Circle the wagons

 

Connecting state and local government leaders

Technologies to protect data from getting tapped, leaked or stolen.

Government officials need an arsenal of weapons to protect digital assets, including tools that fortify databases, prevent sensitive information from leaving an agency and give laptop computer users secure access to corporate networks. The rise in data security breaches at federal agencies and in the private sector has made security managers aware of the need to do more than secure networks with firewalls and expose intruders with intrusion-detection systems. Experts say security managers must focus on protecting databases and stopping data leakages by tracking the flow of data. In addition, the reports of stolen government laptop PCs indicate the need for agencies to install encryption tools to shield data from unauthorized users. Agencies also should add software that forces laptop users to adhere to their security requirements before they can access the network, experts say. 'Content protection and being able to encrypt it is important and so is strong authentication, so when people get on to [computers], they must provide a password or something stronger like a biometric,' said Wayne Jansen, a computer scientist at the National Institute of Standards and Technology. Agencies need 'some sort of controls for the flow of the data on the device ' not only firewalling ' and what type of connections can be made or received,' Jansen said. 'You also certainly would like some antivirus software.' User privacy legislation and reports of intruders accessing information at financial institutions are driving efforts to boost database security. Officials at Symantec Research Labs say financial institutions reported more than 130 data breaches last year. Those breaches affected more than 57 million records. This month Symantec will offer Symantec Database Security, an appliance that monitors database activity in real time. Several companies such as Application Security, Guardium, Incache and Lumigent also offer database vulnerability assessment and intrusion-detection tools that can identify unauthorized transfers. 'Attackers have discovered three things,' said Alan Paller, director of research at the SANS Institute. First, 'Oracle and other database management systems have significant security holes,' he said. Second, 'database programmers make mistakes, and [finally], government agencies are making database queries available over the [Internet]. This has led to an explosion in database attacks.' Emerging tools known as extrusion-detection systems are helping government agencies and private companies detect whether sensitive information is leaving their organizations. For example, the Pension Benefit Guaranty Corp. uses Fidelis Security Systems' DataSafe appliance to protect the personal and financial information of millions of workers and retirees, company officials said. Another company in the extrusion-detection arena is Vericept. 'Our goal is to monitor traffic from the inside going out,' said Daniel Hedrick, product manager at Vericept and a former intelligence officer in the Air Force. 'If I see content going out the door, with or without the approval or the knowledge of the user, I will automatically encrypt it.' Hedrick said that to prevent data from leaking from an organization, the technology must understand employees' behavioral trends. Using extrusion-detection technology, security managers would be able to tell if an employee cut and pasted insider secrets to a blog or message board. He added that such tracking is possible on mobile computers, too, based on logging information. Using extrusion-detection technology, security managers could tell the difference between malicious behavior and accidents by analyzing the occurrences' frequency, Hedrick said. The trend analysis finds repeat offenders rather than nipping leaks in the bud, he added. 'Looking at a Web page or going out to a blog or just sending out information like an attachment, we're not necessarily going to be able to tell the intent of the person,' he said. 'Over time, if we begin to see [that] a user consistently and repeatedly does this type of behavior, then we'll consider it malicious.' Tracking behavior is an issue that goes beyond technology, however, and many companies such as PortAuthority Technologies have extensive executive assessment programs to look at individual employees. Other companies that offer behavioral analytics include Oakley Networks, whose SureView software suite can give a full replay of user behavior for investigations. It also offers analysis of important phrases and filters to passively analyze user behavior and create a document trail that an organization could use to terminate or prosecute an employee. Fingerprinting technology is another way to track data leaks through file identification. This technology uses a hash of a file, or a string of hex numbers usually at least 128 bits long, to create a fingerprint of a file. The file's fingerprint changes when someone edits a file, so an organization can easily determine if a user altered or copied and pasted data from it. PortAuthority Technologies goes further than hash technology with its PreciseID product, which tracks multiple aspects of a file, including keywords, and compares information in the file with external databases. Mobile data and remote connections have their own security challenges, experts say.C.J. Desai, director of product management for client and host security at Symantec, said security is dependent on where users connect their work laptops. '[You've] bought all this security software like antivirus or firewall, but that particular [computer] endpoint connects to my corporate network through a [virtual private network] from home' or some other remote location, Desai said. 'The footprint of our mobile devices continues to change thanks to the personalization of the mobile computer,' said Ross Brown, chief executive officer of eEye Digital Security. He has seen federal workers with their Apple Computer iPods connected to their government laptops, sorting through music with iTunes. If a program such as iTunes needs a critical security update and the user doesn't update it, the laptop could have a data leakage hole, he said. Brown said there are three reasons to deploy technology for data protection: 'keeping bad guys off the devices while you're mobile, keeping your user from taking data off of the mobile devices [and] keeping the device within the user's control.' Identity management software is instrumental in providing secure remote access.Novell provides secure remote access through the company's Identity Manager. The software manages remote connections, and network administrators can assign permissions to specific user groups. 'You need to have a policy, but the policy needs to know who you are,' said Jason Werner, product manager at Novell. 'Where we really shine is we know who you are on the network, and we manage it based upon who you are and what you're doing.' When it becomes available, Microsoft Windows Vista Enterprise Edition will offer another take on identity management that will boost remote access. The latest Windows operating system will include BitLocker, an integrated data-protection feature that encrypts the entire operating system. BitLocker will require users to provide an authentication key or password in addition to a detachable USB key before booting a computer. Those multiple security layers ensure that the mistakes of convenience don't cause a data leak. Security mangers must also safeguard the connections from a user's laptop to agencies' databases. A big source of leakage is laptops that contain a keylogger program or malware and connect to internal databases. 'If you've got data on a laptop [and] you're in a hot spot, someone who wants that data [has] a very good shot at getting that data,' said Richard Rushing, chief security officer of AirDefense.Security solutions that protect network access are the best way to remedy such vulnerabilities. They uphold a standard security configuration that users of remote devices must meet. If their device doesn't have the proper security configuration or has security weaknesses, the network will deny access. The two big proprietary players for network access protection, Cisco Systems and Microsoft, announced in early September that they would make Cisco's Network Admission Control and Microsoft's Network Access Protection interoperable. The joint architecture would add a dual layer of network protection. After solving the connection issues, file encryption is the next step in protecting sensitive data. 'You can try to protect every gigabyte' of that hard drive, said Benjamin Jun, vice president of Technology at Cryptography Research, or you can encrypt it with something as short as a 256-bit encryption key. The Blink software suite at eEye Digital Security protects mobile devices from data leakage via mobile storage devices, such as USB and Firewire devices. Blink includes a policy-based control system for such devices, which prevents unauthorized units from connecting. Microsoft Windows' Rights Management Services feature also does that, and it can also prevent users from writing to or from detachable media. In addition to controlling who accesses devices, organizations must deal with many users who don't keep up with security patches. 'How can I ensure that all this software is properly configured and up to date?' Desai asked. You can't, he said. But agencies can deploy products such as Symantec's host-based intrusion-prevention system, which stops intrusions by blocking malicious connections and operations, or at least quarantining them. Competing vendors include Mitre, Cisco and Sana Security. Although Desai recommended host-based intrusion prevention as a way around unpatched security programs, he encouraged organizations to use other tools, such as virus scanners and spyware and malware blockers. Those tools do the house cleaning, Desai said. Some suites, such as the open-source NOD32 antivirus and WatchGuard Technologies' Gateway AntiVirus/Intrusion Prevention Service, offer antivirus and intrusion-prevention systems in addition to real-time automatic updating, he said.

Editor's note:This story was updated at noon Oct. 12. Please go to Corrections & Clarifications to see what has changed.











Inside protection








Extrusion detection























Securing the endpoint










Secure network access























Patch workaround










NEXT STORY: And another thing...

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.