Where the Risks Are

Knowing what to spend on data protection and where to focus the effort isn't easy. Security assessments help eliminate the guesswork by identifying where your most critical risks lurk.

Where the Risks AreCHANCES ARE, SOME ASPECTS of your IT security setup make you uncomfortable. Maybe it's the server that's so brittle no one dares install security updates on it. Maybe it's the use of shared passwords, known to all past and present IT team members. Maybe it's the overly permissive firewall; outdated antivirus protection; open WiFi. Maybe it's the inability to enforce security policies, or the lack of such policies.

It's difficult to know where to begin improving IT security, because the number of potentially weak areas can be overwhelming. A security assessment helps prioritize the issues, allowing an organization to tackle them in the order of importance. The assessment not only allows IT staff to focus a limited budget on addressing the most critical risks first, but also arms them with facts that could free up additional funding.

To help you get the most out of a security assessment, let's consider which aspects of the environment a security assessment can examine. We'll also discuss how the assessment can be conducted.

What to Examine?

The first step in scoping a security assessment, whether you will conduct it yourself or hire a consultant, is to determine what you'd like to examine. The best way to start is to list your concerns, then group them. The issues often fall into the following categories:

  • External network components, which may include systems and devices accessible from the internet or partner networks
  • Internal network components, which may include workstations, servers, printers, and other devices used by individuals at your college or university
  • Guest or remote networks, which may include mistrusted wireless and wired networks used by visitors or remote VPN users
  • Applications and databases, which store sensitive data and allow staff, faculty, and students to conduct important transactions
  • Security policies and procedures, which guide personnel in IT and other departments in maintaining or making use of IT infrastructure

The goal of a security assessment often is to examine these areas in some detail, in order to identify vulnerabilities, understand their relevance, and prioritize them by risk. This information will allow the organization or the assessor to develop a remediation plan.

Knowing what to include in the security assessment helps estimate the effort and cost. If you don't have the luxury of examining all pertinent aspects of your environment in a single project, consider starting with the most significant concerns, and cover the other ones in subsequent assessments.

Technology vs. Processes

A school working to mature its IT security practices with the help of an assessment can begin by examining IT infrastructure, looking for vulnerabilities in systems, networks, and applications designated for the project's scope. Identifying technological weaknesses that may lead to a breach often highlights the underlying problems in IT management practices.

Alternatively, you can start by examining the current state of your security processes: the way people share data, manage systems, develop applications, install security updates, and so on. This task often involves interviewing individuals throughout the school, including staff, faculty, and students. It also involves reviewing existing security policies and procedures to identify gaps and inconsistencies between written documents and actual practices.

Which of the two phases is the best starting point for you depends on how your college or university thinks about its IT infrastructure: Some focus more on technology; others on processes. If your budget permits, consider examining both aspects of the environment as part of the security assessment.

To Exploit or Not?

A security assessment whose scope includes technological infrastructure components looks for problems such as:

  • Missing security updates
  • System configuration errors
  • Weak passwords
  • Network architecture deficiencies

A vulnerability assessment typically involves performing a comprehensive analysis of infrastructure components and network blueprints to locate the issues above. However, it stops short of exploiting the vulnerabilities to compromise the affected systems. Instead, the tester analyzes the vulnerabilities for trends and patterns to prioritize the many issues often uncovered during the project. The organization may provide the tester with credentials to log on to the assessed systems and applications. This facilitates a thorough, in-depth examination.

A penetration test, also known as ethical hacking, attempts to confirm that the discovered weaknesses can lead to a breach. The tester mimics an attacker's actions to exploit the vulnerabilities. Such an approach further differs from a vulnerability assessment in that the tester often has minimal prior knowledge of the environment, treating the target as a "black box." Findings of a penetration test are difficult to disregard if the test leads to a breach. However, if the tester is unable to penetrate the defenses, the organization may have less information than it would get from a vulnerability assessment-- an attacker with different approaches, tools, and motives may still be able to break in.

Which of the two approaches is right for you? Simply put, pick the one that feels better in light of your school's culture and assessment expectations. Many organizations are uncomfortable allowing a tester to exploit vulnerabilities even under controlled conditions. Others find it difficult to accept the weaknesses discovered during a vulnerability assessment without confirming that they can be exploited. You may also consider a hybrid approach, performing a penetration test of your external systems, while opting for a comprehensive vulnerability assessment of your internal network.

If an ethical hacker is unable to penetrate defenses, you may end up with less information than you would get from a vulnerability assessment-- an attacker with different approaches, tools, and motives may still be able to break in.

The Business of Prioritizing

When prioritizing the issues uncovered during an assessment, account for their business impact. For instance, of the two servers missing common security updates, fix the one that processes more sensitive data or holds a more critical operational role. Evaluating such factors involves speaking to individuals outside the IT department to better understand the systems' roles. A side (but no less important) benefit of this kind of effort: It will help you describe the risks in terms relevant to your organization's executive management.

Tools of the Trade

The long list of security assessment tools includes free and commercial products that vary widely in their usefulness and complexity. A sampling of the tools are:

For assessing weaknesses in the overall security program, refer to ISO 27001 and 27002 standards. These tools, in the form of written guidelines, are an excellent resource for evaluating gaps in security practices and policies.

Of course, the usefulness of any tool depends on the expertise of the person using it. The scanners and other resources mentioned above will produce a good deal of information about the assessed environment. Some of the findings will be false alarms; others will be missing from the automatically collected data set and will need to be gathered through manual means. At the heart of the security assessment is what the tester does to analyze and prioritize the information gathered via automated and manual techniques.

Wrapping up the Project

Typically speaking, the security assessment culminates in a report that describes the testing methodology, ranks the vulnerabilities, accounts for business factors, highlights underlying problems, and outlines remediation options. What should you be wary of? The dangers of ad-hoc assessment efforts. Too many colleges and universities try to address the vulnerability assessment in an unfocused manner, and run out of steam before completing the effort. The best approach: Plan and conduct the remediation effort asa project with a clear timeline and unambiguous goals, and with responsible participants who will help you get the most out of the security assessment's findings.

web extras::
Mickey Spillane Versus Wiley Hacker: Who is qualified to conduct computer forensics: computer jocks or private eyes?
Vulnerability Management Needed for Security, Study Says

Featured

  • glowing blue nodes connected by thin lines in an abstract network on a dark gray to black gradient background

    Report: Generative AI Taking Over SD-WAN Management

    In a few years, nearly three quarters of network operators will use generative AI for SD-WAN management, according to a new report from research firm Gartner.

  • abstract pattern with interconnected blue nodes and lines forming neural network shapes, overlaid with semi-transparent bars and circular data points

    Data, AI Lead Educause Top 10 List for 2025

    Educause recently released its annual Top 10 list of the most important technology issues facing colleges and universities in the coming year, with a familiar trio leading the bunch: data, analytics, and AI. But the report presents these critical technologies through a new lens: restoring trust in higher education.

  • abstract image representing AI tools for reading and writing

    McGraw Hill Introduces 2 Gen AI Learning Tools

    Global education company McGraw Hill has added two new generative AI tools to help personalize learning experiences for both K–12 and higher ed students, according to a news release.

  • abstract image of fragmented, floating geometric shapes with holographic lock icons and encrypted code, set against a dark, glitchy background with intersecting circuits and swirling light trails

    Education Sector a Top Target for Mobile Malware Attacks

    Mobile and IoT/OT cyber threats continue to grow in number and complexity, becoming more targeted and sophisticated, according to a new report from Zscaler.