Application security

November 2012 Information Security

Despite an array of security tools at their disposal, companies are still under cyber attack and, if one looks at the number of known successful attacks on business data and finances, it seems that the criminals are winning. Of course, in South Africa most of these breaches are not publicised because there is no requirement on the part of the company to acknowledge successful intrusions. This may change in the near future, but the reality is that publicising attacks is not the solution.

Some say that the embarrassment factor once a breach is public will force companies to tighten their digital perimeters as a risk mitigation measure. But then, what do they do about the internal threats from employees who see a vulnerability and decide to ‘borrow’ some company money to fund their weekend trip to the casino or support their neighbourhood syndicate? Most people in the know will tell you that the prevalence of internal fraud is far higher than external attacks.

The latest South African Cyber Threat Barometer for 2012/13 estimates that R2,65 billion was lost to cyber crime in the period from January 2011 to August 2012, with just over R660 million that was not recovered. To download the barometer for free, please go to www.securitysa.com/*cyberthreat-za (this is a shortened link that will take you to http://www.wolfpackrisk.com/wp-content/uploads/2012/10/SA%202012%20Cyber%20Threat%20Barometer_Hi_res.pdf).

At the recent CA Symposium in Johannesburg, Hi-Tech Security Solutions spoke to Ed Medcalf, regional commercial manager, CA Technologies, about the latest in application security.

Ed Medcalf
Ed Medcalf

While we all enjoy the technology available today that allows us to access the corporate network and applications from anywhere, using almost any device, the convenience is offset by a reduction in security because the perimeter of the business is now everywhere. If, for example, you log into an application while at the airport and someone watches you type in your password, if that password is your only defence, the watcher can now access whatever you can. Similarly, if you have malware on your mobile device courtesy of a funky app you downloaded, your personal details as well as your access credentials to corporate digital assets are also compromised.

Instead of monitoring data streams and stored data for known malware strings, as most antivirus applications do, Medcalf suggests it is time to monitor the context of application access rather than only the data. Add to this the context of the user’s behaviour and the business has a good chance of stopping both internal and external shenanigans.

It is important to remember that a valid user will not need malware to access corporate systems as they are allowed, or even supposed to be there. However, if you know the user’s normal behaviour, such as what applications he uses, what authority he has and where he accesses the system from, you can adjust the security protocols to grant access while remaining secure.

Medcalf gives the example of a CFO accessing sensitive data. If the CFO is authenticated and logs on from his office PC, continues with his normal behaviour at the times he usually does his work, he can be granted access transparently. If however, he logs in at midnight from an unknown device, the system can automatically insist on more security to ensure the access is legitimate, or even deny access because it is too risky.

If you are already monitoring the data going through applications, this added layer of security will not add any latency or slow the user at all. Medcalf adds that CA works with customers to set policies to implement this type of application security, looking at variables that make sense to the company, such as the number of times a user requests access, the value of transactions he normally handles, and whether he crosses boundaries like financial ceilings and so forth.

Naturally, application security based on behaviour is only one tool in the arsenal of protection companies need to take to secure their digital assets and bank accounts from internal and external threats.

The security process starts with authenticating users and making sure they have access to what they need to do their jobs. It also includes taking the time to create workable policies that set behavioural limits, such as how much money an individual can authorise for payment and who needs to verify the final payment etc.

It also means controlling access via mobile devices. If the CEO above accesses the network via his Galaxy Tablet and the company knows this device is his and has the relevant security installed, access is granted. If however, it is an unknown device, access can be denied or limited.

In the good old days, digital security was an application you could install and basically forget. Today it has become a craft that requires cooperation across different disciplines within the company, focused on developing a constantly evolving solution.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
Linear heat detection (LHD) from Technoswitch
Technews Publishing Technoswitch Fire Detection & Suppression Products & Solutions Fire & Safety
SecuriHeat LHD by Securiton prevails where conventional fire detectors reach their physical limits. It copes well with extreme temperatures and constantly high atmospheric humidity, while precise measurements are also possible when corrosive gases and contaminated air are present.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...
Perimeter Selection Guide
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Perimeter Selection Guide 2024 includes the latest products, solutions, and management platforms for small, medium, and large operations that require reliable, durable, and integrated perimeter security solutions.

Read more...