Você está na página 1de 4

 PRODUCTS & SERVICES

Security 101: Who’s in Charge?


By Jonathan Kendall other issues. And we are obliged to together. The communication breaks
President examine the positive and negative down, everyone has something else
Kendall Design Group interaction of the solutions between to do and the security platform is not
(This article is part three of a three part the various assets, systems, technolo- in place when it is needed.
series.) gies and processes. Only then can we A whitepaper by SecureWorks,
make a decision in the best interest Inc., a company in Atlanta, says,“Secu-
n the first two parts of this of the institution. An acceptable level rity experts are a bit like firefighters.
series, we discussed the of risk can be attained only through They go through intensive training
psychology of those in charge careful planning. that prepares them for an emergency.
of the security of our schools. Now that we have the reasoning Firefighters spend the time between
We discovered the findings of and the planning process in place, fires preparing for emergencies,
Nobel Prize winner Daniel let’s take a look at security-based Re- spreading the word on prevention
Kahneman and Amos Tver- turn on Investment (ROI) and Failure and gaining additional knowledge.
sky in the research of Prospect The- of Investment (FOI), and some new When the emergency arrives, they
ory, which details the phenomenon types of attacks on the horizon. But have to operate on little more than in-
that on-average, the well-meaning first, security takes a team. stinct. There’s no time to look things
people in charge of our children’s up or make sure it’s being done right.
security take significantly more Security — A Team Activity When it’s all done, they return to the
risks with the lives and property of The security team is a key compo- firehouse and start the cycle again.
the students, faculty and staff than nent to the success of enhancing se- There is a big difference between
was anticipated. curity and reducing risk. As the old firefighters and security experts —
We also examined why people saying goes, there is no “I” in team. It the latter don’t get to use the cool
chose to solve the wrong problem. is not a one-person job, or a one-de- fireman’s pole.”
An example is installing a new se- partment job. In the event of a crisis,
curity system or product, and then a team of experts in physical, elec- Why a Team? It is the
believe they have a tronic and cyber security Blended Attack
very secure campus, will need to work together The idea of combining the world
when, in fact, they have and minimize the impact of cyber crime and physical crime
opened themselves to a of a security incident. is the future for the educated, intel-
new world of risk and A diverse group of se- ligent and professional criminal. The
liability because of not curity experts ensures the current weapon for the pedophile is
studying the problem team can share experi- to use the Internet and chat rooms
thoroughly. Because this ence, compensate for gaps to lure the child victim into a “rela-
“solution” was not vet- in knowledge, see and ex- tionship” and then coax them into a
ted in the context of ploit synergies, while al- physical sexual assault, thereby com-
their unique institution lowing for specialization. bining the cyber and physical.
within the larger frame- Jonathan Kendall In a security organization The more advanced criminals, es-
work of integrated se- of one, or without a broad pecially those with the high quality
curity, it has the potential to cause range of experience and open dia- computer skills that are being taught
more security risks than it solves. log, this sharing cannot take place. on campus today, will be able to eas-
The process of security and risk Problems can occur in an organiza- ily use this expertise in different and
analysis planning was discussed in tion where securing assets are kept unique ways. These methods can
detail. We must look at the assets in silos. For example, the information be used to disrupt communications
to protect, all of them including technology (IT) gets the computer such as a computer text message alert
the students, faculty, staff, materials, information and anti-virus security, system or a campus audio annuncia-
technology, intellectual property, while the police get the physical se- tion warning system, while the “lone
facilities, etc. We must explore and wolf” attacker combs the campus for
curity of the hardware when stolen.
victims. Or what if the attacker hacks
prioritize solutions, and put them in The perspective of combining the IT
into the warning systems to create a
the perspective of the institution’s and security technologies are lost and
series of false alarms, or “false posi-
requirements and goals, examine fiefdoms are built. Then the security
tives,” to lower the campus communi-
the total costs in terms of money, re- team will be cut back to a skeleton

sources, time and freedom, among crew with loose ties holding them

110 SPRING 2009 ™ SouthEast Education Network


PRODUCTS & SERVICES 
ty’s trust in the electronic systems? tack. Attackers would use the cyber be executed by any group capable
Then the attack can be carried out component of the attack to increase of cyber crime. But it would take a
with a slower response by authori- the chaos caused by the main, physi- group such as terrorists who want
ties as the community just thinks it cal assault.This type of attack would to make a political “statement.”
is another false-alarm. be launched after the physical com- Physical to Facilitate Cyber. This
The real possibility is that a much ponent and would target systems is the least likely of the blended
larger, more dangerous terrorist and assets used by response and re- attacks and the most difficult to
group could be planning a larger covery personnel, maybe the cam- successfully execute. This type of
scale attack on a campus similar pus text system, 911 or large scale attack would use a physical attack
to the Russian school attack in announcement systems. This is the component to gain access to assets
September 2004, where terrorists most obvious attack scenario for a required for the cyber component
took control of a school, ending in college campus. of the attack. It would likely be tar-
a siege when approximately 300 Cyber to Facilitate Physical. This geted at very specific assets and
people died, including 150 children. type of attack is likely and may be- would require an extremely high
The event made international news, come increasingly attractive to at- degree of coordination.This type of
something the leading terrorists are tackers as they face your increased attack could be used to gain access
anxious to do. security measures. In this attack, to a secure facility, possibly research,
Make the “blended attack” a part an electronic or cyber component from which a critical network
of your security plan and train rig- is used as an enabler for a physi- could be accessed. For example, a
orously for it. cal attack. The cyber assault would group of attackers could launch a
Highly educated criminals are probably be launched before the physical attack against the campus
most likely to use computer and physical attack. This attack would financial information to gain access
electronic system-based “cyber” be intended to defeat security sys- to monetary records. It is likely that
attacks in a blended fashion com- tems, gain access to certain areas, this type of attack would only be
bining offensive cyber elements to or delay security force. And it may launched by a well resourced, high-
worsen the damage and obstruct- incorporate some form of social ly organized group. This is more TV
ing recovery during a physical at- engineering or tricking one’s way plot material, it is unlikely that an
tack. The most probable targets for into a system. This type of attack individual or smaller, ad hoc group
such attacks are important people could use a cyber attack to degrade would have either the resources or
or assets, response police and medi- communications-based security the competencies to execute an op-
cal services, and security systems. systems or block automated noti- eration of this complexity on cam-
Cyber only attacks are also in- fication systems. The attack would pus.
creasingly executed by even new require considerable technologi- If you have an intelligent “adver-
computer science students just to cal sophistication, like the students sary,” bad-guy, or criminal intent
see if they can do it. All the hard learn everyday, to effectively impact on perpetrating a misdeed (in the
work is done because the code is the campus resources. Many would case of a criminal-minded student
on the web. They can either do it see this as a workable challenge, on campus) with time (classes do
for fun, or profit, and this is happen- even a badge of honor just to get it not last all day), resources (the stu-
ing everyday at every institution. to work! dent has the full resources of your
Just check with your IT staff. Physical to Enhance Cyber. This is campus at his disposal), emotion
The risk of a criminal or stu- less likely than the first two attack (revenge for example) and intellect
dent using the blended attack, or types, but may become attractive as (the student is a student so they
God-forbid a campus terrorist at- attackers look for ways to increase are pretty smart), they are going to
tack would be reduced by ensur- the impact of an event. This type study your defenses, campus, tech-
ing that blended attack scenarios of attack would use a physical at- nology and your processes. And if
are included during contingency tack to compound the problems you have something like a rule, ID,
planning and vulnerability analyses, of a cyber attack. It would likely or locked door, they can figure out
increasing surveillance and ongo- be aimed at disabling the security a way to bypass it, and these folks
ing assessments, and enhancing in- prevention, monitoring or response are always figuring, then you have
formation sharing among campus technologies needed to effectively a weakness, a vulnerability. A weak-
and community security services, recover from a cyber or hack-attack. ness in cyber security can lead to a
police, IT, and emergency services. The most likely targets are large, failure of physical security and visa
Blended attacks can be broken high-profile objectives and assets, versa.
down into four general types: perhaps a large or famous campus. It’s the blending of risk and safety
Cyber to Enhance Physical. This is Depending on the type of cyber
the most likely type of blended at- operation, this type of attack could see WHO’S IN CHARGE? page 112

www.seenmagazine.us SouthEast Education Network ™ SPRING 2009 111


✇ CAMPUS SECURITY
and responding appropriately. Relate but there are other conditions, too.
Who’s in Charge? that to a school shooter or a dorm Failure can occur when technology
continued from page 111 rapist or property theft. You did not isn’t updated, monitored or properly
have a school shooter this year. Does maintained. Failure occurs when the
for people, equipment, information, it make sense to ignore the possibil- processes that make for security and
resources, and money. ity or have security solutions in place limit risk aren’t done on a regular ba-
to prevent it? sis, correctly and conscientiously.
Return on Investment (ROI) and Fail- Many people do not believe that The classic example is adding se-
ure of Investment (FOI) you can truly have Return on Invest- curity camera monitoring. These
“Most (administrators) want ment on security. Security is not nor- security camera systems are sold as
hard numbers to make financial mally an investment on which you a great deterrent to crime, and it is
decisions, and we live in a world expect to make a monetary return often insinuated that real-time moni-
where you can’t always have that,” as it is resources spent to protect in- toring will reduce crime. But this is
says Rich Mogull, research director vestments that further the goals and not true. The cameras are very rarely
at Gartner G2 Cross-Industry Re- academic mission of the institution. monitored and the odds of someone
search. “I mean, what’s the ROI of a We can look at security from a dif- actually being at the monitor at the
fire extinguisher?” ferent perspective than we do with exact moment an attack is happening,
The numbers do exist; they just other purchases. Maybe we should recognizes the attack, and responds,
need to be found. The American look at it differently and measure it is so rare as to be on the scale of win-
Society of Safety Engineers (ASSE) differently. ning the lottery.
states in a report that the ROI of With Failure of Investment (FOI), Study after study shows that they
fire extinguishers is approximately a term coined by Andy Willingham solve very few crimes and they are a
a $3 return for every $1 invested. (known as Andy, IT Guy), we can very poor deterrent to criminals. Vid-
This estimate is based on fire extin- look to differentiate between the eo is rarely viewed in real time and,
guishers, like physical and IT secu- failings of people and the failings of only rarely, when the crime is actually
rity, showing up as a part of a larger security-based technology and sys- in full view with the correct lighting
safety/security purchase. It is logical tems. People screw up. They can be and angle of view can the old foot-
and makes sense that there would messy and emotional. They can have age be found and used to investigate
be a high ROI on preventive equip- a bad day and get bored, and they of- and prosecute a criminal. Obviously,
ment such as this. Often, regulation ten don’t know what to do or how this prosecution is after-the-fact, so it
mandates fire extinguishers but that to work something correctly when does not act as a very good preven-
does not change the fact that they a traumatic event like an attack oc- tion methodology.These systems can
have a high ROI. curs. They can get flustered. Technol- be a high-cost, low-reward, classic
Someone might suggest that, ogy fails because it is designed, built, FOI if not implemented effectively,
since there were no fires last year, configured and maintained by these that can trick an institutions’ admin-
there was no ROI. If that is the atti- people. People who often cannot see istration into thinking they are well
tude at your school, it’s time to initi- the system beyond a mechanism to and truly secure.
ate some awareness and education perform a simple set of tasks. It fails We must ask: How does this hap-
because that is not how risk man- because it is put in place to do that pen? How does it get to the point
agement works. How about this: If set of tasks and when faced with do- where these systems and products
you wear your seat belt but do not ing something different it doesn’t are neglected or never properly im-
get in a car accident, does that mean know what to do so it fails to pro- plemented? Is it because people do
you should not wear a seat belt, or tect, or monitor or respond. It fails not understand the real threat or the
only use it occasionally on “high-risk because smart-bad-guys find ways to real assets to protect? One can imple-
trips,” because there was no return? work around a security system or a ment security to meet compliance,
Of course not, it is a low risk, high security process that one consultant satisfy audit and provide enough pro-
reward activity, and because return says are “brittle” or too rigid and set tection to say they are doing some-
is not just measured in a rigid world in its ways. Much like people can be thing, or it can be visible “show of se-
of dollars and cents, and what did or too set in their ways. curity” that makes the evening news
did not occur, but in the real world Security fails for a variety of reasons.
of what might occur and how like- but does not solve the real problem.
There are improper configurations,
ly it is to occur. That is the heart of easy work-a-rounds, poorly trained It is critical to take it to the next
risk management. It involves being staff, implementing wrong technol- level of thinking by making integrat-
ready for something bad to hap- ogy, protecting the wrong assets, one ed physical, electronic and informa-
pen by investing in strategies and system causing another system to tion security a priority. It means hav-
systems to stop it from happening, fail, lack of awareness and poor user ing support from the president and
monitoring when it does happen training. All of this can lead to FOI see SECURITY page 125

112 SPRING 2009 ™ SouthEast Education Network


PRODUCTS & SERVICES 
Security ministration comfortable with? How of the School. Ask for the truth. Get
does the school prioritize its limited over your Prospect Theory thinking
continued from page 112 resources? Is technology or aware- that everything will be okay. And
the board. It means a concerted ef- ness more valuable as a tool? Now start your converged security and
fort to make sure that everyone un- you are answering business questions risk management plan today.
derstands the goals and processes based on the security realities. As we have learned in these three
of the security mission of the cam- Security and risk management is articles, facing the threat and risk is
pus. Security fails when it’s not tak- not just protecting against the school the first issue and it is difficult, but
en seriously by all involved because shooter, or the thief, or the cyber bul- it is critical to a safe and success-
it is not implemented appropriately ly or the hack attack. It is all of that ful campus environment. Who’s in
to the culture of the institution.The and more. charge? You are. It’s time to take re-
security team can’t be successful Many vendors seem to have (and sponsibility and action.
unless the whole campus buys into sell) “the answer,” but you have the
the program and the campus will answer because every institution Jonathan Kendall is the President and
not buy-in if ill-conceived processes and school is unique. Unique envi- Founder of the Kendall Design Group, a
are enacted. ronments, missions, resources, assets, professional services and consulting firm
Failure is measured differently for risks and finances are the norm in ed- specializing in the convergence of technol-
different assets. ucation. The answer may or may not ogy, security and management located in
So how do you go about defin- be contained in the products of the the Washington, DC area and Las Vegas,
ing failure? It speaks to basic risk- sales people who are knocking on Nevada. Kendall has 20 plus years of expe-
management planning. What is the your door. But with proper planning, rience serving the educational community
risk if failure happens with a certain you will have an understanding of around the world on over 200 campuses
process or system to a certain, pri- the big picture, the assets, the goals from K-12 to the Ivy League. He has been
oritized asset at a certain level and and the issues. a featured speaker at the Dartmouth Col-
time? This is why the security and Security is not one thing — it’s ev- lege, the AIA and SCUP national conven-
risk management plan is so impor- erything in the context of your insti- tions, and has written numerous articles.
tant and that decisions to purchase tution. He is a registered private investigator
and implement technologies not be Manage your risks and manage and certified security officer, and has five
taken in haste. A successful institu- your resources — it can be done. years teaching experience to the US State
tion cannot make a decision based It must be done. Get a physical and Department and U.S. Special Forces. Please
on the fact that it is from a certain logical security risk assessment con- contact Mr. Kendall at 410-798-9003, e-
supplier, only on the initial cost, on sultancy involved first. Have them re- mail jon@KendallDesignGroup.com or
“ease of use,” or on some other sin- port directly to the President of the visit www.KendallDesignGroup.com and
gle variable. University or Principal/Headmaster SecureCampus.blogspot.com.
“You have to know what you are
protecting, what the value of it to
the (campus) is and what level of
failure can each thing handle. If you
don’t know, then you are going to
set yourself up for FOI and a new
job search,” says Andy Willingham.
Failure costs real dollars, real
money, real property, real peoples
lives, real reputations. Jobs are lost,
lawsuits are filed, insurance rates in-
crease, etc. Failure is expensive on a
number of levels.
ROI and FOI are definable, but in
many ways emotions come into play.
It is about coming up with numbers,
but those numbers are only useful
in the context of the institution. ROI
and FOI are risk economics that cre-
ate a baseline of your institutions’ at-
titude toward risk management and
security. What level of risk is the ad-

www.seenmagazine.us SouthEast Education Network ™ SPRING 2009 125

Você também pode gostar