FOUNDATIONS OF COMPUTER SECURITY
The foundations of computer security include answers to the superficially simple question “What is this all about?” Our first part establishes a technological and historical context for information assurance so that readers will have a broad understanding of why information assurance matters in the real world. Chapters focus on principles that will underlie the rest of the text: historical perspective on the development of our field; how to conceptualize the goals of information assurance in a well-ordered schema that can be applied universally to all information systems; computer hardware and network elements underlying technical security; history and modern developments in cryptography; and how to discuss breaches of information security using a common technical language so that information can be shared, accumulated, and analyzed. Readers also learn or review the basics of commonly used mathematical models of information-security concepts and how to interpret survey data and, in particular, the pitfalls of self-selection in sampling about crimes. Finally, the first section of the text introduces elements of law (U.S. and international) applying to information assurance. This legal framework from a layman’s viewpoint provides a basis for understanding later chapters; in particular, when examining privacy laws and management’s fiduciary responsibilities.
The growth of computers and of information technology has
been explosive. Never before has an entirely new technology been propagated
around the world with such speed and with C so great a penetration of virtually
every human activity. Computers have brought vast benefits to fields as diverse
as human genome studies, space exploration, artificial intelligence, and a host
of applications from the trivial to the most life-enhancing. Unfortunately,
there is also a dark side to computers: They are used to design and build
weapons of mass destruction as well as military aircraft, nuclear submarines,
BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY and
reconnaissance space stations. The computer’s role in formulating biologic and chemical
weapons, and in simulating their deployment, is one of its least auspicious uses.
Of somewhat lesser concern, computers used in financial applications, such as
facilitating the purchase and sales of everything from matchsticks to mansions,
and transferring trillions of dollars each day in electronic funds, are
irresistible to miscreants; many of them see these activities as open invitations
to fraud and theft. Computer systems, and their interconnecting networks, are
also prey to vandals, malicious egotists, terrorists, and an array of
individuals, groups, companies, and governments intent on using them to further
their own ends, with total disregard for the effects on innocent victims.
Besides these intentional attacks on computer systems, there are innumerable ways
in which inadvertent errors can damage or destroy a computer’s ability to
perform its intended functions. Because of these security problems and because
of a great many others described in this volume, the growth of information
systems security has paralleled that of the computer field itself. Only by a
detailed study of the potential problems, and implementation of the suggested
solutions, can computers be expected to fulfill their promise, with few of the
security lapses that plague less adequately protected systems.
Security can be defined as the state of being free from
danger and not exposed to damage from accidents or attack, or it can be defined
as the process for achieving that desirable state. The objective of information
system security1 is to optimize the performance of an organization with respect
to the risks to which it is exposed.
Risk is defined as the chance of injury, damage, or loss.
Thus, risk has two elements:
(1) Chance—an element of uncertainty, and (2) potential loss
or damage. Except for the possibility of restitution, information system
security actions taken today work to reduce future risk losses. Because of the
uncertainty about future risk losses, perfect security, which implies zero
losses, would be infinitely expensive. For this reason, risk managers strive to
optimize the allocation of resources by minimizing the total cost of
information system security measures taken and the risk losses experienced.
This optimization process is commonly referred to as risk management.
Risk management in this sense is a three-part process:
1. Identification of material risks
2. Selection and implementation of measures to mitigate the
risks
3. Tracking and evaluating of risk losses experienced, in
order to validate the first two parts of the process The purpose of this
Handbook is to describe information security system risks, the measures
available to mitigate these risks, and techniques for managing security risks.
Risk management has been a part of business for centuries.
Renaissance merchants often used several vessels simultaneously, each carrying
a portion of the merchandise, so that the loss of a single ship would not
result in loss of the entire lot. At almost the same time, the concept of
insurance evolved, first to provide economic protection against the loss of
cargo and later to provide protection against the loss of buildings by fire.
Fire insurers and municipal authorities began to require adherence to standards
intended to reduce the risk of catastrophes like the Great Fire of London in
1666. The Insurance Institute was established in London one year later. With
the emergence of corporations as limited liability stock companies, corporate
directors have been required to use prudence and due diligence in protecting
shareholders’ assets. Security risks are among the threats to corporate assets
that directors have an obligation to address.
Double-entry bookkeeping, another Renaissance
invention, proved to be an excellent tool for measuring and controlling
corporate assets. One objective was to make insider fraud more difficult to
conceal. The concept of separation of duties emerged, calling for the use of processing
procedures that required more than one person to complete a transaction. As the
books of account became increasingly important, accounting standards were
developed, and they continue to evolve to this day. These standards served to
make books of account comparable and to assure outsiders that an organization’s
books of account presented an accurate picture of its condition and assets.
These developments led, in turn, to the requirement that an outside auditor perform
an independent review of the books of account and operating procedures. The
transition to automated accounting systems introduced additional security
requirements. Some early safeguards, such as the rule against erasures or
changes in the books of account, no longer applied. Some computerized
accounting systems lacked an audit trail, and others could have the audit trail
subverted as easily as actual entries. Finally, with the advent of the
Information Age, intellectual property has become an increasingly important
part of corporate and governmental assets. At the same time that intellectual
property has grown in importance, threats to intellectual property have become
more dangerous, because of information system (IS) technology itself. When sensitive
information was stored on paper and other tangible documents, and rapid copying
was limited to photography, protection was relatively straightforward.
Nevertheless, document control systems, information classification procedures,
and need to-know access controls were not foolproof, and information
compromises occurred with dismaying regularity. Evolution of IS technology has
made information control several orders of magnitude more complex. The
evolution and, more importantly, the implementation of control techniques have
not kept pace.
Post a Comment