Many people believeperhaps with good reasonsecurity is simply an inhibiting function, preventing our users from doing what they feel they need to. They say they want to do something; we tell them no.
Sure, we security folk know thats an unfair generalization, and the reality isnt all that bad, but at the very least its a common perception of what the IT security department does. We tell them no.
But thats not the way it should be. We can do better. Lets take a moment to learn something from software developers. They often make use of a simple process called use cases. We stand to learn something useful from the use case process.
First, lets consider an example of failure to consider use cases, although this failure has nothing to do with computers. While traveling on business last week in London, I experienced a mens room washbasin with two water spigots: a hot and a cold one. No big deal, right? Well, the two spigots dispensed their water separately, about 6 inches apart from each other. So, how does one wash his hands with warmnot hotwater?
Do you rapidly move your hands from the hot to the cold, in hopes that the average will somehow be to your liking? Do they expect us to fill the sink with some hot and some cold, and then wash our hands in the resulting pool of warm water? That must be what they intended, but what ends up happening is that you either wash with scalding hot, or with ice cold. Crazy, and all because no one considered the use case when designing the washbasin.
A more user-focused way of designing the wash basin would have been to consider how a user would want to wash his handsunder a single warm water flowand design a single spigot accordingly. Pretty straight forward stuff, right?
So wheres the security lesson?
Ive had two recent experiences that made me sit up and take notice of how the designers clearly got the use case and made a secure and user-friendly experience. The first was with my Apple iPod Touch, and the second was with my Apple Airport Extreme.
When I configured my Touch, it automatically looked at my email server settings and replicated them on the Touch. Not a huge accomplishment, you say?
Well, I use IMAP and SMTP, like many of us do, but on my server, I only allow SSL encrypted IMAP and SMTP traffic, and the SMTP service only accepts authenticated connections. With most email clients, if they support this configuration at all, it takes some custom configuring via an advanced button or some such.
But, much to my shock and awe, the Touch grabbed these configuration oddities and set things up exactly as I wanted them, without having to do a thing as the user. Voila my Touch email client was configured as securely as the email client on my Mac is.
First try. Amazing.
Next came the Airport Extreme. I was replacing an older Wi-Fi router that was clearly on its last legs. (It kept dropping connections and losing some of its configuration settings randomly, but was kind of sort of functional otherwise. Clearly on its death bed.) In the configuration wizard for the Airport, I was asked if I was replacing an existing router with the new one. Id never seen that question before, and I went ahead and selected yes.
One of the ways around the issues of security and control that make some businesses wary of cloud computing is to build a private cloud -- one that remains within the corporate firewall and is wholly controlled internally. Private clouds also increase the agility of IT an organization's IT infrastructure and make it easier to roll out new technology projects. Download this eBook to get the facts behind the private cloud and learn how your organization can get started.