Page 623 - StudyBook.pdf
P. 623

Operational and Organizational Security: Incident Response • Chapter 11  607

                    Not all equipment is at risk from the same threats. For example, a workstation at
                 a receptionist’s desk is vulnerable to members of the public who may be able to
                 view what is on the monitor or access data when the receptionist steps away.
                 Equipment is also vulnerable to accidental or malicious damage, such as when a user
                 or visitor accidentally knocks a computer off a desk or spills something on a key-
                 board.A server locked in the server room would not be subject to the same type of
                 threats as the receptionist’s workstation, since access to the room is limited to mem-
                 bers of the Information Technology (IT) staff. Because the level of risk varies
                 between assets and locations, risks must be evaluated for each individual device.
                    When designing security, it is important to strike a balance between the cost of
                 security and the potential loss—you do not want to pay more for security than the
                 equipment and data are worth. Servers are costly and may contain valuable data, so
                 a higher level of security is needed to protect them. On the other hand, an old
                 computer in the Human Resources department that is used for keyboarding tests
                 given to prospective employees needs little or no protection.
                    When determining value, it is important to not only consider the actual cost of
                 something, but how difficult it is to replace.While certain data may be of relatively
                 low cost value, it may still be important to a company and difficult to replace. For
                 example, a writer may have the only copy of a book on his hard disk. Because it
                 has not been published, the actual value of the book is minimal, and the cost of
                 creating the book is limited to the time it took the writer to type the material.
                 However, if the hard disk crashed and the book was lost, it would be difficult to
                 replace the entire book. Even if the writer rewrote the book, it would be unlikely
                 that the new version would be identical to the original. By determining the diffi-
                 culty in replacing data, you are better able to determine its non-monetary or
                 potential value.
                    Another point to remember is that equipment is often devalued yearly for tax
                 purposes, making it seem that the equipment has no worth after a certain time
                 period. If this is the only measurement of worth, security may be overlooked in
                 certain areas, because the equipment does not seem to have any reasonable value.
                 However, older systems may be vital to an organization, because they are used for
                 important functions. For example, a small airport may use older systems for air
                 traffic control such as takeoffs, landings, and flying patterns of aircraft. Because
                 these older systems are essential to normal operations, they are more valuable than
                 a new Web server that hosts a site with directions to the airport.When deter-
                 mining value, you must look at the importance of the equipment as well as its
                 current monetary value.




                                                                              www.syngress.com
   618   619   620   621   622   623   624   625   626   627   628