What is security Policy?
o Set of decisions
o Rules & regulation
o Written or verbally understood
o Which Collectively determines
Organisation’s posture towards security
o Delimits the boundaries
o Acceptable & non acceptable
behaviours
o What is ethical and what is
non-ethical?
o What is the degree of seriousness of
the offence
o Or is it an offence at all
o What if it is violated?
§ A Shares broker
§ A Corporate body
§ A Household application whole-seller
§ A Student
§ A teacher
Etc.
will have
o Different requirements,
o Different priorities
o Different needs
o Different missions / targets / goals
Organisation
differ in their:
o Culture
o Structures
o Strategy
And
thus Security Policy will also differ from organisation to organisation.
Security
Policy will decide:
o What legal course of action will you
follow if attacked?
o What will be considered as a
cognizable crime?
o Can anyone be sued?
o Infringing on someone else’s rights?
To
devise a security policy you must yourself several question?
1. What resources are you trying to
protect?
2. Who would be interested in attacking
you?
3. How much security can you afford?
Never
under-estimate about your own assets!
Data
base is the most important asset in e-commerce!
1.3
What is Security Policy? - Definition
§ A
security policy is the set of decisions that collectively, determines an
organization's attitude toward security.
§ A security policy defines the
boundaries of acceptable behaviour and what the response to violations should
be.
Naturally,
security policies will differ from organization to organization.
Your
security policy may determine what legal course you have to take if you are
ever attacked.
You
must first decide what is and is not permitted. To some extent, this process is
driven by the business or structural needs of the organization. Thus, some
companies may issue a verdict that bars the personal' use of corporate
computers.
Some
companies wish to restrict outgoing traffic, to guard against employees exporting
valuable data. Other policies may be driven by technological considerations.
In general, Computer security means
keeping anyone from doing anything, which is unwanted or undesired, relating to
computers & peripherals. It is the way of protecting your precious assets
in terms of information or resources.
1.4 Picking a security policy:
A 'Security Policy' describes your
plan, methodology to safeguard your assets or what measures / precautions you
take (or do not take) in order to keep your assets secured. A security policy
differs from organization to organization. All the decisions are then based on
this formulated policy.
The first step here is to perform a Risk
Analysis. It is a process of examining all your risks & then finding a
cost-effective decision to recover from it.
A few important steps in this are:
1. Finding out
what resources you wish to protect: Resources may include: Physical
resources like printers, monitors, keyboards, drives, modems etc. & Logical
resources like source & object programs, data, utilities, operating system,
applications etc.
What resources are you
trying to protect? The answer to this will dictate the host specific measures
that are needed. Machines with sensitive files may require extra security
measures: Stronger authentication, keystroke logging and strict auditing, or
even file encryption. If the target of interest is the outgoing connectivity,
the administrator may choose to require certain privileges for access to the
network. May be all such access should be done through a proxy that will
perform extra logging.
2. Find out who
can disrupt them & in what ways: The threats to your assets may
include
- Physical threats to the resources such as stealing,
malfunctioning devices,
- Logical threats such as unauthorized access to data,
information, resources
- Unintended disclosure of your information.
3.
Who
is interested in attacking you?
- Outsiders
as well as insiders may form the collective answer here.
- What
kind of security therefore must be provided differs from the type of
attacker you are planning against.
4. How much Security can you
afford?
Part of the cost of
security is direct financial expenditures, such as the extra routers,
firewalls, software packages, and so on. Often, the administrative costs are
overlooked. There is another cost, however, a cost in convenience and
productivity, and even moderate. Too much security can hurt as surely as too
little can. Annoyed by increases in security, people get frustrated. Finding
the proper balance therefore is essential.
What
Stance do you take?
The stance is the
attitude of the designer. It is determined by the cost of failure and the
designer’s estimate of that likelihood. It is also based on the designer's
opinions of their own abilities. At one end of the scale is a philosophy to
correct it only when mistake happens and. the other one is taking preventive
measures so that no mistake occurs.
Experiment
in Picking a Security Policy
What
is a policy should I have while surfing?
Let
us do a practical experiment
1.
Open
Internet Explorer
2.
Click
on “tool”
3.
Click
on “Internet Options”
4.
Click
on “Security”
5.
Click
on “Custom Level”
6.
Click
on “Default levels”
Study
the following levels.
1.
High
2.
Medium
3.
Medium-low
and
4.
Low
|
High:
The safest way to browse,
but also the least functional
Less secured feature are disabled
Appropriate policy for sites
that might have harmful contents
|
![]() |
![]() |
Medium-Low
Same
as Medium but with prompts
Most
content will run without prompts
Unsigned
ActiveX controls will be downloaded
Appropriate
for sites on local Network (Intranets)
|
![]() |
Medium
Safe
browsing & still functional
Prompts before downloading potentially unsafe content
Unsigned
ActiveX controls will be downloaded
Appropriate
for most Internet sites
|
|
Low
Minimam safeguards and warning promts provided
Most content is downloaded and run without prompts
All active contents can run
Approariate for site that you absolutely trust.
|
![]() |
1.5
What kind of security?
a.
Host Based Security:
If a host is connected
to a network, it ought to be up to the host to protect itself from network
borne abuses. It is possible to tighten up a host to a fair degree of security.
The hosts that tend to be safer include the commercial firewalls, which are
built with security as their primary goal. The SSL (Secure Socket Layer)
provides reasonably easy access to encrypted connectiol1s, and numerous similar
attempts are evolving.
b.
Perimeter Security:
One way the attackers
always would prefer, if you have tremendous security at the door, is to go
around it and get into the system. This approach would therefore lead to
provide perimeter security. The perimeter approach is not effective if the
network is too -large. The network boundaries should not have holes or secret
entrances that allows the attacker to get in.
The attackers here are normally known
as Hackers by the terminology. A hacker is an individual who finds ways
of exploiting your systems & looks for known loopholes (vulnerabilities)
& further can disclose, or use them for personal gains.
A hacker is technically sound, not
satisfied with just running programs, but needs to understand how it works. A
hacker may also be an individual who is employed as a security consultant. Many
companies do that. (Thieves know their own ways & methods. So, why not use
a thief to track another?)
1.6 Distinguish between a Hacker and a
cracker.
§ Qualities of
a Hacker: Lots of Knowledge & Experience. Good Guy. Strong Ethics. Never
Indulges in Crime. Catches Computer Criminals. (Mnemonics: H for Hacker, H for
Heck of it!)
§ Qualities of
a Cracker: Lots of Knowledge & Experience. Bad Guy. Low Ethics. Mostly
Indulges in Crime. Is a Computer Criminal himself. (Mnemonics: C for cracker, C
for Criminal)
Once you know why you require
security, what resources you have to protect & from whom you need to
protect them, you are ready to form your policy to safeguard. A good security
policy should have following characteristics:
- Should define a clear set of security goals.
- Accurately define each issue discussed in the
policy.
- Define under what circumstances each issue is
applicable.
- Should be enforceable with security tools wherever
appropriate.
- Should clearly define the areas of responsibility
for users, administrators & management.
- Should have acceptance within the organization
Hence, a security policy is a
document, which describes the acceptable network activity as well as the
penalties for misuse of it.




No comments:
Post a Comment