16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

214 Chapter 9<br />

the security policy should include a rule, which can be as simple as a single statement<br />

that says the physical interface should have the same password scheme as the network<br />

interface. To take it a step further, the policy might also include a rule that the thermostat<br />

box should be physically locked and only certain personnel have access to the key.<br />

Though it seems like there should be, there are no rules governing security policies in<br />

general. Certain organizations, such as corporations and the government, have certain<br />

guidelines and certifications that must be followed before an application is considered<br />

“ secure, ” but even within a single organization, the security policies will likely differ. The<br />

problem is, as we will repeat throughout this book, that security is application-dependent.<br />

Although this means there is no official template to start from, a good starting place for<br />

a security policy would be the initial requirements document for the application. Each<br />

feature should be analyzed for its impact to the system should it ever be compromised.<br />

Other things to take into account are the hardware used, the development tools and<br />

language used, the physical properties of the application (where is it), and who is going to<br />

be using it.<br />

When developing your security policy, think of your application as a castle. You need to<br />

protect the inhabitants from incoming attacks and make sure they are content (at least if<br />

they are not happy living in a castle); see Figure 9.2 . Your policy is then a checklist of all<br />

the things that might allow the inhabitants to come to harm. There are the obvious things<br />

(get them out of the way first) like locking the castle gate and requiring proof of identity<br />

before allowing someone to enter (the password in an electronic application), or making<br />

sure the inhabitants can do their jobs (the application performs its tasks). However, to truly<br />

develop a useful policy, you have to think a little like the enemy. What are some other<br />

possibilities? Well, the enemy might not care about taking total control of the castle, and<br />

instead prevent it from functioning properly by stopping incoming traders from reaching<br />

the castle (denial of service attack). A more subtle attack might be something that is not<br />

noticed at first, but later becomes a serious problem, like hiring an inhabitant to sabotage<br />

the defenses (disgruntled employee making it easier for hackers), or poisoning the water<br />

supply (viruses). The enemy may also rely on cleverness, such as the mythical Trojan<br />

horse (Trojan horses, basically viruses that give hackers a doorway directly into a system).<br />

The enemy may not even be recognizable as an enemy, in the case of refugees from a<br />

neighboring war-ravaged country suddenly showing up and eating up all the available food<br />

and resources (worms like Blaster and Sasser come to mind). The possibilities go on and<br />

on, and it can be daunting to think of everything that might be a problem.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!