Information Security News mailing list archives
Old security models inadequate for ebusiness
From: InfoSec News <isn () C4I ORG>
Date: Thu, 15 Jun 2000 16:14:18 -0500
http://www.vnunet.com/News/1103325 John Leyden Thursday 15 June 2000 The traditional approach to security adopted by many companies is outdated and will leave firms vulnerable as they enter the ebusiness market, a leading technology consultancy has warned. In its report E-Business Security: New Directions and Successful Strategies, Ovum argues that the traditional hierarchy of trust adopted by organisations does not fit the ebusiness model, meaning that access channels, such as mobile devices, could pose a major security threat. Graham Titterington, senior Ovum analyst and lead author of the report, said: "The old security model tends to rely on perimeter security - protecting the outer boundaries of the organisation. But that is based on a hierarchy of trust which places 'internal' users at the top and 'external' users at the bottom. An approach designed to keep people out of systems is no longer adequate. "This is plainly wrong for ebusinesses which need to allow customers and suppliers into the heart of their systems." Another flaw of the perimeter approach is that it does not distinguish between different applications and systems, which may have radically different security needs according to how mission-critical or sensitive their contents are, said Titterington. Mobile devices, such as smartphones and mobile PCs, have too many vulnerabilities today to be afforded high levels of trust, even if the users themselves can be trusted. "There is no standardised security infrastructure in the form of end-to-end protocols. It is too easy to steal or tamper with the devices, and digital keys are stored at gateways rather than on the device," said Titterington. "Companies should restrict their access rights until at least 2001, when there are better prospects of a standardised security infrastructure." Ovum's recommends "ubiquitous security", where security measures are applied flexibly to specific parts of the ebusiness environment. This relies on access control measures to grant user access selectively, depending on the level of trust placed in the user and the access device used. Different applications would be afforded different levels of protection, according to how mission-critical or sensitive they were judged to be. ISN is sponsored by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Old security models inadequate for ebusiness InfoSec News (Jun 16)