Networks are expanding and they are running a plethora of
applications that in turn drive many of the businesses of enterprises. This
growth and expansion of enterprise networks, and increasing reliance of
businesses on them, have given rise to new challenges of securing these
networks. As the security environment worsens due to a complex set of threats
and vulnerabilities, network security must be dealt with at different levels and
in a much more comprehensive manner than it is being done today.
As the complexity and number of threats increases, the menace
cannot be fought just with complex solutions that most enterprises don't
understand. Network security can be best ensured by following a process,
assessing and determining risks, designing a security policy, building a
security architecture based on it and then looking for tools that are aligned
with it. An enterprise must constantly change and monitor the security policy
and system in accordance with the changes in the external environment and the
business model it follows.
Key Threats
There is nothing called minor or major threats for enterprises. Seemingly
minor threats turn out to be major ones only after attacks happen. There is no
way that enterprises can afford to ignore any of them. For enterprises, security
threats pour in from all directions. These threats could be in form of the
following: physical threats, environmental threats, unauthorized access,
malicious misuse, unintentional (Accidental) errors and omissions, intentional
which includes insiders, virtual insiders (by planting a Trojan inside the
infrastructure to obtain information) and outsiders; identity theft, virus, data
leakage, online banking fraud (for banking industry, and includes phishing,
farming and identity theft). Though the security threats remain almost the same
year by year, they simply assume new avatars every time they appear.
But the biggest threats, the enterprises should consider are:
-
Complacency: Many organizations fail to take threats to
their security seriously, taking instead the view, "It won't happen to
us". The first step towards safeguarding information from harm is
recognizing that threats do exist and deciding that information warrants
security measures -
Poor execution: Half-hearted security measures are worse than none
at all. An inadequate security system not only fails to keep out threats, but
also offers a false sense of security to the organization -
The naive employee: Human nature can be the weakest link in any
security regime. Many users find security procedures a nuisance and skip them to
get the job done. To combat this, nothing beats continued education and
empowerment of users.
Experts panel |
Ajay India Avnish Datt, country manager, Orange Business Services India Jari Heinonen, director, Asia Pacific Region, F-Secure Security Labs Mahendra Lalwani, managing director, ZyXEL Technology Mohammed Hayath C, business development manager, Network Security, Cisco India & SAARC Patrik Runald, senior security specialist, F-Secure Security Labs Prasad Babu, director, Systems Engineering, Juniper Technologies Prosenjeet Banerjee, head of Information Security Services, HCL Comnet Sai Gundavelli, CEO, Solix Technologies SR Kannan, head,Security, Sify Vivek Sharma, general manager, ESG, Wipro |
Due to these threats, the enterprises would be facing data loss,
loss of service, negative publicity and loss of reputation.
New Challenges
The next big wave of network deployments is likely to come from VoIP
networks. Currently these networks are relatively safe, as their numbers are
small but as they grow in popularity, the hackers are also likely to be
attracted to them. Thus, the current trend of dealing with VoIP like just
another application will need to be refined and upgraded. With or without
security, it is important to note that if the latency introduced by equipment is
more than 120 milliseconds, the voice application will perhaps not be used for
business applications.
While firewalls of today are doing a good job of protecting the
networks, firewalls for VoIP will need application level gateways for protocols
like SIP or H.323. These special requirements crop up due to issues like
protocols using more than one port in a session, or the extremely small size of
VoIP packets. A VoIP packet is one of the smallest packets in IP and presents
some very unique challenges to the network security equipment.
Outsourcing Security Management
To outsource or not to outsource security management is a difficult call for
CIOs. The promised benefits of outsourced security are attractive. The potential
to significantly increase network security without hiring half a dozen people or
spending a fortune is impossible to ignore. In countries like Japan and South
Korea, the security of the networks has moved towards an outsourced management
kind of environment. A Pricewaterhouse Coopers report says that the SMB segment
would increasingly look at use of outsourced security management of their first
line of defense including firewall, IDS and incident reporting services. A
recent survey by Forrester estimates that 30% of SMBs outsource their enterprise
applications and 59% of those are concerned about the security of their data. In
India, outsourcing of security is still a tough decision for network managers.
Slowly the outlook is changing and there has been a rise in the management
services space. Though the enterprises are shying from completely handing over
the security to a third party, remote management from a central location is
taking off.
Major Security Trends |
|
Also, the potential risks of outsourcing are considerable. Again
selecting a wrong vendor is a costly affair. There are stories of managed
security companies going out of business, and bad experiences with outsourcing
in other areas of IT. If deciding whether to outsource security is difficult,
deciding what to outsource and to whom seems nearly impossible. Over the past
few years, we've seen many different companies offering different capabilities
under the general category of "managed security services." The field
is so confusing that even the industry analysts can't agree on how to
categorize the services offered. One offers vulnerability scan, another managed
security policies and someone else offers network monitoring services, etc.
Security management should be outsourced to a reliable Managed
Security Service Providers (MSSPs). The business models that can be adopted
include: Managing Security Infrastructure from the partner's location Security
Operation Center (SOC), or building a captive Security Operation Center (SOC)
within the customer's premises. However, the business model finally adopted
needs to be chosen based on the customer's requirement and accepted service
level agreements (SLA).
Managed Security Service
Providers: Multifold Benefits
24x7 Monitoring
It is estimated that almost 60% of the attacks happen during the graveyard
shift-a period where availability of skilled resources is always in
question. To proactively detect and respond to attacks, 24x7 monitoring
becomes an imperative. 24x7 monitoring involves a three-shift operation.
Even if just one security expert per shift is enough, (which is a
difficult presumption considering high domain specialization required in
data security) an organization will require at least three security
experts for round-the-clock monitoring which would be a huge cash outflow.
/vnd/media/post_attachments/503dc0ac522d9c92d85a4228aef2478f589e379de8ca2b67841e97732f7ef60e.jpg)
Powerful Event Correlation
In a corporate environment, event handling tends to become people
dependent. Given the inconsistency in event occurrence, it becomes
difficult to co-relate similar incidents to detect an attack. Moreover,
organizations do not work on Standard Operating Procedures which are
required to effectively diffuse an attack. Even after having an inhouse
expert look at an event, one is not confident of the type of attack that
has happened and the effective method to resolve the same. MSSPs provide
automated event co-relation capabilities that list events with similar
patterns and co-relate them to detect an attack.
Managing False Alerts
False positives constitute 99% of total security alerts, making it
extremely difficult to segregate the 1% of real alerts. A typical firewall
generates thousands of alerts a day while an IDS can generate millions of
raw logs of data that becomes practically impossible to interpret. MSSPs
have automated tools that segregate the 1% actual attacks from the false
positives making security management a much easier task.
Emergency Response
Emergency response becomes difficult if an enterprise is managing its
security inhouse. The security team is either not available or doesn't
have adequate tools, processes, policies to respond to an attack. MSSPs
operate on Standard Operating Procedures that ensure near real time
response to all security incidents.
Reporting and Documenting
Events
Inhouse reporting tools provide limited or no visibility into the security
infrastructure. Either the organization tends to completely ignore the
reporting aspect or delegate it to lesser-qualified resources. Reporting
becomes extremely crucial for forensics and also to analyze the type of
event and method to counter it. MSSPs provide real-time visibility into
the security infrastructure letting a CIO know the status of his network
at any point of time.
Upgrades and Patches
Security vendors come out with new patches on a regular basis. The high
frequency of patch release and multiplicity of security products make it
difficult for the organization to upgrade these patches time to time.
Trained and Dedicated
Professionals
Certified security professionals at an MSSP undergo extensive security
training and rigorous background checks prior to managing or monitoring an
organization's equipment.
Guaranteed Responsiveness
An MSSP begins escalation the moment a problem is detected and the source
is identified. Aggressive Service Level Agreements (SLAs) ensure that an
organization will be notified immediately.
Enhanced Internet Security
This is critical, if governments and businesses are to move high-value
transactions and sensitive information online. For many organizations, a
managed security service represents the most effective approach to
deploying enhanced Internet security.
Commandments of Network Security
The following are
essential for your information security program to be effective:
-
Make sure the CXO
"owns" the information security program and assign senior-level
staff with responsibility for information security. -
Establish a cross-functional information security governance board.
-
Establish metrics to manage the program.
-
Implement an ongoing security improvement plan.
-
Conduct an independent review of the information security program by
conducing regular surveillance audits. -
Implement suitable security technologies, example Layer security at
gateway, server, and client. -
Separate your computing environment into "zones".
-
Start with basics and then improve the program.
-
Consider information security an essential investment for your business.
-
Conduct regular Security Awareness program for the staff.
A Tough Job For The Network Managers
A CIO has a tough task. He has to ensure the security of the network, but
also work within a specified budget. He is under pressure to optimize the return
on investment on one hand, while having to serve the latest upgrades on the
other. He has to plan his security policy and architecture keeping long-term
goals in mind and also deal with multiple vendors in a fast-changing technology
environment.
Enterprises do not receive threats from only one source. Sample
this: About 26 to 32% of the causes of data-loss are due to human error such as
accidental deletion and lost passwords. About 44 to 56% of the causes of data
loss are due to hardware problems or malfunctions; 2 to 3% of the causes of data
loss are due to natural disasters including power surges.
Enterprises thus face threats from their employees, network and
applications, and natural disasters. Hence, CIOs face the challenge to decide
where exactly they should start implementing security. They have to consider all
the three factors while implementing any kind of security policy.
The advice to the CIO is to adopt the best practices in the
industry. However, he should also keep in mind his requirements. Adopting the
best of breed might not always be successful. Security solutions should be
custom-built and be very specific to each business' needs and infrastructure.
The key challenge for any CIO is to make the overall security strategy. And
while doing this he has to assess his current requirement looking at future
growth and also identify critical areas to be addressed. Preparing a road map
after taking into account escalations and scalability, is a good way to start.
|
The Evolution of Mobile Viruses |
Viruses affecting mobile NTT DoCoMo malware Symbian Viruses: Cabir and its offspring Although the Cabir virus Smart phones and mobile |
Security Trends
'The Bad guys are making money'-this is the trend. This is a really
dangerous trend that has been going on now for three years and since they are
making money, there is the incentive for them to continue. They also have more
resources to come up with even nastier threats. There has been a gradual
attitude change of customers who are going in for multiple products for
specialized purposes. Organizations are going in for Unified Threat Management
technologies, by which a single device performs the role of a firewall,
anti-virus and IDS equipment. CIOs are increasingly going in for Information
Security Management Systems which give them a 360 degree look at information
systems and data, and include measures to mitigate all forms of threats.
Many organizations are focusing on network security but the
trend is going to change as organizations have started giving priority to secure
their database. According to Noel Yuhanna, Senior Analyst Forrester,
"Database security will continue to gain importance across the industry,
especially for those storing private data, primarily driven by increased
intrusions and growing regulatory requirements." Add to this, increasing
compliance requirements, which increase the importance of implementing effective
security standards.
Gyan Ranjan Swain
gyanas@cybermedia.co.in