22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.1 The need for secure infrastructures<br />

98 Lotus Security Handbook<br />

Just like we might provide different barriers for protecting our personal property,<br />

we need to ensure that we have “adequate and appropriate” security barriers for<br />

our organization’s information systems. By this we mean that, in the simplest<br />

sense, there are multiple protection methods employed at various points in the<br />

infrastructure design to thwart potential attacks. These methods involve a design<br />

that provides several layers of defense. For the purpose of this discussion, the<br />

term “layer” is generic and could represent something physical or something<br />

logical.<br />

For example, a layered-defense approach to protecting your car from theft could<br />

include keeping it in a locked garage, keeping the doors locked, and using a<br />

steering wheel immobilizing lock. But whether or not this is “adequate and<br />

appropriate” is relative. For a person who owns an older model car and lives in<br />

an isolated location, we hope you’d agree that the protection is perhaps above<br />

and beyond what is deemed adequate, so in that sense it may not be<br />

appropriate. On the other hand, the owner of a museum-worthy collectible car,<br />

living in a high-crime area, might agree our example’s layers of protection are<br />

appropriate but less than adequate.<br />

The analogy of protecting a car is a very simplistic illustration of layers of<br />

defense. We can extend the layered-defense analogy by adding or modifying<br />

layers, such as adding alarm systems, perimeter fences, magnetic card building<br />

access, video surveillance, and so forth. However, the analogy of protecting a<br />

physical object such as a car is still overly simplistic since it is concerned with<br />

outright theft only. In the context of IT, “theft” of data is just one of many<br />

concerns, and it has a whole different meaning since data can be copied while<br />

leaving the original in place. Several additional aspects of security apply to<br />

information technology systems and the data residing and flowing within and<br />

outside the organization. These information security issues include broad<br />

concepts, such as confidentiality and integrity. For example, unauthorized<br />

access to data falls under confidentiality, while malicious alteration or deletion of<br />

data falls under integrity.<br />

This chapter presents an overview of security requirements that an infrastructure<br />

must be capable of supporting. It also provides some common-sense guidelines<br />

for infrastructure defense measures, and a “top-down” model of layers of<br />

defense.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!