MN30281 – Privacy, Trust and Security in Information Systems Are Hardware and Software Security Key in Protecting the Mobile Workforce? Securing Information Assets in Organisations Elliot Chapple 08 Table of Contents Introduction: ........................................................................................................................................... 3 Security Vulnerabilities of Mobile Devices ............................................................................................. 4 Implications of Information Loss on Organisations ................................................................................ 5 Securing Information Assets from a Technical Perspective .................................................................... 7 Securing Information Assets from a Social Perspective........................................................................ 10 Conclusion ............................................................................................................................................. 12 Works Cited ........................................................................................................................................... 13 Appendices............................................................................................................................................ 15 2 Introduction: In the past five years the workforces of many organisations has become increasingly dependent on becoming mobile, allowing routine tasks to be undertaken in an out of office scenario this is so that organisation can benefit from the possible advantages such as improved customer service, higher productivity and the ability to respond to emerging markets quicker (Igbaria & Tan, 1998). In addition as advances in pervasive and ubiquitous computing technology have taken place, employees are able to easily access smaller technologies that have network connectivity and are able to connect with their organisations corporate IT systems and information, including laptops, smart phones and removable storage media such as USB disk drives. With this trend likely to continue such that this year, 2008, it is estimated that there will be over 100 million portable or media devices worldwide used within mobile workforces (Heikkila, 2007). As this evolution of the methods people work is occurring, there a number of critical issues that need to be addressed. Since the mobile workforce can now readily access sensitive or confidential information on the move, this has caused security concerns across all industries, and with constant reports of data loss from high exposure organisations or governments it poses the question can hardware and software security on these mobile devices fully prevent data loss through theft or through malicious practises? 3 Security Vulnerabilities of Mobile Devices As mobile devices have increased in capabilities over the past few years so have the vulnerabilities that they present to the modern mobile workforce. In the current hostile climate for mobile devices connecting to central corporate IT systems there is a need to acknowledge the main areas of weakness that organisations face when using such devices. Studies have shown that for example that the main weakness in using mobile devices is accessing the internet in public areas or through ad-hoc networks, where different nodes forward packets of data between each other and to the internet. This is particularly critical in the forms of mobile commerce or M-Commerce, for example the buying and selling of goods between organisations, where the security risks are higher than within a standard office environment due to the nature of information that is being sent in public areas. With a projected market value of $200 billion (Ghosh & Swaminatha, 2001), it is vital that organisations understand the security implications where contaminated nodes within an ad-hoc network and the continual changing of administrative or security domains could cause large scale problems for information security. Another increasing threat is the rise of social engineering, which is becoming more persistent with the rise of mobile devices, and although currently only accounts for 2% of data breaches (Goss, 2008) is continuous threat to information security. Social engineering, where users are manipulated into divulging important or confidential and performing actions, where the attacker never comes face-to-face with the victim is a particular risk within mobile workforces. As the workforce becomes more decentralised it becomes harder to differentiate between colleagues and potential fraudsters, as there is less effect based trust within the workplace and assumptions are made, sometimes leading to costly outcomes or compromised security, as justified by a study by InfoSecurity Europe where 75% of employees gave their passwords immediately to a group conducting a survey outside of their place of work (Leyden, 2003). The final major issue is the susceptibility mobile devices have of being lost or stolen as they are moved more frequently between locations, and tend to rely on the awareness of the employee to maintain its physical security. A justification for this becoming a primary concern for organisations with mobile workforces is that statistics that have been collected show just how much information is being lost per year, all of which has the potential to be restricted or sensitive information, for example Heathrow airport records 900 laptops that have been collected as lost property each week (SC Magazine Staff Writers, 2008). As shown within Secrets and Lies, Digital Security in a Networked World (Schneier, 2004) network security is a chain, and is only as strong as its weakest link. Until these security vulnerabilities are addressed by organisations with mobile workforces there will always be the threat of information loss as mobile devices remain the most significant point of failure in an organisation IT infrastructure and degrade the overall strength of the security solution and can cause implication for organisations. 4 Implications of Information Loss on Organisations As possible vulnerabilities of the mobile workforce and their associated devices have been discussed it is important to realise the effects of a security breach and loss of information assets on an organisation. Information Assets are apparent within every industry, and are defined as “data that is or should be documented, and which has value or potential value” (Hawley Report, 1994); examples include market and customer information, human resource information and management information and plans. The implications of a loss vary between organisations depending on the type in conjunction with the public perception of the organisation’s brand in question; however there are a number of high level implications that will affect all businesses. The primary impact through the loss of information assets is where organisation will not be able to carry out decision making as there will be no information that will help to reduce uncertainty that exists within market industries today (Butler Group, 2004). This could be for articles such as purchase orders or could be more severe such as processing sensitive data for benefits which will have a direct implication on the organisation and customers if there is a breach of security whilst an employee is using a mobile device outside of the office environment. This in turn has the causal effect of impacting business deadlines and information throughput processes in order both maintain budget decisions as well as generate revenue for the organisation. This is argued in the Reuters report Information as an asset: the invisible goldmine (Reuters, 1995) where out of 500 telephone interviews with senior managers in the UK one in four saw information as the most crucial asset to business practises. Another concern that will impact every organisation is the financial cost of a data loss which will both impact the bottom line for the organisation as well as the individuals whose data has been lost. Throughout 2007 alone, 90% of businesses suffered from a data loss at an average cost of $200,000 (Fitzgerald & Dennis, 2007) however the costs can far greater depending on the type of loss, for example where Nationwide building society lost 11 million records of customer data which was stolen from an employees house (BBC News, 2006) and the Financial Services Authority penalised Nationwide with a £980,000 fine. These penalties described however, did not include the cost of labour that was required to source the data and collect and create new hardware which would be an additional overhead affecting the organisations budgets and time constraints as information collection is a lengthy process (Smith, 2008). A concern that can outweigh the financial losses of lost information due to removable media being misplaced or stolen is that the organisational brand will be affected in a negative manner. Consumer, as well as stakeholder, trust is an intrinsic method of security in conversing or purchasing with an unknown or little known third party and will be the basis of whether or not a customer is likely deal with the organisation in the first instance as argued in (Gluckler & Armbruster, 2003) and The Role of System Trust in Business-to-Consumer Transactions (Pennington, Walcox, & Grover, 2004). A security breach will have an impact on the levels of trust that stakeholders will have in the organisation and in the manner in which business is carried out using the mobile workforce decreasing the likelihood of a transaction, as it will be the consumers information that will be being transported between locations and across various media types . This is also shown in the figure below: 5 <<<INSERT FIG 1 DIAGRAM ABOUT TRUST>>> Therefore mobile workers and their devices must be properly protected to circumvent these outcomes and showing that an initial expenditure into the correct methods will be far better for the organisations reputation. 6 Securing Information Assets from a Technical Perspective With a mobile workforce there a number of technical issues which need to be taken into account when selecting the right way to protect your business. Primarily information security technology will need to be used through “the selection and implementation of [or most] appropriate technologies and products” (InfoSec, 2008), and will consist of reactive and pro-active types of security. The figure below shows a basic taxonomy of methods that can secure a mobile device and are shown in respect to whether they are reactive or pro-active. Figure 1 - Security Taxonomy based upon (Venter & Eloff, 2003) The taxonomy that is shown above is dependant on two main features, firstly whether or not the security method reacts with the data instantly or at a different time and secondly at which layer within organisations IT infrastructure the technology exists. A pro-active security technology is where the data is secured in some manner before a data breach has the chance the to occur, whereas reactive security technologies are where procedures or tasks are implemented and performed once a security infringement is in progress or being attempted. There are a number of pro-active security technologies that can be applied to a range of mobile devices that are in use in the modern methodologies of working today. The first and most widely used in the current mobile workforce is that of cryptography, where information is translated into cipher text (encryption) and then translated back into readable information (decryption) by the user or recipient of the information (Rivest, 1995). There are a number of hardware encryption tools that are readily available for businesses to use, the current number one being Pointsec Mobile Technologies closely followed by PGP Universal and a number of other vendors as described in Appendix 1. <<<IN APPENDIX 1 show TABLE 1 from Heikkla Crypto paper>>>. Although the expense 7 equipping a mobile workforce with this sort of technology is high, for example a license for Pointsec will cost for $129 per laptop and $76 per Pocket PC or PDA (Brooks, 2005), there a number of benefits that will outweigh this cost. The first of the advantages is that your workforce will have full hard disk encryption meaning that files can only be accessed after a successful password entry upon their mobile device system start-up, preventing unauthorised access to the files from the outset, meaning if a device is lost then the “new owner won’t be able to retrieve the protected data” (Heikkila, 2007). Encryption with these tools also allows for devices such as virtual drives where all the encrypted data can be stored and accessed simultaneously in real time, such that the process of encryption and decryption is transparent to the users and will not have any effect on the speed in which their work is undertaken. However encryption does have its drawbacks, if malicious code is able to intercept administrative access rights encryption and most other pro-active security measures will be significantly reduced in terms of security level, which promotes the need for reactive security measures as well, which is argued within “The Inevitability of Failure” (Loscocco, Smalley, Muckelbauer, Taylor, Turner, & Farrell, 1998). Encryption can also be used on removable media and other types of ‘smart phone’ which do not encompass the same level of security as PDAs or Pocket PCs. This gives an organisation a higher level of safety, especially when used in conjunction with laptop hard disk encryption, as it means that the likelihood of information disclosure to unauthorised users is reduced. This is a wise organisation decision as 57% of organisations do not encrypt the data held on their PDAs or removable devices and that in the United States alone 35,000 PDAs and 232,000 mobile phones were lost or stolen in 2001 (Hinde, 2004). By encrypting devices it is possible for a network to store the encryption key for the removable device and therefore only when it is authorised by the corporate IT network the user will be allowed to access the information on the device, adding yet another layer of security to the mobile devices in use. This is a useful tool as this can be used to create logs which will help IT administrators review or monitor the amount of data, and what specific data, an employee has transferred to a removable device making the auditing of data movement much easier in the case of loss or theft (Heikkila, 2007). In turn encryption can be combined with a number of other technologies such as Tokens, Virtual Private Networks (VPN) and Digital Certificates to create a wider range mobile corporate IT infrastructure. An example is the RSA SecurID Token which is used in conjunction with a VPN to create a secure remote access point to an organisations infrastructure and will encrypt bytes of information as they sent and received which only the recipient and sender having the appropriate decryption keys in order to return the cipher text back to clear text. The cost of implementing a solution such as this would be $637,900 for 10,000 users (Entrust, 2008) for the RSA SecurID tokens alone plus the installation of VPN clients such as Nortel Networks including VPN enabled routers and the client software is around $20,000 for every 100 users (Nortel Networks), which is large organisation security decision so that a mobile workforce is secure, however when compared to the cost of peace of mind, this may not seem such a large expenditure. REACTIVE METHODS?!! - Taxonomy of security procedures Layering of security solutions Software in use 8 - Costs / Benefits / Disadvantages Reactive and proactive methods Lead into why technology is generally less needed than social aspects 9 Securing Information Assets from a Social Perspective Security of mobile devices has never been more of a risk than it is today, this is through a mixture of naivety and attitudes towards security on mobile devices, and this is shown in a press release from Pointsec where the MD Magnus Ahlberg discusses that users of mobile devices “often try to circumvent [security measures] due to the time and ‘hassle’ factor associated with them” (Ahlberg, 2004). Awareness is a primary concern in mobile security as reports from the defence industry have shown that the employees and internal individuals are as important as external factors where “you are obsessed with fighting and external enemy... the last thing on your mind is to fight scrupulous individuals within [the organisation]” (Desouza & Vanapalli, 2005). A correct training scheme or process within an organisation is essential to effective data security, especially within a mobile scenario as it will reduce the likelihood of costly mistakes or loss of devices occurring initially as within a study by the Harris Interactive Service Bureau it stated that two thirds of the interview organisations recognised that “employees rather than hackers [pose] the greatest risk to customer privacy” (Hinde, 2004). Organisation will need to enforce security policies and present a form of information protection framework that will be conveyed to the employees within a mobile situation such that there is an understanding of both the ethical issues of losing data, such as loss of personal trust as well as the procedures for reporting data loss and maintaining a vigilant eye on the organisation’s mobile equipment during travelling or ‘on-the-move’ working. This will include the disposal of IT equipment and the methods in which data is erased using software such as the open source Eraser program where the information will be continually over written with fake text to prevent recovery of this information if it was misplaced or stolen (Heidi Computers Ltd, 2008). If employees are trained correctly as well, and a good information security framework is in place it will reduce the possibilities of other human factors causing a loss of organisational information including the emerging threat of social engineering, and simply the unauthorised removal of information (DTI, 2007). In organisation with mobile workforces today it is training of the mobile employees that are important such that items such as confidential data or employee passwords are not given to the wrong people, especially with the increase of social engineering. This is a method of hacking whereby persuasive techniques are used to extract secure or confidential information from employees, without much or any actual contact with them, and can be stopped simply by training the workforce correctly with regards to who to talk to about access controls and other information divulgence (Gaudin, 2002) (Pabrai, 2005). A clear policy on information security will also decrease the inevitability of employees that leave an organisation taking confidential or critical information with them, as this is lacking in the current mobile workforce environment where only a quarter of organisations have “security policies in place to ensure employees cannot damage the organisation when they leave” (Hinde, 2004). It is understood that an organisation cannot respond to every security threat equally however there should be a form of security framework in place that lets “managers... sort through which risks are most likely to materialise and which could cause the most damage to the business” (Austin & Darby, 2003). Where an information security framework is set up within an organisation it should, where possible, attempt to gain ISO certification for the level of information security. As defined by 10 ISO standard 17799 there are a number of ‘control clauses’ that need to be implemented within an organisation in order to achieve the greatest level of information security as it will define items such as a comparison between management support for security in conjunction with business objectives as well as legislative requirements and consequences of violations of a information loss (Yhan, 2002). The Control Clauses of ISO 17799: 1. 2. 3. 4. 5. Security Policy Organisational Security Asset Classification & Control Personnel Security Physical & Environmental Security 6. 7. 8. 9. 10. Communications & Operations Management Access Control System Development and Maintenance Business Continuity Management Compliance (Yhan, 2002) Figure 2 - ISO 17799 Control Clauses Security frameworks have drawbacks such as the initial expenditure and the technical staff resources that will need to keep abreast of the current climate of potential threats to security including the working time expense of organising the risks according to potential business damage. In addition there will be the cost to achieve ISO certification, but as sources have shown that users are the most likely method of where data loss occurs within a mobile workforce it is far more beneficial to have the social practises and standards in place before the hardware and software aspects of information security are implemented into an organisation mobile workforce. If these items are put into place and marketed to the potential consumer market, this creates a level of cognitive trust that will make a transaction more likely. 11 Conclusion Hardware and software security are not the final solution to the problems that the mobile workforce face in terms of securing information assets, especially when it is more likely that it will be the negligence of the workforce that causes information loss (Pabrai, 2005). To produce secure methods of information access via a mobile workforce both social and technical aspects will need to be considered at the appropriate times. Before the hardware and software are introduced an organisation must first set out the correct frameworks for information security, this will involve creating policies surround access and removal of an organisations information assets and also hiring the necessary technical staff to keep abreast of the latest threats to the mobile workforce. Once this is in place the technical staff can evaluate the hardware and software solutions that are available and then apply the correct technologies for the correct business activities. Once in place the correct framework will allow for logs and reviews to see if the current implementation is working for the mobile workforce. This will be an on-going cycle as shown in the figure below: Monitor usage through the use of audit logs, and viewing information Security threat analysis and acknowledgement of ISO standards Information Asset Security Procedures Hardware and Software security implementation and employee training Creation of Information Security Framework and selection of technologies Figure 3 - The Security Cycle, an elaboration from (Heikkila, 2007). Therefore if a system similar to the above is in place within an organisation this will lead to the most possible secure methods in which an organisations mobile workforce can operate and interact using their devices with the central organisational IT infrastructure. 12 Works Cited Ahlberg, M. (2004). The Mobile Workforce, The Weakest Link. Pointsec Press Release. Austin, R. D., & Darby, C. A. (2003). The Myth of Secure Computing. Harvard Business Review. BBC News. (2006, November 18). Security Raised Over Laptop Theft. Retrieved November 23, 2008, from BBC News UK: http://news.bbc.co.uk/1/hi/uk/6160800.stm Brooks, J. (2005, June 13). PointSec, WinMagic Lock Down Mobile Data. Retrieved November 8, 2008, from eWeek.com: http://www.eweek.com/c/a/Security/Pointsec-WinMagic-Lock-DownMobile-Data/ Butler Group. (2004). Exploiting Corporate Information Assets. Hull: Butler Group - Technology Management & Strategy Division. Desouza, K. C., & Vanapalli, G. k. (2005). Securing Knowledge in Organisation: Lessons from the Defense and Intelligence Sectors. Chicago: International Journal of Information Management. DTI. (2007). Information Security: Protecting Your Business Assets. Business Link. Entrust. (2008, September 1). Entrust IdentityGuard Price. Retrieved November 23, 2008, from Entrust: http://www.entrust.com/strong-authentication/identityguard/calculator.cfm Fitzgerald, J., & Dennis, A. (2007). Business Data Communications and Networking (9th Edition). Virginia: John Wiley & Sons Inc. Gaudin, S. (2002). Social Engineering: The Human Side of Hacking. Earthweb. Ghosh, A. K., & Swaminatha, T. M. (2001). Software Security and Privacy Risks in Mobile ECommerce. Communications of the ACM, ACM. Gluckler, J., & Armbruster, T. (2003). The Mechanisms of Trust and Networked Reputation. Sage Publishing. Goss, P. (2008, October 13). Hackers Account for Just 1% of Data Loss. Retrieved November 3, 2008, from TechRadar: http://www.techradar.com/news/computing/hackers-account-for-just-1-of-dataloss-475258 Hawley Report. (1994). Information As An Asset: The Board Agenda. KPMG Impact Group (p. 7). London: KPMG Press Release. Heidi Computers Ltd. (2008). Eraser | Internet Security and Privacy. Retrieved November 25, 2008, from Heidi Computers Ltd: http://www.heidi.ie/node/6 Heikkila, F. M. (2007). Encryption: Security Considerations for Portable Media Devices. IEEE Computer Society. Hinde, S. (2004). Confidential Data Theft and Loss: Stopping the Leaks. ScienceDirect. 13 Igbaria, M., & Tan, M. (1998). The Virtual Workplace. IGI Publishing. InfoSec. (2008, November). InfoSec - Security Management. Retrieved November 26, 2008, from InfoSec: http://www.infosec.gov.hk/english/business/security_imsf_3.html Leyden, J. (2003, April 18). Office Workers Give Away Passwords for a Cheap Pen. Retrieved November 9, 2008, from The Register: http://www.theregister.co.uk/2003/04/18/office_workers_give_away_passwords/ Loscocco, P. A., Smalley, S. D., Muckelbauer, P. A., Taylor, R., Turner, J., & Farrell, J. F. (1998). The Inevitability of Failure: The Flawed Assumptions of Security in Modern Computing Environments. Proceedings of the 21st National Informations Systems Conference. National Security Agency Release. Nortel Networks. (n.d.). Nortel Networks. Retrieved October 29, 2008, from Nortel: Products: VPN: http://www2.nortel.com/go/product_cat.jsp?parId=0&pcatId=-9965&segId=0&catId=9972&locale=en-US Pabrai, U. A. (2005). Awareness Training - Strengthen Your Weakest Link. MediaTec Publishing Inc [Certification Magazine]. Pennington, R., Walcox, H. D., & Grover, V. (2004). The Role of System Trust in Business-to-Consumer Transactions. Journal of Management Information Systems. Reuters. (1995). Information As An Asset: The Invisible Goldmine. London: Reuters. Rivest, R. L. (1995). The RC5 Encryption Algorithm. MIT Laboratory for Computer Science. SC Magazine Staff Writers. (2008, August 1). 900 Laptops Lost at Heathrow Per Week. Retrieved November 10, 2008, from SC Magazine: http://www.securecomputing.net.au/News/118424,900laptops-lost-at-heathrow-per-week.aspx Schneier, B. (2004). Secrets and Lies: Digital Security in a Networked World. Wiley. Smith, D. M. (2008, July 23). The Cost of Lost Data. Retrieved November 24, 2008, from Pepperdine University: School of Business & Management: http://gbr.pepperdine.edu/033/dataloss.html Venter, H., & Eloff, J. (2003). A Taxonomy for Information Security Technologies. Computers & Security. Yhan, G. (2002). ISO 17799: Scope and Implementation - Security Policy. International Organisation for Standardisation. 14 Appendices Table of Encryption Software 15