It Is Well Understood That Security Reduces Convience
Total Page:16
File Type:pdf, Size:1020Kb
It is well understood that security reduces convenience; that convenience reduces security; and that we can buy slightly more security or convenience with a slightly higher expenditure. This is sometimes represented as a joke offer. Profit, security or convenience, choose any two. Often overlooked is a second hidden variable able to influence the level of security achievable in a particular environment. This is the skill or more generally the professionalism of the people providing security. Information Technology Security curriculum is a hot topic at ITSec conferences, in the IT professional societies and in institutions of higher and further education.
In order to provide a safe Information Technology infrastructure, designers, integrators and operators must understand the features of the systems available and being used. They need to know how to operate and configure the systems. They need to know the required level of security (confidentiality, integrity and availability). They need to know how to keep these systems secure. This knowledge is best achieved and maintained through manufacturer certification.
As professionals, security professionals also need to keep their knowledge current. They need to engage in self review, and society expects them to adhere to high ethical standards. When compared to other IT professionals, ITSec professionals have more contentious ethical dilemmas. The issue of personal privacy versus security is one instance. Often posed as a question, “Should our personal email at work be subject to inspection and disclosure?” I don’t want to go into this here, let me get back to curriculum or body of knowledge.
Manufacturer certification is not enough to properly train an ITSec professional. A generalist degree added to certification is better. This should address the problem solving, planning organising communication skills needed. It should address the self review, ongoing love of learning too. But an ITSec professional needs more in my view.
There are some basic principles of security that are not covered in manufacturer certification nor in general IT courses. These are core principles of security. The sorts of things that don’t go out of date. Let me mention one that is thousands of years old. Defence in depth is a concept you find in ancient military thinking. A good security system will protect itself from attack from within. The walls of Troy were not enough. This lesson is still not well understood in IT security. A recent round of on line forum discussion revolved around the need for personal computers to have the inconvenience of personal fire walls installed. Some people thought it was not needed and just too inconvenient.
An application of the principle of defence in depth would identify that the organisation’s external firewall, email and web proxy virus checker, no matter how good, will not protect your work computer from a virus (worm) infected computer somewhere inside the firewall. We shouldn’t ask how the virus got inside the firewall, only what if one does. The defence in depth principle has a little more meaning than this. It also requires defence against the security system being turned on those it was protecting. A good example was a recent attack based on a fault in personnel firewall software itself being used as an access and distribution mechanism for a computer virus. Experienced security professionals understand the importance of keeping the security infrastructure secure and closely monitored. The security infrastructure should be more secure and more closely monitored than the infrastructure it protects.
There are other general principles of security often missed in vendor certification. One is the principle of minimum capability. When we deploy software or grant permissions to people and systems, we should always only grant the minimum capability required to do the agreed task. This principle has been lost in the ever increasing capability granted to software downloaded as we visit ever more “functionally rich” web sites. Programmers are often taught how to use these capabilities, rather than being taught and being required to exercise the principle of minimum capability.
The issue of appropriate content, the balance between fundamental knowledge and current skills, of vendor verification versus degree programs, the balancing of short term skill needs and long term skill needs are being played out for IT in general. In relation to IT Security skills, these principles and the balance chosen can have life threatening and national significance.
We can not leave IT security in the hands of people who know, only, how to configure, even if it is configured well, the latest piece of security equipment or software. The security systems themselves may be faulty and vulnerable. We should only leave security in hands of people who understand the principles of security learned through a thorough study of failures in security over the millennia. These people, if professionals, will ensure they have ongoing current skills and systems knowledge.
The specification of a curriculum in IT security is a current and ongoing task, please join in.