Page 633 - StudyBook.pdf
P. 633

Operational and Organizational Security: Incident Response • Chapter 11  617

                 Chapter 12 “Operational and Organizational Security: Policies and Disaster
                 Recovery.”)
                    Software is expensive, especially when considering the number of copies pur-
                 chased for installation in a large organization. For this reason, any installation CDs
                 and licenses should be kept in a secure area, such as a server room, safe, or locked
                 cabinet. Securing software in this way will also prevent users from making pirated
                 copies or illegally installing software on machines.



                   The Importance of Securing All Data
                   A number of years ago, when hard disks were smaller and could be
                 Notes From the Underground…
                   backed up to floppy disks, I was called in to do some work at a small
                   branch of a loan company. The company was conscious of security, and
                   kept its server in a locked closet that protected it from unauthorized
                   employees. The closet was close enough to a receptionist’s desk, so that
                   anyone who attempted to enter the locked closet during the day would
                   be seen, and the office was equipped with an alarm system to protect it
                   at night. The security lapse existed with the backed-up data.
                        The company backed up all sensitive data to floppy disks. All client
                   information, including data on credit accounts and loans, were backed
                   up to a large number of floppies. If a problem occurred, the floppies
                   could be used to restore the system so this branch office could resume
                   business quickly.
                        Unfortunately, the floppy disks were stored in a broken, plastic
                   storage box, which was kept on top of a filing cabinet. Employees, the
                   night janitors, and even clients, had the opportunity to steal one or all of
                   the disks without any difficulty. When you think of the potential damage
                   people could have experienced if this sensitive information fell into the
                   wrong hands, it makes you cringe. Fortunately, after the employees of
                   the company were informed of the potential problem, they moved the
                   box to a safe.
                        If you think this is an isolated problem, you’re wrong. Years later, a
                   different company had a similar problem. The network administrator
                   used company couriers to routinely transport a rotation of backup tapes
                   to another location, where it was to be locked in a secure cabinet. Each
                   week, the courier would drop off new backup tapes, and pick up the old
                   ones from the cabinet. If there was ever a fire or other disaster at one
                   location, backup tapes could then be acquired from the other location,
                   so that all data could be restored. Unfortunately, it was found that the
                   courier would forget to lock the cabinet after switching the tapes,
                   thereby leaving them insecure in a cabinet that any employee or visitor
                                                                                        Continued

                                                                              www.syngress.com
   628   629   630   631   632   633   634   635   636   637   638