Security Audit and Control
Security Audit and Control
Business Drivers
Today, wireless transmission is a common method of data
communication for cellular phones, wireless personal digital
assistants (PDAs), Blackberrys, text pagers and wireless local
area networks (WLANs). Business requirements are providing
the pull for wireless technology, which can offer lower
installation and operating costs, mobility and flexibility.
Technology is providing the ability for sophisticated systems
that solve real business needs to be built and sold affordably.
The lure of being able to stay connected with business,
wherever and whenever, is certainly a main driver.
Security Issues
This push to untethered access to business is forcing
enterprises to deal head-on with security. Achieving this new
level of security requires weighing vulnerabilities against
requirements and the costs of reducing those vulnerabilities.
Wireless networks are inherently less secure than their wired
counterparts. The confidentiality of data is at risk because data
are sent through the free-space environment or into the air
where anyone with the appropriate technology can intercept
and/or spoof the data. The engineering standards for cellular
telephone availability (i.e., the probability of not getting a dial
tone when attempting a call) are lower than for wired
telephony, so availability is a concern. However, unlike
wireless voice networks, wireless data networks tend to be
always on, always ready to transmit or receive data. They face
the same vulnerabilities as do wireless voice networks, but
they tend to be always available for those vulnerabilities to be
exploited. Wireless communications also pose significant
technical challenges, as well as greater challenges in the areas
of control, security and audit, because they transcend
traditional and regulatory boundaries.
It is necessary to understand wireless technology and the
ways that it can be exploited to effectively implement security. A
security policy that deals realistically with the threats faced by
the network in question and is in compliance with local laws and
regulations is needed. Appropriate controls are also needed to
ensure that the measures called for in the security policy are, in
fact, implemented and that they perform as intended.
Understanding the security and quality risks that surround
wireless communications is a critical requirement for auditors.
Not only must the auditor know how the system works and
what can go wrong, he/she must also know the steps to take to
identify and correct problems when they occur. Equally
important, the auditor must have an idea of what can go
Security Goals
Confidentiality is usually seen as a good thingthe more of
it, the better. When people think of security, they think about
confidentiality. Auditors want to make sure the information
being transmited through the air remains private.
Confidentiality does not come for free. One must invest in
cryptographic software and/or hardware to encrypt and decrypt
messages, and then deal with the continuing requirement for
managing the cryptographic keys, among other management
procedures. This is detailed, time-consuming and costly.
Unless the cost can be justified by the value of the information
to be protected, it is difficult to choose confidentiality on a
cost-benefit basis. Furthermore, there are many business
settings where confidentiality is simply not required, but other
aspects of security are.
Authenticity provides the recipient with assurance that the
message at hand truly originated with the purported sender and
that the sender is who he/she purports to be. Although
provided by cryptographic means, authenticity and
Encryption
Pertinent laws
Incident response
Enforcement
Conclusion
If the security is deemed by the auditor to be insufficient,
then the responsible parties should be advised to expend more
resources on the network to assure a higher degree of security.
If those entreaties are not heeded, auditors should document
the request and the response, as they will surely be important
should a liability case arise from a breach of network security.
Editors Note:
This article is excerpted from research being published by
the IT Governance Institute in a publication titled Managing
Risk in the Wireless LAN Environment: Security, Audit and
Control Issues, by Richard A. Stanley, Ph.D., PE, CISSP. This
research is written from a business and risk management
perspective. It provides a technical, as well as functional,
assessment of the wireless landscape and will be available in
second quarter 2004. A white paper on wireless security can be
found at www.isaca.org/wirelesswhitepaper.htm. The
publication will be offered through the ISACA Bookstore at
www.isaca.org/bookstore.
Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary
organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal.
Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit
and Control Association and/or the IT Governance Institute and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal
does not attest to the originality of authors' content.
Copyright 2004 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCATM Information Systems Control AssociationTM
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25 per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume,
and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the
association or the copyright owner is expressly prohibited.
www.isaca.org