According to a study released in 2000 by the FBI and the Computer
Security Institute (CSI), over seventy percent of all attacks on sensitive
data and resources reported by organizations occurred from within the
organization itself. Implementing an internal security policy is just as
important as an external strategy. This section explains some of the
common steps administrators and users can take to safeguard their systems
from internal exploitation.
Employee workstations, for the most part, are not as likely to be
targets for remote attacks, especially those behind a properly configured
firewall. However, there are some safeguards that can be implemented to
avert an internal or physical attack on individual workstation
resources.
Modern workstation and home PCs use a BIOS that controls system
resources on the hardware level. Workstation users can set administrative
passwords within the BIOS to prevent malicious users from accessing or
booting the system. BIOS passwords prevent malicious users from booting
the system at all, deterring the user from quickly accessing or stealing
information stored on the hard drive.
However, if the malicious user steals the PC (the most common case
of theft among frequent travelers who carry laptops and other mobile
devices) and takes it to a location where they can disassemble the PC,
the BIOS password does not prevent the attacker from removing the hard
drive, installing it in another PC without BIOS restriction, and
accessing the hard drive to read its contents. In these cases, it is
recommended that workstations have locks to restrict access to internal
hardware. Specialized security devices, such as lockable steel cables,
can be attached to PC and laptop chassis to prevent theft, as well as
locks on the chassis itself to prevent internal access. This type of
hardware is widely available from manufacturers such as Kensington and
Targus.
Server hardware, especially production servers, are typically
mounted on racks in server rooms. Server cabinets usually have lockable
doors, and individual server chassis also are available with lockable
front bezels for increased security from errant (or intentional)
tampering.
Enterprises can also use co-location providers to house their
servers, as co-location providers offer higher bandwidth, 24x7 technical
support, and expertise in system and server security. This can be an
effective means of outsourcing security and connectivity needs for HTTP
transactions or streaming media services. However, co-location can be
cost-prohibitive, especially for small- to medium-sized
businesses. Co-location facilities are known for being heavily guarded by
trained security staff and tightly monitored at all times.