Information Technology Security. Advice from Experts

The most effective security systems are architected and deployed in multiple layers to create a sustainable barrier against multiple, and different, types of attacks. For large organizations with multiple public Web portals, employee dial-in access points and supplier support networks, developing a multi-level barrier usually requires a multimillion dollar engineering, purchase, deployment and operational investment.

Typical technical approaches to building a multi-level security system involve:

From a senior management perspective, all of this security costs a lot of money with little visible benefit or tangible return to the organization. However, the cost of not protecting information assets, systems and networks from malicious attack can be extraordinary as calculated by different private and government organizations (in the summer of 2003, private businesses suffered a loss of over $3.5 billion dollars recovering from worms and viruses [CERT, 2003]). Even if the calculations are off by a factor of five (i.e., are 20% correct) it is clear that the cumulative financial costs are very, very large.

So how does all of this information tie back to building multi-level barriers? Each organization must examine the value of its information assets and systems and determine how much investment is reasonable to protect it. For a small organization, the investment threshold may be very low, and dependent upon outsource suppliers to provide virus and worm network filters, combined with one or two levels of user identification verification.

For a medium to large organization that has hundreds or thousands of computers and users, calculating how many, and what type of barriers and fallback systems should be purchased can take several months and a team of dedicated security experts looking at the existing equipment and user policies. Once the costs have been identified, senior managers and executives can make a business decision on the costs, schedules, policies and enforcement mechanisms that make sense for their information assets, employees , customers, suppliers and shareholders.

Категории