
346 CHAPTER 10 NETWORK SECURITY
10.1
BASIC CONTROL PRINCIPLES
OF A
SECURE NETWORK
TECHNICAL
FOCUS
•
The less complex a control, the better.
•
A control’s cost should be equivalent to the iden-
tified risk. It often is not possible to ascertain the
expected loss, so this is a subjective judgment in
many cases.
•
Preventing a security incident is always preferable
to detecting and correcting it after it occurs.
•
An adequate system of internal controls is one
that provides ‘‘just enough’’ security to protect
the network, taking into account both the risks
and costs of the controls.
•
Automated controls (computer-driven) always are
more reliable than manual controls that depend
on human interaction.
•
Controls should apply to everyone, not just a few
select individuals.
•
When a control has an override mechanism, make
sure that it is documented and that the override
procedure has its own controls to avoid misuse.
•
Institute the various security levels in an organi-
zation on the basis of ‘‘need to know.’’ If you do
not need to know, you do not need to access the
network or the data.
•
The control documentation should be confiden-
tial.
•
Names, uses, and locations of network compo-
nents should not be publicly available.
•
Controls must be sufficient to ensure that the
network can be audited, which usually means
keeping historical transaction records.
•
When designing controls, assume that you are
operating in a hostile environment.
•
Always convey an image of high security by pro-
viding education and training.
•
Make sure the controls provide the proper sepa-
ration of duties. This applies especially to those
who design and install the controls and those who
are responsible for everyday use and monitoring.
•
It is desirable to implement entrapment controls
in networks to identify attackers who gain illegal
access.
•
When a control fails, the network should default
to a condition in which everyone is denied access.
A period of failure is when the network is most
vulnerable.
•
Controls should still work even when only one
part of a network fails. For example, if a backbone
network fails, all local area networks connected
to it should still be operational, with their own
independent controls providing protection.
•
Don’t forget the LAN. Security and disaster recov-
ery planning has traditionally focused on host
mainframe computers and WANs. However, LANs
now play an increasingly important role in most
organizations but are often overlooked by central
site network managers.
•
Always assume your opponent is smarter than
you.
•
Always have insurance as the last resort should
all controls fail.
that currently are in the network. This will become the benchmark on which to base
future security reviews.
Assets The first step is to identify the assets on the network. An asset is something
of value and can be either hardware, software, data, or applications. Probably the most
important asset on a network is the organization’s data. For example, suppose someone
destroyed a mainframe worth $10 million. The mainframe could be replaced simply by
buying a new one. It would be expensive, but the problem would be solved in a few
weeks. Now suppose someone destroyed all the student records at your university so that
no one knows what courses anyone had taken or their grades. The cost would far exceed
the cost of replacing a $10 million computer. The lawsuits alone would easily exceed