Workforce Plenary Home Page Home Page |
Go Mobile, Stay SecureMatias Impivaara, Marketing Manager, Handheld security, F-Secure CorporationMr Impivaara began by considering the need for Mobile Security People: it is people who drive security: they like to stay in touch; they value freedom and openness; they demand customized solutions and privacy; they expect the latest technology, and they want to enjoy themselves. What they don't want is to become technology and security experts Technology Develops, but the security needs remain the same:
Protection is needed for both the infrastructure and the terminals: once a virus gets into the system it become authenticated and protected! Data Security is critical in many mobile solutions. Mr Impivaara quoted Anders Nordlander, IT-Security Manager, Swedish National Social Insurance Board: "The use of PDA devices offers clear benefits for us, but it also exposes us to evident new security risks. Confidentiality of information is critical for our operations and we simply cannot afford compromising security.” Standard device security is not enough, but it is also important to remember that the security to be provided should match the need; it is not an absolute. There are different types of device: mobile, handheld, and wireless. However, these are different: a desktop pc may be connected to a wireless device; a standard laptop is of itself mobile, but neither handheld or wireless ... and so on. Wireless Connections as a Security Challenge
Mobility as a Security Challenge
The small size of most mobile devices is also a security challenge. They can fit in a purse or pocket (or - next generation - behind your tie). Now they not only go to the employees homes, but into bars, the beach, and so forth. This has an enormous impact on the risk. What is the threat situation? The main risk is of unwanted disclosure of stored information: a tiny memory card can hold a megabyte of information, and usually there is no protection for these devices. There is no inherent encryption, and information on how to access them can be found on the internet. Thousands of these devices are lost of stolen every year. Hacking presents another threat. Once you have defined network access right to a device you will always have information held on the device about how to access the corporate network. The same passwords are often used to access the mobile device as to access the corporate network. Viruses and other harmful content. There was a nonsense story in Finland about a dangerous virus attacking Nokia phones. There was no real threat, but the media love the idea. There are no real viruses for mobile devices at the moment. However, in the future there are people trying to create them, and the things we can do is to learn from the pc world, and we should be preparing beforehand. Potential Solutions What are the product requirements for a solution? Solutions should be:
It is important to have a complete package, including
Mr. impivaara emphasized the need for effective management. It should be possible, for instance, to be able to distribute antu-virus software automatically, and to have appropriate process set up for situations where for instance a user loses a device. There are a range of potantial business models, and he went on to discuss several different options, such as Licence agreements with hardware vendors, subcontracting and OEM deals, direct enterprise sales, service provider cooperation, sales through partners, and internet sales In summary he brought out the following lessons:
Understanding Policy For Network Security: Wireless ChallengesPeter Harter, Senior Vice-President, Business Development and Public Policy for Securify, Inc.Peter began by considering the current environment, and pointed out that in the mobile world there is no perimeter to the system for which security is needed. An ICC survey of wireless networks in London had shown that 90% are exposed as a result of mis-configuration, default setting, weak or lack of encryption. Increasingly systems are vulnerable to threats from rogue networks and access points set up by employees. One limitation is that PDAs and other handheld devices have less power and facility and thus cannot handle PC based security solutions IDC and Price Water house Coopers have carried out a study over the last year, and they concluded that the losses due to poor security were 1.38 trillion US - more than the GNP of France. Not only are people causing more security losses, but companies are taking more care to track security invasions. He considered the success (?) of the internet
In the business environment there are many more challenges. Many businesses are exchanging information with their partners; the total system is only as strong as its weakest link. If you don't have control of the total network, how sure can you be of your security? A lot of security is at the perimeter - firewalls and so on - like the doors of a house - but what if it has no windows? There is a lot of noise - many distractions, but it is very hard to identify the real threats and to concentrate on them. People want to know how real the threat is - how much real damage can be done to business continuity. People are looking at network security as closely as they are auditing their financial assets. Increasingly in the US there is the suggesting that Public Corporations will have to expose in their annual reports the state of the security of their networks. There is an old saying: 'you can't manage what you can't measure', and in practice nobody can measure network security against a baseline. At a recent conference, only 20% of organizations had a security policy, and only 20% of them maintained it on an ongoing basis. Peter then turned to what he described as the Policy Empowered Network It is important to begin not with technology but with policy. The policy is key - single point solutions are not enough. In summary, Peter made three points:
It is not possible to outspend the security problem, or to hire enough people to conquer it. The only way is through policy. Questions:Bob Blakely, IBM Tivoli. You mentioned cyber risk insurance on one slide. Once a risk has been identified, how can it be quantified? Peter Harter: From a US perspective, the thinking has been that if you have a comprehensive approach to network security and management and can measure access and use, you have something that actuaries can work with. Without that, everything is anecdotal. Bill Ostrom, University of St Thomas: What problems do you see ahead in managing how users contribute to their own security? Peter Harter: Letting executives use PDAs means an issue that needs to be managed, but people don't use these devices lightly. How to get value out of Mobile SolutionsBoris Dickmann, and Dietmar Kock, Wearix and Predictive SystemsPredictive Systems are The Open Group's representative in several countries in Europe. The key message of the presentation by Herr Koch and is that to be successful companies must look at overall business processes and see mobile as a part of that. Boris Dickmann began by looking at the market and its strengths and solutions, and commented on some market research:
The potential values from using mobile applications come from several sources:
Like many speakers, Boris emphasized the need to begin with the business need and the business process, and only then to think about the mobile solution. Any security analysis has to consider the use of devices and information, and Herr Dickmann asked Dietmar Kock to present a Security Framework Dietmar pointed out that the strategic question of understanding risks and analyzing how to meet them has to be the starting point of any security consideration. IT-Governance consists of governing, controlling, monitoring and measuring IT-processes and IT resources within an enterprise. It is divided into the following competencies
One problem is that naturally systems become heterogeneous because it is not always possible to replace devices by an identical model. Secondly, as bandwidth grows, so do data volumes, so the problem increases. Usage of mobile computing power will reduce transaction costs and offer high availability. In order to provide solutions we decided to implement a platform that we could use as a standardized basis for a solution. Success Factors
In summary, risks are of 5 categories:
User Authentication Methods for Mobile SystemsDr Steven Furnell, Network Research Group, University of PlymouthDr Furnell began by discussing the growth of mobile devices in recent years. There has been a substantial growth of mobile devices: e.g. mobile phones - 768m in 2001 to 1,848m in 2004 At the same time there is increasing device functionality e.g. convergence of PDA and phone devices. This trend seems set to continue, and at the same time mobile devices contain an increasing amount of sensitive information. This leads to the question: What protects these devices from attack? Already these devices are vulnerable to threat and their increased use seems likely to make this trend increase as well. Within Dr Furnell's Network Research Group there are several programs of Postgraduate and postdoctoral research: 13 current PhD projects, 8 in the area of IT security. There are links to Orange in a number of projects, including two sponsored PhDs relating to authentication for mobile devices. Increasingly we are going to have the capability to access information from a wide range of services, increasing the need to authenticate ourselves for all these devices. Future devices could have all sorts of information about individuals, maybe including medical records, and corporations. In addition they are used as gateways into corporate systems. He presented some headlines from relating to loss of mobile phones and spamming techniques, such as viruses causing PCs to send SMS messages to mobile phones. There are three potential authentication strategies:
There are obvious weaknesses of traditional methods: passwords and PINs are often:
Steven went on to describe a Questionnaire distributed to 161 mobile phone subscribers, with the aim of to assess the usage of mobile services, usage of current authentication methods, and the likely acceptance of more advanced methods. In response:
In terms of current security, in the majority of cases authentication is via a PIN. All phones support the use of a PIN when the phone is turned on; others support a secondary PIN to take the phone out of standby mode.
PINS are often compromised:
on the other hand:
this would suggest that alternative approaches are needed - is those not involving PINs Steven then want on to consider Future Authentication Requirements Inconvenience was a major reason why survey respondents did not use PINs: require methods that can be non-intrusive; it is also desirable to have methods that users cannot easily invalidate. Token based methods not likely to be viable for mobile systems: tokens could be carried with devices or left permanently in situ - it is analogous to removing the SIM card from the phone, which few people do today. Finally he went on to consider behavioral approaches. These are less certain than other methods, and important measures are
Minimizing one of these often results in a substantial increase in the other, so there is a need for an appropriate balance Possible biometrics include:
In summary Dr Furnell reached four conclusions:
QuestionsQ The trade off between FAR and FRR depends on what you're trying to achieve. In discouraging theft, some false acceptances may be tolerable. A Yes, it very much depends on whether the authentication is supported by some continuous approach |