Security: That Most Thankless of Tasks

By Eric Lundquist  |  Posted 2001-06-11 Print this article Print

As we've said for several years now, security is the first and last step in building an e-business enterprise.

As weve said for several years now, security is the first and last step in building an e-business enterprise. It is also the part of the infrastructure task that garners the least applause for a job well done. No one will thank you for keeping all those bad guys out of the companys network. Someone will fire you when one of those bad guys sneaks through.

And there are clear indications that the job is only going to get tougher.

As we write in this weeks Special Report, "The social engineering of security," building that safe network requires a lot more than making some good hardware and IT architecture decisions. It requires an approach that embraces social, political and cultural considerations. As David Thompson states, "Senior leadership wants objective measurement of an inherently subjective discipline; peer managers dont understand that their participation is necessary; users continually do foolish things; the threats are changing daily; and many organizations are forced to do more with fewer people." Sound familiar? Welcome to the security club.

The task can seem overwhelming. Just when you think you have a handle on Windows 2000 security, you can be sure that someone is going to ask about the security aspects of smart tags on Windows XP. Have those laptops locked down? What about the security of those personal digital assistants, which continue to proliferate and demand wireless access to the enterprise? And you can bet that the marketing push that is building behind the advent of Web services will raise questions about the security of those services. If you had to choose today among .Net, WebSphere or Java Web services, youd have a hard time evaluating those products from a security aspect. Like a lot of Web-based products, you often cant judge the security until the service is up and running on the Net.

While there is no overarching solution, there are steps to take. One, take a look at the security resources available. Spend sufficient time to learn the differences among, and And dont forget the sources where the likes of Rain Forest Puppy and the hackers hang out. To you, security is a task that must be constantly updated. To the Rain Forest Puppies of the world, security is a game where their wins make front-page news.

With a recent FBI survey reporting hacks being up nearly 50 percent over last year and nearly 50,000 unfilled IT security jobs in the United States alone, maybe the first place to start is figuring out where you are going to get the security professionals your organization requires. For that, you might want to go right to our recruiting article, "Finding pros for IT security". But before you sit down to read that article, remove the yellow stickies with your passwords attached to your monitor.

Since 1996, Eric Lundquist has been Editor in Chief of eWEEK, which includes domestic, international and online editions. As eWEEK's EIC, Lundquist oversees a staff of nearly 40 editors, reporters and Labs analysts covering product, services and companies in the high-technology community. He is a frequent speaker at industry gatherings and user events and sits on numerous advisory boards. Eric writes the popular weekly column, 'Up Front,' and he is a confidant of eWEEK's Spencer F. Katt gossip columnist.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel