While the information technology wave put India
on the global map after ‘Y2K,’ there were professionals finding their way well
before that into this nascent field, which was about to explode. Mrs. Bharani Rangabashyam describes her experiences and
insights into one of the most important aspects of this sector – security.
Bharani Rangabashyam (1986, ECE) |
Introduction
When we were in college, Information
Technology or Computer Engineering was not offered as a separate Undergraduate
Engineering major at PSG College of Technology. I distinctly remember
that the institution had just begun the Masters in Computer Applications
program at that time, which had a good reception with applicants from around
the country. In the undergraduate program, we had a few electives
related to Information Technology, which students majoring in other areas could
opt to take.
In the early nineties, Information
Technology began evolving in many sectors in India, prompting many of us to
switch over to it as a career. Of course post the so-called Y2K, the
participation of Indians in this sector was a tsunami. I was part of the early
wave of engineering graduates who began migrating to this field.
Many companies setup a separate
Management Information Systems (MIS) Department. Software training centers
mushroomed all over the country. The trend was to aggressively learn as many
Application Software offerings as one could in a short time, and apply for jobs
requiring those skills, preferably overseas.
The gold rush
begins
Cramming resumes with a long list of
Application Software names supposedly increased the confidence level in many
candidates. Even the so-called software body shops encouraged candidates to
match their resumes skill-by-skill to what was in the job requirement.
"So what if you don't know that exact skill? You know something similar
right? Just put it down in the resume and you can learn the exact matching
skill while on the job" was their rhetoric.
What many did not realize, then, was
that, it was not the number of Application Software types listed on the
resume that would give candidates the strength needed either to secure the job
or more importantly, do well once they start.
True value lies in understanding the
fundamentals of the 3S's of IT, namely:
• Software
Development Methodology (SDM)
• Source
control
• Security
These 3S's are platform and
domain-agnostic, and are continually evolving.
An Information Technology Company
whose primary business is software development may include the 3S's as
part of their training. But if we were to join the Information Technology
division of a company whose main business is in some other domain, then the
onus is on the applicant to know the significance of these fundamentals.
Hack attack
In 2001, I joined the Corporate
Information Technology division of a USA based off-price retail chain. It was
an $18 billion company then, with growing operations in the US, Canada, and
Europe.
But on the Information Technology
side, it left a lot to be desired. It took over 8 years, and a major hacking to
put controls in place. It is still a work-in-progress as the company heads
towards $40 billion in revenues.
Senior Management attitude before the
hacking was ‘we are not an Information Technology company, so it is not
mandatory for us to achieve any high SEICMM/ISO standards. We would invest just
enough in Information Technology to support our main focus, which is our retail
business.”
The hacking was a painful lesson for
the senior management in the company. After that episode, there was a
radical change in the company’s Information Technology policies.
A comparison of the Before-After
scenarios would bring out the significance of each of the 3S's, and how
these add value to the overall performance of the company.
Impact
of Software Development Methodology (SDM)
SDM is a framework for building and
managing Information systems from inception to installation. Common
methodologies include:
- Waterfall
- Iterative/Incremental
- Spiral
- Rapid Application Development
and
- Agile.
Traditionally, many Information
Technology companies used Waterfall to progress the Software sequentially
through its life cycle, namely, Initiation, Requirements, Plan/ Analyze,
Design, Build/Test, Quality Testing, UAT, Implementation and
Post-Implementation support.
More recently, the Iterative and Agile
methodologies are gaining prominence.
Our company had used Waterfall
methodology, but not in its entirety before the hacking.
There were no well-defined teams and roles.
Users would provide just the bare-bone requirements, which were often
ambiguous. They would keep changing it numerous times, even in the later stages
of the project, thereby leading to cost and time overruns.
Change Requests were not formalized.
As a result, there were disconnects between the requirements and the end
product. Information Technology managers would give into pressures from
the business, and try to cut corners. Code may go live without thorough testing
causing fatal defects/ failures in the Production environment.
Managing Source
Code Control
Version control of Software is very
vital. There was no designated Release management team before the
hacking. Some developers did their code changes in a shared drive. They even
managed to go-live with their code, bypassing Source control.
Some used Source control, but would
have the code checked out on their machines for a prolonged period of time.
Some left the company while code was still checked out on their machines. This
resulted in Code overlays or situations when only the executable existed, but
the Source code could not be found or had to be re-engineered.
Importance of
protecting Security
Although our company managed Key
Financial Applications in a more secure environment, still, as the importance
of security was not stressed long and hard enough, it left the company exposed
to vulnerabilities.
And we were not alone in being so
exposed. Below is a list of major hacking episodes worldwide in recent
times:
Heartland Payment
Systems
2008: 134 million credit cards exposed through SQL injection to install spyware
on Heartland's data systems.
TJX Companies Inc.2006: 94 million
credit cards were exposed.
Google/other
Silicon Valley companies: 2009, Stolen intellectual property
ESTSoft: 2011, the
personal information of 35 million South Koreans was exposed after hackers
breached the security of a popular software provider.
Target, Home Depot, Sony, 2014
And the list goes on.
Cost of a
data breach
- Studies have shown that the average cost of a data breach is around $7
million with average cost per compromised record more than $200.
The remedy
The after-scenarios in our company
showing improvements in all the 3S's I have described earlier.
· Firewalls
have been strengthened
· People
who exchanged Credentials met with severe penalties
· Credentials
were reset when job roles were changed, and removed when people left the
company
· Mandatory
Security training for all Information Technology associates conducted
periodically
· Bit-9
Parity checks to stop anyone from installing unauthorized software on their
machines.
· All
across IT, well-defined teams formed with clear roles and
responsibilities.
· RACI
matrix looked up to see who is Responsible, Accountable, Consulted
or Informed for a specific task.
· Release
Management team put in place checks and balances for any software that is
released to the live environment.
· Release
Management published the guidelines for parallel development, and branching and
merging code in central repositories.
· Estimation
is done at various stages of the project, and budget increases are strictly
scrutinized.
· Any
lapses in the process, escalated to senior management. Also publicized widely
to name and shame individuals who are repeat offenders.
· Projects
for total encryption/ masking of cardholder data undertaken.
For individuals the
future is..... a tad scary!
It is important to emphasize that this
sort of vulnerabilities are not just for companies but or individuals also.
Marc Goodman is the founder of the
Future Crimes Institute and a former INTERPOL and FBI agent. He lists a
litany of threats facing us. Here are some examples he shares of what has
already happened in terms of crimes:
Automated Teller Machine (ATM)
Thieves: Fake ATMs where installed at a shopping mall. When
shoppers used these ATMs, their card numbers and pin's were recorded.
They got an 'out of order' message on the ATM. The thieves then used
these numbers to withdraw cash elsewhere.
App
Thieves:
Recently there was a fake HSBC Bank app on Android. Similar to the above
example, people entered their data into it and were subsequently robbed.
Telephone
Network:
The Mexican drug cartel has its own installed telephone network and use auto
piloted vessels to transport drugs into the US
It is worthwhile noting, that while
individuals may not be able to take as stringent measures as companies can, it
is imperative that we take a commonsense set of precautions as well such as
being careful with passwords, protecting private information carefully and not
leaving private information lying around.
Summary
I have pursued a career in in
Information Technology and through its course recognized the importance of
sound security measures. In today’s global economy, individuals are
interconnected, companies are interconnected and economies too are
interconnected. This is bringing enormous innovation, scale and access
across the globe.
However, these very same advantages
are showcasing some vulnerabilities as well. As I have explained in my
own company’s example above, those businesses that do not have proper security
measures, that evolve with the times, leave themselves vulnerable to
attacks. Not only are companies vulnerable, so are individuals.
Within
the secure domain of companies, having a holistic perspective of the 3S’s
(Software Development Methodology, Source control and Security) along with
strong technical and domain knowledge is paramount. Such a focus for
those interested in Information Technology will pave the way for a sound career
in a vital and growing area for enterprises.
About the author:
Bharani Rangabashyam lives with her husband and
son in Leominster, Central Mass, USA.
She works in Corporate IT for a multinational Retail chain. At PSG
College of Technology, she was a day-scholar graduating in Electronics and
Communication Engineering.
No comments:
Post a Comment