Advertisment

FOCUS ENTERPRISE SECURITY: For Your Eyes Only

author-image
DQI Bureau
New Update

The Slammer: Malicious code has emerged as the

single-largest factor behind security breaches. According to the CSI/FBI Survey

2002, more than 94% of large corporations worldwide have had sizeable downtime

and financial losses due to malicious code attacks. As per the recent

CII-PricewaterhouseCoopers Survey, 75% of Indian corporates have had serious

incidences of malicious code attacks "forcing them to shut down external

connections to the Net, resulting in large losses due to downtime and lost

business opportunities". The recent SQLSlammer attack is a case in point.

Electronic Scavenging: Next to security breaches caused by malicious code, the

second major cause of a security breach–often used for corporate espionage–

is ‘electronic scavenging’. Electronic scavenging involves rummaging through

disposed magnetic media for retrieving sensitive data that is left behind on it.

Results from an MIT study, which is being published in the January/February 2003

issue of IEEE Security and Privacy, suggests that t
he secondary market is

awash with confidential information. Scavenging through the data retrieved from

158 used and formatted disk drives, the students at MIT’s Laboratory for

Computer Science found more than 5,000 credit card numbers, detailed personal,

and corporate financial records, numerous medical records, gigabytes of personal

email, and pornography. The intention here is not to scare you. How-ever, if you

are one of those who consider data a critical corporate asset, and essential to

business continuity, read on...

Advertisment
WHO’S THIS STORY

FOR?
An IT chief in a

mid-size company, managing growing amounts of data
WHAT DOES IT

ANSWER?
n What

are the real threats?




n What

do I protect? How?




n How

much should I spend?




n Which

product should I buy?




n Will

it impact our business?

While integrity, confidentiality and availability of data that a computer

system or a network holds are increasingly becoming the lifeline for any

organization, the growth of threats and vulnerabilities that affect data

integrity, confidentiality, and availability have unfortunately kept pace with

the growth and development of IT itself. No wonder then, managing information

security has become a high priority area for organizations. The objective of

information systems security is to minimize the risks in the use of IT while

optimizing performance and introducing predictability to operations. While the

nature of threats to an organization’s information assets continues to change,

the good thing is that the efficient use of people, processes, and technology

still continue to remain the foundation of an effective security management

initiative. However, before proceeding to determine what needs to be protected,

what is more critical is the degree of protection each asset requires. The

security levels need to be determined in order of priority, and people across

the organization should be aware of the same.

Analyze your business impact



Most organizations realize the need to protect their systems adequately. The

challenge is how to determine what to protect and how much should be protected

in addition to issues related to costs. The answer is simple, though tough to

implement and quantify. Allocation of financial resources should be on the basis

of the value of information they seek to protect. An information system in an

organization involves people, processes, and technology. It is important that an

IT security solution design considers all the above factors. The business impact

analysis is also important to understand the degree of potential loss that may

occur. This will cover not just direct financial loss, but other issues, such as

damage the reputation and regulatory effects.

Advertisment
Security

Best Practices
nÂ

Create security-aware culture by educating staff
nÂ

View security as a business issue and plan for it upfront with

major initiatives
nÂ

Perform risk assessment
nÂ

Create security policy based on global standards (e.g. ISO 17799)
nÂ

Design, build, and implement security architecture within IT

environment. Evaluate return on investments of security spends
nÂ

Have dedicated people to manage security (CISO)
nÂ

Implement appropriate technology tools with a clear target–of

managing risks
nÂ

Ensure default configurations are hardened and security features

available in existing hardware/ software are effectively used. (E.g. OS,

firewalls, routers, ERPs, and other applications)
nÂ

Keep technical security defenses (e.g. anti virus) up to date
nÂ

Periodically test security effectiveness (security audits,

penetration testing)
Source:



CII-PwC IT Security Survey, 2002-03

Business impact analysis (BIA) is essentially a means of systematically

assessing the potential impacts resulting from the exploitation of

vulnerabilities. This involves a comparison of the cost of the risk vis-à-vis

the cost of controlling the same. Also, the probability that vulnerability will

be exploited needs to be determined. To determine BIA, it is important to first

classify the information assets, which in term will help determine the area of

concerns. Based on this one can figure out the vulnerabilities and probability

of security breaches. Multiply vulnerability with probability and you have in

hand the business impact.

Compare this with the cost of managing the threat and you have the order of

priority in which they need to be protected and hence the deployment cycle.

Advertisment

Having determined the business impact and having compared it with the cost to

control/mitigate the risks, one is aware both of the order of protection and the

level of protection sought. This enables the organization to spell out its

requirements and decide on the technology/products that best meet its needs,

considering a number of other factors as well like cost–both one time and

recurring, and upgradation capacity.

It is also important to understand and categorize your security

considerations on the basis of how it needs to be tackled. Information security

products are broadly classified as technological and ‘soft products’, or ‘non-technological

services’. Purchasing information security involves mapping the purchase

decision to business requirements in a phased manner.

Categorize your needs



Security considerations of today are different. It includes protecting

against attacks coming from the Internet and the Intranet, enabling trust and

privacy protection for e-transactions, controlling access to systems and

performing security management. Security management needs can be categorized

into three broad areas–identity management, access management, and

threat management.

Advertisment

Identity Management: Web-based technologies have spawned major changes

in how business is conducted today. Faced with this accelerated change in

business growth, business managers need to find new ways to control access to

corporate resources, along with new tools to secure those accesses. They must

also comply with new privacy regulations that require enhanced security for user

access to systems while meeting increased cost constraints.

Smart is Not Always Cheap
It’s important to note that while there’s nothing better than a “cheap and best” option, best of breeds may not come cheap. Also, while cutting through the hardsell, remember three basic maxims:
nÂ

Always go to the core technical team of vendor, instead of relying on the company’s marketing team. This saves time and effort;
nÂ

Insist that the concept–requirements, response time, and other such critical issues–are clearly noted on paper, apart from the bills and other relevant paperwork. This would put in clear perspective the vendor understanding as well as the material requirement; and
nÂ

Always deal directly–as far as possible–with the principal and not just the representatives while negotiating. This will help in avoiding future confusion and cost or time escalation.

Identity management is the creation, management, and use of online or digital

identities. It also helps an organization track and maintain personal

information through directory systems, provisioning tools and synchronization

services that automate the user management process across human resource

applications, IT systems, and non-IT environments. It should also be able to

help increase productivity while reducing user support costs. Usually all

standard identity management tools come with web-based self-administration tools

and features like single sign-on solution, which enables strong authentication

using a range of techniques including PKI, biometrics and hardware tokens. In

addition, an identity management tool should be scalable so as to keep pace with

the business growth and needs.

Advertisment

Access Management: Business-critical data and processes are more

vulnerable than ever due to increasingly sophisticated attacks and the dispersal

of applications across the extended enterprise. Native platform security–whether

a web server, application server, or an operating system–is ineffective

against internal and external attacks that gain access to administrator

privileges. Additionally, privacy and commercial confidentiality requirements

often conflict with system administration rights, which may provide unhindered

and unmonitored access to sensitive business and personal data.

The best access management tools are those that can address these issues with

a comprehensive access management solution that holistically monitors platforms

throughout the business for conformance to access policy, including distributed

servers, applications, mainframe systems and physical access devices. It also

helps organizations decrease the risk of internal and external attacks, thereby

enhancing system availability. In addition, it helps reduce costs with

centralized administration and enhance usability through personalization.

Threat Management: Hackers as well as political activists, competitive

snoopers, and disgruntled employees, drive the proliferation of threats that

include dangerous viruses, worms and malicious code. Even subtle outbreaks of

these threats can bring company operations to a halt, leading to severe

financial losses and countless hours of lost productivity. In addition, simple

everyday activities such as sending and receiving email, sharing files,

utilizing online resources and conducting real-time transactions can rapidly

disrupt an under-protected environment.

Advertisment

Threat management solutions enable organizations’ to elevate their current

defensive security practices to proactively protect against today’s and

tomorrow’s threats. It enables organizations’ to isolate, contain, and

extinguish enterprise threats and prevents further infection during a virus

outbreak.

Once you have categorized your security needs, its important to evaluate each

of the products based on where it fits in the entire need matrix of the company

and compare it with the business impact before you sign on the dotted lines. Any

business whose network is exposed to third party networks or connected to

multiple physical locations where the database is distributed across the network

and users log in from remote locations regardless of its size needs to invest in

security solutions.

The scale and exact nature of security solutions to be deployed will of

course vary on a case to case basis.

Advertisment

Enterprises require from their security solutions the same ‘abilities’

that business demands from IT. These include affordability, flexibility,

interoperability, manageability, and scalability. IT executives should ensure

that IT requirements at their enterprises include detailed current information

about security needs and that chosen and candidate solutions address those needs

adequately.

Interoperability: This is one key parameter to evaluate any

product as security architectures, like IT environments they protect are likely

to remain hybrid, multi vendor deployments for the foreseeable future at most

enterprises. Unfortunately where IT security beyond fighting viruses is

concerned, many of the current offerings are fragmented, highly manual, and

reactive. Such fragmented or poorly interoperable solutions cannot deliver

maximum security and RoI. Hence care should be taken to ensure that the chosen

solutions integrate into comprehensive, synergistic and centrally manageable

resources. It should also interoperate with key applications and incumbent

security solutions to optimize both protection and business value and be easy to

deploy.

The security solution should be capable of running on a variety of platforms

available in the market and should be interoperable seamlessly. You should not

need to decide your operating environment based on security products. The

security products should mingle with your network without major restructuring.

The security products you are buying should also be capable of integrating

seamlessly with other best of breed ones.

Scalability: Another important question that a person needs to ask is

how scalable the security product or solution is. This is extremely important

and an enterprise should have a clear roadmap of possible future applications

and IT requirements as well as the security needs and have scalability built in

accordingly. All business application profiles (BAPs) and user application

profiles (UAPs), or their equivalents, should be updated, expanded, and

integrated with data from relevant security solutions.

This will help you best match solutions with specific requirements and

resources within the enterprise and evaluate those solutions more accurately and

realistically.

It is also important that you choose a vendor who keeps abreast of the latest

operating systems and platforms by releasing new versions and can demonstrate

you a clear roadmap of the same. The roadmap claim should be backed-up through

historical proof. Also, the upgrades should be automated and should be

implemented with a minimum of user disturbance and no system downtime.

Vendor Support: While most of the big companies have in-house

resources to manage their IT need, a majority of the smaller companies cannot

boast of the same. However, irrespective of whether you have the capability or

not, vendor support should still be an important criteria for choosing a

product. As a security solution includes a combination of hardware and software,

one should certainly look for services that include application support and be

very clear and specific about the service-level agreement.

RoI & Affordability: While security may be one of the few areas

where RoI is fairly obvious, even to non-technical business executives and

managers, you may still need to justify the investment every time. From an

affordability point of view you need to focus on security solutions and

approaches that support layered or tiered approaches. This can help restrain the

growth of security costs, generally and for specific applications, and lines of

business within enterprises. Proactive security management will help not only

maximize RoI but return on value (RoV) as well!

Shubhendu Parth

The 21 Best Ways to Lose Your Information

Have you ever wondered what the best ways are to get hacked, be adversely

affected by disasters, or otherwise lose information stored on your computer

systems? Here, in no particular order, are the 21 best ways to not secure your

systems:

n Don’t

pay attention to or even bother to understand what you’re trying to

protect.
n Leave

your databases, especially those containing confidential information,

unencrypted and store them on publicly accessible servers.
n Don’t

patch your software or update your virus signatures, and never run

vulnerability assessments to detect newly discovered software flaws and

system misconfigurations. It’s just too time-consuming.
n When

an employee quits or is let go leave his network log-ins and e-mail

accounts enabled. You never know when he might want to check in on things.
n Don’t

create any security policies that document how you’re safeguarding your

information to protect your organization and clients from information

disasters and legal liabilities.
n If

you do happen to have a security policy, never refer to it, enforce it,

update it, or do what it says.
n Completely

outsource your information security initiatives. There’s no need for

anyone inside your organization to worry about such matters.
n By

all means, don’t take an inventory of your information systems or

document your network.
n Apply

the principle of greatest privilege. Give all users the greatest amount of

access to your information systems. Everyone should have access to

everything–it’s only fair, right?
n Rely

solely on technology. Firewalls, encryption, and antivirus software are

all you need to protect your information.
n Run

your business without disaster recovery and business continuity plans.

After all, you can think clearly and make critical decisions under

pressure, right?
n Don’t

monitor your systems. They’ll be fine running by themselves, and if

anything major happens with the integrity or availability of your

information, you’ll be notified automatically, won’t you?
n Don’t

back up your data, but if you must, don’t test your backups. Also, leave

your backup media on-site–preferably sitting on top of an

uninterruptible power supply.
n Leave

your operating systems and software applications with the default

settings. System hardening is for the birds.
n Respond

to hacker attacks, viruses, and other intrusions as they happen–don’t

be proactive in dealing with them.
n Use

passwords that consist of your pet’s name, your name, your mom’s

maiden name, or your birthday. That way, you won’t forget them. Better

yet, just use "password" for your passwords. Also, don’t

forget to write them down and post them on your monitor or keyboard.
n Don’t

subscribe to security bulletins and mailing lists, and don’t ever read

information security trade magazines.
n Leave

your servers and network equipment in a room to which everyone, including

outsiders off the street, has access.
n Don’t

train your users on your security policies and what to look out for, such

as unsolicited e-mail attachments and common hacker activities. Your users

can’t be burdened with more training.
n Ignore

all known best practices and international information security standards

from the International Standards Organization, Internet Engineering Task

Force, SANS Institute and your local information security consultant, to

name a few. And finally...
n Don’t,

under any circumstances, get upper management involved in information

security initiatives. They’re business-focused and shouldn’t be

bothered or even care about technology or the liabilities associated with

their information, right?

Kevin Beaver, founder & president of Principle Logic

Security Forecast / Financial 2003-04

Firewalls



n  On the

end-to-end security front, VPNs will get integrated with firewalls thus

enhancing security capabilities.



n  Encryption
and firewall functionality will be embedded in network cards. Many vendors have

already incorporated this technology.



n  Content
filtering software will be integrated with VPNs, thus permitting VPN integrated

firewalls to filter content during the tunneling process itself, thus reducing

unnecessary bandwidth usage.



n  More vendors
will offer quality of service functionality integrated with firewalls. This will

allow bandwidth allocation amongst the various tunnels created by VPN integrated

firewalls.


Intrusion Detection Systems (IDS)



n  Switched

networks and traffic payload can be addressed using an in-line "packet

scrubber". A device like this would sit invisibly between two networks and

monitor all traffic exchanged, regardless of switches or hubs, while remaining

immune to attack attempts.



n  Problems in
analysis and correlation will be addressed using applications similar to fine

tune filters and rules in order to reduce false positives. This would over a

time help in providing IDS feedback system that would be based on administrator

input and response.



n  The future
of IDS lies in data correlation. The IDS of tomorrow will produce results by

examining input from several different sources.



n
  In future the concept of NIDS and HIDS will disappear, with

a group of distributed components performing specific tasks. The host will

perform packet analysis for encrypted traffic.



n  As opposed
to the heterogeneous mix of Microsoft, UNIX, and application specific rules in

place on most NIDS, the signatures would be tailored to one host.



n
  Instead of sensors capturing all traffic on a network, the

client machines will monitor their own traffic and run a recurring scan that

would quickly monitor which services and programs run on a machine, allowing for

an even more precise rule-set.



n  Future
applications would provide kernel and OS specific modifications which can

monitor logs, administrative actions, system accounting, and data integrity in

real-time.



n  While the
log results are usually only reviewed by an administrator when a user’s

machine has been compromised, the new trend will see clients automatically

report data to centralized monitoring stations. This will be like the present

management station concept.




Operating Systems



n  High-value

applications will continue to be hosted on mature operating system platforms

through the forecast period.



n  The process
of uncovering and repairing security breaches in Windows products will recur

through the forecast period, resulting in more robust versions.



n  The move to
server appliances for application and storage services will be motivated, in

part, by the fact that they provide standardized, pre-configured security

features.



n  Concerns
will emerge regarding the security of new operating systems for handheld and

cellular devices such as Palm OS and Symbian EPOC.


Authentication



n Tokens and

biometrics will increasingly augment password-based authentication for

high-value systems during the forecast period.



n  Two-stage
authentication systems that use more rigorous multifactor authentication to

provide access to critical data will be offered in the marketplace.



n  Trusted
third-party service providers will play a stronger role in both authentication

and authorization (via digital certificates) during the forecast period.

Malicious Code



n  Antivirus

software will continue to be the most widely deployed type of security software.



n  However,
security threats other than viruses will cause more problems, precisely because

antivirus software is already so widely deployed.

Virtual Private Networks



n  With the

availability of better encryption algorithms, integrated VPN and firewalls will

be deployed in future.



n  With
advancement in encryption algorithms like AES, BlowFish, IPSEC will become

stronger to give even more secure VPNs.



n  MPLS VPNs (RFC
2547 compliant) will increase the speed and security of VPNs.



n  Quantum
cryptography will make encryption more secure by rapidly changing the state of

the photons.



n  Virtual
enterprise networks will enable companies which have both a private intranet,

and a more public extranet to manage the twin requirements of keeping their data

and information assets secure at the same time allowing customers, partners and

suppliers to access relevant parts of their information systems and data, by

designing and engineering dynamic and logic-based security boundaries around

internal systems and data as opposed to the physical and static security models.



n  Organizations
will continue to deploy or enhance VPN architectures to support mobile workers

and exploit the ubiquitous Internet.



n  Trusted
third parties (certificate authorities) will provide key management support to

VPN users.





n  VPN

appliances will appear in the marketplace for both the enterprise side and the

user side of the VPN.

Source: SecureSynergy and PriceWaterhouseCooper

Advertisment