Physical and Network Security Merging? 132
MonMotha writes "CSO reports that physical and network security may be merging in an effort to eliminate redundant jobs, create a more secure security plan, and make security procedures more standardized across the company. This would seem to be a logical step forward as businesses become more and more dependent on their computers, and as the old adage goes, an attacker with physical access already has you owned."
this scares me (Score:5, Funny)
Re:this scares me (Score:4, Funny)
It just means that they'll be really enthusiastic at their jobs.
Though to be on the safe side, it might be best to limit their caffeine intake.
Re:this scares me (Score:2)
- Jester
physical security? (Score:3, Funny)
Re:physical security? (Score:1)
"Hold on, I got it... *BANG*"
"Head shot, nice."
Actually, I imagine the only change this will make to the status quo is an explosion in the amount of "hidden camera" pr0n available in the Gnutella network.
Re:physical security? (Score:2)
Hmmm, I wonder after the commentary on the thread for FBI Hirings/Physical Requirements [slashdot.org] we might be hearing a "HA-hah!" from beyond by J. Edgar Hoover.
Sterotyping (Score:1)
Re:physical security? (Score:1)
In my experience, the most roly-poly chairbound computer nerd could probably run circles around the average security guard.
a secure job... (Score:1)
One Caveat (Score:4, Funny)
(Maybe they should also ban FPS gaming during work hours too...)
Re:One Caveat (Score:1)
Oh oh (Score:1)
Isn't this obvious? (Score:1)
Re:Isn't this obvious? (Score:1)
Re:Isn't this obvious? (Score:3, Insightful)
If the local IT security guy/gal gets privilages on the physical security side, he/she can do a much better job of keeping the systems physically secure.
Obvious, but the implementation is the key (Score:1)
obvious? i'm not so sure (Score:1)
i also know it's important to have legal help should someone break in to the system, or just plain decide to sue the company. however, as a sysadmin, i'm not expected to take the lead in any lawsuits. when we're talking about physical and network security, we're talking about two different skillsets.
i can see the value of putting them in the same group, under some greater auspices of "Security," but if you're talking about making *one person* do both i just don't know. i can't say i'd want any of the sysadmins *i* know responsible for handling intruders. even things like evaluating badge systems and alarm systems are outside a sysadmin's real skillset. sure, i could pick an alarm system. so could the receptionist. we'd probably do about the same job picking one, too.
Re:Problem (Score:3)
Think of them as a crude firewall.
The article was talking about merging the decision making and responsibilities at a higher level. It was NOT talking about giving PCs to rent-a-cops or guns to sysops.
Actually, most network admins I know ALREADY own guns.
Re:Problem (Score:1)
.nosig
Re:Problem (Score:1)
An inane idea (Score:1)
--"I'll just be over here with the machete wielding savages, sir!"
Re:Problem (Score:1)
Re:Problem (Score:1)
Just to play it safe, yes the 2nd Amendment refers to PERSONAL weapon ownership and not just State run militias. The published writings of many Founding Fathers (Washington, Adams and Jefferson for starters) directly addressed this issue.
Keep in mind "Geeks With Guns" was, I believe, founded in California. Many a Linux Expo/LUG has ended with a decent sized group heading off to a range to fire off a few rounds.
CSIS and other agencies have known for decades (Score:5, Insightful)
For example, in evaluating a server room for the RCMP, I saw a physical security guy assess things like smoke detectors, fire extinguishers, construction of the ceiling, construction of the floor and walls, construction of the doorjamb and the locks used, etc. And he had to know his stuff as well as knowing what the pertinent standards for good practice (and in the case of government, for government standards for physical security). His prior job involved some assessments of some CSIS facilities (managing construction of same or something like that IIRC).
It is a very different skillset, but it makes total sense to combine expertise in both into one entity if organizational security is a requirement (and when is it not?). Ideally, in such a group, people will be cross-trained and particular experts in network/computer and site/physical/emission security will be retained. In practice, some poor sysadmins may get stuck trying to ensure physical security as well - depends on who is implementing the rationalization.
I recall reading a security text which devoted about twenty pages to encryption, network security, etc. and about 200 pages to other organizational security processes (including audits, risk assessments, emergency response plans, etc). If it costs me $100,000 to hack your network electronically or $5K to payoff a janitor, which do you think the bad guys will target?
Re:CSIS and other agencies have known for decades (Score:2, Informative)
Re:CSIS and other agencies have known for decades (Score:1)
I think they'll go with the $100,000 method, because it'll be more interesting and fun.
Not only that, but (Score:3, Insightful)
Different skill sets, but the approaches are analogous (perimeters, critical resources, etc.)
Personally I think that it would be a great idea if people had at least some contact and cross-training.
One caveat though-- This should not be about eliminating redundent jobs. Sure this means that you can operate more securely, but it really means you can buy better security for the same cost.
Somewhere, a BOFH is smiling.... (Score:5, Funny)
Re:Somewhere, a BOFH is smiling.... (Score:1)
"Do you feel lucky......well do you punk?"
Re:Somewhere, a BOFH is smiling.... (Score:2)
Bad idea (Score:5, Insightful)
Re:Bad idea (Score:1)
All those skills are required to do proper conputer forensics also, especially if you ever expect to be able to press charges. You at least need to know enough no to destroy the chain of custody, or change vital information by rebooting a server before collecting data, things like that.
Re:Bad idea (Score:1)
How many people work for said company?
My understanding is that in most companies less than 4000 employees worldwide there isn't really any physical security, except perhaps a "Facilities Manager" and a load of useless "Security Guards".
Re:Bad idea (Score:2)
You'd think in that situation that there would be enough turnover or risk to hire somebody with a security background to monitor the security systems (alarms, cameras, card-key systems).
And a lot of places sell or work with valuable, high risk or dangerous materials (weapons, drugs, precious metals & gems, chemicals, radioactive materials, etc). I'd imagine that insurance would demand a more rigorous security situation than property-management supplied "security" (which really are nothing more than rent-a-suits).
Although even for plain-old big buildings, what kind of security do you *want* other than security guards (and the usual card-access systems and cameras)? Ex-Mossad guys with MP5s, German Shepherds and "interrogation" rooms?
Maybe I'm just security unaware, but it strikes me that you can take a long walk down a paranoid road for little purpose...
Re:Bad idea (Score:2)
My understanding is that in most companies less than 4000 employees worldwide there isn't really any physical security, except perhaps a "Facilities Manager" and a load of useless "Security Guards".
Perhaps you don't know your audience. Have you any clue how many SlashDot readers are "useless 'Security Guards'"? How many of us wear down shoe leather for pay that is lower then that earned by a burger flipper? Even the gun-toting ones typically earn $13-15/hour.
Perhaps you are one of the people that make those "useless" security guards necessary. For example, how many times have you consumed alcohol to excess and bothered the other customers excessively? Have you extended the concept of piracy to include shop-lifting? How about your place of employment: ever though that a piece of office equipment would look better in your house than at your workplace?
Just to give you an example, the US Bankruptcy Court trustee determined that $15K/month for 24/7 guards on a property for asset protection during the process was money well-spent...and the Judge agrees. Of course, those "useless" security guards are protecting roughtly $1.5 million in highly-resellable assets, plus another $1.8 million in structure cost, from theft, destruction, or vandelism.
Did you know that in many states the protection jobs -- private investigator, polygraph operator, security guard, and security consultant -- are licensed and regulated? Check your state laws; in Nevada it's NRS 648. Who knows, you might be breaking the law and don't know it.
Re:Bad idea (Score:1)
Re:Bad idea (Score:3, Informative)
Access Control Systems & Methodology
Applications & Systems Development
Business Continuity Planning
Cryptography
Law, Investigation & Ethics
Operations Security
Physical Security
Security Architecture & Models
Security Management Practices
Telecommunications, Network & Internet Security
Re:Bad idea (Score:2)
But there is still a rather wide gulf between the concepts and techniques used within information and physical security realms. To the uninitiated, they may seem to be very simular. They are not. I've seen infosec activities ran by those who have a physical security background... and they end up focusing entirely on the wrong areas.
Information security needs to be aware of physical security. And physical security needs to have an increasing knowledge of IT. But that does not mean one activity should be ran by another.
Just because the CISSP includes Law and Investigation, it does not mean infosec becomes a wing of the Legal department nor does infosec become a police force.
Re:Bad idea (Score:1)
True - what it really means is to be a CISSP you have to have three (soon 4) years verifiable experience in one or more of those fields. To pass the test, you have to know "enough" about each of them. Then you can go practice in your area of specialty, but you should only accept jobs for which you are qualified. For example, someone soming from a physical security background should not apply for a job as a PIX admin just because he passed the CISSP.
Re:Bad use of Acronyms (Score:1)
CBK = Common Body of Knowledge
(ISC)^2 = International Information Systems Security Certification Consortium
----
How expensive is this CISSP anyways? If you are a professional in the field, is this certification really going to get you a raise? I guess if the company is paying than who cares, free books and paid time away from work. Work the system !
Re:Bad use of Acronyms (Score:1)
Cisco's CSO said CISSP is worth $10,000 more per year (I don't think he meant that in a good way). Of course I'm sure he has a higher opinion of Cisco's own security certifications
One guy I went to boot camp with applied for the same job he had not gotten before the test, but he got the job after the test. (He wore the lapel pin to the interview). That should be some indication of what the cert is worth.
Re:Bad use of Acronyms (Score:1)
I bet it's alot cheaper than the class. Maybe I could borrow yours for $50. Hahaha. Then I would have to make a story about the missing diploma.
Maybe when I start making headway on my B.S. loans I can think about more schooling. A year ago, I was thinking about a M$ cert in programming or database design, now I can't decide. One in network security might be helpful for the company I am interested in starting.
Re:Bad idea (Score:2)
Yep, it's sometimes refered to as left-brain and right-brain people.. There ase such fundamental differences in the skill sets of those people that giving all the responsability to one person will lead to reduced security. I can't understand who ever came up with the idea of combining the two ?
ISC^2 already defines this (Score:5, Informative)
The International Information Systems Security Certifications Consortium (ISC^2) defines ten domains of information security.
Physical Security is one of them... a big one. So is network security, auditing, forensics, and liability, amongst other things.
Anyone interested in the relations of risk management and physical/information security should aim their research towards ISC^2 related documentation.. in addition to being fairly comprehensive you will be better prepared when you become experienced enough to apply for your CISSP certification. ;-)
(ISC^2 can be found here [isc2.org])
-PM
Re:ISC^2 already defines this (Score:2)
To anybody involved in information security, this is probably not a revelation. But just because this is an aspect of infosec, does not mean it naturally falls in to the physical security realm.
To put another way... because infosec includes physical security, it does not mean a manager with physical security background is a good choice to lead an infosec activity.
One of these domains includes Law, Investigation, and ethics. And just like physical security, inclusion of legal considerations does not mean infosec should be ran by your corporate Legal office.
Infosec personnel should be aware of legal and physical security aspects that affect their environment. Certainly. And when they need experts in those areas, they should contact their physical security activity or legal.
Re:ISC^2 already defines this (Score:1)
Ideally I wish the first sentence were true, but it's not. I've been working in information security for almost 10 years, and most of the "security experts" I meet know a lot about one particular operating system, possibly a lot about network vulnerabilities or firewalls, and never even consider the idea of risk valuation or exposure assessment.
They tend to harp on and on about "but this is insecure" or "that will get you hacked" but can't even begin to describe the business justification for or against mitigating it.
I think ISC^2 is doing the information security industry a great service by exposing people who claim to be "Information Security Professionals" to the whole picture.
BTW - I totally agree with your points, just because you have to understand the structure of a building to put out a fire doesn't mean that you should use architects as firefighters either. :-) It's just nice to see the "big picture" finally getting some exposure to a largely immature industry.
- PM
It's funny, laugh. (Score:1)
One and the same (Score:2, Insightful)
Plus the best place to hack a network is from the inside. Its not a "mission impossible" to get yourself access to a computer at any major financial institution here in the states.
Data is an asset that needs to be protected both in the physical world where it is stored and, and in the virtual world where it is acessed. The goal in each arena is the same, ignoring either is irresponsible. Thus the inevitability of these two departments combining.
The ASP I was working for last year was very forward thinking on this and ran both network and physical security as a simgle entity. Unfortunatly thinking ahead in security, didn't translate to thinking ahead when creating a sustainable business model.
Re:One and the same (Score:1)
Bad guy: "Let me access all your info, or I'll blow your fucking heads off"
Admin: Uh.. whatever. Root password is 'god'
Admin #2: talk about shit security... I thought you were going to change that.
Bad guy: Hey? Where's the start button?
Admin: You did know this was a Linux farm right?
Re:One and the same (Score:2)
Inevitability of physical and information security combinging? Just because one involves the other does not mean they become the same activity.
Infosec involves purchasing hardware, software, licesnse, etc... does that mean Infosec and the Purchasing department should combine? Information security involves liability and privacy issues... do we combine Infosec with Legal? A compromised system can lead to a serious public relations issue... is Infosec now under the guise of the PR department?
No.
Each department has its own expertise and focus. Issues that one department focuses on can certainly affect other departments. And because of that... those departments should have the ability to coordinate and communicate... and draw on each other's strengths when they hit an issue that another specializes in. But they don't become the same activity.
Re: (Score:2, Funny)
Re:The first step to software security... (Score:2)
For those of us without that option, the first step is almost always physical.
NO internet connectivity until latest/greatest patches are installed. (Downloaded once to trusted server, scanned, then installed)
No physical access without badges.
Cameras at major intersections within the buidling and outside.
I work for a huge company, but in a smaller building. Everyone knows everyone else. The guards no us all by name. They come to us before letting ANYONE beyond the guest area.
It works...so far so good. Time for the old Ben Franklin (I believe) quote of the week:
Two can keep a secret if one is dead.
Do I get my precioussss karmassss nowwssss?
Bye bye geeks... (Score:1)
Re:Bye bye geeks... (Score:2)
Just open up our Nerf guns, replace the innards with some real weaponry, and put it back where you found it. We'll defend our serverrooms just fine. :-)
so... (Score:3, Funny)
Newsflash! (Score:2, Funny)
Scientist are now thoroughly investigating in alternate ways of protecting ones servers or other private belongings. Several options include Glyphs of Warding, cummon the undead to protect a server and storage of servers inside highly radioactive or otherwise toxic enviroments.
Re:Newsflash! (Score:1)
That's disgusting. Whatever room you do that in is secure from me, at least.
Re:Newsflash! (Score:2)
Do you have any clue why companies have gone to electronic lock systems? Let's see:
The complex mechanical device associated with the Key is called a Lock, and the design of most locks enable it to be defeated by turning a handy control which puts it in a failure-null state; even without the control, the Lock can be defeated with Duct Tape or other readily-available blocking device.
Of course, there is a defeat for the Door as well: the Door Stop. How many times have I approached a secure area only to find that some lazy person has employed a Door Stop to completely defeat the security provided by the Door?
no good can come of this... (Score:3, Funny)
Kid on playground #2: Aaaghghgkk!
Kid on playground #1: ha-HA! You're box rootin' days are over Bad Hax0r Bill!
Kid on playground #2: Gosh darn it Tommy! Why do I always have to be the intruder every time we play 'sys-admin'?
Kid on playground #1: quit whining Robby, when we're at your house you can be the network admin
Kid on playground #2: Fine, but at least pretend you're an MSCE this time so I can win one game
Kid on playground #2: Pfft. Alright, but next time we play 'content pirate' you have to be Valenti. I'm sick of peeing my pants so I don't miss the commercials.
Good for them (Score:1, Flamebait)
We definately need to eliminate more redundant jobs. After all, you always hear people complaining these days about having jobs, what with them being redundant, and how much simpler things would be if they were fired. This is definately a step in the right direction.
open ports (Score:3, Insightful)
Re:open ports (Score:1)
Re:Faraday Cage?WTBAMF!!!? (Score:1)
a) more effective than lead
b) safer than lead (you don't have to worry about lead getting into the work environment, then lead poisoning, etc...)
Figuring out. (Score:3, Funny)
Now the most difficult part is figuring out how to convey "w3 0wn j00r a55, fUx0R!" over the dubious medium that is the megaphone.
Banks do this (Score:2, Informative)
I guess that if someone decided to walk into the place with guns a blazing he could, but that's not exactly the most subtle way to steal credit card and bank account information.
Re:Banks do this (Score:2)
Re:Banks do this (Score:1)
Re:Banks do this (Score:2)
Why do people think the target is always credit card information and/or bank account info? There is so much more you can do with information and control than just stealing a pitiful few thousand dollars on credit cards...
Re:Banks do this (Score:1)
Physical access doesn't always help (Score:3, Interesting)
Oh, I dunno about that. We've already seen a number of reports about people who got their laptop back after a theft, apparently because it was running linux or *BSD. The thiefs couldn't get past the login screen, so they trashed it or left it lying somewhere, and whoever found it called the phone number on the sticker.
Granted, this might not stop your expert unix hacker. But most laptop thefts are by petty thiefs who are pretty much computer illiterate, as are the guys who fence them. With Windows or Macs, they can turn it on, try a few things to verify that it runs ok, and it's in the pipeline. With a unix-like system, they can't get in, they conclude that it's unusable, and they toss it.
Your typical laptop thief only gets a hundred bucks or so for the machine. It's not worth a great deal of effort to break through security to verify that you're not buying a fancy-looking brick. So login+password is plenty secure for the typical theft.
Re:Physical access doesn't always help (Score:3, Insightful)
If the thief DOES care what is on the machine I truly believe they will either know how to hack into it or they will have someone they trust do it for them. The target will be specifically picked out (random dumb luck isn't a good way to run an operation like this) and a plan will be in place down to what to do with the data once they have it.
Re:Physical access doesn't always help (Score:2)
Drop the floppy or I'll shoot (Score:2)
the end all and be all security folk? (Score:1, Interesting)
It is that issue there that will present the problem, and also the very thing that many 1337 do0dz will never understand.
That being said, I am glad that the ideas are merging... mainly because I think that it will clue many developers in for the need to provide consistent, standard, and robust interfaces instead of 'hacked for this and only this feature/platform/language/etc' I personally have crappy front end skill, but I understand its very vital nature. For every 1337 do0d that thinks it is not good to 'dumb down' anything, then they obviously do not understand that abstraction does not change or prevent any low level interfacing, but merely provides the means for working with other systems like GUI's. Of course it also means they are wanna be loosers who if they rubbed two neurons together would realize how stupid that kind of thinking is. They should be real programmers and throw away the keyboard, monitor, mouse... and go with a bank of binary dials for any computing. Retards... talk to me later after you have grown some pubes.... oh! look at me, I can code! Yay for you... I can drop most adults in a fight, you won't see my ass taking on Sadam by myself however. Idiots.
More than physical and logical... (Score:2, Informative)
(Oh, and don't forget to email your username/password/IP to me [mailto]. Thanks.)
Re: (Score:1)
Re:rent-a-cops? (Score:1)
I'm a network engineer/unix-alike sys admin by profession. That I didn't finish high school and was employed by McDonald's doesn't diminsh my intellectual or technical capabilities.
Security in various forms... (Score:3, Interesting)
I work for a large auto parts distributor, and our security department doesn't even deal much with access security. They deal with investigations for sticky-fingered employees for the most part. They also deal with the more complicated theft rings, which usually involve state authorities due to dirty city cops being involved.
This is WAY outside sysadmin territory, and I don't see them merging anytime soon.
My problem with this... (Score:3, Insightful)
If this were *merely* to eliminate redundant management structures, it might be agreeable. But probably wouldn't be.
As a former IBM employee, I've had to deal with the management of firewalls by a seperate security organization; the result was a minimum of six weeks to get a TCP port other than 80 opened, if it's permitted at all.
XML was invented by IBM employees as a means of routing around these people by tunneling operations on port 80, which these people would permit by virtue of it being port 80, without concern for the content of the traffic over that port.
Given encryption on storage media, both active and backup, and multiple site replication, physical security is more and more meaningless for information technology.
IMO, eventually corporate networks will not exist at all, *except* as VPNs.
At that point, "physical security" means sending armed guards out on business trips with every schmuck with a laptop, and posting them outside the homes and telecommuting centers of every remote worker.
Frankly, a merger in this area feels more like the physical security people trying to defend against their increasing irrelevance, in the same way that RIAA and MPAA are attempting to defend their increasing irrelevance.
-- Terry
The truth is... (Score:1)
The first principle behind hacking something is to attack the weakest point. In most cases the human factor is the weakest point. Social engineer a password out of a luser and you're on your way. In other cases it might be physical security. By increasing physical security of your network, you just push it further down the list of ways to get in.
The truth is that a truly concerted, determined (and skilled) hacker will get into pretty much any system they want.
Funny story about security guys not getting IT (Score:1)
I *can't* believe it! The security guy specs out an APC Back 250 UPS like you get at Costco for $80 The frickin door probably only stayed locked for, like, a half hour. The security guy though it would stay locked for days!
I inserted my key into the deadbolt on the door (which I insisted on) and firmly closed the lock. The APC was replaced with a 1500 the next day.
The 3 BIG Securities protecting your network (Score:2, Informative)
2. Personnel Security, so that you reduce the chances that you've given authorization to an untrustworthy person.
3. Computer/Network Security, to reduce the chances that unauthorized people get into your network from outside your facility, and to control the access that authorized users have to your systems.
All 3 are needed. If one person isn't doing all 3 security jobs, then the different security people should be working together so that they don't accidentally work at cross-purposes.
For example, one of the buildings on our site had been vacant for several months, so to save money physical security dropped the alarm monitoring and guard patrols when the contract was renewed. Two months later IT set up a new server farm in it,and didn't tell the physical security folks. One month after that, the servers went down and "walked away" over a three day weekend...
I have been managing both for years. (Score:1, Insightful)
Once you cross this hurdle and good well rounded security expert can approach a building, office or room and address everything from the points of entry to the servers.
An example, when approaching a server room I look at the entry mechanism on the door, the hinges and jam. I look at the walls for material, thickness and accessiblity. Is the ceiling accessible? Once inside I look at the physical access to the hardware, the fire prevention equipment, etc. Then we move on to the data security. I have hired people that are experts in each field and they train each other.
In the end you end up with a much more secure environment and the same workforce minus maybe one manager.
I think this was inevitable.
Old adage? (Score:2)
I usually feel a superiority complex when it comes to the "humor" and "wit" that normally accompany the average slashdot text, but this one has me stumped... Is this a really an old adage? Or is it some semi-subtle joke, using the relatively new term "owned" and calling a phrase with its usage an "old adage"?
Six in one (Score:1)
Half a dozen in the other. Security in my mind is about protecting information assets, be they physical, electronic, or human. It all comes down to defining policy and implementing reasonable measures to enforce your policies. Some times the solution is physical, sometimes it is social, and sometimes it is 1s and 0s.
At some high level, all of those elements should be combined into a single responsible entity. Whether the person in charge comes from a physical world or a data world does not matter, provided they have a talent pool from both worlds capable of enforcing their policy. I do not think the article intended to imply that we would see admins being asked to take a bullet (good luck!) or security guards expected to respond to the next Bind exploit (once again, good luck!).
If however, on the off-chance my company wished to provide me with say, oh I don't know maybe a chain gun or a redeemer, I would be more than willing to sit in a tower and secure the physical perimeter for them.
i know someone's said it... (Score:1)
how about throwing MCSEs off the property? or hitting the new admin w/ a taser when he gives a user root so they can install software on their machine?
( gleefully rubbing hands together while entertaining thoughts )Waste of time? (Score:1)
My experience says me that a logical solution (keep crackers away.. etc etc...), has another counter logical solution agaist it (a way to reverse it, to put in plain text: crack it..). Why?, because otherwise it wouldn't be "a logical solution" in the first place.
89 1 55 1 34 2 21 3 13 4 8 5
which number shouldn't be there? (that's right, these numbers are the result of some logic, except one... which, I ask : ))
(ps! Just becasue a logical solution maybe "simple", dosn't mean the counter logical solution should/would be the same)
(PS nr2!! The point I want to make?? (If you haven't figured it out). Well then, you have some thing to make sense of then : ))
God, what an awful idea (Score:2)