Virtually exposed
Law firms can fall prey to computer-based crime, just like any other business. Anthony Yates looks at how the need for information to be accessible over networks can be reconciled with the need for protection
May 21, 2008 at 08:20 PM
7 minute read
A law firm is an attractive target for computer-based crime. It has lots of confidential information, lots of people with access to the core systems and lots to lose if the information is disclosed. Information needs to be protected, but it also needs to be accessible over networks. So how can you make sure you trust the user or the computer that is accessing it?
In the past, computer security was mainly about using good password practices, stopping viruses and blocking access at the firewall. But now computer crime is more purposeful, and the protection needs to be more sophisticated. If an Eastern European gang can fit a card reader into a cash machine without anyone noticing, just think what they might be able to do inside a law firm.
So the questions are: when a user account authenticates to a system, how can I know it really is the person it is supposed to be? And when I trust a computer, by storing information on it or by allowing it to connect to the network, how can I know it is the computer I think it is?
Typically, you start by having good password policies and tightly restricting administrator-level access. Obviously, no-one works as an administrator of their own computer. This is a good deterrent for opportunistic attack, but not for purposeful crime. There are a number of ways in which good policies can be subverted. Bear in mind that a password only has to leak once, and if that is not detected it can be used maliciously for a long time.
A keylogger records keystrokes on the computer and so can be used to capture logon details. A hardware keylogger requires no rights to install. It can be hidden inside the keyboard. If you think how easy it is for equipment to be stolen from offices, you can see how easy it is for equipment to be subverted instead.
Normally you will have different levels of administrative access, but a junior IT support person can escalate their rights in several ways. The simplest would be to install software on a workstation and to wait for a more senior administrator to log on to it. With the captured logon details he can log on to a server and repeat the escalation up to enterprise administrator.
Passwords can also just 'leak'. The domain administrator password might be fiendishly difficult, but a password for another administrator account might be commonly known. The end result is that when a password is supplied for access to a service, you cannot assume the user is who they claim to be.
It has come to the point when two-factor authentication should be required for any administrator account and for any account with access to highly confidential information. It is routinely used for banking transactions and for remote access, so it is not a strange idea. Two-factor authentication inside the organisation is now much easier to do than previously and is almost as easy as password authentication.
The most familiar form of two-factor authentication is the one-time password (OTP), used for example by RSA SecurID. A hardware device generates a unique number that, when combined with a password, authenticates the user. Many services such as SAP and Citrix support it. However, to use it to protect the logon on computers within the office requires changing the authentication mechanism in Windows, which is a big step. It can also be quite expensive for widespread use.
The other main form of two-factor authentication is the 'smart card'. This is the same as the bank card chip and PIN. The chip is a secure microprocessor which holds a digital certificate. Entering the PIN number releases the public key of the certificate, and so authenticates the user.
Unlike OTP, it is now comparatively easy and inexpensive to implement smart card authentication for Windows. Windows Vista and Server 2008 support smart card authentication built-in. In Active Directory Group Policy you can specify that a user account requires a smart card for interactive logon, or you can specify that a server requires smart card authentication. The user certificate is stored in Active Directory as part of the account properties. You can use the built-in Windows Certificate Authority to generate certificates, or you can use a third-party certificate authority.
It used to be that you needed to have a smart card reader with accompanying driver, but smart card devices from companies such as Gemalto now come in a USB format and the driver is built in to Vista. So you simply plug in the USB stick, enter a PIN and you are authenticated. Many non-IT professionals will find this easier than remembering complex and expiring passwords. I would certainly offer it as an alternative to those who dislike passwords.
Once you adopt smart card authentication, there are some interesting avenues for it. You can use the smart card to store certificates from a public certificate authority, for example VeriSign, and this enables you to authenticate uniquely outside the organisation as well as inside. You can combine the smart card with storage on the same USB drive and use it to encrypt the data on the drive. You can give a smart card to your clients so they can authenticate securely to your extranet and access client confidential information.
You can even combine the smart card with building access systems. Gemalto smart cards, for example, can be integrated with the Mifare chip, which is commonly used for swipe cards and is used in the London Oyster card.
But what about trusting the computer? Why do you need to do that?
The information on a computer is protected by a logon but it can be accessed directly from the disk simply by booting with a different operating system. There is no need to steal the computer. Just boot a computer from a USB drive and read or write what you want. You could drop a batch file into the startup folder of an administrator account so it runs silently when they log on. This applies to a laptop left in a meeting room, a desktop at night, or a server in a remote office.
To protect the whole disk, you need something outside the disk. The trusted platform module (TPM) is the answer. A TPM chip is effectively a smart card on the motherboard of the computer. TPM began life as a means primarily to protect digital assets against piracy, but has a number of other useful security functions.
You can use it to: prevent tampering because the state of the computer can be stored in the TPM chip and checked when the computer starts; secure encryption keys, so that information is only unlocked if the TPM allows it; and allow or disallow a computer to connect to the network (or connect remotely over VPN, for example).
Windows Vista and Server 2008 use the TPM chip to provide the security for BitLocker whole disk encryption. You do not even need to supply a password. As long as the boot sequence of the computer is unchanged, the disk can be unlocked. Then, once the system has started, you can authenticate the user with a smart card. Active Directory provides the infrastructure for key recovery and both TPM and BitLocker can be managed through Group Policy.
There are a few general points about these technologies. They require an infrastructure to manage them, so you need to plan carefully how you are going to use them and for the impact they will have. They are not expensive to implement. In my view they are not inconvenient and may even be more convenient than they are currently. But, if there is a culture in the firm of being not entirely welcoming to new IT security measures, IT people may be reluctant to recommend them. The question the managing partner or IT director needs to ask is: 'Is it safe?'.
Anthony Yates is a director of Airdesk UK.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'Almost Impossible'?: Squire Challenge to Sanctions Spotlights Difficulty of Getting Off Administration's List
4 minute read'Never Been More Dynamic': US Law Firm Leaders Reflect on 2024 and Expectations Next Year
7 minute readTrending Stories
- 1Call for Nominations: Elite Trial Lawyers 2025
- 2Senate Judiciary Dems Release Report on Supreme Court Ethics
- 3Senate Confirms Last 2 of Biden's California Judicial Nominees
- 4Morrison & Foerster Doles Out Year-End and Special Bonuses, Raises Base Compensation for Associates
- 5Tom Girardi to Surrender to Federal Authorities on Jan. 7
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250