empubs.awma.org/gsearch/em/2004/4/itinsight.pdf · 2011-08-17 · april 2004 em 13 circle 4 on...

4
EM 12 April 2004 EM EM IT Insight by Jill Barson Gilbert T oday, many environment, health, and safety (EH&S) professionals carry around portable notebook com- puters, allowing them immediate access to informa- tion anytime, anywhere—via wired or wireless networks, at home, in the office, in airports, and even on airplanes. However, with the increasing threat of corporate espionage and malicious computer “hacking,” and the introduction of commercial soft- ware applications delivered via the Internet, concerns over the safety of corporate data are greater than ever. And human error remains one of the chief causes of network security problems! 1 At a minimum, computer networks, large and small, need pro- tection from unauthorized intruders and a method of tracking those that have access to the network and its data. How secure are your data when you connect to your corporate network? NETWORK SECURITY THREATS Networks are intended to facilitate information sharing. They include the Internet, intranets for internal users, and extranets that provide limited access to customers and partners outside the company. Keep in mind that the more parties that have access to your network, the more you should be concerned about security. Although personal computers and computer networks have been in use for more than 20 years, the risk of cyber security attacks remains high. Though the number of actual incidents reported by information technology (IT) security professionals in 2003 equaled the number reported in 2002, attacks via the Internet are on the rise, according to the results of a 2003 survey of computer security conducted by the FBI. 2 Many of the orga- nizations surveyed reported network attacks from both inside and outside the company. Despite these trends, however, the severity and financial impacts of computer security breaches declined for the first time last year since 1999. This indicates that companies have gained a certain degree of control over security and can mitigate the impacts of security breaches. HEDGE YOUR BETS AGAINST SECURITY THREATS Network security measures help protect corporate networks and data from unauthorized modification, destruction, or dis- closure. They also assure that the network properly performs its critical functions without harmful side effects. Sound planning and implementation can help minimize the risk of network security breaches. In many ways, IT network security planning parallels EH&S emergency planning and response. Both types of planning employ like processes: (1) assessing and prioritizing risks, (2) identifying mitigation strategies, (3) developing and implementing management systems, and (4) auditing the man- agement systems on a regular basis. Assess and Prioritize Risks Many trade groups, computer hardware and software manufac- turers, and standards organizations are getting serious about IT

Upload: others

Post on 27-Apr-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EMpubs.awma.org/gsearch/em/2004/4/itinsight.pdf · 2011-08-17 · April 2004 EM 13 CIRCLE 4 ON READER SERVICE CARD security. The American Chemistry Council, for example, recog-nizes

EM IT Insight

12 April 2004EM

EM IT Insight

by Jill Barson Gilbert

T oday, many environment, health, and safety (EH&S)professionals carry around portable notebook com-puters, allowing them immediate access to informa-

tion anytime, anywhere—via wired or wireless networks, athome, in the office, in airports, and even on airplanes. However,with the increasing threat of corporate espionage and maliciouscomputer “hacking,” and the introduction of commercial soft-ware applications delivered via the Internet, concerns over thesafety of corporate data are greater than ever. And human errorremains one of the chief causes of network security problems!1

At a minimum, computer networks, large and small, need pro-tection from unauthorized intruders and a method of trackingthose that have access to the network and its data. How secureare your data when you connect to your corporate network?

NETWORK SECURITY THREATSNetworks are intended to facilitate information sharing. Theyinclude the Internet, intranets for internal users, and extranetsthat provide limited access to customers and partners outsidethe company. Keep in mind that the more parties that haveaccess to your network, the more you should be concernedabout security.

Although personal computers and computer networks havebeen in use for more than 20 years, the risk of cyber securityattacks remains high. Though the number of actual incidentsreported by information technology (IT) security professionals

in 2003 equaled the number reported in 2002, attacks via theInternet are on the rise, according to the results of a 2003 surveyof computer security conducted by the FBI.2 Many of the orga-nizations surveyed reported network attacks from both insideand outside the company. Despite these trends, however, theseverity and financial impacts of computer security breachesdeclined for the first time last year since 1999. This indicatesthat companies have gained a certain degree of control oversecurity and can mitigate the impacts of security breaches.

HEDGE YOUR BETS AGAINST SECURITY THREATSNetwork security measures help protect corporate networksand data from unauthorized modification, destruction, or dis-closure. They also assure that the network properly performs itscritical functions without harmful side effects. Sound planningand implementation can help minimize the risk of networksecurity breaches. In many ways, IT network security planningparallels EH&S emergency planning and response. Both typesof planning employ like processes: (1) assessing and prioritizingrisks, (2) identifying mitigation strategies, (3) developing andimplementing management systems, and (4) auditing the man-agement systems on a regular basis.

Assess and Prioritize RisksMany trade groups, computer hardware and software manufac-turers, and standards organizations are getting serious about IT

Page 2: EMpubs.awma.org/gsearch/em/2004/4/itinsight.pdf · 2011-08-17 · April 2004 EM 13 CIRCLE 4 ON READER SERVICE CARD security. The American Chemistry Council, for example, recog-nizes

April 2004 13EM

CIRCLE 4 ON READER SERVICE CARD

security. The American Chemistry Council, for example, recog-nizes information and cyber security as a critical component ofa sound security management system. It is developing a code ofmanagement practices for information and cyber security withinits Responsible Care program.3 Also, the National Institute forStandards and Technology (NIST) publishes a risk managementguide that can be applied to many types of organizations.4

To understand your network’s potential security risks, youmay need to conduct a network assessment. Much like a secu-rity vulnerability analysis of chemical operations or an EH&Srisk assessment, a network security assessment should evalu-ate where failures are likely to occur, which failures would causethe most harm, and which risks should receive the highestpriority for mitigation. If your IT staff already has security poli-cies and procedures in place, you may need only to verify yournetwork security measures rather than conduct a detailedexamination. A network security assessment might include asecurity readiness review and a risk assessment. A securityreadiness review should cover the following domains: generalbusiness practices, the IT environment, system, network, firewall,applications and databases, and hardware “clients.”5 A riskassessment follows the review and uses data gathered in thesedomains to identify where failures are likely to occur, which

would cause the most harm, and to set priorities for mitigation.Threats, vulnerabilities, and business requirements change,

but your commitment to security should be constant. Youshould periodically reassess your network security to providecomprehensive protection. The frequency of reassessmentdepends on the size of your organization and the complexity ofyour IT systems.

Identify Mitigation StrategiesOnce you have identified specific security risks, you can identifyappropriate mitigation strategies. This might include the useof multiple or “layered” security technologies that provide betterprotection than a single technology; one security measure canprotect the network where another measure fails.6

Nearly all of the respondents in the 2003 FBI survey employfour network security technologies:2 (1) antivirus software likeComputer Associates, Norton, or McAfee; (2) hardware and soft-ware firewalls; (3) software access control (e.g., user login); and(4) physical security measures, such as locked server rooms andantitheft devices. Nearly three-quarters use intrusion detectionsoftware to recognize attacks that firewalls often cannot de-tect, and to provide data to assist in mitigation if a networkbreach occurs. Only a few companies today use biometrics

Reform School: Understanding theChanging World of New Source Review (NSR)

Visit www.awma.org for more information.

The rules are evolving, and so is one of A&WMA's most popular workshops.

The Fundamentals of NSR Workshop Series is getting a facelift. With the ever-changing world of NSR being one of the most complex issues today, and reformbeing the subject that you want to know about — please join us for a highlyinteractive two-day event. This workshop will:

• Show where each version of the rule applies;• Explain the basics of the major NSR permit requirements (BACT, LAER, etc.);• Discuss the applicability criteria for each version of the rule, allowing you to

determine whether major NSR applies to a project; • Update you on the latest enforcement initiatives, settlement agreements, and

court decisions; and• Provide an idea of what's in store for NSR rules and programs in the near future.

If you are involved in NSR permitting, this is the training you need to keepabreast of the latest developments.

Coming to a city near you…

Albuquerque, NM - September 16-17, 2004 Orlando, FL - October 7-8, 2004

Updated Workshop Series

Page 3: EMpubs.awma.org/gsearch/em/2004/4/itinsight.pdf · 2011-08-17 · April 2004 EM 13 CIRCLE 4 ON READER SERVICE CARD security. The American Chemistry Council, for example, recog-nizes

EM IT Insight

14 April 2004EM

Volunteers Needed toAdvance Association

Training

Are you interested in continuing education for environmental professionals? Do you haveideas for growth in the area of training forAssociation members? If so, then the TrainingDivision of the Education Council would like toget you involved.

Current Programs:

Audio + Web Conferences

E-Learning Center

Course selection for Annual Conference andInternational Urban Forum

Fresh ideas from members are being sought!

If interested, please contact Charlie Pratt at phone: +1-919-832-2283, or e-mail: [email protected].

technologies, such as voice, eye, or fingerprint recognition toprotect their networks.

Develop and Implement Management SystemsGood management systems have the support of top manage-ment, are dynamic, and involve the right people and resources.Two types of network security management systems are net-work security policies and procedures and disaster recovery plans.

Network Security Policies and Procedures. Network securitypolicies and procedures must be clearly written and communi-cated throughout the organization. They also must come withproper training for all users, and must be enforced throughoutthe organization, or they will not be effective.

Network security policies and procedures might address• User login to the network — policies and procedures for

secure in-office, home-office, and remote dial-in access.• Internet use — policies, procedures, and guidelines

on the types of Internet sites accessible by employeesand contractors, or policies on data and softwaredownloads to prevent inadvertent virus attacks.

• Company intranets and extranets — policies regard-ing access to internal and external Web sites by employ-ees, contractors, suppliers, and vendors, as part of theirday-to-day jobs.

• Physical security of the network — policies and pro-cedures to protect the physical security of server rooms,servers and equipment, and desktop computers.

• Use of company computers — measures to restrict ac-cess to sensitive company data by unauthorized users.

• Use of a virtual private network (VPN) — policiesregarding access to network via VPN, with or withoutauthentication devices such as tokens.

• Use of wireless devices — policies regarding passwordprotection, use of wireless devises in public places, etc.

Disaster Recovery Plans. A disaster recovery plan can help or-ganizations recover electronic data quickly after unauthorizedaccess or in the event of a natural disaster, such as a hurricane,flood, or earthquake. As in EH&S emergency planning, the goalsof a disaster recovery plan are to evaluate and prevent vulner-abilities, minimize serious business disruption, and ensureeffective and speedy recovery. The disaster recovery plan shouldbe tested periodically, reviewed at least annually, and updatedas appropriate. It should be available to the designated disasterresponse team, and copies should be maintained offsite, in casethe site cannot be accessed.

A disaster recovery plan might address• The range of potential disasters that might occur —

natural disasters, network breaches and viruses, soft-ware issues, human error, unforeseen circumstances,and hardware failures.

Page 4: EMpubs.awma.org/gsearch/em/2004/4/itinsight.pdf · 2011-08-17 · April 2004 EM 13 CIRCLE 4 ON READER SERVICE CARD security. The American Chemistry Council, for example, recog-nizes

April 2004 15EM

About the AuthorJill Barson Gilbert, QEP, is president of Lexi-con Systems, LLC. She helps organizationsincrease business value by designing and imple-menting EH&S management solutions thatleverage technology. A respected author andspeaker, Gilbert is past chair of A&WMA’sInformation Solutions Committee. She can bereached at [email protected].

• Consequences of disasters — length and extent ofoutage, corruption of software, damage to hardware,need to restore backed up data, impact on users.

• Safety of critical documents and records — avail-ability of hard copy and electronic backup data, onsiteand offsite data storage, availability of backup data,time frame to restore critical documents and records.

• Priorities for data processing systems and opera-tions — identification of the most critical data andsystems to be restored when the network is broughtback from an outage.

• Recovery strategies and tactics — address who, what,when, where, and how to recover systems and data.Address internal and external resources needed forrecovery, such as the response team, potential needfor an offsite command center and equipment, backupserver sites, and power generating equipment.

• Testing criteria and procedures — periodic drills andtests to ensure the disaster recovery plan works beforea disaster occurs.

If your network and the data within it are important toyour organization, you need to protect them. Most organiza-tions lack adequate network security planning, citing that itdoes not generate profits. As a result, network security often isreactive rather than forward-looking. Spending the time to iden-tify and put into practice effective network security safeguardscan provide many benefits, including the ability to quickly re-cover following a security breach, minimize network down-time and business interruption, reduce financial impacts, andlessen stress within the organization.

REFERENCES1. Study: Human Error Causes Most Security Breaches; Strategic Research Corp.,

March 20, 2003.2. Eighth Annual Computer Security Institute/FBI Computer Crime and Security

Survey; Federal Bureau of Investigations, 2003.3. Implementation Guide for Responsible Care Security Code of Management Prac-

tices, Site Security, and Verification; American Chemistry Council, July 2002.4. Stonebumer, G.; Goguen, A.; Feringa, A. Risk Management Guide for Infor-

mation Technology Systems; NIST Special Publication 800-30; National In-stitute for Standards and Technology, October 2001.

5. See http://www.hp.com/hps/security/sc_readiness.html (accessed Jan.2004).

6. Wells, M.; Thrower, W. The Importance of Layered Security; Symantec Corp.,September 10, 2002; available at http://enterprisesecurity.symantec.com/article.cfm?articleid=769&EID=0 (accessed Feb. 2004).

CIRCLE 5 ON READER SERVICE CARD