Feeds

Defeating the hacker

Security is for everyone

The Power of One Brief: Top reasons to choose HP BladeSystem

Book review Who is responsible for security? Everybody is, not just the security officer and his/her team. But it's a technical issue, right? A matter of firewalls, applying patches, installing programs that detect and remove spyware and viruses... Wrong again!

Security is largely (despite the efforts of vendors who want to sell you more "stuff") largely a people and culture thing – a company is more at risk from dissatisfied and unhappy employees misusing the authority they have been given, for example, than from that meeja bogeyman, the external hacker.

A holistic view of security is what makes Robert Schifreen's book Defeating the Hacker, billed as "a non-technical guide to IT security", so useful. Much security good practice is counterintuitive, but everybody working in IT should have a good understanding of security as a whole, not simply of a few pieces of security technology.

However, Schifreen's book isn't technical in the way the Anti-Hacker Toolkit by Mike Shema, Chris Davis, Aaron Philipp, David Cowen (reviewed by Pan Pantziarka here) is.

Actually, the non-technical billing is a bit misleading. Schifreen talks about ISO 17799 (the widely adopted information security standard) and is happy to suggest that you don't broadcast your SSID, and that you do enable WPA rather than WEP encryption when setting up wireless networking. The book is technical enough to be useful, but it isn't just a catalogue of software and hardware products to buy and configure.

Most chapters have five practical "action points" in a checklist at the end, which will help you implement a good security regime in practice. The book starts by recommending basic risk assessment and a review of the laws relating to IT security (such as the UK Data Protection Act) in your place of business. A whole chapter is devoted to information security policies, the lack of which is a key indicator of poor security practice. After all, without an agreed policy, how will you configure all that security hardware you'll no doubt be persuaded to buy?

There are 42 chapters covering everything from server security, firewalls and wireless networking to social engineering, ecommerce fraud, securing your premises and even business continuity planning.

Schifreen has a story to tell (he was the original teenage hacker, back when curiosity was a legitimate excuse) and the whole book is written in an accessible conversational style which makes it readable as well as practical and informative.

For instance, Schifreen writes: "I've seen large multinational companies suffer horrendous virus infections across many thousands of PCs because a board-level director (in one case it was actually the IT director) didn't think that the rules about email attachments should apply to them" – which illustrates the point that senior management buy-in and understanding is vital to security.

This book covers a lot, so the detail it can go into is limited, but it does give readers a very thorough grounding in security as a whole – and doesn't neglect the risk management and people issues as some books do.

You can argue about details, as always, but the content is pretty even-handed (for example, while it recommends automatic patching of Windows systems, which scares me a bit, it does mention the small risk that a patch will cause problems in itself, and describes ways to mitigate this). There is a website for this book, if you want to read a sample chapter.

Defeating the Hacker

Defeating the HackerVerdict: This is a useful book although its billing as a "non-technical guide to IT security"; is a bit misleading. It is technical enough to be useful, but isn't bogged down in technical details and jargon. It would be better described as a practical business-oriented guide to IT security – but it is definitely worth reading.

Author: Robert Schifreen

Publisher: Wiley

ISBN: 0-470-02555-7

Media: Book

Buy this book at Cash 'n' Carrion.

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.