12.07.2015 Views

Proceedings of 8th European Assembly on telework (Telework2001)

Proceedings of 8th European Assembly on telework (Telework2001)

Proceedings of 8th European Assembly on telework (Telework2001)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

81Security and usability tend to be c<strong>on</strong>tradictory requirements. When making systems more secure,we are normally also making them less usable. E-work is something that should work <strong>on</strong> the terms<str<strong>on</strong>g>of</str<strong>on</strong>g> the ordinary user, that is, be usable to everybody. Combining security and usability is a majorchallenge <str<strong>on</strong>g>of</str<strong>on</strong>g> our times.5. Secure E-work – a visi<strong>on</strong>Internetworking will c<strong>on</strong>tinue to develop and spread to new areas <str<strong>on</strong>g>of</str<strong>on</strong>g> applicati<strong>on</strong>. Ec<strong>on</strong>omies <str<strong>on</strong>g>of</str<strong>on</strong>g>scale will drive virtually all applicati<strong>on</strong>s to use the main-stream IP technology. With mobility,quality <str<strong>on</strong>g>of</str<strong>on</strong>g> service, and security as basic service <str<strong>on</strong>g>of</str<strong>on</strong>g> the next generati<strong>on</strong> Internet, we will have aglobal generic platform to base E-work <strong>on</strong>.IPSEC and public key infrastructure will effectively protect against unauthorized disclosure andmodificati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> network traffic. Sufficient redundancy in the network will protect agains denial <str<strong>on</strong>g>of</str<strong>on</strong>g>service. All this can be achieved with inexpensive standard soluti<strong>on</strong>s that will c<strong>on</strong>tinue to comedown in price.So, the technological platform for secure E-work is forming and the networking aspects <str<strong>on</strong>g>of</str<strong>on</strong>g> securitycan be solved. However, when we are dealing with people and complex informati<strong>on</strong> flows, there isno simple standard soluti<strong>on</strong> to the security <str<strong>on</strong>g>of</str<strong>on</strong>g> the entire system. A lot <str<strong>on</strong>g>of</str<strong>on</strong>g> work is required to definethe core business processes with their associated informati<strong>on</strong> flows and security requirements.Security needs to be designed into these processes. Standard security mechanisms need to beapplied to make sure that the informati<strong>on</strong> systems used do not compromise the security <str<strong>on</strong>g>of</str<strong>on</strong>g>informati<strong>on</strong> flows.There are no known methods for proving the security <str<strong>on</strong>g>of</str<strong>on</strong>g> entire processes. We need to buildc<strong>on</strong>tinuous m<strong>on</strong>itoring and feed-back into our processes. Also, auditing by an outside party (notresp<strong>on</strong>sible for implementing or running the systems) is necessary.We have, hopefully, reached a stage, where the ever increasing processing power and othertechnological achievements will be made serve people. Usability <str<strong>on</strong>g>of</str<strong>on</strong>g> any informati<strong>on</strong> systemsalready is a major challenge. Combining security with usability is even more difficult. The maingoal <str<strong>on</strong>g>of</str<strong>on</strong>g> systems design should not be to optimize the use <str<strong>on</strong>g>of</str<strong>on</strong>g> ever cheaper computing resourcesbut to make the work <str<strong>on</strong>g>of</str<strong>on</strong>g> people increasingly efficient and pleasant. This is an interesting interdisciplinaryreasearch area that can <strong>on</strong>ly be expected to grow in importance.The weakest link <str<strong>on</strong>g>of</str<strong>on</strong>g> security will c<strong>on</strong>tinue to be people and their attitudes. Time after time, themain cause for major security breaches turns out to be the unauthorized behavior <str<strong>on</strong>g>of</str<strong>on</strong>g> authorizedpeople in their daily tasks. While technical measures and secure scalable technical platforms arenecessary for the success <str<strong>on</strong>g>of</str<strong>on</strong>g> E-work, they cannot compensate for shortcomings in the n<strong>on</strong>-technicalaspects <str<strong>on</strong>g>of</str<strong>on</strong>g> security. Security needs to be defined, designed, and built into work processes. Peopleneed to be well instructed, trained an motivated. There also needs to be m<strong>on</strong>itoring and feed-backas well as independent auditing. This requires commitment <str<strong>on</strong>g>of</str<strong>on</strong>g> entire organizati<strong>on</strong>s starting fromtheir top management. The possibilities <str<strong>on</strong>g>of</str<strong>on</strong>g>fered by E-work are such, that the time and effort should,<strong>on</strong> the leng term, prove to be well spent.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!