Security
Protecting Corporate/Network Assets

 

Firewall

A firewall acts as a barrier between security zones of an internal network and an outside network. A firewall is commonly installed between the public Internet and the corporate network. The firewall is configured to allow the types of network traffic desired by an organization and to deny all others. This protects valuable data assets like database servers from external attacks.

A firewall may exist as a dedicated piece of equipment much like a router or switch OR it may be firewall software installed on a computer that bridges the two networks. In either case, it is the configuration of the traffic rules on the firewall that determine the security level it offers.

Proxy

A proxy acts as a buffer between security zones of a network much like a firewall. The difference is that instead of allowing traffic to flow through it, it makes requests of networks on behalf of the connecting machines coming through it. This helps to mask the identity of the machines coming through it and further protect them. While a firewall may be deployed between security zones of an organization's internal network, a proxy is almost always deployed exclusively between corporate networks and the Internet.

Anti-Virus

Anti-virus software, or scanners as they are sometimes referred to, attempt to detect and block the presence and activity of malicious code. The majority of anti-virus software attempts to do this by comparing code to a library of known virus samples. This methodology of detecting a virus is called Signature Based detection. As new viruses are being developed daily, (several hundred per month according to anti-virus vendor labs) the maintenance and distribution of the known virus library is a resource intensive undertaking. This is usually accommodated with anti-virus software that regularly connects over the Internet to a central site for downloading of the latest definitions. Anti-virus software is available to scan electronic data at all entrance points to your system and network including client computers, mail gateways, firewalls, and Personal Digital Assistants (PDAs).

In addition to Signature Based detection, Heuristic Based anti-virus scanners are available. Heuristic scanners watch systems for signs of virus-like activity that may include writing to executable files, reading the email address book, or issuing destructive commands. Most modern anti-virus software packages combine elements of both types of scanning.

When anti-virus software detects a virus, the program can be set to delete or quarantine the suspect code.

Virtual Private Network (VPN)

In the past when organizations needed to extend their networks to business partners or remote offices, the only way to do it was to lease lines from a telecommunications company (telco). The leased lines formed the organization's private network.

A virtual private network works by using the public Internet while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP). As a result of the Internet's access to worldwide locations, the VPN allows an organization to extend its network when and where its needed without incurring a large investment. For example, an employee could work from home or a traveling executive could connect in an airport lounge through a secured VPN connection.

VPN connections use encryption technology and firewalls to mitigate the risks that allowing connections from the Internet entails.

Email

Email has become a de facto standard for all types of business communication from purchase orders and contracts to the relaying of instructions and requests. It is important to note that the majority of email installations have a large number of security weaknesses. For example, email that is sent unencrypted on the network makes it susceptible to interception by sniffers. As well, forging the From: address on an email is a trivial task.

Physical Security

Even when a computer system is secured (or hardened , in computer security lingo) to a very high level, the data is still vulnerable to an attacker who can gain physical access to the system. For this reason, computers with data that needs to be secured must also be physically protected in the same way that the data would require if the information existed in physical file folders. Organizations protect their computing and data assets by storing them in locked data centers with restricted access systems.

Open Source

Software where the source code is available to the users is called open source software. Open source proponents argue that because the source code is open to scrutiny by security experts around the world, mistakes in the code that could be exploited by attackers are found. Vendors of closed source systems have a valid point that the source code is available to the same attackers to study.

Several popular information security tools are available as open source as well. These tools generally break new ground in functionality before similar commercial tools.

Portable Computers

The portability of computers makes them especially susceptible to physical theft. This applies to laptops, Tablet PCs, Pocket PCs and Palm computers. The computer replacement cost is only a small part of the overall costs when a computer is stolen. The time lost by an employee while they await a replacement as well as time spent restoring the lost data can greatly exceed the hardware cost. To combat theft, cables and motion sensitive alarms can be affixed to standard lock down points on most laptops. Encryption software specifically designed to make data on laptops unreadable to others is also available.

Intrusion Detection System (IDS)

An intrusion detection system is a tool of information security and network professionals that detects unauthorized access to computer systems. It accomplishes this as a network device that analyzes network traffic looking for known attack patterns. It can then terminate the network session, blocking out the attacker. An IDS can also be installed on a web server or database server to monitor network traffic for attacks specific to those environments.

Public Key Infrastructure (PKI)/ Digital Certificates

A PKI is a technology and policy infrastructure deployed by an organization that enables the assigning of digital certificates to users and computers.

A digital certificate is a special file that a user or server can use to authenticate itself. It makes use of encryption keys and digital signatures to enable this. Digital certificates are issued from a certificate authority server in a public key infrastructure. By installing digital certificates in an email program, a user gains the ability encrypt and sign email messages.

One of the problems with the deployment of PKI and digital certificates is when users need to use their digital certificates from several locations. One of the solutions to this problem is storing the digital certificate on a smart card. A smart card is a credit card sized piece of plastic with an integrated computer chip. A user can then use their digital certificate anywhere a smart card reader exists.

E-Commerce

When a company chooses to use e-commerce to take advantage of reduced process costs in the buying and selling of goods, they must consider the risks in doing so. Policies must be adopted and implemented that ensure authentication and authorization are at levels the company requires to conduct business. The risks of accepting electronic transactions must be mitigated to acceptable levels with policy and technical controls.

Audit

Modern computer systems and applications are capable of generating extensive logs of all activity on the systems. This activity can include transaction records, security modifications, and records of attempts to conduct unauthorized activities. The security and audit departments of an organization should undertake regular reviews of these important logs.

Education

The overall security posture of an organization largely depends on the investment in information security education it makes. End users of computer systems must be made aware of the value of the assets they work with daily. Management must ensure that appropriate resources are made available to secure the organization's assets. Information technology staff must be kept up to date on the proper development and deployment of technology.

Employee Checks

The number of corporations using criminal record checks as part of their hiring processes is increasing. Employees, and especially information technology employees, are trusted with large amounts of data upon which the employer depends for its existence. In addition, some employers use credit record checks. The theory is that an employee in dire financial straits may be more likely to commit theft or be susceptible to bribery.

Policy

One of a corporation's most effective forms of protection is the use of policy . A computer usage policy for their employees reduces liability for an employee's actions. A security policy assists employees in ensuring that security is considered in all decision-making processes.

Web Site Security

Applications that are deployed on Internet web sites require special security measures compared to applications deployed within a corporation's network. On the Internet, these computers are under constant attack from outsiders. A poorly planned deployment of a web server on the Internet will only last a couple of minutes before it is attacked and exploited.

Securing a web server is not an easy job. The application that is deployed must have been designed and developed by a team that has considered security throughout the process. The host web site must have been installed and configured to a high security state. Additional security measures such as firewalls and intrusion detection systems should be properly deployed.

Wireless

Using radio frequency transmitters and receivers allows organizations to extend the reach of their network infrastructure beyond the range of hard-wired cables. This allows them to quickly and easily adapt to changes in their environment such as the move to new office space. Wireless networks also allow for computers and network technology to be applied in fields where it was not previously practical. For example a doctor may carry a tablet computer around with him on his rounds to make notes of patient conditions.

The first setups of wireless networking equipment had poorly implemented security standards and were susceptible to eavesdropping by outsiders. Since then, the technology has matured to a point where a wireless infrastructure can be as trusted as well as a wired one.

Encryption

Encryption is the act of encoding or ciphering a message or data into a format that is unreadable to unauthorized parties. Encryption uses secret codes to allow authorized parties to read the data.

There are a large number of encryption algorithms in use. The majority of them use methodologies that are widely known. What makes their application secure is the security of the keys used and not the secrecy of the algorithm themselves. The US government standard for encryption is the Advanced Encryption Standard (AES) algorithm. This algorithm replaces the aging Data Encryption Standard (DES).

The science of cryptography relates to the development of new encoding algorithms and uses for encryption. Current applications of encryption are capable of not only hiding data, but also of using digital signatures which allow parties to verify the source of email messages, program code and data.

Honeynet / Honeypot

A honeypot computer system is installed on a network system to study attack activity. The computer system would not contain any data of value, but may contain data that appears to be of value. System administrators monitor these systems to find indications of attack activity. Because the systems have no real business purpose, any activity on the system is known to be unauthorized. This helps them develop more effective defense systems for their production systems based on the attacks they see.