Information Technology Security. Advice from Experts

Chapter List

Chapter VI: Wireless Information Security
Chapter VII: Reference Materials

Section Overview

This section reviews several information security technologies that are critical to just about every organization that has information systems. Written for executives and senior managers who are aware of some of the technology components but who are not experts overviews about protecting computer operating systems, wireless local area networks (LANs), data obsolescence, data recovery, public key infrastructure, biometrics and smartcards are provided.

The objective is to expose technologies that are close to full market acceptance and introduction, and that are useful to security engineers , senior managers and executives as they prepare budgets and resource plans.

Overall Strategy

Given the multiple methods , technologies and objectives applied by hackers, crackers, teenagers and employees to gain unauthorized access to information assets, the management strategy to defeat their efforts also requires a multi- faceted approach. As an omnipresent enabler , technology plays a key role in automatically closing, sensing, locating, identifying and documenting intrusive and unapproved access to information systems and networks.

When properly selected, installed and configured, technology systems provide 24 x 7 support to security experts and engineers who can provide the necessary analysis and final decisions concerning intrusions, equipment failure, software error, or planned security testing. In general, technology security barriers are grouped into:

Applied together with a solid architecture and governance foundation, equipment and software provide substantial protection from multiple threats inside and outside the organization. Of course, there is no perfect security solution the computing and communications markets are too innovative, dynamic and market driven to agree on the rigid standards that type of draconian approach would require.

Infrastructure Protection

The computing infrastructure for most organizations provides the dial tone services, including network operations, telecom and data transport, system integration of commercial-off-the-shelf (COTS) software, Domain Name Services (DNS), enterprise directory services (single password across all systems) and ongoing support operations. Protection of the infrastructure involves physical security of data center computing equipment, data libraries and tape or disk backups , and redundant network access points to avoid single points of failure. In addition, redundant power sources are available and hardened (protected) to ensure continuity of operations in case of commercial power outages due to power grid failure or weather related problems.

Protecting the physical infrastructure is a traditional IT activity that has been successfully accomplished there are very few reports about data centers being physically attacked by terrorists or intruders, and even fewer reports of any physical thefts occurring. Staff members , according to published reports, have caused virtually all thefts from inside data centers.

Категории