12.07.2015 Views

Proceedings of 8th European Assembly on telework (Telework2001)

Proceedings of 8th European Assembly on telework (Telework2001)

Proceedings of 8th European Assembly on telework (Telework2001)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

78Informati<strong>on</strong> Security in E-workArto Karila, Dr. Karila A & E Ltd.1. Threats and requirements for the security <str<strong>on</strong>g>of</str<strong>on</strong>g> E-workThreats against the security <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong> systems can be divided into three main categories:disclosure <str<strong>on</strong>g>of</str<strong>on</strong>g> c<strong>on</strong>fidential informati<strong>on</strong> (the disclosure threat), loss <str<strong>on</strong>g>of</str<strong>on</strong>g> integrity <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong> (themodificati<strong>on</strong> threat), and unavailability <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong> (the denial <str<strong>on</strong>g>of</str<strong>on</strong>g> service threat). Traditi<strong>on</strong>ally,informati<strong>on</strong> security has been primarily associated with the disclosure threat. In today’s world,our dependence <strong>on</strong> informati<strong>on</strong> systems is such, that unauthorized modificati<strong>on</strong> or extendedunavailability <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong> can have disastrous c<strong>on</strong>sequences. In E-work, all kinds <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong>need to be accessible through the network. Therefore, informati<strong>on</strong> security is a mandatoryrequirement for E-work.When working in an open network, informati<strong>on</strong> flowing through the network is susceptibleto unauthorized disclosure and modificati<strong>on</strong>. Str<strong>on</strong>g encrypti<strong>on</strong> is necessary to protect thec<strong>on</strong>fidentiality and integrity <str<strong>on</strong>g>of</str<strong>on</strong>g> such informati<strong>on</strong>. Indirectly, encrypti<strong>on</strong> also helps ensure theavailability <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong> networks. When disclosure and modificati<strong>on</strong> threats are effectivelyprotected against, it is possible to implement availability by building sufficient redundancy intoinformati<strong>on</strong> networks. Building this kind <str<strong>on</strong>g>of</str<strong>on</strong>g> redundancy is something which the Internet technologywas originally designed and still is well suited for.2. Development <str<strong>on</strong>g>of</str<strong>on</strong>g> network infrastructureInternet architecture is the dominating network architecture <str<strong>on</strong>g>of</str<strong>on</strong>g> the early 2000’s. Internet is based <strong>on</strong>the Internet Protocol (IP), which can be run <strong>on</strong> all kinds <str<strong>on</strong>g>of</str<strong>on</strong>g> physical networks and under all kinds <str<strong>on</strong>g>of</str<strong>on</strong>g>applicati<strong>on</strong>s. Its independence <str<strong>on</strong>g>of</str<strong>on</strong>g> both physical networks and applicati<strong>on</strong>s is the main strength <str<strong>on</strong>g>of</str<strong>on</strong>g>IP. IP can easily be implemented even <strong>on</strong> totally new network technologies, such as Wireless LAN(WLAN) or the General Packet Radio Service (GPRS) <str<strong>on</strong>g>of</str<strong>on</strong>g> the GSM (General System for Mobilecommunicati<strong>on</strong>s) network. New applicati<strong>on</strong>s, such as the World Wide Web (WWW), Voice overIP (VoIP), and many others to come, can easily be implemented <strong>on</strong> top <str<strong>on</strong>g>of</str<strong>on</strong>g> the standard IP service.The Internet architecture has remained essentially unchanged since 1974 and c<strong>on</strong>tinues to prove itsstrength. Hence, the old slogan ”IP over everything, everything over IP” is more true today thanever before.The main shortcomings <str<strong>on</strong>g>of</str<strong>on</strong>g> IP are its inadequate address space, lack <str<strong>on</strong>g>of</str<strong>on</strong>g> mobility support, lack <str<strong>on</strong>g>of</str<strong>on</strong>g>differentiated quality <str<strong>on</strong>g>of</str<strong>on</strong>g> service, and lack <str<strong>on</strong>g>of</str<strong>on</strong>g> security. Each <str<strong>on</strong>g>of</str<strong>on</strong>g> these issues has been addressed bythe Internet Engineering Task Force (IETF) and standard track soluti<strong>on</strong>s have been developed foreach <str<strong>on</strong>g>of</str<strong>on</strong>g> them. The new versi<strong>on</strong> 6 <str<strong>on</strong>g>of</str<strong>on</strong>g> IP (IPv6) <str<strong>on</strong>g>of</str<strong>on</strong>g>fers a virtually unlimited number <str<strong>on</strong>g>of</str<strong>on</strong>g> addresses

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!