Boeing backs metadata for information security
- 16 April, 2013 14:39
Metadata – 'data about data' such as the non-image-related information stored when people snap a photo on a digital camera – should be used to label corporate information according to one US security specialist.
Speaking at The Open Group conference in Sydney, Boeing information security chief strategist Stephen Whitlock told delegates that if more digital data was labelled it would be easier to secure. “What we are talking about is a shift from discretionary access control system to mandatory access control. If you apply metadata to the data and have a set of policies, the system decides the access,” he said.
For example, if an aircraft designer was logged into a CAD system and working on a certain project, by default the system would be able to assign certain rights to that data.
Whitlock showed delegates the type of metadata stored by his camera. This included the owner’s name, the firmware used by the camera, and if the camera had been repaired.
“I like this example because when you press the shutter the camera did all this,” he said. “Most of the applications I use are much smarter than my camera.”
“The industry that has tonnes of money at stake in various verticals ought to care about corporate data as much as a picture someone snaps with an iPhone,” Whitlock said.
He added that data theft was “much easier” than physical crime because it was faster and left little to no trace.
“There is a lot less risk when you are stealing data, especially if you’re doing it over the Internet from one country to another,” he said.
Whitlock said he would like to industries invest in data labelling including rules and protocols.
“Data is now worth more than hardware and we have seen a big global rise in data theft. There needs to be more emphasis on data.”
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Evolving Threats Demand New Approaches to Security
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.
Whitepaper: Preventing Data Loss Takes More Than MDM
You need to secure your BYOD devices—but MDM alone isn't enough to prevent data loss. Read this whitepaper—Data Loss Prevention: When MDM Is Not Enough—to learn how to combat MDM shortcomings. See how to add cross-platform security, implement protection policies, and address risks in consumer apps.
Cloud-Based Mobile Device Security Streamlines Data Protection
Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions