Are Hardware and Software Security Methods the Solution for

advertisement
2008
Are Hardware and Software
Security Methods the Solution
for Protecting the Mobile
Workforce? - Discuss
Securing Information Assets in
Organisations
This report will discuss the current problems facing a mobile workforce and the
impacts on organizations in the case of information loss. Security methods,
both technical and social, will be discussed as methods in which to solve these
problems for the mobile workforces.
Elliot Chapple 052321917
MN30281 – Privacy, Trust and Security in Information Systems
Word Count:
Introduction
<187>
In the past five years the workforces of many organisations has become increasingly dependent on
becoming mobile, allowing routine tasks to be undertaken outside an office scenario, such that the
organisation can benefit from advantages such as improved customer service, higher productivity
and the ability to respond to emerging markets quicker (Igbaria & Tan, 1998). In addition as
advances in pervasive and ubiquitous computing technology have taken place, employees are able
to easily access smaller technologies that have network connectivity and are able to connect with
their organisations corporate IT systems and information. The devices include laptops, smart phones
and removable storage media such as USB disk drives and it is estimated that there will be over 100
million portable or media devices worldwide used within mobile workforces (Heikkila, 2007)
Since the mobile workforce can now readily access sensitive or confidential information on the
move, and with constant reports of data loss organisations or governments this essay will discuss the
question can hardware and software security on these mobile devices fully prevent data loss
through theft or through malicious practises or are there other factors affecting security?
Threats and Implications of Information Loss
<650>
As mobile devices have increased in capabilities over the past few years so have the vulnerabilities
that they present to the modern mobile workforce and to the corporate IT systems to which they
connect. Studies have shown that the main weakness in using mobile devices is accessing the
internet in public areas or through ad-hoc networks1. This is particularly critical in the forms of
mobile commerce, with a projected market value of $200 billion (Ghosh & Swaminatha, 2001), it is
vital that organisations understand the security implications of information transmission over
insecure sources.
A major concern is the susceptibility mobile devices have of being lost or stolen as they are moved
more frequently between locations, for example Heathrow airport records 900 laptops that have
been collected as lost property each week (SC Magazine Staff Writers, 2008) which is a concern due
to the amount of information stored on these devices that has been misplaced. As shown within
Secrets and Lies, Digital Security in a Networked World (Schneier, 2004) network security is a chain,
and is only as strong as its weakest link. Until these security vulnerabilities are addressed by
organisations with mobile workforces there will always be the threat of loss of information assets as
mobile devices remain the most significant point of failure in an organisation IT infrastructure and
degrade the overall strength of the security solution.
1
Ad-Hoc Networks are where different nodes (computers or other devices) forward packets of data between
each other and to the Internet
2
Information assets are an important part of an organisation and their loss can lead to multiple
implications for organisations. Information Assets themselves are apparent within every industry,
and are defined as “data that is or should be documented, and which has value or potential value”
(Hawley Report, 1994); examples can include market and customer information or more sensitive
information and are the most important aspect of a business as is argued within the Reuters report
“Information as an asset: the invisible goldmine” (Reuters, 1995) where out of 500 telephone
interviews with senior managers in the UK one in four saw information as the most crucial asset to
business practises . The primary impact through the loss of information assets is where organisation
will not be able to carry out decision making as no information will be available to reduce
uncertainty that exists within market industries today (Butler Group, 2004)..
Another concern that will impact every organisation is the financial cost of a data loss,
throughout 2007 alone, 90% of businesses suffered from a data loss at an average cost of $200,000
(Fitzgerald & Dennis, 2007).However the costs can far greater depending on the type of loss, for
example where Nationwide building society lost 11 million records of customer data which was
stolen from an employees house (BBC News, 2006) and the Financial Services Authority penalised
Nationwide with a £980,000 fine. These penalties described however, did not include the cost of
labour that was required to source the data and collect and create new hardware which would be an
additional overhead affecting the organisations budgets and time constraints as information
collection is a lengthy process (Smith, 2008).
A concern that can outweigh the financial losses of lost information due to removable media
being misplaced or stolen is that the organisational brand will be affected in a negative manner.
Consumer and stakeholder trust is an intrinsic method of security in conversing or purchasing with
an unknown third party and will be the basis of the likelihood of a transaction (Gluckler &
Armbruster, 2003) (Pennington, Walcox, & Grover, 2004). A security breach will have an impact on
the levels of trust that stakeholders will have in the organisation and in the manner in which
business is carried out using the mobile workforce (Klang, 2001), as it will be the stakeholders’
information that will be being transported between locations and across various media types.
Securing Information Assets from a Technical Perspective <726>
With a mobile workforce there a number of technical issues which need to be evaluated when
selecting the right way to protect information assets. Primarily information security technology will
need to be used through “the selection and implementation of [or the most] appropriate
technologies and products” (InfoSec, 2008), and will consist of both pro-active2 and reactive3 types of
security. The figure below shows a basic taxonomy of security methods.
2
3
Pro-Active is where data is secured before a data infringement is able to occur.
Reactive is where procedures or tasks are performed once a security breach is in progress or being attempted
3
<CHANGE OF DIAG>
FINISH ME
Figure 1 - Security Taxonomy based upon (Venter & Eloff, 2003)
There are a number of pro-active security technologies that can be applied to a range of mobile
devices that are in use, including cryptography, digital signatures and anti-virus software. The most
widely used within the mobile workforce is cryptography, where information is translated into
cipher text (encryption) and then translated back into readable information (decryption) by the
recipient of the information (Rivest, 1995). There are a number of vendors for hardware encryption
tools for organisations, the market leader being Pointsec Mobile Technologies although other
vendors are described in Appendix 1. Although the expense equipping a mobile workforce with this
sort of technology is high, for example a license for Pointsec will cost for $129 per laptop and $76
per Pocket PC or PDA (Brooks, 2005), there a number of benefits that will outweigh this cost. The
main advantage is that your workforce will have full hard disk encryption meaning that files can only
be accessed after a successful password entry upon their mobile device system start-up, preventing
unauthorised access to the files from the outset, meaning if a device is lost then the “new owner
won’t be able to retrieve the protected data” (Heikkila, 2007). However encryption does have its
drawbacks, if malicious code is able to intercept administrative access rights encryption will become
useless, as argued within “The Inevitability of Failure” (Loscocco, Smalley, Muckelbauer, Taylor,
Turner, & Farrell, 1998).
Additionally encryption can be used on removable media and other devices such as PDAs or mobile
‘smart’ phones. This is a wise organisation decision as 57% of organisations do not encrypt the data
held on their PDAs (Hinde, 2004) or removable devices and that in the United States alone 35,000
PDAs and 232,000 mobile phones were lost or stolen in 2001 (Hinde, 2004). By encrypting devices, it
is possible for a network to store the encryption key for the removable device and therefore only
when it is authorised by the corporate IT network the user will be allowed to access the information
through the device. This adds another layer of security to the mobile devices in use and makes
tracking data movement much easier in the case of loss or theft (Heikkila, 2007). Encryption can be
combined with a number of other pro-active technologies such as Tokens, Virtual Private Networks
(VPN) and Digital Certificates to create a wider range mobile corporate IT infrastructure. An example
is the RSA SecurID Token that when used in conjunction with a VPN creates a secure remote access
point to an organisations infrastructure and will encrypt bytes of information as they sent and
received over both secure and unsecure networks. The cost of implementing a solution such as this
would be high, $637,900 for 10,000 users (Entrust, 2008) for the RSA SecurID tokens alone. In
addition the installation of VPN clients, such as Nortel Networks, costs $20,000 for every 100 users
(Nortel Networks), which is large organisational decision for security to ensure the mobile workforce
is secure.
4
Reactive methods that can be applied to the mobile workforce are generally easier to implement
and will be less of a business expense with the software costing between £3000 and £15,000 for a
high number of licenses (Shinder, 2004).. Reactive security methods can include items such as
passwords, access control and firewalls that are installed or created on the devices used by the
mobile workforce. The most commonly used of these methods is the use of passwords, this is
because at a high level they will grant and block access to files or a device itself, acting as a method
of authentication (Zviran & Haga, 1999). Firewalls are often used for mobile workforces, as these
provide a simple blockade between a trusted corporate IT infrastructure and the Internet, denying
any unauthorised attempts at information interception particularly on unsecure networks (Al-Shaer
& Hamed, 2004) and are used in conjunction with anti-virus software.
Securing Information Assets from a Social Perspective
However, hardware and software based security can only protect information assets to a level.
Security of mobile devices it the largest common organisational threat and is because of a mixture of
naivety and attitudes towards security on mobile devices. This is shown in a press release from
Pointsec where the MD Magnus Ahlberg discusses that users of mobile devices “often try to
circumvent [security measures] due to the time and ‘hassle’ factor associated with them” (Ahlberg,
2004).
Awareness is a primary concern in mobile security as reports from the defence industry have
shown that the employees and internal individuals are as important as external factors where “you
are obsessed with fighting and external enemy... the last thing on your mind is to fight scrupulous
individuals within [the organisation]” (Desouza & Vanapalli, 2005). A correct training scheme or
process within an organisation is essential to effective data security, especially within a mobile
scenario as shown within a study by the Harris Interactive Service Bureau which stated that two
thirds of the organisations interviewed recognised “employees rather than hackers [pose] the
greatest risk to customer privacy” (Hinde, 2004). Organisations will need to enforce security policies
and present an information protection framework that will need be conveyed to the employees
through training or workshops. This will create an understanding of both the ethical issues of losing
data, such as the procedures for reporting data loss, and maintaining a vigilant eye on the
organisation’s mobile equipment during travelling or ‘on-the-move’ working. This will include the
disposal of IT equipment and the methods in which data is to be erased after use using software
such as the open source Eraser program. Eraser continually overwrites the information with fake
text to prevent recovery, such that this information cannot be stolen or lost to third parties (Heidi
Computers Ltd, 2008) and provides an NSA level4 of security.
If employees are trained correctly as well, and a good information security framework is in place,
it will reduce the possibilities of other human factors causing a loss of organisational information.
4
An NSA Level of security is where the data is re-written over a minimum of 7 times, normally between 20-50
times to prevent data recovery.
5
These threats include the emerging danger of social engineering5 which is becoming more persistent
with the rise of mobile devices, currently accounting for 2% of data breaches (Goss, 2008), as well as
the unauthorised removal of information by employees (DTI, 2007). In organisations with mobile
workforces today, it is training of mobile employees that is important to prevent both social
engineering issues and workforce naivety. So that items such as confidential data or employee
passwords are not given to the wrong people (Gaudin, 2002) (Pabrai, 2005), such as the case where
passwords were willingly given to a group conducting a survey outside their office (Leyden, 2003). A
clear policy on information security will also decrease the inevitability of employees that leave an
organisation taking confidential or critical information with them, as this is lacking in the current
mobile workforce environment where only a quarter of organisations have “security policies in place
to ensure employees cannot damage the organisation when they leave” (Hinde, 2004).
Understandably, organisations cannot respond to every security threat in the same way.
However, there should be a form of security framework in place that lets “managers... sort through
which risks are most likely to materialise and which could cause the most damage to the business”
(Austin & Darby, 2003). Where an information security framework is set up within an organisation it
should gain ISO certification providing a common platform for information security (Kenning, 2001).
As defined by ISO standard 17799 there are a number of ‘control clauses’ that need to be
implemented within an organisation in order to achieve the greatest level of information security as
it will define items such as a comparison between management support for security in conjunction
with business objectives as well as legislative requirements and consequences of violations of a
information loss (Yhan, 2002).
The Control Clauses of ISO 17799:
1.
2.
3.
4.
5.
Security Policy
Organisational Security
Asset Classification & Control
Personnel Security
Physical & Environmental Security
6.
7.
8.
9.
10.
Communications & Operations Management
Access Control
System Development and Maintenance
Business Continuity Management
Compliance
(Yhan, 2002)
Figure 2 - ISO 17799 Control Clauses
Security frameworks have drawbacks such as the initial expenditure and the technical staff
resources that will need to keep abreast of the current climate of potential threats to security
including the working time expense of organising the risks according to potential business damage.
In addition there will be the cost to achieve ISO certification, but as sources have shown that users
are the most likely method of where data loss occurs within a mobile workforce it is far more
beneficial to have the social practises and standards in place before the hardware and software
aspects of information security are implemented into an organisation mobile workforce (Peltier,
2003). If these items are put into place and marketed to the potential consumer market, this creates
a level of cognitive trust that will make a transaction more likely.
5
Social engineering is where users are manipulated into divulging important or confidential information and
performing actions through persuasive language, and attacks are not even necessarily performed face to face
6
Conclusion
<240>
Hardware and software security are not the final solution to the problems that the mobile workforce
encounter in terms of securing information assets. There is only so much security that technology
can achieve, especially when negligence of the workforce is a higher primary cause of information
loss than malicious third parties (Pabrai, 2005). To produce secure methods of information access
via a mobile workforce both social and technical aspects will need to be considered. Before the
hardware and software security measures are introduced an organisation must first set out the
correct frameworks for information security, this will involve creating policies surround access and
removal of an organisations information assets and hiring technical staff to keep abreast of the
latest threats to the mobile workforce. Once this is in place, the technical staff can evaluate the
hardware and software solutions that are available and apply the correct technologies appropriate
to business activities. A correct framework will allow for logs and reviews to see if the current
implementation is working for the mobile workforce. This will be an on-going cycle as shown in the
figure below:
Security threat analysis
and acknowledgement of
ISO standards
Monitor usage using
audit logs, and
viewing information
Information Asset
Security
Procedures
Hardware and Software
security implementation
and employee training
Creation of Information
Security Framework and
selection of technologies
Figure 3 - The Security Cycle, an elaboration on removable device security (Heikkila, 2007).
Therefore if a system similar to the above is in place within an organisation this will lead to the most
possible secure methods in which an organisations mobile workforce can operate and interact using
their devices with the central organisational IT infrastructure.
7
Appendices
Table of Encryption Software
8
Works Cited
Ahlberg, M. (2004). The Mobile Workforce, The Weakest Link. Pointsec Press Release.
Al-Shaer, E. S., & Hamed, H. H. (2004). Modeling and Management of Firewall Policies. IEEE.
Austin, R. D., & Darby, C. A. (2003). The Myth of Secure Computing. Harvard Business Review.
BBC News. (2006, November 18). Security Raised Over Laptop Theft. Retrieved November 23, 2008,
from BBC News UK: http://news.bbc.co.uk/1/hi/uk/6160800.stm
Brooks, J. (2005, June 13). PointSec, WinMagic Lock Down Mobile Data. Retrieved November 8,
2008, from eWeek.com: http://www.eweek.com/c/a/Security/Pointsec-WinMagic-Lock-DownMobile-Data/
Butler Group. (2004). Exploiting Corporate Information Assets. Hull: Butler Group - Technology
Management & Strategy Division.
Desouza, K. C., & Vanapalli, G. k. (2005). Securing Knowledge in Organisation: Lessons from the
Defense and Intelligence Sectors. Chicago: International Journal of Information Management.
DTI. (2007). Information Security: Protecting Your Business Assets. Business Link.
Entrust. (2008, September 1). Entrust IdentityGuard Price. Retrieved November 23, 2008, from
Entrust: http://www.entrust.com/strong-authentication/identityguard/calculator.cfm
Fitzgerald, J., & Dennis, A. (2007). Business Data Communications and Networking (9th Edition).
Virginia: John Wiley & Sons Inc.
Gaudin, S. (2002). Social Engineering: The Human Side of Hacking. Earthweb.
Ghosh, A. K., & Swaminatha, T. M. (2001). Software Security and Privacy Risks in Mobile ECommerce. Communications of the ACM, ACM.
Gluckler, J., & Armbruster, T. (2003). The Mechanisms of Trust and Networked Reputation. Sage
Publishing.
Goss, P. (2008, October 13). Hackers Account for Just 1% of Data Loss. Retrieved November 3, 2008,
from TechRadar: http://www.techradar.com/news/computing/hackers-account-for-just-1-of-dataloss-475258
Hawley Report. (1994). Information As An Asset: The Board Agenda. KPMG Impact Group (p. 7).
London: KPMG Press Release.
Heidi Computers Ltd. (2008). Eraser | Internet Security and Privacy. Retrieved November 25, 2008,
from Heidi Computers Ltd: http://www.heidi.ie/node/6
Heikkila, F. M. (2007). Encryption: Security Considerations for Portable Media Devices. IEEE Computer
Society.
9
Hinde, S. (2004). Confidential Data Theft and Loss: Stopping the Leaks. ScienceDirect.
Igbaria, M., & Tan, M. (1998). The Virtual Workplace. IGI Publishing.
InfoSec. (2008, November). InfoSec - Security Management. Retrieved November 26, 2008, from
InfoSec: http://www.infosec.gov.hk/english/business/security_imsf_3.html
Kenning, M. J. (2001). Security Management Standard - ISO 17799/BS 7799. BT Technology Journal
(Springer) , 132-136.
Klang, M. (2001). Who Do You Trust? Beyond Encryption, Secure E-Business. Elsevier.
Leyden, J. (2003, April 18). Office Workers Give Away Passwords for a Cheap Pen. Retrieved
November 9, 2008, from The Register:
http://www.theregister.co.uk/2003/04/18/office_workers_give_away_passwords/
Loscocco, P. A., Smalley, S. D., Muckelbauer, P. A., Taylor, R., Turner, J., & Farrell, J. F. (1998). The
Inevitability of Failure: The Flawed Assumptions of Security in Modern Computing Environments.
Proceedings of the 21st National Informations Systems Conference. National Security Agency
Release.
Nortel Networks. (n.d.). Nortel Networks. Retrieved October 29, 2008, from Nortel: Products: VPN:
http://www2.nortel.com/go/product_cat.jsp?parId=0&pcatId=-9965&segId=0&catId=9972&locale=en-US
Pabrai, U. A. (2005). Awareness Training - Strengthen Your Weakest Link. MediaTec Publishing Inc
[Certification Magazine].
Peltier, T. R. (2003). Preparing for ISO 17799. Information Security Journal: A Global Perspective , 2128.
Pennington, R., Walcox, H. D., & Grover, V. (2004). The Role of System Trust in Business-to-Consumer
Transactions. Journal of Management Information Systems.
Reuters. (1995). Information As An Asset: The Invisible Goldmine. London: Reuters.
Rivest, R. L. (1995). The RC5 Encryption Algorithm. MIT Laboratory for Computer Science.
SC Magazine Staff Writers. (2008, August 1). 900 Laptops Lost at Heathrow Per Week. Retrieved
November 10, 2008, from SC Magazine: http://www.securecomputing.net.au/News/118424,900laptops-lost-at-heathrow-per-week.aspx
Schneier, B. (2004). Secrets and Lies: Digital Security in a Networked World. Wiley.
Shinder, D. (2004, July 19). Choosing a Firewall. Retrieved November 30, 2008, from Windows
Networking: http://www.windowsnetworking.com/articles_tutorials/Choosing_a_Firewall.html
Smith, D. M. (2008, July 23). The Cost of Lost Data. Retrieved November 24, 2008, from Pepperdine
University: School of Business & Management: http://gbr.pepperdine.edu/033/dataloss.html
10
Venter, H., & Eloff, J. (2003). A Taxonomy for Information Security Technologies. Computers &
Security.
Yhan, G. (2002). ISO 17799: Scope and Implementation - Security Policy. International Organisation
for Standardisation.
Zviran, M., & Haga, W. J. (1999). Password Security: An Empirical Study. Journal of Management
Information Systems (ACM) , 161-185.
11
Download