Understanding ASI: Advanced Security Intelligence for business
Posted on 7 Nov 2012 at 17:46
ASI is an evolutionary response to revolutionary developments in global cyberterror and organised crime gangs. Davey Winder investigates
Earlier this year the head of MI5, speaking publicly for the first time in two years, warned that UK businesses are battling astonishing levels of cyber-attack. Jonathan Evans called the attacks, from organised criminals and state-sponsored groups alike, a “threat to the integrity, confidentiality and availability of government information”. MI5 itself has been involved in trying to defend government targets against what he described as being an “industrial-scale process” involving thousands of people.
He was right then, and nothing has changed since to suggest that he isn’t right now. However, the threat is not only to government data and against government departments; businesses are at risk of exposure to the fallout from such attacks as well. A marketing manager for an IT security vendor might call this an evolution of the attack surface, or evolution of the threat space; it’s actually only natural progression.
IT security has always been about defending against a mix of the old and new
IT security has always been about defending against a mix of the old and new, the determined thief and the bedroom chancer, the master hacker and the script kiddie. What we see here are new threats being developed by the determined master hackers – threats that once launched, detected and analysed become distributed amongst the script kiddies and chancers alike. Although this sounds like a one-sided game, with the bad guys holding all the aces, the truth is that such evolutionary developments swing both ways.
While the National Security Strategy rates cyber-attacks up there with terrorist attacks for the threat it poses to critical national infrastructure, more money and resources will be thrown at defending against it at a national, state-sponsored level. This is good news for businesses of all sizes, as the drip-down effect will be a better understanding of how to protect commercial data, business networks and your own bottom line.
As the attack surface broadens and the attack types become increasingly sophisticated, so the need to ramp up conventional cyber-defences grows in importance. If you think of the traditional approach to mitigating IT risk as being “point security” – antivirus, intrusion prevention systems and firewall – the time has come to join the folk at MI5 in implementing Advanced Security Intelligence (ASI).
Advanced Security Intelligence
Think of ASI as taking a holistic, real-time view of all information sources being analysed in order to spot any anomaly, such as unusual user behaviour or oddities in network traffic. If you’ve been around IT security and network admin for a while you might recognise the basic description of security information and event management (SIEM) and log management tools – in fact, ASI has been referred to as next-generation SIEM (NGSIEM). IBM and McAfee are bolstering their SIEM tools with additional ASI capabilities.
But in the real world, what does this actually mean to your business? It means understanding that erecting a wall around your data is no longer enough. You need to be able to get a view on what’s happening behind, in front, above and below that wall; you need to know if the builders of that wall used cheap bricks; you need to be able to not only see the bigger picture, but analyse every pixel of it to spot the insecurity.
For more details about purchasing this feature and/or images for editorial usage, please contact Jasmine Samra on email@example.com
- Google I/O live stream and blog: how to watch 2014 Google I/O keynote speech live
- Google testing its own domain registration service
- Adobe announces first hardware: Adobe Ink and Slide
- Vote now in the PC Pro Excellence Awards 2014!
- What’s new in OS X 10.10? Apple Yosemite’s new features
- Samsung Z Tizen phone helps loosen ties with Android
- Microsoft rumoured to launch smartwatch this summer
- LG G3 launched: LG takes the wraps off smartphone that offers “more with less effort”
- LG G3 launch live video stream and blog: as it happened
- Apple fixes iMessage lock-in for Android switchers
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- I went to Glastonbury and the only thing that got high was my smartphone
- Meet the robots helping teach children
- PaperLater: would you pay to print the internet?
- Amazon vs Kobo: how much to make the ebook switch?
- Phishing emails: how I nearly got caught out
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords