22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

48 Lotus Security Handbook<br />

The same thing goes for security. What made distributed denial-of-service<br />

attacks effective at first was that people trying to combat them knew about the<br />

vulnerabilities in TCP/IP that could be used to mount a denial-of-service attack<br />

(such as SYN Floods), but they didn’t know that, through the power of distributed<br />

computing, machines connected to the Internet could be infected with a special<br />

kind of software that caused them to act as zombies and mount a coordinated<br />

denial-of-service attack which is several orders of magnitude worse than a simple<br />

denial-of-service attack. Worse, these people didn’t even known that they didn’t<br />

know this, so they could not plan for it as part of the security policy and the<br />

resulting security architecture.<br />

Because attackers will always find new ways of attacking, there will always be<br />

some residual risk. Ideally, a proper security methodology will help us do a<br />

thorough security review and implement an appropriate security infrastructure.<br />

Before we go into this, we first complete our review of the basic steps of IT<br />

security (more complex models and methods will follow).<br />

Looking back at Figure 2-1, mitigating risks involves a set of specific steps.<br />

1. Analyze the major risks for the organization you are trying to secure so that<br />

you can define procedures that will help prevent these risks from happening.<br />

2. Define a security policy to deal with assets for which it is not possible to<br />

prevent malicious actions without putting one or more protective measures in<br />

place.<br />

3. In situations where protective measures are overcome, have in place an<br />

emergency response plan (generally called an Incident Handling procedure)<br />

that tells you what to do in those cases.<br />

4. Finally, because all those problems are not solved just by defining a security<br />

policy, but only by investing money for certain activities and countermeasures,<br />

it is the final call of senior management as to what residual risk can be<br />

accepted. Insurance carriers can provide <strong>cover</strong>age for these residual risks.<br />

The rate at which risk can be reduced by defining and applying a security policy<br />

varies on a case-by-case basis; our figure is for illustration purposes only.<br />

2.1.3 The human element<br />

To complete our review of the basics, let’s consider the most common cause of<br />

security problems: people.<br />

People, and not necessarily the technology in place, are the cause of security<br />

problems in the long run. Generally, security is compromised when employees<br />

make mistakes or perform activities that lay outside of their realm of permissions.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!