Sunteți pe pagina 1din 10

Mobile computing is more than just a trend,

and that makes mobile security more than


just a strategy, according to John Soat.

A M ving
Target
Blame it on Apple.
“The factor in the market that’s changed the way C-level officers think
about [mobile security] is the iPhone,” says Al Potter, senior consulting
analyst with ICSA Labs, an organization involved in research, intelligence
and certification testing of products. The iPhone, with its ability to access
the Internet and download applications, has raised users’ expectations for
wireless devices. It has also complicated the job of information security
professionals and raised awareness of how vulnerable mobile computing
devices can be.
As these devices get smaller, more powerful and more ubiquitous,
information security strategies must adapt. In the long term, the mobil-
ity imperative may force a refocusing by security professionals in their
i llu st r at i o n by p et e m cA rt h u r / ve e r

orientation toward information security.

Begin at the Beginning


Mobile computing started with laptops; mobile security starts there, too.
The techniques used to lock down PCs and workstations—authentica-
tion, strong password protection, corporate firewalls—should be applied
to laptops. Implement state-of-the-art security software, including anti­
spam, antivirus and antispyware applications. Enforce corporate security
procedures, such as patch management and aggressive Web monitoring.
And require a written security policy regarding laptops, along with regu-
lar awareness training to familiarize users with that policy.
Since laptops are portable, they can an increase this year in malware aimed Not true, says Daniel Hoffman,
operate outside the corporate network. at mobile phones, and an equivalent author of the book BlackJacking: Security
When not connected to the network, increase in the number of bots attached Threats to BlackBerry Devices, PDAs, and
users should be required to interact to them. Patrick Traynor, an assistant Cell Phones in the Enterprise and chief
with corporate resources over virtual professor in the School of Computer technology officer at Smobile Systems,
private networks, and all data should be Science at Georgia Tech, writes in the which develops mobile device security
encrypted. Also, laptops must be secured report, “Malware will be injected onto software. The effect of anti-malware
when left unattended—an effort that cell phones to turn them into bots. Large software on cell phones is “almost negli-
should be highlighted in the corporate cellular botnets could then be used to gible,” Hoffman claims, “if you have the
security policy. perpetrate a [denial of service] attack appropriate solution.”
Unfortunately, there are continued against the core of the cellular network.” There are security systems devel-
cases of laptops containing confiden- Cellular data concerns are differ- oped specifically for wireless devices.
tial corporate data being left by users in ent in different parts of the world. “The They offer comprehensive applications,
cars or at airports. That’s why hard-drive phone-that’s-more-than-a-phone has including antivirus, antispam and fire-
encryption on corporate laptops is a more legs in Asia-Pacific and Europe wall protection, as well as ways to control
growing trend, with hardware vendors than in the U.S.,” says ICSA’s Potter. “The those devices remotely, such as remote
often offering it as an added feature. Also, threat is propagated more there than [in lockdown and data wipe.
encryption is now incorporated into the United States].” In Japan, for example, This is where the BlackBerry has an

“The phone-that’s-more-than-a-phone has more legs in Asia-Pacific and


Europe than in the U.S. The threat is propagated more there than [in the United
States].” — Al Potter, I CSA Labs
operating systems, such as FileVault on cell-phone phishing is a growing problem. advantage over other PDAs and smart-
the Mac OS and BitLocker on Windows. This is due to the country’s widespread phones. First, RIM designed and built
Security software vendors offer practice of banking over mobile phones. the BlackBerry from the ground up. “We
server-based management consoles that The corporate applications most wrote our own radio code, we have our
can automatically update antivirus​ closely associated with PDAs and smart- own operating system, we have our own
applications on laptops, implement phones are e-mail and, increasingly, data Java,” Totzke says. Second, security fea-
encryption, monitor email and Web traf- access. Unfortunately, security measures tures such as encryption are hard-wired
fic, back up and restore data, and lock out implemented at the corporate level can into the device. Third, RIM offers the
users who aren’t authenticated and then be problematic for wireless devices. BlackBerry Enterprise Server, which
remotely wipe data off those hard drives. “To be successful in the wireless space, provides many of the security measures
it’s all about balancing constrained mentioned, as well as remote-control
Balancing Risk and Reward resources,” says Scott Totzke, vice presi- and management capabilities, tailored
With the proliferation of wireless devices, dent of global security at Research In specifically for the BlackBerry.
mobile computing has become more than Motion (RIM), maker of the BlackBerry.
laptops. “We’re trying to come to terms Mobile devices, while small, incorporate Problem Areas
with how we can embrace the reduced limited but increasingly powerful pro- While security problems associated with
cost and agility and flexibility of these cessing power, communications capa- smartphones and cell phones are simi-
platforms while balancing the risk,” says bility and storage. Specifically, Totzke lar to those for laptops, there are unique
Christopher Hoff, CISSP, chief security points out that battery technology “is not variations. For example, cell phones are
architect at IT services vendor Unisys. evolving at the pace of Moore’s Law.” easier to steal. Another thing for global
Though viruses and trojans tar- That’s why security measures like travelers to keep in mind, says Smobile’s
geted at cell phones have been reported, antivirus applications and personal Hoffman, is that if they pass their wire-
so far there have been no widespread, firewalls may present problems: They less devices over to uniformed officials
widely publicized attacks against mobile use resources that can drain battery life. and other strangers, they’re opening
phones. But that doesn’t mean it can’t In the Emerging Cyber Threats Report, themselves up to risk. “If I can get a hold
or won’t happen. In its 2009 Emerging Traynor pointed to “battery power as of it for less than a minute, I can pull all
Cyber Threats Report, the Georgia Tech a primary security hurdle” in the cell- the contact info and a lot of data,” he
Information Security Center predicts phone environment.
“Our strategy is to make sure we can secure the data in the forms
it shows up in. The focus is on protecting the data, as opposed to
[protecting] the host itself.” — Patrick Han ri o n, M icroso ft
says. Hoffman ought to know; he identi- tion is equally important, because mobile tion technology is finding its way to the
fies himself as an ethical hacker. workers access and store sensitive corpo- desktop. By moving most of the process-
Both laptop and mobile device users rate data. Encryption protection should ing and all of the data storage to a central
need limits imposed on their Web surf- extend to wireless storage devices, espe- server, virtualization helps mitigate the
ing. With wireless devices, though, the cially in large companies that struggle to threat to mobile computing’s most vul-
form factor itself contributes to the prob- enforce a ban on such technology. nerable element: the end device. Simi-
lem. Because the small screen can cut off Make sure all smartphones and cell larly, cloud computing, which taps into
the URL at the top, users have a harder phones go through IT. It’s one thing to data storage and processing taking place
time identifying illegitimate Websites. keep track of wireless devices when man- in a central, remote, secured location,
In the same way e-mail should be agement controls them; it’s another prob- will help automate and enforce many of
monitored, text messaging must be lem when those devices are purchased the elements of mobile security.
tracked, both externally to guard against and controlled by individual workers. It’s Some security experts suggest the
loss of intellectual property, and inter- essential to have some method of remote increasing use of mobile computing
nally to guard against harassment and control for content filtering, backup and devices is forcing a rethink of informa-
other human resources problems. recovery of data, remote lock and wipe, tion security strategy. If the first stage had
Another problem area has to do with and the ability to shut down certain fea- as its focus protecting the perimeter, and
peripherals. Most wireless devices incor- tures such as cameras. the second stage was about securing the
porate cameras, so organizations are Finally, education is as important an host, the third is about protecting data—
increasingly prohibiting their use in the element in wireless-device security as it wherever it resides and in whatever
corporate environment. “There are a lot is with laptops, perhaps more so. Users form. “Our strategy is to make sure we
of liability issues with people taking pic- must be made aware of the security risks can secure the data in the forms it shows
tures,” says James Naftel, senior product associated with their mobile computers. up in,” says Patrick Hanrion, CISSP
manager for Sybase. As things stand now, many aren’t. and principal architect in IT security at
USB storage devices can hold a tre- Apple is the exception that proves Microsoft. “The focus is on protecting
mendous amount of data and are hard to the rule. The original incarnation of the the data, as opposed to [protecting] the
track. Storage devices for smartphones iPhone got a bad reputation in the cor- host itself.”
and cell phones, such as the microSD porate environment for being security That may require a slightly different
card, are even smaller and harder to con- challenged. Yet the iPhone is working its orientation for information security
trol. As much as corporations would like way into business through increasingly professionals. “The device is the vector
to, few have the ability to enforce a ban on sophisticated computing capabilities by which the data leaks,” says ICSA’s Pot-
consumer technologies such as these. and continuing consumer appeal. ter. “The real problem is classifying the
Due in part to complaints from corpo- data. You have to understand what your
Policy Matters rate users, last year’s iPhone 3G addressed data is, where it’s supposed to be, and
Security policies for wireless devices some of the device’s security limitations, where it really is.”
should be similar to those for laptops, including hooking into Microsoft’s From that perspective, mobile
and in line with corporate security stan- ActiveSync server. But the iPhone is “still devices are simply a means to a comput-
dards. Companies must block access lacking in capabilities some enterprises ing end, as important as any element in
to public Wi-Fi networks, especially if absolutely require,” says Unisys’ Hoff, the IT architecture. That puts additional
users are attempting to connect with the such as full-device encryption and cen- responsibilities on both security profes-
corporate network. If possible, mobile tralized security management tools. And sionals and end users to make the most
device users need to connect to corpo- that’s why many organizations, Hoff ’s of the devices while ensuring the safety
rate networks over VPNs. included, are still pilot testing it. and security of the enterprise.
Password protection is a must. Pass- Blame it on Apple.
word access on cell phones can be a pain, Refocusing and Reorienting
both for users and for IT support staff There are trends in corporate computing John Soat is a freelance business and
besieged by requests for forgotten pass- that may help address some mobile secu- technology journalist based in Ohio.
words, but it’s worth the trouble. Encryp- rity challenges. For example, virtualiza-
enablingteam
intelligence
How to enhance

t
team awareness, stability
and performance.
By Scott Holbrook
eam leadership is to create excellence in spite of seemingly emotions and impulses in a variety of
challenging, even on a good insurmountable obstacles. These groups situations
day with a great group. likely exhibited team intelligence, and Social awareness: being conscious
Leaders are constantly created team awareness as individual of, and understanding, how emotions
scanning the horizon for members learned each other’s strengths affect others
strategic input, work- and developed strategies for success. Relationship management: cre-
ing to increase customer In this era of globalization and geo- ating and maintaining relationships
satisfaction, dealing with graphically disparate teams, leaders are across a spectrum of social levels; the
operational constraints no longer afforded the luxury of creat- ability to motivate others even in chal-
and handling day-to-day ing the perfect team from a blank ros- lenging situations.
personnel issues. Add in ter. How can they move their teams up Effective leaders begin at the indi-
an underperforming team the performance ladder? How can they vidual level and foster team awareness.
and you have a recipe for frustration inspire sustained excellence? By nurtur- This process includes an honest internal
that, left unaddressed, becomes a ticking ing individuals, developing an environ- assessment of the team’s capabilities by
time bomb for everyone involved. ment of trust and communication, and the individuals themselves, as well as
Teams often sabotage their own suc- enabling team intelligence. an external customer’s assessment of
cess by creating artificial boundaries the same capabilities. Combined with a
to include their strengths and exclude Defining Team Intelligence team-specific focus inventory, a plan of
their weaknesses. This hinders success Team intelligence is an extension of action and built-in reviews, even under-
and often results in a growing chasm the concept of emotional intelligence, performing teams can achieve growth
between the organization’s goals and the largely accredited to Daniel Goleman and move toward sustained excellence.
team’s ability to execute. (danielgoleman.info/blog), who has
authored several books on the topic, Start State
i llust r at i o n by v e e r

The Team Scenario including The Emotionally Intelligent First, assess the team’s current strengths
Teams are a unique mix of players with Workplace. There are four major com- and weaknesses. Does the team need to
various talents, including overachievers, ponents of emotional intelligence: develop its communication skills? Does
underachievers, extroverts, introverts, Self-awareness: being conscious of, it need to hone its visioning skills? Is the
thinkers and doers. Often leaders have a and understanding, your emotions team effective at customer service? Does
favorite team, one that overcame all odds Self-management: controlling your it have a high level of trust?
Next, discuss the overall strategy and indicates each team member’s pre- brainstorm ways to celebrate success
for improvement. A focus inventory dilection for interacting with others and and cultivate ideas to stimulate progress
should be introduced as one of several the world around them. There are sev- in areas where the team has stalled. This
performance enhancement tools, part eral MBTI assessment questionnaires approach creates team alignment and
of a larger framework for continuous available online. generates momentum.
improvement. The focus inventory is a The MBTI results can be displayed Now it’s time to turn the team’s intel-
set of skills selected by the team leader on a 4x4 grid with the type descriptor. In ligence toward solving the customer’s
indicating the key attributes of a highly each block, place the names of the team biggest problems—those that the team
performing team. While the inven- members whose assessment matches could never have surmounted before
tory can change based on industry, the MBTI type. This provides a unique the intelligence cycle. The team is now
there are certain core skills that should view of the team, and can be used to help prepared to assess customer needs and
be included, such as communication, members understand and better com- apply its newly developed communica-
teamwork and accountability. It might municate with each other. tion and visioning skills to effectively
contain from five to 15 skill areas; the partner with the customer.
team should select its primary areas of Growth Phase
improvement based on the three or four During the growth phase, the team Reflection
lowest-scoring team skills. evolves from individuals to a cohesive Team intelligence is a cyclical process
The next step begins with individual, unit. This phase includes the ongoing and should begin and end with reflec-
closed-door interviews with each team reinforcement of team awareness, and tion on the team’s performance. Once
member. To gather accurate data, create the creation and validation of the team’s the team has completed its first evolu-
an atmosphere of trust and convey to vision and goals. tion of the intelligence cycle, reassess
each person that the focus inventory data Allow time to create a team vision; the team goals, revise the focus inven-
is being considered from a team roll-up getting the group to agree is usually a tory, determine next steps and restart
context. Ask them to rate each focus area lengthy and sometimes painful process. the cycle with new growth targets. The
on a scale of one to five based on how the Team buy-in to the vision is an essential focus inventory is a useful tool for defin-
team performs in that area. This changes part of enabling team intelligence. Once ing core skills, and when combined with
the framework from self-assessment to the team has developed its vision, make a plan of action and a team commitment
team assessment. And keeping the rating it a stated part of daily life. For example, to improve, it can serve as a baseline of
scale small forces members to carefully begin each meeting with the vision state- common understanding.
consider their choices. ment: Make it rote, and make sure the Identifying strengths and weak-
team is aligned around its meaning. nesses alone does not constitute team
Transition Phase intelligence but represents the first step
Once the data has been collected, review Review and Feedback Cycles on the path toward maximizing team
it for patterns of strength and weakness. Periodic reviews are a key component performance. Developing team intel-
Consider some supporting tools to pre- to keep the team moving in the same ligence takes work, commitment and
pare for a team discussion of the focus direction. Determine early in the devel- time on the part of the leader as well as
inventory results. opment cycle how often and what types the team. It’s important to set realistic
Perhaps the best tool to enhance team of feedback will be provided. One way goals and allow enough time for changes
communications and awareness is the to gather feedback is to use Post-it® to yield results.
Myers-Briggs Type Indicator (MBTI) assessments. Here, each team member
assessment. It reveals personal prefer- is given a Post-it pad and asked to write Scott C. Holbrook, PMP, CISSP, is the
ences in four quadrants: introversion/ answers to specific questions, such as manager of Information Security and
extraversion; sensing/intuition; think- “Where are we succeeding?” and “Where Disaster Recovery for CaridianBCT, a
ing/feeling; and judgment/perception. can we improve?” Separate the answers global medical device manufacturing
The assessment is taken individually, into related groups on a whiteboard; company. He is based in Colorado.
Memory and the
ability to retain stuff.

Live OnLine, Official (ISC)2® CBK® Review Seminar.



Nothing compares to an Official CBK Review Seminar
from (ISC)2, unless of course it’s Live OnLine, the latest
educational offering from (ISC)2. From the convenience
of your desktop you can enjoy the same award-winning
course content*, delivered by our (ISC)2 Authorized
Instructors, without taking five days out of your busy
schedule, or paying travel costs.

And, if working in your PJs is not enough incentive, check


out the current special offers at www.isc2.org/offer.

*SC Magazine award winner 2006, 2007, 2008


John Soat investigates professionals can expect to
see a steady increase in the
whether information number and sophistication of
those attacks with which they’re
warfare is a serious already familiar: worms; Trojans;

threat or over-hyped spam; phishing; network intru-

info
sions; and data theft.
hysteria. Cybersecurity Growing
experts offer two Capabilities
Ultimately, when it comes to security
words of advice:

war
concerns, the “who” is less important

Be prepared. than the “how.”


“The information security professional
can’t be concerned with who it is that’s
attacking his or her network,” says security
consultant Winn Schwartau. “It’s all about the
capabilities, and capabilities keep going up.”
With the publication of Information Warfare:
Cyberterrorism: Protecting Your Personal Security in
the Electronic Age, he literally wrote the book on info
warfare. According to Schwartau, it can be divided
into three areas:
The headlines last August sounded chillingly familiar, an arctic blast of •   Class 1: Personal Information Warfare, where the
Cold War anxiety: “Russia Invades Georgia.” But while its politics seemed like déjà individual is the target. “We didn’t call it identity theft
vu, the conflict offered an extensive look at an emerging—and unsettling—form of back in the day,” Schwartau says.
combat in an increasingly online and interconnected world: information warfare. •   Class 2: Corporate Information Warfare, or “the
Georgia’s cyber infrastructure was under attack even before Russian tanks rough equivalent of what we used to call industrial espio-
began rolling in. For several days, extensive denial-of-service (DoS) attacks ren- nage,” he says.
dered government Websites useless. Some observers downplayed the signifi- •   Class 3: Government Information Warfare. The Russia-
cance of the online attacks, ascribing them to “hacktivists”—savvy amateurs Georgia conflict is an example of this. Another example is a
bent on inserting themselves into the fight. Russian officials have denied similar situation that developed in Estonia last year, where that
direct participation in the DoS attacks against Georgia, and no one is cer- former Soviet satellite’s cyber infrastructure was compromised
tain exactly where they originated or who was responsible. by DoS attacks over several days after Estonian officials removed
Still, the U.S. government and its defense agencies are taking informa- a Russian war memorial from the center of the capitol.
tion warfare seriously. Several cyber warfare programs have been estab- Businesses must be aware of all three areas of potential
lished, including the Air Force’s Cyber Command unit. In January 2008, attack. “The information security professional has to under-
President George W. Bush approved a new interagency cybersecurity effort to be run by stand the complete environment,” Schwartau says. That’s
the Department of Homeland Security, and a Silicon Valley-based entrepreneur was tapped to head it. because, for example, Class 1 information warfare—identity
How seriously should information security professionals take the threat of information warfare? More theft—“may be coming from a Class 2 or Class 3 source,” he
seriously than they do now, according to many cybersecurity experts. says, making it more dangerous. Guarding against sophisti-
victim of information cated phishing or malware attacks places greater emphasis on
When, Not If organization composed of security professionals warfare, or at least an intended vic- Web controls and PC security.
In their efforts to address the forest of security prob- who track and report on the progress of malware, tim. Phishing attacks are often used to obtain funds for terror- Class 2 information warfare involves “patents, copyrights,
i llu st r at i o n by c sa i m ag e s / ve e r

lems, information security professionals may be botnet activity and electronic fraud. DiMino points ist organizations, according to watchdog groups. At the same business deals—that is, the real value of companies,” Schwar-
ignoring a few significant trees. In the (ISC)² 2008 out that one of the most important elements of infor- time, certain nation states are interested in obtaining the intel- tau says. It can be perpetrated by outsiders through network
Global Information Security Workforce Study, mation warfare is the botnet. Botnets are worldwide lectual property of companies to exploit the technical advances intrusions, but also by insiders. That’s why it’s important for
almost half (48 percent) of (ISC)² members say they networks of compromised computers; those com- and competitive advantages represented by patented processes information security professionals to work closely with their
are mildly or not at all concerned about the secu- puters currently number in the millions—and that and copyrighted algorithms. Internet addresses in China, for human resource departments to screen applicants for critical
rity threat posed by terrorists, and 38 percent say the figure is growing (see “Battling Botnets,” InfoSecurity example, have been linked to network intrusions in the U.S., IT positions, including H-1B workers.
same thing about organized crime. Professional, Autumn 2008). “The use of a computer including a well-publicized break-in last year into non-mili- Schwartau says it has become increasingly important that all
“It really is a matter of semantics,” says Andre in a targeted attack—that’s my definition of cyber tary networks at the Pentagon. areas of security—HR, cyber security and physical security—
DiMino, co-founder and director of the Shad- warfare,” says DiMino. So, while most companies aren’t likely to suffer coordi- are integrated as closely as possible. An example is a disgruntled
owserver Foundation, a self-funded, non-profit Your organization may have already been the nated, intense electronic bombardment, information security ex-employee, “the insider that becomes an outsider,” as he puts
it. To address that scenario, “part of the HR process should security, particularly those who work at critical infrastructure
be irrecoverable revocation of all assets,” Schwartau says— organizations, need “more training in the aspect of how to deal
including, perhaps especially, electronic assets. with a crisis,” says John Bumgarner, CTO and research director
In the U.S., Class 3 info warfare will increasingly involve for security technology for the U.S. Cyber Consequences Unit,
private companies because they own and operate most of the a non-profit research organization funded by the Department
critical infrastructure used by government and military opera- of Homeland Security and other government agencies. This
tions, such as the telecom network or the electric grid. Experts unit advises “the highest levels of government” on cybersecu-
are divided on just how vulnerable that infrastructure is, and rity issues, Bumgarner says.
how aggressively it’s being probed. There is still speculation Information security professionals “usually respond to
that the 2002 power outage on the East Coast resulted from events that have already occurred,” he says. The Georgian and
probing of the SCADA systems. While that speculation flirts Estonian incidents demonstrate that security professionals
with hysteria, the lesson is: Be prepared. “If you have a critical might benefit from training in how to respond while an attack
is taking place. “A lot of agencies do not
train that way, do not train for aggressive
“Is [info warfare] going to get response,” Bumgarner says.
Various types of info warfare resources
nastier? Yes, it’s going to get nastier.” are available. The Estonian Ministry of
Defence recently posted a document titled
Winn Schwartau, security consultant and author “Cyber Security Strategy” on its Website
(mod.gov.ee) that calls for, among other
things, “the development and implemen-
system on the Internet, chances are it’s going to be knocked,” tation of international cyber security policies.”
says Shadowserver’s DiMino. The U.S. Cyber Consequences Unit offers a cybersecurity
An important element to consider is the global supply checklist intended to provide “a comprehensive survey of the
chain. Andrew Colarik, an information security consultant steps that corporations and other organizations should take
and cybersecurity expert, says information security profes- to reduce their vulnerability to cyber attacks.” The checklist
sionals must factor the possibility of regional information contains 478 questions grouped into six categories: hardware,
warfare conflicts, like those in Estonia and Georgia, into their software, networks, automation, humans and suppliers. It is “a
business continuity plans. That means having alternatives baseline where we think organizations should be,” Bumgarner
ready, in terms of logistics and resources, if Internet access to says. He urges information security professionals to examine
supply chain partners is interrupted. the checklist and offer their input. “It’s not something created
O. Sami Saydjari, president of the security consulting and in a vacuum,” he says. “We welcome any comments on it.”
research firm Cyber Defense Agency and a former cyber- Schwartau says information security professionals must
security expert with the National Security Agency, says most convince upper management that the threat of information
organizations aren’t taking the cyber warfare threat seriously warfare is real. That’s because it’s not just the security person’s
enough, and one area he points to is outsourcing. Because problem. “Too often the info sec guys get laden with things
software coding and maintenance is often sent to other coun- they shouldn’t,” he says. For instance, are the costs involved in
tries, information security professionals have to be aware of implementing better power backup systems worth more than
the possibility of “contamination in our corporate infrastruc- a potential data loss? “That’s a business decision, not a techni-
ture,” or applications that “come back with Trojan horses and cal decision,” Schwartau says.
back doors that can be exploited later on,” he says. On the other hand, the threat of information warfare indi-
It’s a sensitive issue politically, but a risk that shouldn’t be cates how critical cybersecurity issues are in the Internet age.
ignored. “In a global environment, they’re going to have to put “There should be an info sec signoff on any major corporate
software quality assurance controls in place” to deal with that decision,” says Schwartau.
risk, Saydjari says. Finally, the most important lesson of the Georgian attacks
may lie in how they compare to the Estonian attacks: While the
Cyber Consequences Estonian attacks were simplistic and scattershot, the Georgian
Cybersecurity experts say DoS attacks—or the threat of attacks were targeted. The level of sophistication “jumped
them—are used to try to blackmail organizations. They’re from ground zero to three,” says Bumgarner. “An information
also used by criminal organizations to demonstrate prow- security professional should worry about this.”
ess. Shadowserver’s DiMino recommends analyzing network Schwartau is more blunt. “Is it going to get nastier?” he asks.
infrastructure for the load balancing and redundancy needed “Yes, it’s going to get nastier.”
to withstand a sustained DoS attack. “We see many sites that
don’t have that design built in,” he says. John Soat is a freelance business and technology journalist
On a professional level, those involved in information based in Cleveland, Ohio, USA.
Mental processing
of information.

The (ISC)2 studISCope Self Assessment.



studISCope is the official (ISC)2® online self-assessment
tool that gauges your knowledge of the SSCP ® or
CISSP ® CBK®. It analyzes your answers and presents a
personalized study plan that highlights areas where
you’re likely to perform well on a certification exam,
and where you may need a little more work. For a
relatively small investment, you’ll know exactly where
you stand and what to do about it! Planning on earning
your certification? Visit www.isc2.org/studiscope today.

S-ar putea să vă placă și