Cover V03, I06
Article
Sidebar 1

nov94.tar


Computer Security Revisited: Physical Security

Neal S. Jamison

Every system administrator must contend with computer security. As computer systems become increasingly networked and internetworked, administrators must be constantly aware of the threat of someone attempting to break in or to corrupt data. Accordingly, almost every book or journal written about UNIX administration discusses some facet of security. However, there is a very dangerous omission in most of these: they ignore physical security.

Theft of computers and computer components has become a significant problem. Statistics compiled by the National Stolen Computer Registry show that theft in 1992 involved over 700,000 computers and totaled over $800 million in losses -- and these are only the cases that were reported. The registry also reports that individual components such as RAM, hard disks, and CPU chips are being lifted more frequently than entire PCs.

As client/server networks that utilize x86 personal computers are implemented and as UNIX migrates to the x86 desktop, traditional UNIX administrators find themselves responsible for more than just traditional UNIX machines. As users become more aware of their computing environment, and as computer platforms at work more closely resemble the home PC, computer theft will become more prevalent.

You can take several steps to minimize your risk as a system administrator, or to give yourself a better chance of recovering stolen equipment in the event that this does happen.

Securing Your Systems

1. Put the user in charge. When you place a system on a user's desk, tell the user that he/she is responsible for that system.

2. Inventory everything. You must know exactly what you have. Keep a database that records a description of every component in each computer. This should include serial numbers, manufacturer part numbers, estimated replacement value, etc. Every time a change is made to the system, make sure that this database gets updated. If something gets stolen, your chances of recovery are much greater if you can determine exactly what was stolen. Organizations such as the National Stolen Computer Registry can help recover stolen parts, but only if the component serial numbers are recorded. How many of us actually open each and every computer and record that information?

3. Re-inventory often. Inform users that there will be a periodic check of the equipment. This does not have to make users feel that they are not trusted -- it can also function as a monthly maintenance check.

A number of tools can help you manage a re-inventory. Certain network management tools will let you know if a system has been powered off, or even if the configuration has changed. A simple implementation of this is the UNIX command rup. rup polls all hosts on the local network, returning a value for that host similar to that of uptime. If you check this regularly, you can easily see if a computer has been recently taken down. If you find that this has occurred, check the system to ensure that there is not a problem.

4. Secure the computer and its components as much as possible. Many vendors now sell devices that not only tether equipment to the furniture, but can also prevent unwelcome entry to the computer. An investment of less than $100 per workstation is very small when compared to replacing costly components.

Many computer manufacturers are using computer cases that can be locked. If you have this capability, use it. Leaving the key in the lock on the user's desk will only provoke anyone who is tempted. Label these keys and keep them in a safe place.

Replace the screws in the computer case with special screws requiring an uncommon tool for removal. If a would-be thief cannot easily open a case without damaging it, he/she may be deterred. Most burglars want their action to go unnoticed.

If your cases cannot be locked, you can purchase special holographic "security" labels that, once removed, leave a residue and cannot be reused . Each of these labels has a serial number that can be tracked in the database mentioned above. Place one of these over a seam in the computer case. Once these labels are in place, the re-inventory mentioned above is reduced to simply "swapping howdys" with the user and glancing down to ensure that the numbered label is intact.

5. Limit access. Most offices keep valuable equipment behind locked doors to keep outsiders away. But some control must be exercised over employees also. Keep track of who has access to rooms where computer equipment is used or stored. Maintain a log of who is working after hours and on weekends. If a magnetic ID card lock is used and a theft takes place over a weekend, it is easy to find out who was in the office during the period in question.

Conclusion

While we all like to think that our users are honest, law-abiding citizens, the truth is that some of them are not. Computer theft recently hit close to home for me, when three PCs on a client/server network that I was responsible for were pilfered. Replacing the parts was almost as expensive as throwing out the remains and purchasing three new computers. Had I used some of the above practices, this theft could have been prevented.

When computers are pilfered, everyone pays. System administrators pay because of the unnecessary headache. The users pay because of the increased security hassles and possible downtime in their network. The organization as a whole pays, because replacing stolen components is not cheap, and often when a hard drive disappears, so may valuable or proprietary data. When theft takes place, everyone is a suspect. It is your job to minimize the risk and ensure that your computer environments remain intact.

About the Author

Neal S. Jamison is a consultant with Quality Consulting Services, Inc. of McLean, VA. He is currently on contract in Hawaii as the System Administrator/Engineer of a large UNIX-based document imaging system. He holds a B.S. in Computer Science from Virginia Polytechnic Institute and State University and is actively pursuing his M.S. in Information Systems from Hawaii Pacific University. He has been working with various UNIX systems for over 8 years.