Page 695 - StudyBook.pdf
P. 695

Operational and Organizational Security: Policies and Disaster Recovery• Chapter 12  679

                 network open to viruses and malicious software installed on the person’s computer.
                 Beyond this, allowing the personal equipment may exempt the person from other
                 policies, such as those involving acceptable use that we discuss later in this chapter.
                 In addition to this, if the person undergoes disciplinary proceedings or termination
                 of employment, chances are he or she will be unlikely to supply the company with
                 their computer to ensure any files, software, or other data on the machine has been
                 properly removed. Due to the issues related to personal equipment being used on a
                 network, it is often best not to allow personal equipment to be used for business
                 purposes.


                   Policies Followed by Everyone
               Damage & Defense…  position of power wants to ignore aspects of a policy, they can generally
                   In any organization there are rules for everyone, and those who are
                   exceptions to the rules. The unfortunate truth is that if someone in a


                   get away with it. However, unless everyone from the owner of a company
                   to the lowest level employee follows policies, security holes will exist.
                        Anyone who has consulted or worked in computers for any length
                   of time has experiences with individuals who felt they were above the
                   policies of their organization. In one experience, the problems of such
                   actions became clear when the assistant manager of an IT department
                   caused a major incident. Even though she would quote chapter and verse
                   on policies, procedures and contracts used by the organization, she
                   ignored a policy regarding personal equipment and used her own laptop
                   for work. Regrettably though, her house was broken into one day, and
                   the laptop was stolen.
                        For some reason, everyone else in the IT department wasn’t
                   informed until the next day, creating a flurry of activity. The laptop had
                   software to remotely connect to the internal network, a list of adminis-
                   trator passwords, copies of procedures, and a wealth of other sensitive
                   information and tools. Because it wasn’t the company’s computer, there
                   were no backups made of the laptop, so there was no way of deter-
                   mining everything that was on the machine. Worse still, it wasn’t config-
                   ured and locked down like other computers in the organization, so it was
                   possible whoever stole the machine could access it’s data. Administrator
                   passwords needed to be changed, certain accounts were replaced by new
                   ones, access codes used in physical security were modified, and a review
                   of all systems were conducted. While a security breach was averted, the
                   potential threat was astronomical. Not only did the person have data
                   used by management, but administrative access to systems. It was a
                   worst-case scenario.

                                                                                        Continued

                                                                              www.syngress.com
   690   691   692   693   694   695   696   697   698   699   700