22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

106 Lotus Security Handbook<br />

Utilizing intrusion detection can not only detect an attempted attack in progress,<br />

but it can also alert you to the fact there was a successful attack that breached<br />

some area. While some breaches are obvious, like vandalizing your corporate<br />

Web page, some attacks would easily go unnoticed.<br />

A question we hear some clients ask, “Is [network] intrusion detection considered<br />

wiretapping?” This brings up interesting ethical questions; however, the legal<br />

concerns regarding the definition of wiretapping vary widely in different countries.<br />

In most countries, it is permissible to monitor activity on your own equipment,<br />

although there may be limitations on what content can and cannot be monitored.<br />

It may also vary depending on whether the monitoring is for internal users<br />

(employees) as opposed to external customers. In the U.S., there is legal<br />

precedence that allows an employer to monitor the usage of company-owned<br />

equipment by employees. However, we recommend that all internal monitoring of<br />

employee activity be clearly spelled out in either an employment policy or a<br />

security policy (or both).<br />

There are four basic categories of IDS: network (NIDS), host integrity, activity<br />

monitors, and content scanners. The latter is not always viewed as an “IDS,” but<br />

since most people would agree that an e-mail virus is a type of attack, then a<br />

virus scanner can be considered a specialized type of IDS. We discuss these<br />

different types of IDS in 4.1.5, “Intrusion detection systems” on page 128.<br />

A critical factor in the effectiveness of most intrusion detection is using current<br />

signature files. New vulnerabilities are dis<strong>cover</strong>ed constantly, and new methods<br />

for attacking systems are also dis<strong>cover</strong>ed all the time. Signature files provide the<br />

IDS with the latest patterns that indicate a type of attack, such as a denial of<br />

service attempt or a new virus, worm, and so forth. Note that the signature file<br />

updates are not the same as updates to the IDS code itself. We discuss<br />

application and OS code updates in “Apply security vulnerability updates” on<br />

page 110.<br />

3.2.2 Data integrity assurance<br />

In this section, we describe the following methods for ensuring data integrity:<br />

1. Ensure data remains unaltered in transit.<br />

2. Provide integrity access controls for filtering updates and administration.<br />

3. Support business continuity through redundancy and fail-over.<br />

4. Utilize secure tools for maintenance activity to required subsystems.<br />

5. Require infrastructure components to have all security vulnerability updates<br />

applied in a timely manner.<br />

6. Utilize operational procedures that include auditing and reporting.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!