|
4. Learn your Enemy: There are three issues here. First of all, never underestimate the capability of attackers. “Honeynets” are experimental networks which are intentionally designed in a way to have some security holes. The goal is to have a better understanding of attacks and attackers. Interestingly maybe, it took less than one hour for the attackers to find out this vulnerable network and exploit its security hole. Secondly, for physical security it might be reasonable to think that security is not a big concern just because there is not much profit an attacker can obtain. On the other hand, in the digital world, since the attacks can be performed remotely (minimizing the risk to be caught), attackers no longer need to have such a motivation to attack to your system. To get their attacks mentioned in tomorrow’s newspaper is something enough for them ( publicity attacks). Third point is that, insiders (e.g., working as an employee), dangerously having the knowledge nobody else can have, usually posing a much more serious security threat for the organization. Insiders can be either good insiders (the victim of social engineering attacks) or bad insiders e.g., fired (ex)employees.
Trust is an important term that needs to be introduced in this chapter and this looks like the most appropriate place for doing that. Trust can be defined as the belief that an entity acts reliably and securely within a specified context. In one view, trust and security have opposite meanings. The less trust you have on your employees, the more security measures you need in your organization. |
|
|