Computing security is one of the fastest changing and most complicated areas in the information
.
.
.
technology industry today. Each day seems to bring another threat to the security of the world’s
.
.
.
computing resources. Recently, the Social Security Administration took its operations off line
.
.
.
because of privacy fears. In addition, Microsoft has had to re-tool its Explorer browser due to
.
.
.
security concerns, and companies have reported a threefold increase in virus incidents over the last
.
.
.
year. These items follow the spectacular stories of hackers who broke into and modified the content
.
.
.
of the CIA’s and Justice Department’s web sites, and of computing thief Kevin Mitnick, who
.
.
.
gained access to thousands of consumers’ credit card numbers. These incidents represent only a
.
.
.
.
subset of the wide variety of threats computer users and administrators must defend against.
.
.
.
Making this area even more complex is the confusing array of technologies and solutions, including
.
.
.
encryption, firewalls, smartcards, and digital certificates, which are offered to solve these problems.
.
.
.
.
With the overall growth of computing, particularly networked and inter-networked computing,
.
.
.
more resources and information are at risk than ever before, with new threats emerging daily.
.
.
.
Independent research estimates potential losses from lack of security at between $40-80 billion in
.
.
.
the year 2000. Enterprises abilities to protect their resources and capitalize on opportunities will
.
.
.
depend on the level of security they enforce.
.
.
.
.
.
Computing security breaches as well as the concerns of IT managers are rising, yet the deployment
.
.
.
of security solutions lags. Over 75% of organizations responding to a recent poll reported a
.
.
.
significant computer breach over the last year: the subset of these organizations, which could
.
.
.
quantify their losses (249 institutions), reported losses of over $100 million. While most security
.
.
.
problems remain basic, such as viruses, password exposure, and physical theft, to date most
.
.
.
enterprises have employed only limited or point solutions for security.
.
.
.
.
IT managers must design a practical roadmap to guide their enterprises through this tangle of
.
.
.
.
information, threats, and solutions. In charting a course, they must incorporate the latest
.
.
.
technologies, adapt to new threats, and ensure that their solutions do not compromise performance.
.
.
.
.
The Compaq Enterprise Security Framework addresses enterprise security in terms of computing
.
.
.
platforms, secure computing technology, and the objectives required of a strong enterprise security
.
.
.
policy. The framework also describes solution sets for each platform in terms of “levels” of
.
.
.
security. Using the easy-to-understand framework and levels, enterprises can plan a security
.
.
.
solution roadmap that meets their business requirements. Compaq’s Enterprise Security Framework
.
.
.
delivers the critical needs of IT managers and makes the process of securing enterprise computing
.
.
.
as easy as possible.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3
WHITE PAPER (cont.)
.
.
.
.
.
.
.
SECURITY ENVIRONMENT
.
.
.
.
Computing security has always been critical to enterprises. However, in today’s environment the
.
.
.
components of the computing world have changed in ways that make computing security more
.
.
.
critical and complex. In the past, computing security focused on protecting assets in a mainframe-
.
.
.
oriented system. In the current, inter-networked environment, enterprises view security as crucial
.
.
.
for two reasons: first, computing security measures protect against potentially devastating losses;
.
.
.
and second, security enables businesses and opportunities to generate new revenue and reduce
.
.
.
costs. Facing a growing variety of threats, losses, and intense market pressures, IT managers will
.
.
.
propel the demand for practical, sound security solutions in the near future.
.
.
.
.
.
.
.
Security Environment: Importance and Trends
.
.
.
.
.
Several computing environment trends have changed the nature and challenges of computing
.
.
.
security (see Figure 1).
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Computing Growth
Computing
Resources
Security
Networked Computing
Figure 1
• The most obvious computing trend affecting security concerns is the dramatic growth in the
installed base of desktops, workstations, laptops, and PDAs in both the consumer and business
markets. The simple impact of this growth has been to place more valuable enterprise, personal
information, applications, and hardware assets in the hands of numerous people.
• The next trend is the importance of networked (client/server) computing, primarily in
enterprises and small businesses. As this type of computing has become the dominant
architecture, more people have networked access to significant enterprise information and
applications than ever before. Some analysts estimate that 50% of the world’s computers are
networked in some way (LAN, WAN, etc.).
• The third trend is the emergence of inter-networked computing. In the last 2-3 years, more
enterprises and institutions have connected from their internal networks to the greater networks
of other businesses and consumers on the Internet. Inter-connected networks now enable more
parties (business partners, customers, and employees) to gain access to crucial systems’
resources across public, traditionally unsecured networks.
• Finally, the promise of Electronic Commerce is pressing businesses and computing vendors to
find ways to securely conduct commercial and private transactions over public networks. In
many cases, these transactions involve parties with whom they have no previous affiliation.
Together, these trends have created a significantly different and more difficult computing
environment for IT managers to secure. Previously, they could control the enterprise’s information
Internetworked Systems
Network ANetwork B
Network C
Electronic Commerce
Public
Network
4
WHITE PAPER (cont.)
.
.
residing on mainframes and mid-range systems in a closely monitored and physically secure
.
.
.
environment – the glass house. In this setting, businesses deployed private, leased lines for external
.
.
.
data transactions with known partners and used e-mail for internal communication only.
.
.
.
.
.
In the new environment, a wide variety of enterprise computers either contain or connect to critical
.
.
.
business information. In addition, these devices can be portable (laptops, PDAs) and are rarely
.
.
.
physically secured. Servers are corporally distributed throughout an enterprise, and each sever can
.
.
.
be connected to hundreds of clients. These servers are also frequently networked to outside parties
.
.
.
through the Internet or to remote access modems. Furthermore, businesses are now using the public
.
.
.
networks as a platform for conducting commerce and exchanging sensitive information with
.
.
.
consumers and business partners.
.
.
.
.
.
.
.
Security Environment: Threats and Pressures
.
.
.
.
With these trends, a variety of threats have increased in importance and proliferated across the
.
.
.
computing landscape. The following examples provide an idea of the confusing issues with which
.
.
.
IT managers must contend (see Figure 2).
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Application
.
.
Server
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
• Saboteurs and thieves (either internal or external) can access, steal, and change the content of
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
crucial information.
• Hackers can launch viruses and other attacks that crash important systems.
• Disgruntled employees can either steal or guess passwords to gain access to information and
applications they are not authorized to use (e.g. payroll, HR).
• Outsiders can dial-in directly to the network or PCs and use this as a launching point for
internal network attacks.
• Attackers can use various tactics to crash web servers or change their content; web servers can
also be used as access points to the internal network.
Mainframe
Corporate
Network
Corporate
User
— Security Threats —
DB
Web-
Server
Firewall
Figure 2
Internet
Intranet/
Externet
Modem Bank
Mobile
User
Users
5
WHITE PAPER (cont.)
.
.
We want to trust you.”
• Thieves can steal corporate laptops for their information and hardware value and sell assets to
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
third parties (i.e. competitors).
• Physical security of home PCs is at risk from theft, and data stored on disks is at risk from viral
attack.
In addition to their responsibility to protect hardware, software, and information assets from these
threats, IT managers also face pressures to deploy advanced security to their networks. These
pressures can be roughly grouped into “friendly” and “unfriendly” forces (see Figure 3).
“FRIENDLY”
Consumers,
Customers, Partners
Private Information
n
Joint Plans
n
Supplier
n
data/forecasts
The “friendly” pressures primarily come from customers, consumers, and business partners. Both
customers and consumers are concerned with the protection of the private information they share
with companies (i.e., medical records, credit card numbers, joint plans). In addition, they are
unwilling to participate in E-Commerce with companies until they feel the transactions are
completely secure. Business partners’ concerns are focused on two areas: first, on achieving a
comfortable level of security for companies exchanging information over open
“Externets”(meaning the Internet, when it is used for business to business commerce) and secondly,
on the question of legal liability, which is brought into focus by the security issue.
Recent court cases suggest that there is an emerging precedent of “downstream liability.” This
precedent requires companies to employ “reasonable measures” of security or face potential
liability for computer attacks launched on other parties from within their network (e.g. a criminal
breaks into the inadequate security of Company B and uses this trusted position to hack into
Business Partner C’s more robust security system).
When enterprises do not adequately secure their networks, “unfriendly” forces such as competitors
and government either take advantage of that deficiency or demand retribution. The first of these
forces is competitors. Competitors can turn a company’s security weaknesses into an advantage in
one or both of two ways: initially, through the competitor-organized theft of information or
hindrance of internal systems (i.e. attacks which crash strategic company systems such as call
centers, web servers, etc.), and secondly if a competitor accesses or copies private information, they
can quickly counter a business’ strategies (e.g. beat their competitive bid for work, under-price
their product in the market). By the same token, crashing a rival’s critical systems can hurt their
reputation for customer service or on-time performance. Competitors can also create a competitive
advantage through the impact of a publicized breach on the market position and perception of a
company. In many security-sensitive industries (e.g. health care, banking), the security of a
company’s network is a crucial part of the trust formed between business and customer. If this trust
is in question, the relationship is compromised and may cease (e.g., if a private bank loses funds or
account information electronically through a publicized security breach, they will probably lose
clients as well).
— Security Pressures —
Enterprise IT
Managers
Figure 3
“UNFRIENDLY”
Competitors,
Government
“If they can’t trust you,
there will be costs”
Security as
n
competitive
advantage
Downstream liability
n
6
WHITE PAPER (cont.)
.
.
The other potential “unfriendly” force is government. Government regulation of computing security
.
.
.
is still evolving; however, it is possible that both the state and federal governments may begin to
.
.
.
hold enterprises responsible for the privacy of consumer information.