22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In our discussion, risk has all of these meanings. It is the possibility of suffering<br />

harm (definition 1); the factor or thing presenting danger, the hazard (definition<br />

2); and also the exposure to the possibility of loss or damage (definition 3).<br />

For an IT department, risk is the danger or probability of loss of reputation,<br />

sensitive information, or the ability to continue doing business. It is also the<br />

quantity of each, including sums of money related to those that a company<br />

stands to lose.<br />

A comprehensive portion of your security policy deals with the manner in which<br />

you manage the risks faced by your company's computer system.<br />

Often, companies and their IT personnel do not understand the nature of those<br />

risks. With all the hype in the media (both printed and electronic), they assume<br />

that the real danger comes from the Internet and from people outside of the<br />

company.<br />

After all, the portrait that is constantly painted of these individuals is that they are<br />

poorly dressed Generation X'ers who have nothing better to do in life than to<br />

scour the Internet trying to find vulnerable systems to attack, penetrate, and<br />

maliciously destroy or corrupt. A prime example of this characterization can be<br />

found in Clifford Stohl's excellent, and totally true, novel The Cuckoo's Egg:<br />

Tracking a Spy Through the Maze of Computer Espionage (Mass Market<br />

Paperback Reprint edition, July 1995, Pocket Books, ISBN: 0671726889). In this<br />

story, the cracker in question is young, wears jeans, and wreaks havoc left and<br />

right, using the computer systems of one company as the springboard to attack<br />

the systems of other companies and organizations.<br />

Therefore, upper-level managers at various companies believe that if they<br />

properly secure their computer system from people on the outside of the<br />

company and shield access from the Internet, they have effectively secured their<br />

computer system, at which point they can cease the work of hardening and<br />

securing the system and finally sleep soundly at night.<br />

Bad news: this view of the computer security world is incorrect and shortsighted<br />

at the same time. The sad reality is that many companies have suffered and died<br />

from attacks perpetrated by insiders, meaning people working for the company.<br />

These are usually attacks by disgruntled employees who use the newly acquired<br />

information to their advantage.<br />

You should therefore make sure that your computer security policy includes the<br />

necessary safeguards to protect information from people on both sides of the<br />

virtual security fence.<br />

Chapter 2. Security methodologies 45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!