Securing E-Business Systems: A Guide for Managers and Executives

Securing E-Business Systems: A Guide for Managers and Executives

by Timothy Braithwaite


View All Available Formats & Editions
Choose Expedited Shipping at checkout for guaranteed delivery by Monday, January 21

Product Details

ISBN-13: 9781119090939
Publisher: Wiley
Publication date: 04/10/2002
Pages: 224
Product dimensions: 6.00(w) x 8.90(h) x 0.70(d)

About the Author

TIMOTHY BRAITHWAITE has spent more than fifteen years in senior security management positions and another twenty years in executive director positions for computer and communications services organizations in both the public and private sectors. He has also worked as a private consultant. Tim has previously published The Power of IT: Maximizing Your Technology Investments and Evaluating the Year 2000 Project: A Management Guide for Determining Reasonable Care.

Read an Excerpt

Securing E-Business Systems

A Guide for Managers and Executives
By Timothy Braithwaite

John Wiley & Sons

ISBN: 0-471-07298-2

Chapter One

Electronic Business Systems Security

What is it?

What does it include?

How important is it?

How to get started?


One of the major computing challenges in today's economy is the manifest lack of adequate security over the information, computers, networks, and Internet applications on which business, government, and the economy depend. Many computer security threats have been identified over the past 25 years, and each has spawned a special category of corrective actions to address it. For example, in earlier times, efforts to address the lack of automated security were variously known as computer security (COMPUSEC), communications security (COMSEC), emanations security (EMSEC), information security (INFOSEC), and information technology security (ITSEC). More recently, information assurance (IA), Internet systems security (ISS), and cyber-security have grown in popularity. Each of these areas in turn have grown subcategories of security knowledge and special safeguarding techniques that are needed to secure today's electronic business systems. There is no one security solution for an e-business system because the e-business application sits at the pinnacle of modern computing and is therefore susceptible to all the security weaknesses of the various foundationtechnologies.

For our purposes, e-business security acknowledges all the threats identified by each of these security categories and employs the technical security safeguards and risk mitigation techniques associated with each category as determined by the actual risks found to be threatening the business. E-business security also calls on the traditional disciplines of personnel and physical security to complete the picture of safeguards that will be needed when addressing threats to the electronic business.

Conceptually, e-business security represents an accumulation and consolidation of information processing threats that identify the need to protect the integrity and confidentiality of information and the need to secure the underlying support technologies used in the gathering, storage, processing, and delivery of that information.

But what is e-business security and why is it important? How do threats to electronic business impact the world of contemporary commerce and what must be accomplished to improve an organization's security posture-especially when it comes to "new" e-business systems?


Some definitions:

Assure-make safe, make certain, tell positively, give confidence.


Information Technology (IT)-the technology of the production, storage, and communication of information using computers.

Electronic Business-the application of information technology to business activities.

Using these definitions, e-business security can be said to be concerned with making certain that the knowledge-value of business information is made safe and is available for business processing when needed. Consequently, e-business security is concerned that the technologies used for the production, storage, and communication of information are made safe so that the knowledge-value of the information is certain and can be trusted when used. If information and the processing technology are made safe, users will have confidence that the information positively tells (i.e., accurately portrays) the reality of that which the information is supposed to represent. In different words, e-business security is concerned with the confidentiality of information, maintaining its knowledge-value, and ensuring its availability to legitimate users and customers when required to perform an authorized business activity.

By comparison, if information, and its knowledge-value, are not made safe, cannot be trusted, and are not readily available to legitimate users and customers, business and government activities will be adversely impacted. If by accident or deliberate action, information is stolen, becomes inaccurate or misleading, or is not available for use, business and governmental decisions and actions may become compromised, distorted, or wrong, and/or decisions cannot even be made and actions cannot be taken. When this occurs, executives, stockholders, users, customers, and citizens lose confidence in the information and may no longer trust the system, process, or organizations that make use of the information. They also lose confidence in the organization responsible for maintaining the information and the integrity of the business process. E-business security, then, is concerned with being able to assure trust in all information and the computing processes used to conduct e-business.


Perhaps it is helpful to view the scope of e-business security as including all those actions required to prevent, minimize, and recover from the universally appreciated threats summarized by the acronym GIGO-garbage in-garbage out. Within this context, e-business security is concerned with preventing those accidental and/or deliberate actions that may result in the introduction of inaccurate data or information to a system (GI) as well as any accidental or deliberate processing, storage, and communication activity that may produce inaccurate, false, or misleading outputs from a system (GO).

These concerns are addressed by taking action to assure the integrity and confidentiality of information and processes while at the same time assuring the ready availability of information, processes, and other system resources when required for use by legitimate users and customers. For example, "denial of service" attacks, such as those often experienced by Internet users, are currently being viewed as the number one threat to our highly automated and interconnected way of conducting business and executing the functions of government. This is because a successful denial of service attack destroys the ability of the e-business system to function at all.

In conclusion, e-business security is concerned with all aspects of how business information is collected and handled, how hardware and software process and communicate that information, how information is stored and protected from eavesdroppers, and how system resources are configured and made safe to ensure their ready availability to legitimate users and customers.


To the extent that business information and the technology used to produce, store, or communicate that information are considered important to an organization's e-business operations, the definitions and discussions outlined in this chapter are consistent with the intent of Presidential Decision Directive-63 (PDD-63) on Critical Infrastructure Protection and other initiatives calling for the protection of the nation's critical information infrastructure. In a practical sense, if information and/or its processing were considered mission-critical or mission-sensitive for Y2K purposes, it should probably now be considered critical for the intent of e-business security.

Presidential Decision Directive-63 directs that information integrity, confidentiality, and availability be assured, not only for government systems but also for all information processing systems on which the nation depends. E-business systems certainly fall within this definition. The intent of the directive can be accomplished only if all aspects of information collection, production, storage, and communication are made safe (i.e., secured). By inference, this includes how e-business systems are designed, managed, configured, accessed, and operated. It also includes how software and databases are designed, programmed, and tested; how system changes are made and validated; how systems are monitored for incidents; and how critical information and backup systems are protected. By establishing information, computer, and communications security controls sufficient to prevent and mitigate anticipated risks, and by establishing a continuous security monitoring and security improvement process, the intent of PDD-63 can be satisfied.

All aspects of computing and communicating impact the objectives of assuring integrity, confidentiality, and availability and should therefore be within the scope of an e-business security initiative.


E-business security is an overarching business issue that, based on analyzed risks, establishes the threat acceptance and reduction parameters for the safe use of technology. As an overarching issue, e-business security can be thought of as being absolutely fundamental to the effective and efficient use of information technology (IT) in support of e-business. E-business security enables the operational concepts of e-business or e-government to become a viable way of conducting the affairs of the corporation and the government. Having built an electronic business or government world, our dependency on information and its confidential, accurate, and timely processing has grown to the point where compromises of information, loss of integrity, and/or failures of the underlying support technology may be catastrophic.

How much or how little security is required in any given instance is a "due diligence" issue for management. Determining what constitutes a "pound of security" and the associated costs are decisions that can be made only after considerable analysis-analysis that requires the direct involvement of senior executives of the corporation. If information and its supporting processing and communicating technologies are not important to your organization, little attention need be given to these issues. However, if information processing and its supporting technologies are central to the conduct of your business, a great deal of security work may be necessary. It all depends on your situation, how well you know your risks, and what has previously been done to address those risks.

The question that needs answering is "what risks threaten your e-business and how are your customers, employees, partners, investors, and shareholders impacted should any of those threats materialize?" The answer to "how much or how little security is required" must consider a great many variables that change over time and therefore require a continuous improvement mind-set and the establishment of security management processes that allow threats to be monitored so that continuous security posture improvements can be made.


First, an organization must know the actual security posture of their existing e-business processes so that management is aware of system vulnerabilities and how they may adversely impact business operations. Management can then intelligently choose, in the light of analysis, what degree of risk to accept. When was the last computer and network security assessment conducted? If your company is like most companies, it has been several years and does not reflect the new distributed e-business and Internet applications the company has been building or integrating from off-the-shelf products. Additionally, your organization was distracted for several years with the Y2K problem and all the work and expense that was needed to correct it. Consequently, most organizations must begin anew to determine an appropriate course of e-business security action for their company.

Beginning anew means to start with a formal assessment of the vulnerabilities, threats, risks, and potential adverse impacts associated with how information technology is now being used to support the electronic business processes of the organization. Such an assessment will identify ways in which information and processing integrity can be compromised, confidentiality breached, and availability of computing services denied (Chapter 3).

Questions concerning the cost of bringing e-business systems up to an acceptable level of security can be answered only after the security assessment has been conducted and senior management has contemplated the "quantifiable" losses and a series of potential adverse impacts that are generally "unquantifiable" (Chapter 7).

In addition to identifying technical security weaknesses, this assessment should attempt to discover the extent to which IT support organizations and/or contractors adhere in their daily operations to system management "best practices" and security "best practices" being advocated by security experts. Adherence to these practices is crucial if the e-business operations of the organization are to be executed in a well-managed, stable, dependable, and safe manner (Chapters 4, 6, and Appendix B).

Following an assessment of technical weaknesses and management practices, a plan of corrective actions or "road map" should clearly outline appropriate safeguard actions, their costs, and the anticipated costs needed to design and execute a security program of corrective actions and day-to-day management of that program (Chapters 4, 6, and Appendix B).

Security assessments for e-business systems come in many flavors depending on the complexity of the business and computing environment to be analyzed, the amount of time that has elapsed since the last assessment, and the dollars available to conduct the analysis.

E-business security assessments may evaluate the security posture of the entire enterprise, focusing on vertical "legacy" business systems or new e-business applications, or may determine the effectiveness of security practices at a system-specific operational level. A new aspect of a traditional security assessment growing out of the Y2K experience is an analysis that crosses all system interfaces of a "supply chain" made up of various interdependent businesses. This will be especially appropriate where just-in-time processing is occurring or where business to business (B2B), business to customer (B2C), or business to government (B2G) is a growing part of the business model. For corporations that are already heavily networked, an essential element of the e-business security assessment is to immediately begin monitoring current system traffic to discover what is actually going on at the systems and network level (Chapter 5).

Finally, a major question that most organizations should ask regarding e-business assessments is whether their employees have the technical, security, and "best practices" knowledge and experience needed to conduct the type of analysis that factors in all the technical innovations and associated threats that have been introduced into the e-business processing mix in recent years.


Excerpted from Securing E-Business Systems by Timothy Braithwaite Excerpted by permission.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Table of Contents

Chapter 1Electronic Business Systems Security1
How Is E-Business Security Defined?2
Can E-Business Security Be Explained More Simply?3
Is E-Business Security Really Such a Big Deal?3
Is E-Business Security More Important Than Other Information Technology Initiatives?4
How Does an Organization Get Started?5
Instead of Playing "Catch-Up," What Should an Organization Be Doing to Design E-Business Systems That Are Secure in the First Place?7
Chapter 2E-Business Systems and Infrastructure Support Issues8
E-Business Defined9
A Short History of E-Business Innovations9
The Need for Secure E-Business Systems14
Software: The Vulnerable Underbelly of Computing17
The Interoperability Challenge and E-Business Success20
E-Business Security: An Exercise in Trade-Offs23
Few Systems Are Designed to Be Secure25
Chapter 3Security Weaknesses in E-Business Infrastructure and "Best Practices" Security27
Fundamental Technical Security Threats28
The Guiding Principles of Protection38
"Best Practice" Prevention, Detection, and Countermeasures and Recovery Techniques47
Chapter 4Managing E-Business Systems and Security58
Part 1Misconceptions and Questionable Assumptions60
Part 2Managing E-Business Systems as a Corporate Asset69
Part 3E-Business Security Program Management97
Chapter 5A "Just-in-Time" Strategy for Securing the E-Business System: The Role for Security Monitoring and Incident Response129
The Current State of E-Business Security130
Standard Requirements of an E-Business Security Strategy132
A New Security Strategy133
The Crucial Role of Security Monitoring and Incident Response to the Securing of E-Business Systems134
The Current State of Intrusion Detection Systems (IDS)134
Defining a Cost-Effective Security Monitoring and Incident Response Capability137
Alternatives to Building "Your Own" Security Monitoring and Incident Response Capability138
Chapter 6Designing and Delivering Secured E-Business Application Systems140
Past Development Realities145
Contemporary Development Realities148
Developing Secured E-Business Systems150
Using the SDR Framework153
Choosing a Systems Development Methodology That Is Compatible with the SDR Framework154
Participants in the Identification of Security and Integrity Controls154
Importance of Automated Tools162
A Cautionary Word About New Technologies165
Summary and Conclusions165
Chapter 7Justifying E-Business Security and the Security Management Program167
The "Quantifiable" Argument169
Emerging "Nonquantifiable" Arguments170
Benefits Justifications Must Cover Security Program Administration175
Chapter 8Computers, Software, Security, and Issues of Liability178
Evolving Theories of Responsibility178
Likely Scenarios179
How Might a Liability Case Unfold?180
Questions to Be Asked to Ensure That Reasonable Care Has Been Taken in Developing a Secure E-Business System182
Chapter 9The National Critical Infrastructure Protection (CIP) Initiative187
The Problem of Dependency187
Critical Infrastructure Protection (CIP) Purpose, Directives, Organizations, and Relationships188
Frequently Asked Questions About the IT-ISAC190
Critical Information Infrastructure Protection Issues that Need Resolution192
Appendix AY2K Lessons Learned and Their Importance for E-Business Security194
Appendix BSystems Development Review Framework for E-Business Development Projects208
Appendix CA Corporate Plan of Action for Securing E-Business Systems (Sample)229
Appendix DE-Business Risk Management Review Model Instructions for Use251
Appendix EResources Guide262

What People are Saying About This

From the Publisher

" be recommended as a as an IT security handbook..." (Information Age, August 2002)

"...covers the full gamut of security threats..." (Infoconomy, 5 September 2002)

“…a timely and valuable introduction to the fourth generation of cellular networks…(Infoconomy, 1 August 2002)

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews