New security threats from every which way

As virtualization, SOA and mobility projects proliferate and converge, they open the enterprise to a rash of troublesome network security problems

As enterprises seek out ways to reduce IT costs, optimize resources and improve operational efficiencies, three technology trends have started to dominate: virtualization, service-oriented architecture and mobility. More promising yet is the intertwining of these unique technologies.

Some examples: Mercy Medical Center, in the US, is piloting virtual desktops rolled out on encrypted USB devices to its mobile doctors and residents. RedRoller, an online-shopping comparison service, created an SOA to connect its small-and-midsize business (SMB) customers to best pricing at shipping carriers -- a system that's likely to go virtual down the road. Delaware Electric, gives field workers with tablet PCs access to an SOA infrastructure.

What does this mean from a security perspective? It means myriad new layers of risk being created along the stack -- all of which must be securely deployed and managed. "We're talking layers and layers you need to pay attention to, both in isolation and also where they're mixing up with unexpected interactions," says Dennis Moreau, CTO of Configuresoft, a configuration management company.

Take the virtual machine environment. This environment comprises a virtual machine manager (VMM) or hypervisor that's shimmed between the kernel and the host operating system to create a layer of layers, or as some call it, a "virtual stack." In that stack are the hypervisor and guest layers that call among themselves and cannot be monitored by most of today's tools.

"There's a whole series of security dilemmas IT professionals are facing with these new technologies," says M. Victor Janulaitis, CEO of Janco Associates, an IT and business analysis firm. "The most prevalent problems are change management and version control, all the way to the cellular phones," he says.

Best practices, standards and tools are emerging, but they're mostly piecemeal, open to interpretation and incomplete in their coverage. Today that makes comprehensive management of any of these technologies problematic.

Exploits on all fronts

In its annual security report, Cisco outlines likely attacks against virtualization, SOA and mobility infrastructures. Here are some excerpts:

On SOA: Malware attacks exploiting application vulnerabilities will grow and become more significant during the next several years. Expect more sophisticated attacks from professional attackers. Organizations probably will see an increasing number of infected systems attempting to access protected networks.

On virtualization: Malware rootkits that execute entirely in system memory emerged during 2007. As average RAM size continues to increase, such strategies probably will grow in popularity.

On mobility: The huge increase during the past year in the use of multipurpose smart phones, such as Apple's iPhone, means there are more mobile devices with fully functional operating systems in use than ever before. Future mobile malware will take advantage of the richer capabilities of these operating systems. Expect future mobile-malware attacks to propagate via mobile e-mail, Short Message Service, Wi-Fi, and instant messaging applications.

More malware will target portable media and gaming devices. As more users take advantage of growing storage capacity in iPods and other flash media to store sensitive business information, expect attackers to target these devices.

Across all three technologies: Expect more multiplatform attacks.

Source: Cisco 2007 Annual Security Report

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Deb Radcliff

Network World
Show Comments

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?