies have allowed companies, especially large
ones, to increasingly regard security as a positive infrastructure element.
This infrastructure issue was driven by the need to expand trusted
relationships with customers, partners, suppliers and channels. Most
companies’ greatest asset is their content. The ability to use security
technologies (e.g., authentication and authorization) to enable greater access
to corporate content deepens and stabilizes relationships. These trusted
relationships can yield numerous benefits, such as higher transaction rates
with greater scalability, lower cost per transaction, transference of
personnel from low-value interactions to high-value personalized service, and
so on. Overall, enterprises increasingly use security products and services to
help them dramatically scale revenue, transactions, and/or customers at high
double-digit rates while confining cost increases to single- or low
double-digit rates. If implemented successfully, this practice ensures
profitable growth.
“This
saves us money.”
“Radical move:
States try tax outsourcing” (Computerworld) “A small group of companies is
participating in a project to outsource sales tax collections. State
government backers of the project hope it will revolutionize the way sales
taxes are collected and paid. Taxware International Inc. in Salem, Mass., and
subcontractor Hewlett-Packard Co. have developed a transaction server that
interfaces with a merchant’s retail system via an Internet connection to
automate tax calculation at the time of sale. What makes this project
groundbreaking is the agreement by participating states to ...shift some of
the potential routine tax audit liability—a major burden for businesses—to
the outsourcing vendor. IT and tax managers said that for a remote tax
transaction system to work, it must address security, the transaction-
processing speed and the accuracy of the tax calculation. But if those
concerns can be satisfied, the potential benefits, including reduced
compliance costs, will be attractive to firms.”
Integrating
security in an organization
How can your
organization avoid undue loss and liability, and leverage security to provide
tangible benefits? By having a plan, and following through. Overall, a proven
way to integrate security is to start with these basic phases:
When defined and
documented, these are the key aspects of a “security architecture” where
each component builds on and supports the next Inventory, assessment and audit
provide the information necessary to create a security policy synchronized
with the real risks and requirements of the organization. With this policy in
hand, security procedures and IT disaster recovery plans can be created.
Operational experience using these procedures and plans creates feedback
information that is useful in subsequent assessments and audits.
Within this
architecture, risks should be addressed through prevention where appropriate,
control for events that may still occur, mitigation if damage occurs, and
plans for recovery and restoration. Design of a good security architecture
hinges on good information and good judgment; extreme security is often
extremely expensive and inappropriate.
Not all incidents or
events can be prevented, and mitigation or acceptance should be considered as
appropriate responses to some threats. Some threats may be simply accepted
because the risk is very low. The risk of many normally-anticipated threats
may be protected against through common security measures. Threats with a very
low risk but extreme consequences may be addressed with mitigating actions,
such as insurance and recovery plans, rather than taking preventive measures
that are prohibitively expensive or hinder normal business practices.
Recommended
solutions
Clearly there are
risks present to any public or private organization, and the appropriate way
to address these risks is through appropriate security architecture. Creation
of this architecture is a nontrivial activity, but neither is it a long and
drawn-out process. Even in the largest and most complex of organizations, the
most effective approach is an iterative one, addressing immediate issues with
tactical solutions and long-term issues with a process that contributes to
continual refinement of the architecture.
Partnering with a
security service organization that has experience in your line of business
increases the likelihood of success in developing the most effective, most
beneficial, and least intrusive security architecture for your organization.
Visit the Authors Web Site Inquiry Only - No Cost Or Obligation
� ![]() �
Search the ENTIRE Business
Forum site.�Search includes the Business
|
� |