how secure is it?

T H E
M A G A Z I N E
F O R
T H E
I T
P R O F E S S I O N A L
SPRING 2015
DATA
WHERE IS IT?
HOW SECURE IS IT?
WHO CAN ACCESS IT?
bcs.org/itnow
DATA
DATA
08 DATA RETENTION WRANGLING
10 DATA COLLECTION DANGERS
14 RISK ASSESSMENT
16 DUDE, WHERE’S MY DATA?
18 CLOUD REGULATION
LEARNING AND DEVELOPMENT
42 DEVELOPING AND MENTORING
44 TECH MEETS TRADITION
Image: iStockphoto/173390168
HEALTH
46 INTRODUCTION TO BCS HEALTH
47 EMAIL ARCHIVING AND HEALTH
EDITORIAL TEAM
Henry Tucker Editor-in-Chief
Justin Richards Multimedia Editor
Grant Powell Assistant Editor
Brian Runciman Head of Editorial
PRODUCTION
Florence Leroy Production Manager
Advertising
Daniel Lindsey
E [email protected]
T +44 (0) 20 7978 2544
Keep in touch
Contributions are welcome
for consideration.
Please email: [email protected]
ITNOW is the membership magazine of
BCS, The Chartered Institute for IT.
It is sent to a wide variety of IT
professionals, from systems developers
to directors, consultants to training and
education specialists. A subscription to
ITNOW comprises four issues.
All prices include postage. For subscribers
outside the UK, delivery is by Standard Air.
Annual subscription rates
Institutional: print edition and site-wide
online access: £208/US$394/€311;
print edition only: £191/US$362/€286;
site-wide online access only: £166/
US$315/€249.
Personal: print edition and individual
online access: £191/US$362/€286.
ITNOW, ISSN 1746-5702, is published
quarterly (March, June, September,
December) by BCS, The Chartered Institute
for IT, North Star House, Swindon, UK.
The US annual subscription price is $394.
Airfreight and mailing in the USA by agent
named Air Business Ltd, c/o Worldnet
Shipping Inc., 156-15, 146th Avenue, 2nd
Floor, Jamaica, NY 11434, USA.
Periodicals postage paid at Jamaica NY
11431.
US Postmaster: Send address changes
to ITNOW, Air Business Ltd, c/o Worldnet
Shipping Inc., 156-15, 146th Avenue, 2nd
Floor, Jamaica, NY 11434, USA.
Subscription records are maintained at
BCS, The Chartered Institute for IT, North
Star House, North Star Avenue, Swindon,
SN2 1FA UK.
SECURITY
24 SCoE UPDATE
26 SECURE DEVELOPMENT
28 PAYING THE PRICE
30 PERSISTENT THREATS
32 MAINTAIN INTEGRITY
34 HOW SECURE IS SECURE?
36 SOMEONE IS WATCHING YOU
38 SECURING TRANSACTIONS
40 SECURITY BALANCING ACT
...THE REST
48 MANIFESTOS
56 CES: DRIVE-BY COMPUTING
58 DIGITAL LEADERS SURVEY
60 BUSINESS INTELLIGENCE
For payment details and terms and
conditions, please see:
www.oxfordjournals.org/our_journals/
combul/access_purchases /price_list.htm
The current year and two previous
years’ issues are available from Oxford
University Press. Previous volumes can
be obtained from the Periodicals Service
Company, 11 Main Street, Germantown,
NY 12526, USA.
E [email protected]
T +1 518 537 4700, F +1 518 537 5899
For further information, please contact:
Journals Customer Service Department,
Oxford University Press, Great Clarendon
Street, Oxford OX2 6DP, UK.
E [email protected]
T (and answerphone) +44 (0)1865 353 907
F +44 (0)1865 353 485
The opinions expressed herein are
not necessarily those of BCS or the
organisations employing the authors.
© 2015 The British Computer Society.
Registered Charity No 292786.
Copying: Permission to copy for educational
purposes only without fee all or part of
this material is granted provided that the
copies are not made or distributed for direct
commercial advantage; BCS copyright notice
and the title of the publication and its date
appear; and notice is given that copying is by
permission of BCS.
To copy otherwise, or to republish,
requires specific permission from the
publications manager at the address
below and may require a fee.
Printed by Rotolito Lombarda, S.p.A
Italy.
ISSN 1746-5702. Volume 57, Part 1.
BCS The Chartered Institute for IT
First Floor, Block D, North Star House,
North Star Avenue, Swindon, SN2 1FA, UK.
T +44 (0)1793 417 424
F +44 (0)1793 417 444
www.bcs.org/contact
Incorporated by Royal Charter 1984.
Liz Bacon BCS President
Paul Fletcher CEO
Feedback
email: [email protected]
MEMBER NEWS
MEMBER NEWS
ORGANISATIONAL
MEMBERSHIP
BAREFOOT COMPUTING PROJECT
doi:10.1093/itnow/bwv001 ©2015 The British Computer Society
BT has agreed to support the project from
March until the end of this school year.
The project was originally funded by the
Department for Education from September
2014 to March 2015.
Led by the Institute in partnership with
BT, and initially funded by the Department
for Education, the Barefoot project supports
primary school teachers to teach the new
computing curriculum, which became
compulsory in schools throughout England
in September 2014.
The scheme provides cross-curricular
computer science resources and training
for primary school teachers with no
previous computer science knowledge.
The initiative is being supported through
a programme of free in-school computing
workshops for primary school teachers
across England.
Pat Hughes, Project Leader for Barefoot
Computing said: ‘The announcement that
BT is providing funding to extend the
Barefoot project is great news. The scheme
has proved to be popular so far.
‘As well as training thousands of
teachers there have been 6,000
registrations to the Barefoot website
with 2,500 new teacher registrations
in the last two months. Barefoot helps
04
ITNOW March 2015
teachers understand ideas and concepts
such as algorithms, abstraction and data
structures, how they occur naturally in
many other disciplines that they also teach,
and how they can teach them to children
starting from age five.’
School Reform Minister, Nick Gibb said:
‘I am delighted that BT is extending the
successful Barefoot project, providing
innovative support for primary teachers
on the new computing curriculum. This is
an excellent example of industry working
together with schools to support teachers
- ensuring pupils leave school prepared for
life in modern Britain.’
Clive Selley, CEO of BT Technology,
Services and Operations said: ‘Computing is
a very important skill for BT and through our
engagement with schools we’ve seen that
children really enjoy it and that it can have a
profound impact on other STEM subjects.
‘We’re proud to be partnering with
Barefoot Computing and that the
workshops BT, and other volunteers across
England, have been involved have been
such a success; it’s great to hear from
teachers that the programme has boosted
their confidence.
‘The programme was due to end in
March, but given its popularity to date, BT
is pleased to announce it will be working
with BCS and Computing At School (CAS) to
ensure that it continues to run through the
summer term.’
The Barefoot training workshops are
run by volunteer professionals from the IT/
computing and education sectors. These
events introduce the new computing
curriculum to teachers and explain the
support available to them through Barefoot
and other related projects.
Pat Hughes continued: ‘This programme
of events will help equip teachers with the
skills and knowledge needed to incorporate
the computer science elements of the new
computing curriculum into their lessons.
By providing high quality cross-curricular
computer science resources for primary
school teachers, supported by explanations
of the key computing concepts, we are
providing support for teachers who may
have little previous knowledge of computer
science. A lot of teachers are already
introducing many of these concepts in
to their classrooms without realising it
and we want them to see that it’s not as
complicated as they may think.’
For more information about Barefoot
Computing visit: http://barefootcas.org.uk
WELCOME REVIEW
Image: iStock/158354481
Image: iStock/178471354
With almost 3,000 teachers from over 800 different schools in England having received training via the
Barefoot Computing Project since its launch last summer, BCS, The Chartered Institute for IT is pleased to
announce that the scheme is to be extended.
BCS, The Chartered Institute for IT, welcomes the review of the
accreditation of computer science courses in UK universities announced by
the Department of Business, Innovation and Skills.
Paul Fletcher, Group CEO of the Institute
said: ‘It’s very important that university
accreditation should undergo regular
reviews to ensure that courses offer
students the best opportunities. We are
pleased that computer science is the first
course to be reviewed as this reflects the
importance of this discipline today and in
the future.
‘As an accreditation body, we welcome
this focus; however, we want to ensure
that the review considers all factors.
Employability is critical as one of several
measures that need to be taken into
account; the ability for universities to drive
social mobility by helping students from
under privileged backgrounds is also
important.
‘We will be working with Tech
Partnership, employers and universities
to discuss these issues and how we can
help ensure students have access to an
education that provides them with the
skills for a career both at the end of their
course and a professional career over the
long-term.
‘For computer science courses specifically,
this means that we champion the teaching
of the principles that underpin computer
science rather than specific technologies.
This together with the skills to understand
how these principles can be applied in the
world of business is key to helping students
develop a successful career.’
BCS, The Chartered Institute for IT,
accredits computing courses in 80 per
cent of UK universities.
Goldsmiths, University of London has
joined the Organisational Membership
scheme offered by BCS, The
Chartered Institute for IT.
Goldsmiths is the first university to
join the scheme, which has attracted
many commercial organisations
including; Waitrose, the Post Office, Glue
Reply and London Metal Exchange.
David Evans, BCS Director of
Membership explained: ‘We’re delighted
to have Goldsmiths, University of
London, join our Organisational
Membership scheme. The university
sets very high standards and has a
vision which its IT team is instrumental
in helping to achieve.’
Goldsmiths’ IT department will now
be able to apply for BCS professional
membership and access the associated
benefits under the scheme which offers
a way for companies to increase their
return on IT investment and raise the
profile of their IT teams.
In addition, by encouraging
employees to join membership by
covering the cost, employers are able
to ensure that their IT practitioners
are professional and have access to
career development tools, industry
standards, best practice information
and qualifications.
Daniel Rubie, Head of Infrastructure
at Goldsmiths said: ‘Organisational
Membership is an investment in our
people. We have a team of professionals
who will help us turn our vision into
reality. By being part of this we will
be able to adopt the best practice
standards that are recognised across
the globe.’
He added: ‘The scheme will also
help individuals map out their career
paths and identify how they fit with the
industry standard Skills Framework
for the Information Age (SFIA). By
doing this, they will be able to identify
what they want to achieve in their own
careers and how they can achieve it.’
http://teamtalk.bcs.org
March 2015 ITNOW
05
INTERVIEW
ALCHEMY
BRINGING MEMBERS
VOLUNTEERS AND
STAFF TOGETHER
Paul Fletcher FBCS, Group Chief Executive, BCS, The Chartered
Institute for IT, joined the Institute in September 2014.
He spoke to Brian Runciman MBCS about his background, his initial
impressions of the organisation and more.
Tell us a bit about your background.
I’ve spent the last ten years at RM
Education where I was Group Managing
Director, Education Technology. My time
there was about getting tech into schools
and universities in the UK and solving the
problems that arise where education and
technology meet.
Before that I spent some time in
consultancy, which followed on from seven
years in the aerospace industry. Those are
members and staff work together - I think
it can create real alchemy. For example,
we have had a significant impact recently
with our work on the new curriculum and
as our charter says, we need to impact the
public - so that is a huge achievement.
Also, the BCS’s networks are strong.
The regional branches and specialist
groups provide a lot of benefits – they are
a real strength and an ingredient of that
unrivalled market position. As I have gone
‘We have an unrivalled market position and a
mandate created through legacy and the charter.’
the first three chapters of my working life I view BCS as the fourth.
doi:10.1093/itnow/bwv002 ©2015 The British Computer Society
What attracted you to BCS?
It felt like a natural progression for me; the
right time to move on to keep things fresh.
There is a big crossover with RM, with both the
education and technology focus, and I
genuinely think I have something to offer.
I also liked the opportunity to work in a notfor-profit organisation, a sector I had not
been in before. The laudable purpose of the
Institute was relevant in my decision-making
so, although like everyone I need to make a
living, I like the idea of an organisation whose
purpose and aims I share.
What does BCS do well at the moment?
We have an unrivalled market position and
a mandate created through legacy and the
charter to allow us to do good things. When
we get things right - when volunteers,
06
ITNOW March 2015
to various Institute meetings I have found
that the amount of effort people put in is
humbling – I’ve been really impressed that
our BCS people are so interested in giving
back to their profession that they give their
time for free.
What should the organisation be doing
more of, or better, than what you’ve seen
so far?
We pursue too many projects and
initiatives, so that means we lack some
focus. When you look at what we do and its
alignment with our organisation’s purpose,
the connection is sometimes tenuous. This
means we are spread a bit thinly and that,
in turn, reduces our impact.
Likewise, we need a stronger voice
on the big technology issues that are
impacting society. We need to have
an opinion, and that could even be
controversial if needs be. For example, the
tension between the safety of the UK in the
context of the terrorism threat and people’s
understandable concerns about privacy
– this is something on which we should
facilitate debate.
Is the broadness of the royal charter a
problem?
I don’t think so, it is in old English but the
fundamental principles still hold true.
What is the executive team’s vision for
near future?
When I came in I first wanted to work with
the team to deliver services for the
members this year and hit current targets.
Last year’s small financial surplus was
good, after all we need the commercial
activities to be successful to allow us to
invest. And that investment is not only in
systems for members and products, but so
we can fulfil our mandate to society. Some
of our intellectual property is now getting a
little old – so that needs work as well.
And the longer term?
It is time to refresh the BCS’s vision and
strategy. The executive team, alongside the
boards and council, have been working on
this and we have a revised purpose and
new strategic pillars to inform the vision.
We will be saying more about that in the
near future.
real and more basic difference in industrial
applications. Also, the way our children
learn is fundamentally changing – AI, if
used properly, can be used to assist in this.
‘We need to have an opinion and that could even be
controversial if needs be.’
The more of relevance we have to say,
the more we can feedback into useful
products, and the more we network the
better what we have to say is. It goes round
in an ever-improving loop. There is plenty
for us to talk about. People are concerned
about IT; it’s so prevalent in society.
People want to keep their kids safe, they
are concerned about privacy, the legal and
regulatory areas have a lot of challenges
ahead, some are worried about unchecked
AI research.
And this goes way beyond technology to
societal impact, ethics and our way of life
in general.
What upcoming tech excites you most?
Technology that continues to drive
efficiency. For example the internet of
things can distract you with its consumer
applications, but actually it can make a
Traditional classrooms will die - the
potential and the challenges are exciting.
What worries you most?
I do wonder where it will end. What will we
spend our time doing? What will we do to
earn a living?
It’s interesting that these questions
have particular relevance for the UK. For
example the automation of things like
banking and retail.
In the UK we were a manufacturing
nation, then we developed into a finance
and service-based economy – but those are
some of the main things that automation is
enhancing – so how does that impact our
workforce? An interesting question.
www.bcs.org
QUICK QUESTIONS
What tech couldn’t you live without?
My iPhone and iPad.
What gadget would you want if you
could have anything?
I hate traffic – I’d pay money to have
a proper real-time application that
reroutes traffic and keeps it flowing.
Mac or PC?
PC, but, as above, Apple devices. iOS for
mobile and a Windows desktop.
Killer app?
For me it’s about connectivity, email,
Facetime, texting. As I travel a lot I want
to stay connected.
Netflix or Amazon Prime?
Both. Terrestrial TV is dying. No-one
wants to sit through adverts, they just
want good programmes when they want
them. At the moment I am watching
Prison Break.
Favourite blog?
I like the Ted Talks. For a daily read I turn
to Tech Market View. Then I cherry-pick
anything related to tech and education,
apprenticeships, digital skills and so on.
Personal philosophy?
It’s about authenticity – you need to
understand who you are, your strengths
and weaknesses – and be yourself. Tell
people what you think.
March 2015 ITNOW
07
DATA
DATA
RETENTION
WRANGLES
Charlotte Walker-Osborn, Partner
and Head of Eversheds’ Tech,
Media and Telecoms Sector, talks
about a couple of hot topics relating to security in tech and media.
A new Counter-Terrorism and Security Bill
(the bill) was introduced to the House of
Commons on 26 November 2014 that will,
among other things, allow the government
to require communications providers to
retain data necessary to attribute an IP
address to an individual.
doi:10.1093/itnow/bwv003 ©2015 The British Computer Society
What?
Earlier in 2014, the European Union’s Data
Retention Directive was found to be
invalid. The government passed a new Data
Retention and Investigatory Powers Act 2014
(DRIPA) in order to replace the Data Retention
Regulations 2009 (2009 Regulations), which
had implemented the EU Directive and was at
risk of being found invalid.
DRIPA contained various amendments
to the Regulation of Investigatory Powers
Act 2000 and set out a new regime for the
retention of communications data.
Among other things, DRIPA amended
the definition of telecommunications
service to cover services that
consist of, or include, facilitating the
creation, management or storage of
communications, catching over-the-top
players, internet mail providers and social
media businesses who may not have been
required to retain communications data
under the 2009 Regulations.
The bill makes certain amendments
08
ITNOW March 2015
to the provisions of DRIPA including
the definition of ‘communications data’.
Providers may now be required to retain
internet data that relates to internet access
services or internet communications
services and may be used to identify or
assist in identifying which IP address or
other identifier belongs to the sender or
recipient of a communication (whether or
not a person).
The effect is that providers that
are potentially required to retain
communications data may now need to
attribute IP addresses to individuals or
devices or retain information to assist law
enforcement authorities to identify the users
of certain telecommunications services.
So what?
In some ways, the new requirements
do not go much further than the existing
requirements of DRIPA. For example,
internet access providers could already be
required to retain IP address details.
However, providers may be under a
higher obligation to retain such data and,
unlike in the 2009 Regulations, there is no
defence for a provider in the event that
another organisation is already retaining
the relevant data.
The requirement for data to be collected
and retained to attribute IP addresses
and other internet identifiers to recipients
and senders may well be controversial
given that providers need to comply with
the data protection laws and regulations
with respect to the communications data
that they retain. Much will depend on
how draconian the government will be in
issuing data retention notices under the
amended DRIPA.
While DRIPA, and previous bills
proposed by the government on the
subject of data retention (including the
Communications Data Bill from 2012),
have been the subject of great debate, the
new focus of the new bill has been on the
wide-ranging powers that the government
has requested including the power to
place universities under a statutory duty
to prevent people from being drawn into
terrorism. Line by line examination of
the bill took place during the final day of
committee stage on 28 January 2015.
Amendments discussed covered clauses
21, 22, 24, 25, 28, 30, 32, 34, 36 and 42 of
the bill. At time of writing, the report stage
– further line-by-line examination of the
bill - was scheduled for 2 February 2015.
Whatever form the bill finally takes,
there is little doubt that the government
will continue to push its agenda for greater
powers in relation to communications data.
Recent studies on cloud computing
suggest that security concerns are still
hampering the adoption of cloud
computing. BT, Fujitsu and Netspoke
recently commissioned studies which,
predictably, revealed that confidence in the
security of the cloud is at an all-time low.
Despite the predictable results, these
studies will provide cloud computing
services providers with insightful prospective
customer feedback.
In September, BT published the results
of a study it commissioned that explored
the attitudes to, and use of, cloud-based
services of IT decision makers from
enterprise organisations in 11 countries.
BT reported that three quarters of those
surveyed (76%) cited security as their main
concern about using cloud-based services.
Despite security being a major concern,
surprisingly, 50% of those surveyed
admitted to adopting mass market,
consumer cloud services, rather than those
designed specifically for the enterprise.
Fujitsu’s study reported similar findings.
The study, ‘Two Years On: The Financial
Services Landscape: Is your organisation
super-powered?’, follows up on a 2012 study.
176 IT decision makers were surveyed at a
range of financial sector firms.
The study found that, two years on from
the last survey, less than a quarter of financial
sector firms have implemented cloud
computing and, of those who neither use cloud
at present nor are planning to in the future,
nearly half (42%) said that they believe that it
opens up too many security threats.
The Netspoke commissioned study,
Cloud Multiplier Effect in European
Countries, reported similar findings to
those of the BT and Fujitsu studies.
Just over half of the respondents did
not agree that their organisation’s cloud
service use enabled security technologies
to protect and secure sensitive and
confidential information and 72 per cent
said these cloud service providers are not
in full compliance with privacy and data
protection regulations and laws.
As expected, and in line with concerns
over security, the studies suggest that it
tends to be non-sensitive data and nonbusiness critical processes and data that
are being hosted in the cloud.
For example, Netspoke found that, on
average, only 23 per cent of a business’s
critical applications are in the cloud and
only 10 per cent of sensitive or confidential
information is stored in the cloud. Whilst
Fujitsu found that around three quarters
of those using cloud do so for internal
operations.
So what?
For those parties who supply cloud solutions,
the results of the surveys provide insightful
prospective customer feedback which can
be used to tackle certain barriers to the
adoption of cloud computing, including
security.
For those procuring or considering
procuring cloud, it will be interesting to
see how suppliers deal with the continuing
concerns around security and data. This is
an area I will be taking an in-depth look at
in a future briefing this year.
To help enterprises better understand
the cloud, the International Organisation
of Standardisation (ISO) has recently
released two international standards
on cloud computing, ISO/IEC 17788 and
ISO/IEC 17789. ISO/IEC 17788, Cloud
computing – Overview1 and vocabulary,
provides definitions of common cloud
computing terms, including those for cloud
service categories such as software-asa-service (SaaS), platform-as-a-service
(PaaS) and infrastructure-as-a-service
(IaaS). It also specifies the terminology for
cloud deployment models such as public
and private cloud. ISO/IEC 17789, Cloud
computing – Reference architecture2,
contains diagrams and descriptions of how
the various aspects of cloud computing
relate to one another.
Whilst many reading this article will
find the standards potentially quite
basic for them, these standards will
be significant in helping a number of
organisations’ understanding of the cloud
and are expected to pave the way for more
technical standards dealing with issues
such as security.
www.bcs.org/security
References
1. www.iso.org/iso/home/store/
catalogue_tc/catalogue_detail.
htm?csnumber=60544
2. www.iso.org/iso/home/store/
catalogue_tc/catalogue_detail.
htm?csnumber=60545
March 2015 ITNOW
09
DATA
doi:10.1093/itnow/bwv004 ©2015 The British Computer Society
Image: iStock/496034653
DATA
COLLECTION
DANGERS
Andy Smith from the BCS Security Community of Expertise examines the security risks of data
aggregation and mining.
10
ITNOW March 2015
The BCS Security Community of Expertise
and more specifically the Identity
Assurance Working Group have been
looking at various subjects related to
online security.
One of the issues that is becoming
much more serious is the ability for
organisations, including sales and
marketing departments, advertising
companies and serious organised crime,
to use data aggregation and data mining to
their advantage and to target individuals.
Aggregation is the collecting together
of individual items of data or databases to
form large sets of data, for example, bring
together social media accounts, internet
searches, shopping preferences and email
for millions of people.
Data mining is taking a large data set
and using tools to search for particular
words or phrases, then narrowing the
search with combined search terms to find
individual records of interest. For example,
searching the vehicle database for a car
registration number for a car in long-term
parking at Heathrow and using the name
results to search for travel details, electors
and school databases for other people
living at the address.
Targeted online marketing can be
aggressive and unwanted. We are all
victims of spam, ad-ware and other
unwelcome methods of trying to separate
us from our money. However, most online
marketing is actually good and welcome.
Targeted marketing can be very
useful, but to achieve this, the advertising
organisations need to track and hold a
significant amount of information about a
person.
Some of this can be personal such as
age and where you live. When they are
tracking spending profiles and the types
of products people buy this can become
very sensitive. Basically they are gathering
(aggregating) huge amounts of information
and then mining thisfor marketing purposes.
However, there are laws to protect the
public from aggressive marketing, invasion
of privacy and to ensure data protection.
This is especially true in Europe, including
the UK. These laws cover the type of
data that is held and ensure it is properly
protected, and to a certain extent, not
misused. But this only applies to reputable
companies and those in jurisdictions
covered by such laws.
Applying the same capability to
organised crime and you have a wholly
different and much more serious problem.
Between the law-abiding professional
organisations that provide useful
advertising services on the internet and
organised crime there is a spectrum
of organisations ranging from slightly
aggressive targeted marketing to malicious
code authors that install ad-ware on your
machine to replace official adverts with
nefarious ones.
This is one major area of data mining
and the one most people think of, but it is
not the only one. Organised crime, terrorist
organisations, investigative journalists
and private investigators can all use data
sources on the internet and data mining
tools to find and target people.
It is amazing what is now achievable
from knowing small snippets of
information and using these as keys in
different databases, which give further
bits of information, which in turn can be
used as search keys in other databases.
Given large aggregated data sets and the
right search terms, it’s possible to find a
lot of information about people including
information that could otherwise be
confidential, for example, that someone is
having an affair.
In democratic societies with good
governance and oversight, it is not
unreasonable for law enforcement to use
large government databases to track and
find criminals. Knowing a car was used in
a crime, finding the owner and tracking the
driver at the time is something expected
in the UK. However, in oppressive regimes
this can now be used for suppressing
human rights, such as finding a posting on
a news group that goes against the regime
and using the IP address to find the service
provider, then the credit card details to find
the poster, even though they thought their
posting was anonymous. It’s easy to find
people, even if you have a pay-as-you-go
tablet, it really depends on whether it is
worth the time and effort, which in most
cases it is not.
Take, for example, a hacker managing
to get in to loyalty scheme databases. It
would be easy to mine the data and identify
alcoholics, newly pregnant women etc. This
is why certain large supermarket chains
put huge amounts of effort into protecting
their databases. The security controls do
not just stop unauthorised access, they
stop authorised staff doing unauthorised
things. The security controls on some of
these databases are better than those on
military databases.
The trouble is that not all organisations
do such a good job of protecting their
data. Worse still, individuals are very bad
at protecting their own information. One
aspect of preventing data mining is helping
the naïve protect themselves online, for
example, parents protecting their children,
as the children do not understand the
implications of giving out sensitive personal
information.
So what can organisations do? The first
thing is to recognise where information is
being aggregated. This can apply to one
database or dataset, but it is also important
to look at that dataset in the context of
related datasets. By itself, a database of
customer details in a CRM system may
not seem that sensitive, but when related
to other databases it may be possible to
extrapolate additional information such as
someone with an addiction.
Having decided that a dataset
aggregates to something more sensitive
than the sum of the individual entries,
additional controls need to be added to
address the aggregation. Information may
be classed as personal if its one entry or
one million. But losing a copy of one entry
should have a much lower impact than
losing a copy of a million entries, especially
if it includes credit card information or
March 2015 ITNOW
11
12
ITNOW March 2015
permit multiple records to be returned?
It could also prevent wildcard searches
on the database or limit the search keys.
Banks do this very well. When a person
contacts the bank via a call centre, the
advisor will look up the record for the
person based on, for example, postcode
and surname. They will then be prompted
for information that only the caller would
know. Without this the record cannot be
seen.
The other control is to prevent bulk
extraction. A database may only be searched
for single records as part of a normal
business process. Again a firewall in front
of the database could prevent file transfer
or extracts of the database being taken.
Specific controls that prevent extraction of
data and data mining is the best method for
ensuring malicious code, hackers and staff
cannot take copies of the dataset or perform
searches on inappropriate search terms
including wildcards.
The last aspect is people who do not
realise they are sharing their lives, not
just with friends and family, but also with
anyone that has a good search engine,
from marketers to organised crime. This
is especially true when some social media
sites change their terms and conditions
and open up privacy settings.
I no longer have accounts on certain
social media sites, as they now ‘own
all photographs posted on xxxx’. They
also twice removed the privacy settings
so that my information was exposed
until I added the privacy controls again.
Millions of people still do not realise that
their information is public. Even simple
things like putting too much detail in a CV
uploaded to job sites can be a bad thing. It
does not take much for a criminal to open
an account as a potential employer and
browse CVs, which can include full names,
address, contact details and so on.
It is vital that people think about
what information they are putting on
the internet and why. A short CV with
an email address and note that a full
version is available on request is all that is
needed on job sites. Searching for medical
websites and certain information should
be done with caution, including ensuring
the browser is set to do not track. I would
suggest using a different web browser type
for sensitive sites, one that does not share
cookies or cache with your main browser.
If you look after the computers for
children and family members that may
be adults, but new to the internet, its best
to ensure that their computer has a full
internet security package, which includes
parental controls. Configure this for them
to prevent personal information being
exposed and prevent access to blacklisted
websites. Though this will not solve every
issue it will certainly help.
As storage gets cheaper, processing
power increases exponentially and the
internet becomes more pervasive in
everyone’s lives, the data mining issue
will just get worse. Criminals are going
to follow the money online. They are
going to target people for identity theft,
blackmail and worse. Private investigators
and investigative journalists are going to
use those massive data sources to their
benefit and marketing will become even
more accurate and targeted.
However, this does not have to be as
bad as it sounds; fear, uncertainty and
doubt can be just as bad, as they prevent
people making full use of the advantages
offered by the internet. If you protect your
personal data, as you would in the real
world, and minimise where your personal
data is exposed and stored on third party
databases, you can enjoy the internet with
minimal risk.
THERE ARE MORE
ATTACKERS THAN
DEFENDERS
Manage the threat.
Our information security portfolio
delivers the knowledge and capabilities
you need to keep your information safe.
bcs.org/infosecurity
BCS is sponsoring the Cyber Security Show,
13-14 April 2015, etc.venues 155 Bishopsgate, London.
15% discount for BCS members with code DFHM
terrapinn.com/cybersecurity
BC1062/LD/AD/0115
other sensitive data. Even wfrom a basic
business impact perspective, having to
send a letter to one customer to say their
credit card has been compromised may
cost £1; letters to a million customers on
the other hand...
The key controls are already there, but
they should be enhanced for aggregated
data. Access control should ensure only
authorised people have access to the data,
but do staff need access to all the data to
do their job or just some of it? If they only
need regional data, or access to single
entries at a time, then the authorisation
should be configured to enforce this policy.
More importantly the accounting should
be of sufficient quality that it can be
used as evidence in a court, should legal
enforcement be required.
Accounting is very important in
dissuading people of overstepping their
remit. Just because someone can do
something, it does not mean they should.
The ability to look at all records in a
database does not mean a member of
staff should start looking at details about
their neighbours or famous people.
There may be some records in a
database that you want to add a flag to.
Well known people are obvious examples,
but also company directors may be
deemed sensitive and could be flagged. By
this I mean using a host-based intrusion
detection system or other method to alert
security if someone looks at a particular
record. They would have a list of those
authorised to do so and would pay a visit
to anyone who was browsing.
If databases have search functions
there are also controls that can be put in
place to reduce or prevent data mining.
Putting a specific type of proxy in front of
the database that prevents more than a set
number of searches or only allows a small
number of records to be returned at a time
can help. If people only need to see single
records to do their job, why would you
www.bcs.org/security
© BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2015
DATA
doi:10.1093/itnow/bwv005 ©2015 The British Computer Society
Image: Digital Vision/200134172-002
RISK
ASSESSMENT
John Mitchell, Chair of the BCS
Information Risk Management and
Assurance Specialist Group, looks
at the issues surrounding the
collecting, storing and use of data.
Risk identification of the issues surrounding
the collecting, storage and use of data is
relatively easy if we apply the confidentiality,
integrity and availability (CIA) framework.
Even risk prioritisation is pretty
straightforward.
The difficult part is the risk management
and assurance components. Why is this
the case? Well, the first two (identification
and prioritisation) only involve talking,
whereas the last two usually require some
action to be taken. For anything other than
tolerate the risk, something has to be done
14
ITNOW March 2015
to either terminate, transfer or mitigate
the risk.
If we visualise IT as a pyramid with
hardware at the bottom and information
at the top, then the successive layers
between the two are: base software
(i.e. operating system), middle software
(i.e. database management), application
software (i.e. payroll) and data.
This last level is stored and manipulated
by the lower levels to produce
information. The network which provides
the interconnectivity to distribute this
information can be imagined as running
up the spine of the pyramid. This means
that for information to be reliable and
available when required we must manage
every underlying asset and process.
The underlying risks are the usual CIA
ones, plus compliance, which is often
forgotten, but may be the biggest risk of all
as we shall see later. Taken together these
are a huge risk management challenge,
especially when it comes to providing
assurance that the end product of our
investment, the information, can be relied on.
BCS has a specialist group that deals
with this challenge; the Information Risk
Management and Assurance (IRMA) group
is one of the oldest within BCS and this
year celebrates its 50th anniversary. It has
gone through three name changes along
the way (Auditing by Computer, Computer
Audit and now IRMA), which illustrates its
attempt to keep pace with the changes in
risk due to changes in technology.
It is interesting to note that 50 years
ago, in the very early days of computing,
some far sighted people realised the need
to develop a control framework to provide
assurance that the information being
created by the technology could be relied on.
Data collection and subsequent
processing stages need to be controlled in
a way which provides for confidentiality,
integrity, availability and compliance at
each stage of the journey from raw data to
management information. When I reflect
on what is involved in that journey I am
amazed that we get anything approaching
reliable output; and yet by and large we
do. This is because over the years we
have identified the key risks and put in
appropriate controls to manage them to an
acceptable level.
This is not the same as no risk and
the acceptable level will vary from
industry sector to sector, from company
to company and even from system to
system, but we now have a pretty good
understanding as to what that level of
acceptability should be for any given
situation.
The only reason that we have all that
hardware, software and networks is to
capture the raw data, store it and then
process it to produce information for
(hopefully) sensible decision making.
The necessary control framework
is formidable. We must provide for
confidentiality, integrity, availability
and compliance within the world-wide
regulatory framework.
Although this is a daunting concept your
compliance friends (for indeed we are)
have developed just such an assurance
framework. We have dissembled IT into
36 key processes spread across five
domains, which are applicable regardless
of industry sector or technology. For
each process we have identified the key
controls and, even more importantly, ways
of measuring the operational effectiveness
of those controls. We can even measure
the effectiveness of the IT governance
framework in meeting IT objectives which
should align with business objectives.
We call this framework Control Objectives
for IT (COBITTM), which is now in its fifth
version since its inception in 1996.
COBIT was originally developed by the
Information Systems Audit and Control
Association (ISACA) as a result of a quarter
of a million dollars grant from IBM, who
realised the need for assurance over the
technology that it was selling. COBIT is
available for free at:
www.isaca.org/COBIT/Documents/COBIT5Ver2-FrameWork.pdf.
COBIT provides the capability for
mapping enterprise goals, to IT goals,
and then to IT processes, with further
drill-down into activities, key goals, key
performance indicators, capability maturity
modelling and assessment against ISO
15504. It is a truly awesome concentration
of risk and control knowledge.
It starts with the concept that as IT is
there to support the business, then IT risks
are business risks. If we know which IT
components are being used to achieve a
particular business objective, then we can
risk assess and manage those components
whether they are infrastructure, hardware,
software or people related.
That way we can assess HR processes
to ensure that we have the appropriate
IT personnel in place; the design and
implementation stages; and the operational
and support phases.
Every three years ISACA conducts a
statistically valid world-wide survey to
ascertain what the real risks are and
how they are being managed. This is
supported by research into technological
developments and whether we need to
adjust our information risk management
and assurance tactics accordingly. This
has enabled us to adjust our control
paradigms to recognise the changing
risk profiles caused by the move from
mainframe computers to tablets, from
batch processing to real-time systems,
from LANs to cloud, from internal to
outsourced management and from
centralised to de-centralised data collection
and processing.
We do not claim to know all the answers,
but the identification of the risks is an
important first step. We are also able
to dispel myths, such as trust being a
control, by mathematically measuring
the effectiveness of a specific control in
managing a particular risk.
To effectively manage a risk you ideally
need to manage both the likelihood and
the consequence. A single control can
only manage one side of the risk equation
so you need a minimum of two controls
for each risk and this assumes that
both controls operate to a 100 per cent
effectiveness. Most controls do not achieve
anywhere near this effectiveness level
so we may well need multiple controls to
manage the risk to the appropriate level.
By applying such assurance techniques
we can help management to identify
weaknesses in their IRMA structure. It is
then up to them to decide whether they are
willing to live with it (tolerate), remove it
(terminate), adjust it (treat) or share it with
another party (transfer).
You will notice that every decision, apart
from tolerate, requires some action to be
taken. These improvement programmes
are where you need to speak to your
assurance professional.
There are multiple ways of achieving a
particular control objective and they can
help the IT professional decide on the most
appropriate approach. This should be a
team effort.
The IT people know the technology and
us assurance professionals know the
controls. Working together makes sense,
collaboration is so much better than
confrontation.
www.bcs.org/groups/irma
March 2015 ITNOW
15
DATA
DUDE
WHERE’S MY
DATA?
a number of publicly available Twitter
aggregators such as StreamedIn,
Twitonomy and the aptly named Creepy.
With the time and inclination, it’s possible
to extrapolate all sorts of information from
an unsuspecting user’s tweets. From trivial
snippets such as a user’s favourite band
or preferred coffee shop, to more private
things such as an individual’s route to work
and where they live. All of this information
derived from data that users have leaked
one tweet at a time1.
This is a key point. Even though the
Twitter user may never have expressly said,
‘I live here’, it is, nevertheless, possible to
put the pieces of the jigsaw together to see
the bigger picture.
doi:10.1093/itnow/bwv006 ©2015 The British Computer Society
Image: Digital Vision/200286490-001
(It should be pointed out that Twitter has
merely been used as an example here
and there is no question of there being
any malpractice on its part.)
consequences of doing so?
In this article location data will be used
as an example to show some of the ethical
issues relating to mass data collection,
before concluding with some realistic
proposals about what can be done about
these issues.
Hidden data
Mobile phones are able to track their
owner’s location with remarkable accuracy.
The apps installed on mobile devices have
access to this data with the user’s
permission. It is likely that there are a
large number of users unaware that their
data is being transferred to third parties
without it being obvious to them that this
is happening.
Having already seen what can be done
with the limited location data we know
about, it’s only a small logical step to see
what might be possible if all location data
was aggregated in some way.
Unintended consequences
Let’s take Twitter as an example. People
muse about whatever is on their mind using
140 characters or less. Tweets sit there for
all the world to see. It’s all good fun. However,
it is also a goldmine of information for those
that are interested. And a lot of people are
interested - especially if a user tweets a lot
and has elected to add their location data to
their tweets.
The presence of Twitter has spawned
Ethical questions
The examples above start to raise some
ethical questions.
Are the terms and conditions for mobile
phone apps set out in plain language that
a typical user can understand? Assuming
the end users even read the T&Cs in the
first place, probably not a safe assumption,
it could be argued that the users have not
expressly given their consent for their data
to be used in the way it is actually being
Data is everywhere. Some of this data is information we voluntarily give away through social media or other
online tools, but data is also being generated as a by-product of us simply going about our day to day lives. This
raises ethical questions, says John Quayle MBCS, a member of the BCS Ethics Specialist Group.
Every day we are adding to our digital
footprint and, given the ubiquity of the
devices we all use out of necessity rather
than choice, there is very little we can do,
as individuals, to change this.
Our industry has barely scratched
the surface of big data so it is therefore
unsurprising that a new generation of
products has emerged specifically to gather
data about individuals, what they like, what
they do, what they buy, their political views
and so on.
These new products follow the same
basic model: users provide their data and,
in return, something of value is offered as
compensation. Perhaps the most obvious
examples of this type of product are the
likes of Twitter, Facebook and LinkedIn, but
data collection is happening far beyond the
16
ITNOW March 2015
boundaries of social media.
To give a few examples: people are
happy to provide data about their shopping
habits via store loyalty cards in return
for special offers; smart cards track their
owner’s travel habits in return for the
convenience of being able to tap in and
out of the transport system; files and
emails are hosted on somebody else’s
servers so that they can be accessed from
anywhere that has an internet connection;
photographs are posted on social media
sites so that people can share experiences
with their friends.
Generally this seems to work. Quid pro
quo. You take my data, you provide me with
a service in return. Everybody wins. But
do people really understand how much
data they’re giving away and the potential
used. In fact, the user may not even be
aware that data is being collected at all. How
can a user take steps to seek the deletion of
any data being held about them if they don’t
even know it exists in the first place?
For many, this is the user’s problem. They
should have read the T&Cs in the first place
so that they understand the risks.
However, this type of thinking misses
the point. Our industry has a duty of care to
protect its end-users and it would be simply
irresponsible to ignore questions about data
security and integrity.
Furthermore, people will be far more likely
to share data if and when they can be given
confidence that their data is, in some way,
protected. We must never forget that the key
point in data collection is not what the data
is supposed to be used for, but what it could
be used for. In the wrong hands, data can be
used for malicious purposes and this is what
we must take steps to avoid.
Proposals
So what is to be done? The following
proposals are put forward in order to start
the debate:
Firstly, the terms and conditions to which
users sign up need to be simplified. Key
facts documents similar to those in the
financial industry would go a long way to
helping end-users decide if they want to
sign up to a service or indeed how they
might want to use a service.
Many users don’t even read the T&Cs
because they are so long and complex;
literally longer than a Shakespeare play in
some cases2! A key facts document is far
more likely to be read and understood than
a verbose legal document.
Secondly, people should know about
all the data that is held about them. Data
controllers should, therefore, be obliged to
send an annual statement of data to each
and every individual for whom they store
personalised data. On the face of it, this
might seem controversial, creating a vast
overhead for companies but, in practice,
this should be a relatively simple task for
any company that is competent to handle
data. Google, Facebook and Twitter all offer
the option for users to download all the
data that is held about them. Organisations
that cannot comply with this request would
either have to anonymise data or delete the
data they hold.
Finally, there should be an assumption
that individuals own their own data and
should have the right to have their data
deleted within certain parameters. It
wouldn’t make sense, for example, to allow
individuals to delete missed payments from
their credit history, but the individual does
have the right to make sure their credit
history is correct.
Data can be used for purposes contrary
to the spirit in which it was provided.
Furthermore, personalised data is also
being collected about individuals who may
not even be aware it’s being collected in
the first place. The IT industry has duty
of care to ensure that data is handled
competently. This would ensure that
individuals are protected but also give endusers confidence that their data will not be
misused.
The methods by which the industry
protects its end-users is a matter of debate,
but options include making terms and
conditions easier to understand, providing
greater transparency of the data that is
held on individuals and the adoption of the
general assumption that the end-user owns
any data from which they can be identified.
www.bcs.org
References
1. http://cms1.gre.ac.uk/research/
csafe/publications/JenkinsGanCFET2014.pdf
2. http://www.dailymail.co.uk/
news/article-2118688/PayPalagreement-longer-Hamlet-iTunesbeats-Macbeth.html
March 2015 ITNOW
17
DATA
justified or not, surely the EU is right to
work towards such minimum standards.
Currently the market norm is complex
contracts or service level agreements that
are insufficiently specific and balanced
and which contain extensive disclaimers.
The use of take-it-or-leave-it standard
contracts might be cost-saving for the
cloud provider, but is often undesirable for
the user, including the final consumer.
Standardised contractual terms would
reduce the transaction cost of legal advice.
Contractual litigation should be regarded
as a sign of regulatory failure. Robust
and transparent standard contractual
terms must be the way forward. Usefully,
therefore, the EU is working towards
model contract terms and a code of
conduct for cloud providers. See also ISO/
IEC 27018 mentioned below.
CLOUD WITH A CHANCE OF
The EU’s regulatory planning for cloud computing and data protection is an expanding domain worthy of
everyone’s attention. Whether you are pro-EU regulation, or anti, the European Commission is
addressing vital solutions to key issues so says Stephen Meachem, a barrister and solicitor with the Law
Tribe and a member of the BCS Law Specialist Group.
doi:10.1093/itnow/bwv007 ©2015 The British Computer Society
Image: iStock/452232627
REGULATION
Though the cloud supports business agility
and market entry by having the potential
to offer flexibility and scalability it is not
without issues.
The regulatory concerns around cloud
computing and the data-related issues it
raises for businesses arise in two areas:
(a) the relationship (contractual and
operational) between cloud providers and
their customers;
(b) the regulatory landscape, which
includes data protection.
A proposed new General Data Protection
Regulation is intended to regulate big data,
the cloud and social networks. This may
offer innovation opportunities in cloud
18
ITNOW March 2015
software development.
Standardisation of cloud service terms
and conditions
Currently, individual vendors have
an incentive to fight for dominance by
locking in their customers. The market
needs service level agreements giving
a contractual right to get data back in a
usable form, which is easy to integrate
in-house or to a different cloud provider.
If a service goes down users require
to be up and running again as quickly as
possible. Given the current capabilities of
IT is this a big ask? Both Google’s Apps for
Business and Microsoft’s cloud services
are able to manage it. Whatever difficulties
small providers may claim, whether
Data protection in the cloud
The cloud is blurring the boundaries of the
enterprise and creating security issues.
People need to know where their data
is and who has the right to see it. Issues
arise in the cloud when cloud services are
used to process personally identifiable
information (PII).
It is hard to imagine an organisation
that does not hold a certain amount of
PII (related to employees for instance).
However, in the cloud, whilst the data
processing is outsourced and under cloud
provider control, the legal obligations
regarding PII protection remain with the
client of the cloud services; under the Data
Protection Directive 1995, as implemented
in the UK by the Data Protection Act 1998.
The EU has developed an auditable
voluntary standard known as ISO/IEC
27018. An auditor can verify whether a
cloud provider meets the requirements of
the standard and, if the level of compliance
is adequate, it can issue a compliance
certificate.
This certificate can be used both as
a marketing tool for the cloud provider
and as a warranty that the cloud provider
meets its obligations regarding PII
March 2015 ITNOW
19
DATA
processing. To complete the regulatory
system the compliance certificate can
then be registered in the contract signed
between the client and the cloud service
provider. This is an admirable solution in
my view.
The Data Protection Directive 1995 is
relevant to the cloud and big data as it
contains a purpose limitation principle
that provides that personal information
must only be processed for specified,
explicit and legitimate purposes, and that
it must not be further processed in a way
incompatible with those purposes.
Derogations are only permitted where
this is necessary to safeguard one of a
list of public policy objectives, including,
for example, public and national security,
defence and the prevention of crime.
The UK’s Information Commissioner’s
Guide to Data Protection links the
compatibility of two or more purposes to
the question of whether or not any further
processing can be considered fair.
Using or disclosing personal information
in a way that is outside that which the
individual concerned would reasonably
expect, or which would have an unjustified
adverse effect on them, would be
considered unfair and thus incompatible
with the original purpose.
Accordingly when assessing the
compatibility of new purposes, data
controllers must take into account,
inter alia, the nature of the data, the
legal grounds on which it was originally
collected, and whether the data subject
was in a weak bargaining position or
whether it was mandatory for the data
subject to provide the data in the first
place.
However, Section 35 of the Data
Protection Act 1995 permits disclosures
‘under any UK enactment’, even if those
disclosures would otherwise violate the
purpose limitation principle. The practical
effect of this provision in its current form
20
ITNOW March 2015
is that UK data controllers have no right
(or obligation) to refuse a request for
the disclosure of personal data to public
bodies on the basis of their data protection
obligations as long as that disclosure is
mandated by any statutory or common law
obligation.
It could, of course, be argued that such
a lawful request from a UK government
agency would itself be in breach of its
obligations under the Data Protection
Directive; which would be a potentially
costly and lengthy litigation matter.
Article 6(4) of the proposed General
Data Protection Regulation will dilute the
purpose limitation principle somewhat
in that it will provide a statutory basis in
EU law for data processing activities for
purposes that would otherwise prima
facie have been judged as incompatible
with the original purpose where inter alia
‘processing is necessary for compliance
with a legal obligation to which the
controller is subject’ (Article 6(1)(c)) or
‘processing is necessary for the purposes
of the legitimate interests pursued by a
controller, except where such interests are
overridden by the interests or fundamental
rights and freedoms of the data subject
which require protection of personal data
…’ (Article 6(1)(f).
Safeguards in respect of 6(1)(c) appear
at Article 6(3): the ‘legal obligation’ must
meet an objective of public interest or
be ‘necessary to protect the rights and
freedoms of others’ and ‘respect the
essence of the right to the protection of
personal data’ and ‘be proportionate to
the aim pursued’. Moreover, it must be
consonant with the Charter of Fundamental
Rights of the European Union. Stronger
safeguards may be required. Data
processors may disagree.
Arguably to restore and maximise trust
in the cloud more transparency is needed
on government access to data, for example,
for reasons of law enforcement and
national security, including commitments
on what constitutes legitimate government
access to data and transparency about
what access requests have been made.
Summary of the proposed EU General
Data Protection Regulation.
• A right to be forgotten. When a data
subject no longer wants data to be
processed and there are no legitimate
grounds for retaining it, the data
will be deleted. The rules are about
empowering individuals, not about
erasing past events or restricting the
freedom of the press.
• Data subjects will have easier access
to their own data.
• A right to transfer personal data from
one service provider to another.
• When a data subject’s consent is
required, they must be asked explicitly.
• More transparency about how your data
is handled, with easy-to-understand
information, especially for children.
• Businesses and organisations will
need to inform data subjects about
data breaches that could adversely
affect you without undue delay, within
24 hours. They will also have to notify
the relevant data protection authority.
• Improved administrative and judicial
remedies in cases of violation of data
protection rights.
• Increased responsibility and
accountability for those processing
personal data, through requirements
for data protection risk assessments,
organisational data protection
officers and the principles of ‘privacy
by design’ and ‘privacy by default,’
which must be implemented within
systems.
This treaty is the closest instrument
to a universal declaration of data rights
in existence. A key amendment is the
explicit formulation of the principle of
proportionality, which is to be respected at
any stage of data processing.
New duties of data controllers and
processors include a duty of active
transparency and an obligation to establish
internal mechanisms to demonstrate
compliance, to carry out risk analyses, and
to design processing in such a way as to
minimise risks for data subjects.
The above principles and the principles
of ‘privacy by design’ and ‘privacy by
default’ to be enacted in the General Data
Protection Regulation are certainly food
for thought and a source of potential
instructions for software engineers.
Love or hate it, being in Europe can’t be
all bad for business! Can it?
www.bcs.org/law
Proposed amendment by the Council
of Europe of the 1981 Convention 108 for
the Protection of Individuals with regard to
Automatic Processing of Personal Data
Further information
Sources of further information
Proposed General Data Protection
Regulation: http://ec.europa.eu/
justice/data-protection/document/
review2012/com_2012_11_en.pdf
ISO/IEC 27018:
https://www.iso.org/obp/
ui/#iso:std:iso-iec:27018:ed-1:v1:en
Recent EU guidelines identifying and
disseminating best practices in
contract terms:
https://ec.europa.eu/digital-agenda/
en/news/cloud-service-level-agreement-standardisation-guidelines
The European Commission’s Expert
Group on Cloud Computing Contracts:
http://ec.europa.eu/justice/contract/
cloud-computing/expert-group/
index_en.htm
The European Commission
Roadmap: http://eur-lex.
europa.eu/legal-content/EN/
TXT/?uri=CELEX:52012DC0529
The European Commission’s Digital
Agenda for Europe: http://ec.europa.
eu/digital-agenda/en/europeancloud-computing-strategy
Proposed amendment by the Council
of Europe of Convention 108 for the
Protection of Individuals with Regard
to Automatic Processing of Personal
Data: http://www.coe.int/t/dghl/
standardsetting/dataprotection/TPD_
documents/T-PD(2012)04Rev4_E_
Convention%20108%20modernised%20version.pdf
March 2015 ITNOW
21
INFORMATION SECURITY
LESSONS
LEARNED
doi:10.1093/itnow/bwv008 ©2015 The British Computer Society
Image: iStock/476346099
When it comes to dealing with hacks such as the one Sony suffered,
Gareth Niblett, Chairman of the BCS Information Security Specialist Group
says we should all learn from others mistakes.
We are all susceptible to being hacked
and our private records compromised.
The trick to defending yourself or
your organisation is to learn from the
experiences of others and understand
who might wish to target you.
Avoiding the mistakes of others is
a low-cost method of improving your
security posture.
One of the big attacks of 2014 was
against Sony, which was comprehensively
taken over by hackers.
22
ITNOW March 2015
Other than the debate as to who
perpetrated the hack, it was apparent
that Sony has not learned from previous
compromises, that it and others had
suffered, as it continued to operate with
lax security controls.
Observers might wonder how a large
organisation, more than able to afford
capable professionals, administering
appropriate security policies and
procedures, and underpinned by
technology could allow many terabytes of
data to be exfiltrated without anyone or
anything noticing something was awry.
The practice of keeping a directory of
static passwords for corporate accounts
shows how even a large business
struggles to find a way to balance security
with usability.
Attacks leveraging zero-day
vulnerabilities can crack open even the
strongest layers of defence, so you still
need to also be checking on the inside.
All of us rely on software and many of
us rely on it being robust and secure. It
is impossible for functional software to
have no bugs or vulnerabilities, but many
can be squashed during the software
development lifecycle, with code analysis /
testing. Secure software development can
make our digital environment safer.
The UK’s largest
exhibition & conference
dedicated to ITSM
EXHIBITION | KEYNOTES | NETWORKING | SEMINARS | EXPERT ADVICE
Sponsored by:
Supported by:
In partnership with
www.servicedesk360.com
FURTHER INFORMATION
Information Security Specialist
Group (ISSG):
www.bcs-issg.org.uk
Information Risk Management and
Assurance Specialist Group:
www.bcs.org/groups/irma
BCS Security Community of
Expertise (SCoE):
www.bcs.org/securitycommunity
Register for FREE entry
Quote priority code 104SITS and save £35 on the day
www.ITSMshow.com
INFORMATION SECURITY
EXPERT
GUIDANCE
Andy Smith MSc FBCS CITP
provides an update on the BCS
Security Community of Expertise.
doi:10.1093/itnow/bwv009 ©2015 The British Computer Society
Image: Photodisc/200402666-001
The BCS Security Community of Expertise
(SCoE) (www.bcs.org/scoe) and its various
subgroups have been very active over the
last few months.
There have been a number of changes
on the committee with some long standing
members retiring and new members
being voted on to the committee. We
now have a liaison with (ISC)2 and better
representation on the ISO standards
panels as a result.
The Identity Assurance Working Group
(IAWG) has also been very active and
representatives will be talking at UK IGF
this year and will submit proposals for talks
at EuroDIG and UN-IGF www.intgovforum.
org/cms. A summary paper of the activity
from last year will be placed on the website
shortly www.bcs.org/scoe.
The focus of the SCoE remains on
providing advice and guidance for the BCS
membership and ensuring BCS is a voice
in various areas including government and
European policy. Our relationship with the
Digital Policy Alliance and other government
related organisations remains strong and
24
ITNOW March 2015
we are striving to ensure the views of the
BCS membership are taken into account
in the various panels and forums. If you
would like to contribute to any of the policy
consultations please do, the information is
here and is constantly updated:
http://policy.bcs.org/consultations.
The SCoE has taken an active interest
in near field communication (NFC) and
a position paper on this is being drafted.
There is a lot of distrust around NFC.
The market is in flux, with an uneasy
relationship between the IT industry and
financial organisations. There is no real
liability model for NFC and there are issues
such as malicious code and privacy that still
need to be addressed properly.
The SCoE came up with a number of
areas to look at during 2015. A few of
these will be selected based on what we
feel will provide the most benefit to the
membership.
The short-listed topics are:
• Hold a top tips Q&A at Infosec 2015 as
part of our workshop on
professionalising the security industry
and security education;
• BYOD security aspects focused on:
‘stop looking at the devices, look at
the data’ - the security and ownership
of content not the security and
ownership of devices (note this also
•
•
•
•
•
•
applies to the cloud);
Cyber security aspects of internet of
things. This will mainly be done via
the IoT WG focus on the awareness
and impact of IOT on the public in
cars, smart TVs, smart metres, smart
lights etc;
Education: security sense/home
advice/risk assessment - linked to
security top tips and Get Safe Online,
which BCS contributes to. Including
developing a basic security sense
guide for individuals and SMEs;
Presence online - how do you protect
yourself online (legal, moral,
personal and social – plus such things
as understanding jurisdictions). Also
how to protect the naïve from
themselves.
Cloud security / safety - what are the
key threats and how do companies
and security professionals deal with
these. There are specific concerns
around follow-the-sun administration,
proxies and organised crime in this
context.
EU legislation - such as the new data
protection, e-signatures and e-trust
regulations, right to be forgotten and
net neutrality push.
Working with the Charity Commission
on promoting good practice. This is tied
•
•
in to our work on security education;
Big data and privacy - data aggregation
and data mining;
Lack of application security and the
complexity for the public to understand
what is provided for them and their own
responsibilities.
From this list a few topics will be chosen
and as much as possible achieved over the
next year.
There are a large range of subjects that
are now proving interesting and critical to
daily life, from internet of things and NFC,
to Bluetooth and ‘my life in my hand’ where
people have their whole lives; calendars,
contacts, email, social media, basically
everything, on their smartphone.
So many of these technologies are
becoming ubiquitous and combined in
previously unimaginable ways. Now your
smartphone can control your TV, sound
system, cooker, lights, etc., which means
that unless its properly secured, so can
other people.
With the internet now being a standard
inclusion on most TVs including video
conferencing and web browsing right from
your sofa, life is so much easier. But how
many people read the user agreement? The
one that gives the manufacturer the right
to monitor your web usage, turn on your
camera and microphone remotely and listen
in. Yes there are some that include this. It
is subjects like this that show how people
should be protected from cool features that
have hidden security issues.
BYODis now becoming a much more
important subject for organisations, with
staff using tablets for taking meeting notes
and managing their calendar to some
diverting their work email to their personal
device and others working out they can
access that wonderful cloud email service
the company just started using from their
phone. This is a topic we are looking at
further and may become a key theme for
2015.
I think 2015 will be an interesting year
with many lively debates on privacy and
anonymity and ongoing security issues
surrounding merging technologies.
The SCoE will endeavour to represent
the BCS membership across a wide variety
of forums. There are regular talks and
meetings at the BCS office, especially useful
if you live in London, but security events do
take place on a regional basis too.
Check out your local branch for more
details: www.bcs.org/branches.
www.bcs.org/security
March 2015 ITNOW
25
INFORMATION SECURITY
SECURE
DEVELOPMENT
Steve Daniels FBCS CITP, Strategic Business Advisor for Cyber Security in CGI UK, looks at the best
practices for secure cyber development now being adopted.
doi:10.1093/itnow/bwv010 ©2015 The British Computer Society
Today’s reality is that an insecure system
will be breached. Secure systems
engineering has often not been sufficiently
prioritised, over being faster to market and
adopting new technology.
The many publicly quoted data breaches
demonstrate that this approach is not good
for business. Failing to keep customer and
organisation data private, available and
correct now comes at an escalating price.
This can include significant remedial costs
and lost revenue (e.g. Sony ‘The Interview’1),
huge fines (e.g. TJ Maxx2), lost customers,
getting swallowed up (e.g. HBGary3) or
going out of business (e.g. Nortel4). Recent
evidence5 shows that recovery costs can be
2.5 times larger than mitigating the issue in
the development process.
Applying structured risk management
within the development approach is the best
way to address this challenge.
Why is it seemingly so hard?
Securing systems is not trivial. With
millions of lines of code on a complex
mesh of servers, running multiple
protocols across a network, with the
applications on top, it is often considered
an insurmountable challenge.
Such architectures can quickly become
riddled with security vulnerabilities.
Numerous security industry reports6 show
a substantial number of vulnerabilities
reported annually. One study7 cited that 53
per cent of the systems scanned contained
exploitable vulnerabilities. A study of
applications8 showed 86 per cent of their
websites contained at least one serious flaw.
26
ITNOW March 2015
Software development lifecycles are being
increasingly compressed to deliver results
sooner. Monthly ‘waterfall’ phases are now
weekly ‘updates’ and ‘daily stand-ups’ within
rapid development (‘AGILE’) processes.
These challenges are not new. Many
organisations have established secure
development lifecycles to fundamentally
reduce system vulnerabilities8. These have
resulted in accessible techniques and
guidance, with corresponding improvements
in secure systems9. Microsoft’s ‘STRIDE’ is
one such model for structured analysis of
threat or attack patterns.
The central role of risk assessment
A comprehensive risk assessment of a
systems development provides a common
language for ‘potential problem management’,
usable throughout the lifecycle.
The resulting risk scenarios have proven
to be helpful in communicating the threats
and risks to the proposed system, to
architects and developers. But additionally,
these scenarios provide an excellent
mechanism through which to ensure that:
1. the right amount, level and frequency
of management engagement can be
obtained.
2. architects and designers understand
why they are implementing security
controls rather than seeing them as
annoyances which delay implementation.
3. security investment in the project
overall, and effort to be invested in
each of the security activities
themselves, is ‘right-sized’ and
appropriately ‘weighted’.
4. in an agile environment, security is
more suited to the ‘sprints’ process.
5. proposals to trade-off controls for
functionality and delivery can be
addressed objectively.
Plotting the secure development journey
Risk assessments are successful when
a consensus results. Communication and
collaboration between the business users,
developers, security experts and other
stakeholders are essential.
Too many business managers
today consider that development is for
developers. But, even if it takes some effort
to get initial engagement to build the risk
assessment, many benefits then accrue.
My experience is that this can actually bring
forward the development delivery date.
One example of risk assessment smoothing
the development process, is it identifies
how critical security factors are in each
instance and how it compares to the other
development perspectives.
Clearly articulated security requirements
are the keystone of every secure system
development and must be commensurate
with the risk, unless this is over-ridden, for
example, by regulatory obligations.
For these to be useful for software
development, they must be specific
statements such as ‘the application must
authorise users using the username,
memorable word and PIN code’ rather than
generic statements such as ‘the application
must authorise all users’. The existence
of the risk assessment will reassure
designers that the requirements are neither
over- or under-stated.
Shaping the design and managing the build
No one would challenge the need for
effective architecture practices, such as
understanding:
1. the technologies being used and
where there may be incompatibilities;
2. that the architecture has been built up
appropriately;
3. the design and assurance processes
applied to all the components;
4. the provenance and past performance
of the components and applications.
However, such processes are often
carried out by development teams in
isolation. In contrast, when these
assessments are undertaken in a
‘risk-driven’ format, increased delivery
efficiency results, in which different activities
can be weighted uniquely.
In an agile development some processes
are well suited to integrating security, such
as the iterative code development phase.
But the architecture analysis can seem at
odds with the iterative nature of agile.
In fact, design reviews and code
clean-ups can easily be added to the
backlog to become part of scheduled
sprints. The risk model is then very effective
both at ensuring that this happens and that
progressive sprints focus on completing
the relevant parts, in priority order and
sufficient detail.
Sufficient testing
Then comes the vitally important step of
real-world security testing, often wrongly
seen as the final development step.
With all the system modules integrated,
the testing seeks to confirm that the system
performs and security controls operate as
expected. This will include testing of:
1. the original security requirements;
2. common security issues with the
adopted technologies;
3. specific application features;
4. specially developed security controls.
This can again be best structured by
reference back to the risk model. This
will resolve such questions as: should the
testing be done by an independent testing
house, perhaps undertaking a CREST or
CHECK10 review? Does the development
really merit standard testing? How much
specialist and user engagement should
there be to probe such issues as
performance of the user interface? What
testing tools would be appropriate? What
testing of capacity would be justified?
Achieving and demonstrating assurance
When a total cost of operation view is taken
of the development, the real last stage is
providing a sustainable assurance regime.
The risk model again plays a major role
in defining how user acceptance will be
obtained from the business, and who from.
Associated activities can also be shaped
by risk to include what user acceptance
training should be undertaken and what the
audit regime’s scope, frequency and depth
of review needs to be.
Another critically important aspect of
development, which can be shaped by the
risk model, is how to handle waivers or
non-compliances, i.e. those issues that
remain unfixed. By identifying relative
priorities, the risk model will enable this to
become a business-based decision.
The start point will then be whether
these can even be afforded. But if they can,
what is the relative priority to fix them? In
what timescale and how soon must the
issue’s continued existence be subject to
re-approval and by who?
Last, but not least, no good system
goes live without appropriate performance
reporting i.e. critical success factors
supported by metrics. The risk model is
ideal for defining what these need to be.
By using risk assessment to calibrate
the development activities, they will remain
proportionate and relevant to the real risks
to which the live system will be exposed.
Whilst a more secure system will have
been delivered, many other material
benefits will emerge that mandate the
adoption of this approach. These will
encompass: lower development costs,
lower running costs, more uptime, more
throughput, higher end-customer trust and,
as a consequence, more end-customers.
Secure systems development is therefore
achievable and entirely worthwhile.
www.bcs.org/security
References
1. Sony’s costs for The Interview
Breach; Bloomberg, January 2015:
http://tinyurl.com/otypbsg
2. TJX, Visa reach $40.9M
settlement for data breach; USA
Today, November 2007;
http://tinyurl.com/nxc94x4
3. Anonymous speaks: the inside
story of the HBGary hack; Ars
Technica; February 2011;
http://tinyurl.com/75e4ymp
4. Chinese Hackers Suspected In
Long-Term Nortel Breach; Wall Street
Journal; February 2012;
http://tinyurl.com/mom4u7p
5. Ponemon : Costs of Data Breaches
2014: www.ponemon.org/news-2/23
6. http://tinyurl.com/pjhpwuz
7. 2013 Internet Security Threat
Report, Volume 18; http://tinyurl.
com/cc7856t
8. Cisco Secure Development
Lifecycle; Cisco; Retrieved November
2013; http://tinyurl.com/nelpqxp
Oracle Software Security Assurance;
Oracle; Retrieved November 2013;
http://tinyurl.com/oj4pyo5
Microsoft Security Development
Lifecycle; Microsoft; Retrieved
November 2013;
http://tinyurl.com/l9rssvm
9. The Trustworthy Computing
Security Development Lifecycle.
The Benefits; Microsoft; March 2005;
http://tinyurl.com/n2tkzrf
10. CREST: http://crest-approved.org/
CHECK:
www.cesg.gov.uk/Pages/homepage.
aspx
March 2015 ITNOW
27
INFORMATION SECURITY
without triggering any monitoring systems.
Compounding the concern is that the
vast majority of these attacks are not
actually particularly sophisticated. Clever
in elements of their implementation
perhaps, but using known vulnerabilities
and off-the-shelf tools.
Properly patched and maintained
organisations, with dedicated security
teams and security software in place
should not be falling victim to hackers of
this level of capability.
It seems remarkable then that, when
cyber security is so high-profile, such
breaches can still occur with such
depressing frequency. What is going wrong?
In the defence of big organisations,
ensuring consistent security standards
across a large, often multinational
estate, which may have grown through
acquisition, and with different cultural
approaches in each region, is non-trivial.
However, the root of the problem is
deeper and more systemic. For too long IT
has been treated as something that should
be subject to cost cutting, often very
PAYING
doi:10.1093/itnow/bwv011 ©2015 The British Computer Society
Image: Thinkstock/78617963
THE PRICE
When it comes to cyber security,
why do large companies do it so
poorly, asks Rob Pritchard.
2014 was a mammoth year for security
breaches. Target was the first breach to
make headlines, when millions of customer
credit card details were stolen by pointof-sale malware. Home Depot suffered a
similar breach.
JP Morgan came later in the year, with
the admission of the compromise of some
80 million customers’ details by a Russian
criminal gang, with media allusion of
connections to the Russian state.
Rounding off the year was the
destructive hack against Sony, quickly
28
ITNOW March 2015
attributed to North Korea. Receiving
less media coverage, though otherwise
very similar, was the equally destructive
attack on the Sands Casino in Las Vegas,
apparently carried out by Iranian groups
following controversial comments about
the appropriate response to the Iranian
nuclear programme made by the casino’s
owner at a pro-Israeli US conference.
In 2014, when these breaches occurred,
none of the companies could claim
ignorance of security issues. Both in
the UK and the US, cyber security has
gone from niche concern to headline generating news, and been the subject
of government funding and awareness
campaigns.
Indeed, in nearly all of these examples
the unfortunate organisations had been
spending money on cyber security
initiatives. Target had deployed a security
monitoring product which alerted them to
the problem, but no action was taken.
Significant compromises do not occur
overnight. It takes time to gain, and
maintain, persistent and deep access to a
large network.
An initial breach is made, often through
a phishing email compromising the
machine of a single user, and slowly
expanded, with the attackers stealing
credentials, accessing more computers
on the network and ensuring they have
persistent access. They have to do all this
of operating systems and applications,
often dated and out of support. Poor asset
management compounds these problems.
How can you assess your exposure to a
threat if you do not know the extent of your
perimeter and what software you have
running on what operating system? It’s
simply not possible, and budget and remit
for cyber security projects rarely extends to
remediating these issues.
Extensive outsourcing has not helped.
I am not arguing that outsourcing is
inherently insecure, but the way it is
usually done is anathema to good, effective,
cyber security.
Large organisations will usually have
complex outsourcing arrangements, which
encompass everything from network
management, to patching and the help desk.
Often these functions are carried out
by different companies, in geographically
diverse parts of the world.
And to be clear I am also not arguing
that organisations from other parts of the
world are incapable, or inherently insecure
- but anyone who has managed teams
Significant compromises do not occur
overnight. It takes time to gain, and maintain,
persistent and deep access to a large network.
aggressively. The failures in security we
see today are the consequences of a longterm failure to invest in what is businesscritical infrastructure.
Whilst organisations are certainly
beginning to spend more money on
security, it is usually restricted to spending
specifically on tools, and the recruitment
and training of security staff.
This is not, in itself, a bad thing, but even
relatively large spend on security cannot
make up for years of underspend in IT
infrastructure.
Too many large companies have
networks they barely understand, and
an estate consisting of a huge variety
across different locations will know how
challenging it is to ensure effective working
practises, even more so across different
timezones.
Outsourcing contracts and deliverables
focus on cost and resolution time, and do
not enforce, or often even mention, security.
Even where they do mention security,
employees of a third party company, with
targets based on numbers of tickets closed,
may not be willing, or able, to properly
consider security when resolving issues.
The fundamental underpinnings of
good cyber security are also good IT
management practice:
• asset management, which underpins
•
•
•
•
effective patching;
good network management;
properly architected applications, built
through a development process that
includes security requirements from
the ground up;
ensuring user accounts are created
using the principle of least privilege,
and that there is a proper process
for prompt removal of access when
employees leave;
and possibly more importantly than
any of these are IT, network and
development teams that work as a
cohesive whole and recognise the
responsibility they have to protect the
company and its assets.
Cyber security is not a black box solution,
no matter what some marketing blurb
would have you believe.
Spending money solely on cyber security
whilst not addressing fundamental flaws
in IT infrastructure is like installing fire
alarms in a straw house full of smokers.
Effective cyber security stems from
a well-managed infrastructure, with a
security team working alongside those
responsible for IT management.
2015 will bring more high profile security
incidents. More data will be lost, accounts
breached and organisations suffer huge
losses, lawsuits and damage to reputations.
Equally, spending on cyber security will
continue to climb. There will be more
conferences, government initiatives and
hand wringing about cyber threats.
Until we see spending on IT
infrastructure begin to increase and boards
recognising that their IT is a critical asset
that underpins all of their business, we will
not see a decline in security incidents.
www.bcs.org/security
March 2015 ITNOW
29
INFORMATION SECURITY
PERSISTENT
THREATS
doi:10.1093/itnow/bwv012 ©2015 The British Computer Society
Image: Digital Vision/sb10062916kk-001
Valory Batchellor and Neil
Warburton from IBM take a look at
the recent attack on Sony and ask
what we can learn from it.
2014 saw a number of very high-profile
attacks on major companies and continued
the trend for more frequent and bigger
breaches. It was rounded off by an attack
on Sony Pictures Entertainment in the
USA, which had a far-reaching impact and
still making news in early January.
A group called Guardians of Peace
(GOP) claimed responsibility. Estimates of
the data stolen vary between 1 and 100
Terabytes, including employee sensitive
personal information and personal emails
between senior executives. Unreleased
films were made available for download on
file-sharing sites. Up to 30,000 company
PCs were compromised and hard drives
wiped. The company was effectively
closed for business for several days with
employees reverting to pen and paper.
At time of writing, we know that
malware called Destover was involved in
the breach and was active within Sony
for several days before the hack became
public.
However, it is not clear how long Sony’s
systems had been breached for or what
the initial attack vector was.
30
ITNOW March 2015
Spear-phishing or simple insider help
may have been involved. Recently, a
second group claimed it shared stolen
Sony user IDs with GOP. The FBI stated
this attack would have evaded many US
government security measures. They
currently blame North Korea, though some
experts disagree.
Many companies will look to update
their traditional defences such as IPS,
antivirus and firewalls in the wake of the
Sony attack. Major security vendors have
issued guidance on configuration and/or
signature updates to detect Destover and
some may leverage this incident to try to
sell yet more security tools.
Is stopping Destover enough?
From knowledge of other attacks, it seems
likely that Destover was a final step in
a carefully planned, prolonged attack.
Removing so much data takes a lot of
time, as does analysing and distributing it.
Identifying and halting Destover may have
saved Sony’s PCs, but much of the
business damage was already done.
We would expect security systems to
have spotted such a large data breach
and raised alerts. How could it remain
undetected? We’ll explore this below.
Modern cyber-attacks
The term advanced persistent threat (APT)
is used to describe modern cyberattack
techniques.
Advanced refers to the sophistication of
the attack and the fact that one or more
elements are often as yet unrecognised by
security products.
Persistent refers to the fact that they
take place over a long time (often months)
and usually involve some kind of remote
monitoring by the hackers.
The following explains the five broad
phases of an APT:
1. Break in: reconnaissance, spear
phishing and remote exploits to gain
access;
2. Latch-on: malware and backdoors
installed to establish a foothold;
3. Expand: lateral movement to increase
access and maintain a presence;
4. Gather: acquisition and aggregation of
confidential data;
5. Exfiltrate: data exfiltration to external
networks.
APT attacks involve a good deal of
planning and often multiple attack
vectors. Once in, they spread to wherever
they find a weakness, constantly growing
their knowledge of the infrastructure and
where its weaknesses are until they find
what they can exploit or steal. Data is then
often extracted over a long period of time.
The development of cyberattacks over
time has an analogy in bank heist movies.
Once, we liked our bank robbery movies
to show daring smash-and-grabs, where
a gang was in and out as fast as possible.
If they were in the bank more than a few
minutes, it was going wrong.
Now, we like movies about sophisticated
bank robberies that are carried out
over months, often with inside help and
sometimes with the robbers inside the bank
for long periods (e.g., Inside Man, 2006).
With insufficient details on how Sony
was attacked, we have to refer to a wellknown historical APT attack to illustrate
common attack patterns and make
recommendations.
Target was attacked in 2013. Its
systems were first breached by attackers
using credentials stolen from an employee
of a third-party company (phase one).
From there the attackers penetrated as far
as the point-of-sale systems where they
installed malware (phases two and three).
They also breached data servers, installed
more malware and used all of this to steal
credit card data (phases four and five).
The in-house security systems actually
detected the activity early on, and raised
alerts, but these were missed or ignored.
How did this happen?
Too much information
An IBM survey found that a major
challenge facing many organisations is a
plethora of security tools – one respondent
reported 85 tools from 45 vendors.
We all know what it is like to be
overwhelmed by a constant stream
of information coming at us. How do
you prioritise which alerts should be
investigated? Especially if they are on
multiple screens from multiple systems.
How can you improve your chances of
not being the next APT victim?
Steps to mitigate risk
First, you need a clear view of your
organisational security posture. Not all data
is created equal, and budgets are limited.
Define where the most important data
is and take all necessary steps to protect it.
What data has most value for the company?
Where is it held? What is the best way to
protect it? What risks can you bear?
Second, understand trends in security
tool technology. Tools that use behaviourbased technologies to detect unusual
activity have several advantages over
traditional signature-based solutions that
detect exploits:
•
•
•
Many attacks share common
behaviours, so one behavioural
‘pattern’ can cover many specific
attacks.
Zero-day exploits (no signature
available) can be detected by their
activity.
You do not need thousands of up-todate signature files, this means less
reliance on updates from a vendor
and quicker identification of an attack.
Third, you need to be able to interpret the
output from the security tools and respond
to protect your business according to the
severity of the risk and potential business
damage. This means visualising the activity in
the infrastructure and determining quickly
what matters most.
This is where the application of analytics
to security, security intelligence, can help.
While many people have heard of security
information and event management (SIEM)
systems, security intelligence is more than
just a SIEM. An integrated approach to
security intelligence directs and augments
the skills of security professionals and
allows them to use their experience and
judgement to best effect.
Security intelligence takes input from
multiple security tools and other sources
of infrastructure information such as event
logs and network flows, and correlates this
against knowledge such as: infrastructure
and network layout; historical behaviour;
known bad agents; known vulnerabilities in
the infrastructure; importance of specific
assets and routes to exploit those assets.
From this it should provide a ‘single pane
of glass’ into the organisation showing
where the greatest threats and risks are at
any given point in time. It takes advantage
of the outputs from good tools and the work
done to define your security posture.
Although there will be set-up costs, these
will be offset by much greater productivity
and accuracy in dealing with incidents.
Security intelligence will also increasingly
become available via managed service
providers or cloud-based deployments.
Finally, it will help you mitigate simple
human error or poor processes. Security
intelligence can be the smoke detector
in your organisation: check the status
regularly, change the battery (i.e., review
policies as your organisation evolves) and
pay attention when it goes off!
www.bcs.org/security
References
https://en.wikipedia.org/wiki/Sony_
Pictures_Entertainment_hack
http://deadline.com/2014/12/sony-hacktimeline-any-pascal-the-interview-northkorea-1201325501/
http://www.politico.com/story/2014/12/
fbi-briefed-on-alternate-sony-hacktheory-113866.html
http://threatpost.com/detailsemerge-on-sony-wiper-malwaredestover/109727
http://en.wikipedia.org/wiki/Advanced_
persistent_threat
http://www.informationisbeautiful.net/
visualizations/worlds-biggest-databreaches-hacks/
http://www.bbc.co.uk/news/
technology-30632711
March 2015 ITNOW
31
INFORMATION SECURITY
When it comes to security
planning, John Mitchell says you
can hope for the best, but you
must also plan for the worst.
doi:10.1093/itnow/bwv013 ©2015 The British Computer Society
Image: iStock/493632875
MAINTAIN INTEGRITY
The correct information at the time and
place of need is what every manager
desires. To do this we need to add the
requirement that the information complies
with the statutory and regulatory framework.
Every security manager quotes
confidentiality, integrity and availability
(CIA), but the compliance aspect is equally
important. Indeed it may be argued that
it is more so, because what is the point of
having good CIA if you can go to prison for
a breach of the law?
As an example, one could design a
secure image collection, storage and
retrieval system that meets all necessary
CIA criteria, but if the images are of a
by someone who breaks the compliance
(secrecy act) requirement.
Even the collection of the raw data may
be in breach of compliance requirements,
as may encoding it and transmitting it
in an encoded format. It just depends on
where you are in the world and what the
local regulations are.
You can be arrested in the USA for
processes run in the UK, as the CEO
of BetOnSports, the online gambling
company, found to his detriment when
he was hauled from an aircraft, which
was simply transiting through the USA.
Although the bets were processed in
the UK, the transactions passed through
Data entry, or garbage in-garbage out (GIGO)
as it is better defined, needs far more
attention than it currently receives.
paedophilic nature, then the CIA aspects
are trumped by the compliance criterion.
Likewise, one could have really excellent
CIA for government secrets only for
these to be put into the public domain
32
ITNOW March 2015
USA networks and online gambling is an
offence in the USA.
Even ignoring the compliance aspects
we may face major problems with data
integrity due to the way the data is
initially collected. Data entry, or garbage
in-garbage out (GIGO) as it is better
defined, needs far more attention than it
currently receives.
Simply eyeballing an entry and then
pressing the enter key can lead to a nearly
two per cent error rate.
Even when coupled with instant
validation of the entry the error rate is
rarely reduced to zero. If the data quality
rules allow a range, then anything within
the range will be accepted regardless of its
integrity.
Even where only an absolute entry is
allowed, such as gender, the resulting
entry of M or F may still be incorrect, as
we found from comparing gender with
operation type in a patients’ records
system, where we found several males
associated with hysterectomies!
We know that we are not going to get
absolute data integrity at the collection
stage, it simply depends on how much
additional care we are willing to put into
those data items that really matter. We
may decide that we can live with incorrect
post codes, but not with incorrect account
numbers.
The risk analysis should determine what
is acceptable and then we should design
the controls to provide for that level of
acceptability. Control design is both an art
and a science and really should be done at
the system design stage. Ideally we should
generate a table of data quality rules for
each data item.
The challenge here is that the data may
be one of four major classes: configuration,
standing, derived or transaction. Each of
these has its relative level of importance.
For example, configuration data may
impact on the entire system, whereas
standing data will only impact on the
transactions to which it is applied.
Derived data usually uses some standing
and transaction data manipulated by some
logic. So there is even more opportunity for
the resulting information to be wrong.
We once found a bug in a Unix compiler
that resulted in a numeric one divided by a
numeric one not equalling a numeric one,
which made a real mess of the information
being produced.
Even if the compliance and integrity
aspects are okay we still need to consider
the availability and confidentiality
aspects. The data may produce accurate
information, but if that information is not
available at time of need then it is totally
useless, as NATS found when it had to
close a significant part of UK air space due
to their air traffic control system failing.
With real-time information systems the
failure to deliver at time and place of need
is immediately known to the customer,
whereas an integrity problem may go
unnoticed for years.
Which brings me to the confidentiality
aspect of CIA. We spend vast amounts
of money in trying to ensure that only
authorised people have access to our data,
but as I have argued previously, once you
grant privileges, then your entire control
framework is based on the trust you have
in that individual and trust is not a control,
it is a hope. I was taught to hope for the
best, but plan for the worst. I am sure that
Sony corporation wish that they had spent
more time on the latter.
www.bcs.org/security
March 2015 ITNOW
33
INFORMATION SECURITY
HOW SECURE
IS SECURE?
doi:10.1093/itnow/bwv014 ©2015 The British Computer Society
Image: iStock/477444495
Gareth Baxendale FBCS CITP,
Head of Technology, Clinical
Research, Network National
Institute for Health Research,
looks at the ways to secure
critical infrastructure.
Despite popular belief, hackers do not
tend to don balaclavas, before they begin
their silent attacks on our infrastructures.
However, we do seem to associate this
bank robber-esque image with the activity
of hacking and IT security.
In today’s world, security is a way of
life for all of us, you only have to go to the
airport and you will be reminded of how
serious it can get.
For technologists the securing of data
is no doubt ‘business as usual’, but as we
evolve more complex methods to present
our services and allow users to interact
with them, the greater the risk becomes.
How secure is secure?
Securing your infrastructure can take
considerable effort, and getting the correct
level of security in place, at the right level,
is key. It is easy to over-engineer a solution
that may impact the entire user experience.
On the other hand, a poorly designed
solution will require greater effort at the
other end in maintaining and monitoring,
and may even result in sleepless nights.
When designing an approach, the
infrastructure, application and data layer
must be viewed as a whole, or you may
secure one layer but leave another open
to attack. Some questions to consider: do
you want to use a DMZ (demilitarized zone)
and open ports on your internal firewall for
every service required? Or do you want to
simply keep everything on the internal side
34
ITNOW March 2015
so as not to turn your firewall into Swiss
cheese?
Then there is the CMZ (classified
militarized zone) which, by choice, contains
your sensitive data and is monitored to an
extreme degree to ensure it is protected at
all costs.
When presenting data do you use a
staging database in a different subnet to
limit the chance of a direct connection to
your back-end data layer? Will you consider
emerging proactive database monitoring
tools such as Fortinet’s FortiDB?
Of course, your approach will depend on
the services you are exposing and every
vendor will have a different set of options
for you to choose from.
Good practice
The annual security review and pen test,
while still important, is now giving way to
more live security reporting and analysis
to provide you with assurance that your
data is safe. Many security vendors now
offer proactive monitoring of your external
services to ensure that known exploits
have not accidentally been opened up by
trigger-happy firewall administrators.
Some simple good practice can make a
real difference, such as ensuring you have
multi-vendor firewalls separating your
networks. This may seem like an expensive
luxury at first, but It means that any wouldbe attacker has two highly complex firewall
technologies to overcome instead of just
one. It also means that in the rare case a
vendor’s firewall has a known weakness it
is unlikely that the second vendor will have
the same exploit, reducing the chances of
an attacker’s success.
Ensuring your systems are patched to
current levels is also an essential activity
in the battle against the hacker.
But let’s not just limit this to technology
itself; ‘change control’, as a process, is an
important defensive weapon against human
error that might otherwise cost you dearly.
Knowing what needs to be changed, gaining
approval, planning who will do the work
and when, along with ensuring a full impact
assessment is carried out, will save you a
lot of pain later on.
In most cases the attack vector will be
your database. This is where an attacker
can collect personal details about your
customers, harvest passwords and
login details, collect credit card data, or,
even worse, medical history and other
sensitive data. While these data assets
may be ‘hashed and salted’ using complex
encryption techniques, the reality faced is
that many organisations suffer immense
reputational damage having to admit
publicly that the data was stolen in the
first place, even if there is no chance the
data could be unencrypted.
Attacks from within, by members of
staff, are also now common place. Take
for example a very high profile insurance
company who suffered embarrassment
when two members of staff acquired data
on customer’s recent insurance claims and
sold it to claims management companies.
Also, don’t assume that a hacker will
always attack from the perimeter of your
network from an obscure country. Keeping
the virtual front door locked, but leaving
the physical back door open can be a
perfect way for a determined hacker to
gain access. Local attacks are as much a
risk as remote ones.
The tiger hunts
Take the following as an example, if a
hacker knows where your office is located
(Let’s be honest, Google will show them
the front door!) they may attempt to access
your premises as the air-conditioning or
printer repair man. Of course they are
not on the list of expected visitors, so off
reception go to find out the score from
facilities management leaving the
reception desk unattended. Our hacker
printer repair man pulls out a Wi-Fi router
and loops it to the back of the reception PC
and hides it behind the desk.
The receptionist returns and informs
our hacker printer repair man that no
repairs are scheduled.
‘It must be a mix up at HQ,’ he says and
politely leaves. He now heads for his car
and connects over Wi-Fi to the router he
has just planted, He now has access to your
LAN and the attack begins. This activity is
often done by ‘ethical hackers’ who are paid
by companies to find weaknesses in their
security processes and is known as a ‘Tiger
Attack’. It could, however, be a real event if
your data is valuable enough to an organised
crime syndicate or someone who wants to
damage your company’s reputation.
Sadly, the weakest link in data security
is almost always the human. Socially
engineered attacks are the first weapon
in the arsenal of the hacker. With it they
can pose as your local service desk team
and email unsuspecting staff of an ‘urgent
security breach’ that requires them to
change their password immediately. Your
staff are super trained in security and data
protection, the email has the company
logo and looks genuine, so the security
conscious staff member clicks on the link
to change their password.
Once complete the member of staff
feels proud that they have dutifully
followed the security advice and probably
begins encouraging the rest of the team to
do the same.
Little do they know they have just typed
their username and password into a fake
website page where our hacker will harvest
and use the details entered to access
services like Outlook Web Access in order
to read sensitive emails, or a VPN service to
gain remote access to the network.
However, since we always use different
passwords for all our internet accounts
there is absolutely no chance that our
hacker might use the same harvested
details to access our personal eBay, PayPal
or other financially related site, right?
Know thy enemy
We all hope that our online accounts are
secure and that we have dutifully set up all
the mandatory PINs, secret words, picture
security and the like. Each site though
typically uses a different selection of
security options and this poses an easy
way for a hacker to collate a security
profile on us. It only takes one site to reveal
some data on us for a hacker to use that
data to access another site.
Basic security questions like ‘What’s the
name of my dog?’ can easily be harvested
from your Facebook account where you’ve
shared cute pictures of your little mutt. The
oft used mother’s maiden name is also
at risk with your family history being on
show on Facebook. Hackers can even use
this information to ring up support lines
and pose as you to get account passwords
reset so be careful about your choice of
security questions. Where possible always
use two-factor authentication where a
random PIN is generated to a device you
have such as your smartphone. Oddly eBay
doesn’t offer this feature, probably one of
the sites we use the most!
In the battle to protect your data the best
advice is to think like a hacker. A hacker
will target the weakest link so the question
for you is what’s your weakest link? This
applies to your company’s data assets and
your own personal data.
Don’t be caught out by focusing
exclusively on the complex end of security,
the real risk lies in the simple and often
unnoticed day-to-day functions of your
organisation. And don’t forget to review
your own personal security profile so as
not to be the next victim of those pesky
hackers.
www.bcs.org/security
March 2015 ITNOW
35
INFORMATION SECURITY
SOMEONE IS
WATCHING
YOU
doi:10.1093/itnow/bwv015 ©2015 The British Computer Society
Image: iStock/178758211
While there were a number of
prominent security incidents in
2014, there were undoubtedly
more than those reported, says
Nic Oatridge MBCS.
The attack on Sony Pictures was one of the
most widely reported in 2014, however, in
my experience many organisations choose
to keep mum about them. One incident I
looked at in 2013 involved a serious
security incident at a relatively small
subsidiary of a major corporation. The
company chose not to disclose it for fear
that it could lead to the subsidiary winding
up, or that it could adversely affect the
reputation of the parent company.
Many companies adopt the same
approach. The number of attempted security
breaches is probably impossible to assess,
but is almost certainly more extensive than
most people think or most surveys suggest.
Atos, the worldwide IT partner for the
Olympic Committee, detected over 255
million security alerts on its security
information and event management (SIEM)
system during the London Olympics, of
which 4.5 million, constituted significant
events and over 5,000 resulted in incidents
that required further assessment.
36
ITNOW March 2015
No security incidents impacted live
competition, but it can clearly be seen that
the scale of the assaults on organisations
can be staggering.
Small businesses who do not court
controversy or international attention may
feel that the firewalls, security patches
and password systems they have in place
constitute the extent of the controls they
need to have, but the leading information
security management standard, ISO27001,
identifies no less than 114 areas where
controls are likely to be required. And the
need for adequate controls is critical even
for a small undertaking.
I run a number of websites and it is
revealing to analyse the traffic I receive.
Take one website, SwissWinterSports.co.uk,
a site aimed at informing English-speaking
skiers and snowboarders about winter
sports in Switzerland. It gets a modest
amount of traffic, with several hundred
legitimate visitors a day.
However, the leading sources of hits
during one typical week in December were
respectively an ISP in Israel, a suspicious
unknown IP address, a known comment
spammer, a Russian spam harvester and
a Ukrainian spam harvester. Throughout
the list of visitors and in the error logs was
evidence of highly suspicious activity.
Two of the most common sources of 404
‘document not found’ errors were to the
administrative login pages associated with
Wordpress and Joomla, neither of which
I host at this site, so presumably these
are attempted security breaches. The 404
errors included a number from known bugs
and legitimate sources, such as hits on icon
files that don’t exist, but most were not.
As you might expect for a website of
this nature, the countries associated with
the most traffic are the UK, USA and
Switzerland, but lurking in the top ten are
China, the Russian Federation and Ukraine.
Brazil, India, Israel and Romania also often
feature in the top 20 of countries visiting
the site, countries not renowned for their
love of skiing.
This unwanted traffic may not breach
security (although one day it might), but it
is a source of unwanted consumption of
bandwidth and processor performance
to the extent that some sites now bar
traffic from some countries that they
do not target and I would definitely
recommend that you bar some countries
from accessing the administrative pages
of your CMS. Incidentally, you may wonder
where North Korea figures in this, but their
spooks, such as the notorious Unit 121,
that reputedly hacked Sony, operate out of
China with Chinese IP addresses.
I mention the risk to web tools, like
Wordpress. By some measures, Wordpress
powers a quarter of the web and, in the
same way Windows became a target for
viruses because of its ubiquity, Wordpress
suffers similarly. Fortunately there are
many add-ins to improve security, but one
problem with frameworks in general is
that they contain way more functionality
than you need, which you should therefore
disable if you can, and their open source is
no doubt pored over by hackers looking to
find zero-day exploits.
Many spam servers are not operated
directly by criminal gangs, script kiddies,
hackers and government agencies.
Instead poorly protected, innocent
servers are turned into zombies, sending
dubious traffic out from their unknowing
hosts, who in turn then get identified as
suspect and may suffer loss of service or
reputation as a result. Project Honeypot
acts as a target for robots, crawlers,
spiders and spammers to identify who
they are and whether they are legitimate.
consumers expect increase significantly
the likelihood of backdoors to your most
coveted information assets.
The importance of having a concrete
security architecture and pro-actively
maintaining it are imperative. I have
seen sites that have encrypted sensitive
personal data on the same infrastructure
as the keys required to access it, with the
inevitable consequence. It is simply not
tenable to think it is safe to hold all company
data behind one impregnable perimeter,
as one breach can compromise many
information resources. Similarly it is hard
for organisations to have every information
and communication system they operate
accessed only by locked down devices.
Although the cloud has become widely
recognised as requiring particular security
considerations, many organisations operate
what are effectively private clouds in which
information of differing confidentiality,
integrity and availability (CIA) requirements
is all treated equally. All information assets
should be classified with the risks formally
identified and managed appropriately, even
In the same way Windows became a target
for viruses because of its ubiquity, Wordpress
suffers similarly.
To date they have identified many
millions of harvesters, spam servers,
comment spammers, dictionary
attackers and other suspect visits to
their honey pots. They provide a useful
tool for checking suspect IP addresses at
projecthoneypot.org, as does IPvoid.com
and a number of other online sites.
Unfortunately the most accomplished
intruders operate stealthily and often look
like legitimate traffic. Spammers are a
nuisance, but an SQL injection or denial
of service (DoS) attack could be much
more serious. Moreover the different form
factors and increasingly sophisticated user
interfaces that employees, customers and
in the smallest enterprise. If anything, it is the
smaller operation that is more at existential
risk from poorly managed information than
large diversified organisations.
Associated with the architecture are
clear policies and these should not only
cover networked assets but embedded
systems and stand-alone systems, indeed
anything that has a microprocessor;
remember Stuxnet?
Even a well-designed security
architecture does not offer full protection
if security operations are not effective.
As the breaches at Sony demonstrate, a
truly determined hacker may be able to
overcome virtually any security measures.
This emphasises the importance of
effective security information and event
management, so that security risks and
incidents can be identified quickly or even
anticipated.
The quality and speed of response
to a security incident is also important.
A leading company I worked with was
hacked by Anonymous and, whilst they
were figuring out how to address the
circumstances that gave rise to the hack,
got hacked again through the same port.
This emphasises the need to replay
security incident scenarios so that there is
a clear course of action understood by all
involved parties in the event of a serious
security incident.
And we all do backups, don’t we?
However, when did you last check the
integrity of your backup data, how
quickly you can recover or whether the
security policies you used when you first
implemented your backup system are still
appropriate?
I mentioned ISO27001 earlier. Essentially
it mandates organisations to implement
a rigorous management control system
with periodic security audits. It does not
guarantee that an organisation follows
perfect security management practices,
but it is a start. However, in this heavily
interconnected world, it may not be your
security policies that lead to a security
incident. The major breach at Target
occurred because a contracted company
did not follow effective policies; Snowden
was a contractor.
For organisations that have not yet been
hit by a major information security incident,
work on the basis that it is probably only a
matter of time. The new year is as good a
time as any to reflect on the consequences,
as many executives who suffered security
breaches in 2014 are doing now, belatedly.
www.bcs.org/security
March 2015 ITNOW
37
Editors-in-Chief
Professor David Pym
Professor Tyler Moore
SECURING DIGITAL
TRANSACTIONS
SUBMISSIONS NOW OPEN
doi:10.1093/itnow/bwv016 ©2015 The British Computer Society
Image: iStock/450947285
With today’s smartphones, transferring money at a branch or ATM is quickly becoming a thing of the past.
But how can you be sure that your money and personal information are secure when banking on your
smartphone asks Alex Grant, Managing Director, Fraud Prevention, Barclays.
According to a recent study, over £4 billion
worth of transactions were processed in a
single month using smartphones in 20141.
It’s undeniable. Using banking apps on
smartphones to check balances or manage
your money is becoming a way of life.
The growing reliance on these kinds
of transactions has put security at the
forefront for banks and customers alike.
The new BSI Kitemark for Secure Digital
Transactions assures security for a wide
range of online transactions including
entertainment and gaming.
Today’s website and software developers
have to consider a wide range of threat
vectors. Moreover, they have to ensure
functionality over numerous disparate
browsers and operating systems.
This is particularly crucial with financial
transactions, where the threat of password
compromise or malicious URLs needs to
be managed. Currently, criminals target
websites and smartphone applications
that manage financial transactions
because the rewards are quick and
plentiful, and because they’re able to
exploit complexities within the systems
that lead to vulnerabilities.
Despite the many secure software
development methodologies already
available, the pressure on developers to
be more agile and deliver to market often
leads to shortcuts and the acceptance of
unnecessary risks.
Collaboration
BSI created the Kitemark as a sign of quality in
38
ITNOW March 2015
the early 1900s, and it’s become a familiar
symbol of quality, safety and trust in
marketing and consumer materials over
the years.
Barclays commissioned a survey to
determine whether the presence of the
BSI Kitemark would provide banking
customers with a similar level of comfort –
encouraging them to register for their free
banking products. The survey concluded
that wary customers were more likely to
register for and use a product associated
with the Kitemark.
Testing
A key part of any Secure Digital
Transactions Kitemark would be the testing
of the systems to be certified to ensure
that they were secure to a measurable
standard.
The common vulnerability scoring
system (CVSS) was chosen as the most
consistent and reliable method to measure
the risk of vulnerabilities across software,
infrastructure and services.
The Open Web Application Security
Project (OWASP) Application Security
Verification Standard (ASVS) was chosen
as the standard to define the level of depth
and rigour that testing would be conducted.
The functional testing of the product
in its production environment rather
than development releases was critical
to understanding how susceptible the
banking products were to external
malicious attack and in setting a
benchmark of what good looks like.
Penetration testing company. Gotham
Digital Science (GDS) performed the
security testing to the level defined for
the Kitemark and delivered a functional
penetration test report that identified some
vulnerabilities, but importantly none were
above the critical CVSS value of 7.0, which
would be considered a major vulnerability.
The management and resolution of
lower risk vulnerabilities used a standard
model that was an existing component of
the ISO/IEC 27001 Information Security
Management System operated by
Barclays. A continuous surveillance visit
by BSI ISMS auditors resulted in several
actions that needed to be addressed to
achieve the Kitemark criteria
The BSI Kitemark certification ensures
that a product or service meets the
required British, European, international
standard for quality, safety, performance
and trust.
Like ISO/IEC 27001, it’s a voluntary
certification, but is provided by BSI
– which maintains impartiality and
independence and is recognized for its
rigorous standards for apps and online
transactions. This includes a process of
ongoing assessments to maintain high
levels of security.
www.bcs.org
Anthropology
Cultural Studies Journal of Cybersecurity is a new open access journal
Computer Science committed to providing quality original research and
Security
scholarship in the inherently interdisciplinary cyber domain.
Cryptography
Economics
Submissions are now open and published content
Law
will be available from Spring 2015.
Psychology
Politics and Policy
War Studies
Reference
1. FS Tech www.fstech.co.uk/fst/Barclays_
Smartphone_App_Payments.php
cybersecurity.oxfordjournals.org
INFORMATION SECURITY
THE
G
IN
C
N
A
L
A
B
Y
IT
R
U
C
E
S
ACT
Security must therefore be viewed as a
component within the risk management
infrastructure of the organisation. The level
of security should be determined by the
needs of the business and in relation to
the provision of all forms of risk mitigation.
Various frameworks such as the ISO2700n
family of standards, COBIT and its
extended form RiskIT help to steer these
deliberations, but judgements remain
subjective.
On a positive note, the growing
importance of online transactions, the
increase of regulatory compliance
(including initiatives such as those of the
payment card industry), and increasing
awareness of cyber risks have increased
the awareness of business leaders of the
need for security.
doi:10.1093/itnow/bwv017 ©2015 The British Computer Society
Image: iStock/149354357
Graham Titterington examines the
many challenges organisations
face with IT security.
We live in a market driven economy and
the link between security expenditure
and its return on investment is tenuous.
Information security gives a form of
insurance: protecting the assets, reputation,
customer confidence, brand and, increasingly,
the physical security of the business as
more things become internet connected.
While these things are the most valuable
business assets, they are hard to quantify.
Neither the goals nor the route
to achieving security are clear. Total
security is impossible as people are a
major component in the risk scenario. In
addition the IT infrastructure in almost
all businesses is vast and not fully
documented. The threat environment
is continually changing and becoming
40
ITNOW March 2015
more menacing, coming from sources as
diverse as foreign powers and disaffected
employees. There are many laws and
regulations emerging in this area, notably
data protection legislation, but these set
objectives and the route to delivering the
requirements is not defined.
Security strategy in a business can only
be delivered in an efficient way if there is
a top-down strategy driven by the board
and structured along risk management
lines. This won’t guarantee success, but it
will help to clarify policies and should be
flexible enough to accommodate changing
circumstances.
Security is subordinate to the business
In general the business decisions relating
to information security spending should be
made on the basis of what level of risk is
acceptable, and what is the most efficient way
of achieving the necessary risk mitigation.
IT security is a necessary burden for
most organisations. Customers, partners,
staff, suppliers and other stakeholders
expect an organisation to be secure and
it is, therefore, hard to sell security as a
value-added commodity. However, the cost
to the business of not providing effective
security is enormous, possibly ruinous.
Despite this, security professionals are
always under pressure to cut costs.
The potential risk in the information
security field is hard to quantify. From an
actuarial point of view, rare major losses
are harder to estimate than more frequent
lower level losses. The biggest single risk
for most businesses is brand degradation,
and this is particularly hard to quantify.
The cost of a security breach is
often borne by a party other than the
one that was responsible for the lapse.
For example, individuals bear the
consequences of leakage of their personal
data, and are only partly compensated by
the organisation that leaked them.
You can’t secure what you can’t manage
Securing IT systems is an integral part of
managing IT systems.
The first requirement to secure
something is to have an accurate record
of what you have, how it is being used, and
corporate infrastructure is increasingly
incorporating personal devices that
are harder to manage and secure than
corporate-owned devices.
Who is responsible?
IT security needs to be driven by the top
level management in an organisation, and
in most cases there is now a policy
framework coming from the board.
However, this is only the first step.
Differences in the vocabularies used by
the business and the IT department have
impeded communication down the line.
Information security is a requirement on
people throughout an organisation and the
deployment of IT security products is often
delegated to departmental level.
For example, marketing or business
development may well be responsible
for corporate websites. IT departments
generally run data centres. Identity
management and user access controls
often come under the remit of the HR
department. This is a problem because
information security needs to be viewed
Total security is impossible as people are a
major component in the risk scenario.
what it is being used for. Most organisations
struggle to stay up-to-date with the status
of each of their servers, let alone with
user PCs spread across multiple sites and
countries. Simply managing all their digital
certificates is challenging.
Furthermore an integral part of any
IT system is the users, who may be
employees, subcontractors, suppliers,
customers, partners or others. All
of them are human and therefore
unpredictable. The human risk is most
evident in protecting removable storage
and mobile devices. If we ignore people
who deliberately seek to subvert security,
others will make mistakes or fall for some
form of social engineering scam. The
from a holistic perspective in order to
identify residual levels of risk resulting
from policies and practices in each area of
the corporate operations.
Where does the threat come from?
There is a wide gulf between headlinegrabbing stories such as the Sony Studios
hack and a typical cyber-attack. Most
incidents are the result of mistakes or
random malware attacks.
However, the deliberate attacks have
the most serious consequences. Deliberate
attacks are planned, determined and
often long-term. Such attacks may
come from disaffected employees and
former employees, competitors, criminal
gangs usually intent on fraud or theft, or
governments. The criminal gangs are the
main danger for most businesses. Attacks
can involve a multi-stage process that
starts with a social engineering approach
aimed at stealing key passwords and user
credentials for use in subsequent stages
of the attack. In some cases spyware is
downloaded into the organisation.
However, ultimately attackers are driven
by their own need for profit. This can
come from a few high value information
assets, a multitude of relatively mundane
information assets, or from inflicting
damage on an opponent.
Security management
Security management is a developing area
for product support. The higher levels of
security management have to dovetail into
business process frameworks and risk
management.
The intermediate layers include monitoring
and managing the configuration of IT
infrastructure, and the security information
and event management (SIEM) field.
While most compliance regulations
are expressed in business terms (with
the notable exception of the payment
card Industry data security standard), the
delivery of these requirements necessitates
numerous security controls.
This means that the reports available
from security management products
are crucial to satisfying compliance
requirements. However, they do need to be
re-presented in a format required by each
set of regulations.
When it comes to deploying security
products it is helpful to get products that
are well integrated with each other, even if
this means selecting on a basis of fit-forpurpose, rather than best of breed. Many
organisations are seeking to rationalise
their suppliers to help achieve this, as well
as to get better contractual terms.
www.bcs.org/security
March 2015 ITNOW
41
LEARNING AND DEVELOPMENT
DEVELOPMENT
AND MENTORING
doi:10.1093/itnow/bws004
doi:10.1093/itnow/bwv018 ©2012
©2015 The
The British
British Computer
Computer Society
Society
Image: Creatas/80608276
Jill Dann FBCS CITP, Director at Consultation Ltd, takes us on a whistle stop tour of BCSWomen Specialist
Group’s methods and tools.
It is an individual’s responsibility to take
on their own professional development
and mentoring. The BCSWomen Specialist
Group seeks to support women returning to
STEM careers as well as to inspire women
to have the best possible career utilising
their potential.
That doesn’t absolve any employer from
their responsibility to support employee
development, however, development needs
to support an individual in ways that make
sense to them; one which extends beyond
their workplace or current role.
Some women may not have resources
from an employer or be on a career break
or have other responsibilities holding
back their ability to focus on their careers,
for example, parental care, childcare
responsibilities.
Women are encouraged to join BCS
and BCSWomen to gain access to the
Personal Development Plan tools, the Career
Mentoring Network (currently in pilot phase)
42
ITNOW March 2015
and the group’s initiatives, such as the
events run this past summer on the 3 and
23 June 2014, to train mentors in some
of the necessary skills. The materials are
available, both a slideshow and exercise
workbook; Scotland and Wales have run
their own branch events using them.
Your goals, your outcomes
Any development activity is only valuable
in its effect on the individual, which is why
we focus on outcomes. Reflection on what
was gained from an activity is essential, as
it can help focus on the valuable outcomes
and aid future planning.
Reflection on personal direction and
development undertaken can then lead to
goals and a clearer idea of what is actually
helping.
A broad view of what works
What are relevant development activities?
Basically, anything that helps you progress
in a measurable way. If you are looking for
activities with specific outcomes to meet
development goals, then it is important to think
broadly about sources of help and to recognise
the triggers for changing behaviours.
BCSWomen hold events around the
country and can make materials available
wherever you are based. Anything from
an eBook, seminar, discussion and online
material, to a conversation can contribute
to your development. Structured activities
like BCS courses and certifications can
be very useful and, in some careers,
necessary. A blended approach is a good
idea focused on a goal to employment, role
change or progression.
Reports and articles, through to joining
a group committee, working group or
contributing to a policy statement can lead
to relevant outcomes against goals. Going
for Chartered status can help to move
your career forward. Simply meeting up
with other professionals can expand your
horizons, all the way through to more
structured mentoring towards a particular
purpose.
Guidance and resources
www.bcs.org/cpd contains a range of
guidance notes that can help you set out
on a development journey and has
suggestions on resources and events that
might be useful to you.
Getting systematic
Setting goals and recording your activities
provides a basic structure for your
development. With this in mind BCS has the
Personal Development Plan (PDP), an online
tool to help you record and plan goals and
activities and is highly customisable to your
needs.
It’s available to all at www.pdp.bcs.org, but
with some functions restricted to members.
It embodies our philosophy of development,
and it can be configured to suit your way of
working. Members can also report against
goals for sharing with others.
Mentoring
A mentor can, for example, help a mentee to
acquire technical expertise, to gain knowledge
and skills, understand appropriate behaviour
in social situations and to understand the
workings of an organisation and its
expectations of their role.
No blueprint exists for the ideal
mentoring relationship, but what is
common to all cases of mentoring is that
the mentee comes to view things in a
different way with expanded horizons. The
mentor engenders change in the mentee,
helping that person towards a new vision
of attainment.
Mentoring can be useful through
any part of your development journey,
helping you look at your career direction,
planning goals, or as an activity against
a goal. Mentoring others can, in turn, be
very rewarding and a useful development
activity in itself, as well as supporting the
wider development of the profession.
This is a great way of getting support in
your development and is a key element of
BCS’s professional culture. Being a mentor
is open to anyone who has something to
offer and is not restricted solely to those
with long experience.
The BCSWomen Specialist Group
can provide the materials for interested
members to run events to educate mentors
and mentees.
BCS plans to launch its Career
Mentoring Network, which will enable
members to make connections with
mentors and mentees as well as through
specific programmes (e.g. BCS Women,
BCS Entrepreneurs).
www.bcs.org/bcswomen
March 2015 ITNOW
43
LEARNING AND DEVELOPMENT
TECHNOLOGY
MEETS TRADITION
The Company hosts a monthly informal get
together at Bangers Wine Bar in the City of
London, it also hosts four annual business
lunches with notable speakers drawn from
industry. There are a further three formal
events; The Master’s installation service
and dinner, The New Freemens’ Dinner and
The Partners’ Dinner – a white tie
banquet held at The Mansion House, which
is the apex of the social calendar.
Civic duty
The senior members of the Company,
known as liverymen, have the right to
participate in the annual election of the
two sheriffs of the City of London, and with
the City’s Aldermen they elect The Right
Honourable The Lord Mayor of London - the
world’s oldest extant democratically elected
office.
doi:10.1093/itnow/bws004
doi:10.1093/itnow/bwv019 ©2012
©2015 The
The British
British Computer
Computer Society
Society
Image: iStock/533350537
Paul D Jagger FBCS CITP a Court Liveryman of The Worshipful Company of Information Technologists
explores the role of the Company, its links with charity, education, industry and fellowship, the armed forces and the City of London’s government.
Clearly the IT profession didn’t grow out of a
medieval guild, so it may surprise
readers to learn that IT has its own guild in
the UK, namely The Worshipful Company of
Information Technologists (the Company).
The Worshipful Company of Information
Technologists is one of 110 livery companies
in the City of London. The Company was
formed in the mid-1980s and achieved the
status of a guild soon after. In 1989 it was
granted a Coat of Arms and in 1992 the
government of the City of London conferred
livery company status upon the guild. In
2000 the Company moved into what it
describes as its ‘first hall’, premises in
the City of London, that is the home of the
Company for business and social events.
In 2010 the Company received a Royal
Charter presented by HRH The Earl of
Wessex on behalf of HM The Queen and in
2011 the Company opened its first school,
a project jointly funded with The Mercers’
Company (the most senior of the City livery
companies).
44
ITNOW March 2015
What is the role of the Company?
The Company is immensely active and
despite its youthful status it punches far
above its weight among the other livery
companies.
Some of the more tangible ways in which
the Company achieves its Royal Charter
aims include:
and has a strong technology focus.
The Company also provides school
governors, practical support and mentors
to students at Lilian Baylis Technology
School in Lambeth. With the support of the
Company Lilian Baylis achieved outstanding
rating in all aspects of its 2014 Ofsted
assessment.
Charity
The Company has been successful in
supporting several charitable initiatives
including partnering with Litelites – an
organisation that provides assistive
technology to severely handicapped
children. The Company also founded
iT4Communities, which links IT professionals
seeking to give their time and talent to nonprofit organisations.
Industry
The Company is described in City circles as
‘a working company’, meaning it is made up
of members who are still active in the occupation represented by the company.
The Company also has links with BCS at
both the organisation and membership level,
and those links form the basis for several
joint initiatives, such as an Oxford Union
style debate in 2013.
The Company also has links with the
trade association techUK, and many
employers of IT professionals.
Education
The Company jointly founded
Hammersmith Academy with the Mercers’
Company. The Academy opened in 2011
Fellowship
Armed forces and cadets
The Company has a long-standing
relationship with The Royal Signals, the IT
combat support arm of the British Army.
The Company awards prizes for
excellence among the soldiers and
officers of the Royal Signals and provides
career advice and mentorship for those
transitioning from the military to civilian
occupations.
The Company also has affiliations
with two cadet forces units in the Greater
London area. The cadets often provide a
carpet guard at formal company events.
the IT professional. The Company focuses
on charitable giveback and
providing an environment for fellowship.
The Company counts among its members
many Members or Fellows of BCS and
several past presidents.
Who joins the Company?
The membership comprises business leaders, IT entrepreneurs, freelance IT
professionals, academics, IT practitioners in
businesses of all sizes and those
working in allied professions such as law,
financial services and the information
content industry. With nearly 800 members,
the Company is among the largest of the
livery companies.
The Company has a diverse membership,
already having provided three female
Masters, and there are members
from a wide range of social and ethnic
backgrounds. What binds them all together
is a desire to give back to the profession,
and to meet in fellowship.
The Company also operates a very
successful journeyman scheme, a
mentorship programme for graduates in
the early years of their occupation. Many of
these journeymen (the term imports both
genders) go on to become Freemen of the
Company.
Church
Whilst the livery companies welcome those
of any faith or none, each Company is
affiliated with a church in the City. The
Priory Church of Saint Bartholomew the
Great is the place where the Company
comes together to worship for a number of
annual events.
How does the Company link with tradition?
The Company participates in many
city-wide traditions such as the annual Lord
Mayor’s Show and the United Guilds Service
at St Paul’s. The Company also embraces
the customs and ceremonies associated
with all livery companies at formal dining
events. Members have the opportunity to
become Freemen of the City of London and
even to stand for elected office in the City.
Four members of the Company have served
in the office of Lord Mayor of London.
Relationship with BCS
The Company and BCS have complimentary
roles that enable both to collaborate where
relevant, but focus on different societal
roles. BCS focuses on developing the IT
profession for the benefit of UK Plc, and for
What are the benefits of membership?
The Company is one of those organisations
where members get out what they put in,
and consequently each members
experience will differ. Some of the
highlights of membership include:
•
•
•
•
•
•
meeting with some of the most
influential people in the IT profession in
a neutral setting;
participating in the traditions, customs
and ceremonies of the City of London;
becoming a Freeman of the City of
London (yes, they can and do take
sheep across London Bridge);
the opportunity to make an immense
difference in the lives of less fortunate
people through charitable activities.;
participating in some truly memorable
and historic social, civic and
professional events;
mentoring entrepreneurs, small
business, students and soldiers to help
them develop and grow their IT career.
A common misconception is that livery
companies are a branch or offshoot of
Freemasonry. Whilst there is no direct
connection between the livery companies
and Freemasonry, it is probable that
Freemasonry grew out of the City of London
livery companies in the late 17th Century.
You don’t have to be a Freemason to join a
livery company.
What if I don’t live in or near London?
Livery companies are creatures of the City,
and as such their life is centred on the City
of London. However, the Company has
members all over the UK and there are
regional groups outside of London. There is
a wealth of sporting and social events that
happen outside of the City and many ways
for members to get involved without regularly coming into London.
How would I go about joining?
The Company is always keen to welcome
new members, male or female, young or
old, short or tall! The best place to start is
simply to contact the Company at IT Hall
and ask for the application form. If you don’t
know anyone in the Company, then the staff
at IT Hall will put you in touch with someone
who shares a similar background or perhaps lives near to you.
www.wcit.org.uk
March 2015 ITNOW
45
HEALTH INFORMATICS
EMAIL ARCHIVING AND HEALTH
INTRODUCTION TO BCS HEALTH
Mike Freeman, Sales Director, Techne-Comm Ltd, discusses the importance of email archiving in the
healthcare sector.
Gareth Baxendale FBCS, Head of Technology, National Institute for Health Research, Clinical Research
Network, University of Leeds, introduces himself and BCS’s health informatics group, BCS Health.
46
ITNOW March 2015
together under one agreed approach.
How to get involved in BCS Health
As a member of BCS you can simply join
our merry band by selecting ‘BCS Health’
from the list of specialist groups in your
secure membership area. Upon selecting
the option you will not only enjoy a warm
fuzzy feeling, but also start to receive
updates and invitations to specialist events
sent out by BCS Health.
You can also join a regional BCS Health
We work as volunteers bringing our
professional experience to help with health IT
challenges and support the interests of both
patients and health professionals.
policies and consultations offering position
statements on behalf of you, the member.
BCS Health supports and influences
professional standards; for example,
we are involved in supporting the new
Federation of Informatics Professionals
(FED-IP), which is an exciting initiative
to increase the professional standing of
informatics professionals and bring the
many informatics professional bodies
Group including BCS Health Wales,
Scotland, Northern, London & South East
and Northern Ireland and other supporting
groups such as BCS Primary Health Care,
BCS ASSIST and BCS Nursing. All play a
part in shaping and influencing key issues
faced by patients and professionals across
the health IT spectrum.
www.bcs.org/health
Image: Wavebreak Media/494385415
What is BCS Health
Well, perhaps I should start with the role
I play on behalf of BCS Health. I have
recently been privileged to take on the
role of Vice Chair Communications and
Publications, so it will come as no surprise
that I am somewhat keen on socialising
and educating (pretty much with anyone
who will listen) on the amazing work and
effort that goes on at BCS Health.
We work as volunteers bringing our
professional experience to the table to
help with health IT challenges and support
the interests of both patients and health
professionals.
BCS Health has many branches of
activity that you may not be aware of; in
fact many of the activities you are welcome
to join and participate in. BCS Health’s
focus is really about modern healthcare
and both the technology and patient data
that support it.
On the subject of data, BCS Health
feeds into an independent group called
the Professional Records Standards Body,
which was set up to represent patient and
care professional organisations on the
type and structure of data that should be
included in care records.
BCS Health also works to influence
policy and is represented on the BCS
Policy & Public Affairs Board who consider
policy affecting the IT profession and
wider society. BCS Health also works with
government and responds to relevant
doi:10.1093/itnow/bwv021 ©2015 The British Computer Society
doi:10.1093/itnow/bwv020 ©2015 The British Computer Society
Image: iStock/465134963e
We all like a warm welcome, so please
accept a convivial welcome from the
volunteers and BCS staff that make BCS
Health what it is today.
Now we’re all friends please let me
share with you a little about who we are…
Within the UK healthcare sector, NHSmail
is rapidly being adopted by NHS trusts. As
the only dedicated mail system to have
received government ‘OFFICIAL SENSITIVE’
accreditation and be fully approved by the
Department of Health for the purpose of
sharing patient identifiable and other
sensitive information.
As a result, the vast majority of NHS
organisations are using it in some form, with
usage growing due to the refresh initiative
driven by HSCIC, as well as the approval
of the ISB 1596 Secure Email standard in
March 2014. NHS trusts and organisations
are being encouraged to either move to
NHSmail or bring existing email systems in
line with the new standards.
NHSmail is currently being used by
over 500,000 GPs, healthcare workers
and other staff within the NHS. It brings a
number of benefits to users – both those
dealing directly with patients, as well as
other staff, such as those in administration
or procurement roles.
NHSmail is a national system, run
by the NHS, ensuring that users can
share folders and calendars across
organisations. It is a secure service, with
emails protected to the standards set out
by the UK Government. NHSmail is also
cost-effective, fast and always available,
allowing users to have access to the
information required 24-hours a day and
from any device.
However, the one downside to NHSmail
is that for the majority of users the size
of the mailbox is limited; storage space is
approximately 400MB. For users sending
patient data, files and scans on a daily
basis, this can be problematic, especially
considering that much of this information
must be kept for compliance and legal
reasons. The role of email archiving
therefore, is an important one.
The main requirements for an archiving
solution are ease of use and accessibility.
With the importance of the information
being exchanged, it is crucial that it can
be easily found and accessed, whilst
remaining 100 per cent secure.
For NHSmail users, emails can be
archived using Outlook Personal Storage
Folders, also known as PSTs. The difficulty
with using this format is that users are
not necessarily aware of where these
files are stored; they can be saved to
the desktop of the user or a network
drive, which undermines security and
can cause storage issues. Folders larger
than 2GB are often prone to corruption
and if this occurs, valuable data could be
lost. PSTs are also costly to back up as a
large amount of space is required when
they are backed up regularly. In addition,
searching for these files is complex, which
can present a challenge when, for example,
searching for a Freedom of Information
(FOI) Act request.
For critical sectors, such as healthcare,
archiving solutions should, therefore, be
easy to use and accessible. Searching for
specific information, for both the user and
supervisor, is made easier if the personal
folder structure of a mailbox is replicated
within the archiving solution.
Additionally, being able to search
according to different criteria – including
keyword in the message or subject, date,
sender or recipient etc. would ensure that
emails can quickly be found based on little
information. Ideally, this archiving solution
should not use PST folders, instead
archiving emails and relevant information
in a way that meets the security standards
and does not employ methods such as
stubbing or shortcutting.
The management of both the email
system and the archiving solution plays
a crucial role in the overall success of an
organisation. For the NHS, in particular,
having the correct technology and
solutions in place will enable users to be
more productive and effective, which can
ultimately impact on patient care.
www.bcs.org/health
March 2015 ITNOW
47
MANIFESTOS
MANIFESTOS
MAKING THE UK THE IT PLACE TO BE
doi:10.1093/itnow/bwv021 ©2015 The British Computer Society
Image: iStock/511665345
There will be a general election in 2015. In preparation many bodies have produced manifestos to try to
influence government policy in the IT space. Are they asking for the right things? Brian Runciman MBCS
reports on some of the manifestos and highlights some BCS reaction from a recent policy meeting.
According to Nesta UK (formerly NESTA,
National Endowment for Science,
Technology and the Arts) political
manifestos have actually been quite
successful in incorporating new trends –
for example the rise of automation and the
creation of the internet. However, they also
caution that ‘they rarely set out clear
policies for taking advantage of new trends,
or for mitigating their risks.’
Noting that government is also poor
at predicting the shocks that such trends
can cause and taking into account the
increasing speed of change in the digital
landscape, getting the approach to national
digital strategy right requires expert input.
As techUK has noted, the tech sector has
outperformed the rest of the private sector
over the last 10 years, and it recovered
far more quickly in the aftermath of the
2008 financial crisis. It will be even more
important during the next parliamentary
term and beyond.
Key themes
The key themes that come out of these
manifestos are:
1. UK startups and innovation;
2. tech in government services;
3. digital skills;
4. identity assurance and security;
48
ITNOW March 2015
5. European integration and global
integration;
6. the workforce;
7. the legislative landscape;
8. the tech itself.
UK startups and innovation
The Coalition for a Digital Economy
(Coadec) report that the ‘UK’s internet
economy makes over 8 per cent of GDP’
and predict that this will grow to 12 per
cent by 2016. Also noting that the UK was
the fastest growing economy in G20, it
draws attention to the role of microentrepreneurs in creating innovative
services. This means that innovation often
has its roots in the startup environment,
making it key to continued UK growth.
One problem Coadec draws attention to
is that of funding, noting that whilst seed
funding can be easier to get, taking ideas,
products and innovations forward, which
needs more funding, is increasingly tough.
Like many of the eight main themes
there is cross-over with other areas. In this
case job creation. The link is made explicit
by e-Skills, in quoting the 2007 Kauffman
Foundation study, which says that most job
creation comes from entrepreneurship.
Coadec wants to create an ‘environment
to encourage permission-less innovation
where possible.’ eSkills adds a practical
aspect to this with their view that every
country in Europe needs a ‘jobs through
e-entrepreneurship’ campaign. techUK
sees even further, asking that we make
the UK a ‘global hub for talent with a
smart migration policy’ to attract wealth
creators to the UK economy who can use
and disseminate the skills needed to make
innovative ideas fly.
What is BCS’s take on this? Simply that
we should aspire to make the UK a melting
pot for innovation.
The UK should be the destination for
innovation in IT, and the organisations
that can make this happen go beyond the
exciting start-ups at digital roundabout
to the bodies that take the lead in the
profession, government, policy bodies and
more.
Indeed, the BCS Entrepreneurs Specialist
Group aims to engage with entrepreneurial
communities to grow the digital ecosystem
for the benefit of members and society,
provide a real-time forum for existing and
would-be entrepreneurs to network with
an expert group of innovation stakeholders
from government, established and
emerging technology enterprises and digital
support clusters.
Tech in government services
A phrase that comes up several times in
the government services space is
‘government as a platform.’ Whilst it may
be tempting to see this as buzzword
creation, both Coadec and the Policy
Exchange put some meat on the bones,
with the idea that government should
release APIs for government services,
allowing others to innovate ‘on top’ of them.
techUK also discusses the use of
commoditised and utility solutions to
standardise functions and the sharing
of data. If there is a need for bespoke
services, which techUK concedes there
may be, it adds the useful corollary that
these be implemented in ways to promote
further growth – for example allowing
SMEs to reuse the intellectual property
(IP) they may have originally developed for
government contracts.
More specific suggestions come from
the Policy Exchange, which thinks that
the civil service competency framework
should be updated to include IT skills and
techUK suggests the next government
should appoint a chief privacy officer to
oversee and maintain public services.
As BCS notes, services are increasingly
digital by default – and that’s a good thing.
The Institute necessarily has this default
position – indeed BCS already does a lot
of good work in tandem with government,
including influencing at the policy level.
More specifically in recent years the
Institute had a pivotal role in introducing
a proper computer science curriculum for
schools – and continues to support users
with ECDL.
Digital skills
The need for improved and ongoing
support for digital skills comes out loud and
clear in nearly every manifesto available.
As eSkills comments, one of the problems
is Warholesque: ‘Today when you graduate
you are set for, say, 15 minutes.’ But it also
adds in the problem of the narrow field of
view because ‘national IT policies tend to
the population is online (Policy Exchange
compares this to the 98 per cent plus
penetration in Norway and Iceland).
The new computer science curriculum,
which, as noted above, BCS was
instrumental in bringing into being, is
mentioned in several manifestos. Coadec
notes that the suggested £3.5m to support
teachers in their teaching of the new
curriculum amounts to only £175 per
school - unfavourably comparing that to
the £15,000 per school that Jersey has
provided – albeit with fewer schools.
Policy Exchange is even more
parsimonious with its £3m pot for a
competitive grant to fund third parties
to deliver teacher training for the new
curriculum.
On the same issue the UK Digital Skills
Taskforce says a ‘minimum of £20m over
the next Parliament’ is needed to assist
teachers.
One suggestion to combat this issue
comes from Coadec, which suggests
incentives for startups to help train
teachers. Where an entrepreneur would
find the time may be another question - a
An EU report shows that only 25 per cent
self-report a high level of digital competency.
job too far?
Conversely, the National Institute of Adult
Continuing Education (NIACE) says that
investment in skills is ‘too heavily focused
on young adults at expense of over 24s.’
And with the issue of extended working
lives coming nearer then life-long learning
becomes even more necessary.
As e-Skills notes the ‘full potential of
egovernment will only be seen when the
European population is connected to the
internet and e-skilled.’
For the population at large e-Skills
suggests a European standard for
e-competency, calling for EU-wide
indicators of digital competencies
and media literacy. This follows an EU
TechUK suggests the next government should
appoint a chief privacy officer to oversee and
maintain public services.
focus on developing basic IT skills.’
One of the problems is the digital
inclusion gap. It is difficult to deliver
digital skills when only 83 per cent of
course, as NIACE acknowledges with its
view that ‘adults need to take ownership
of their own learning and development.’
They put forward the idea of a personal
skills account for all adults linked to an
entitlement to career reviews to help people
decide what skills development will work
for them.
In the higher education space, Policy
Exchange suggests removing the cap of
10 endorsements per academic institution
from the Tier 1 Graduate Entrepreneur visa.
BCS has a lot of traction in the digital
skills space – and it takes the view that
there are certain baseline competencies
that are needed to make digital skills
training effective. These skills are needed
to support growth – not just in education
and large business organisations, but also
SMEs and the civil service. This is not just
an education piece - there is a disconnect
with actually policy.
Lessons can and should be learnt from
recent history. In the UK the education
system has failed to educate those coming
into IT, with a historic failure to educate
at the school level in computer science
report showing that only 25 per cent of
people self-report a high level of digital
competency.
Some of this is about philosophy of
disciplines and, whilst there is progress
now, it could be said to be 20 years too late.
Technology is already at the core of
all businesses. The House of Lords is
currently undertaking a review of digital
skills, and cyber skills have been added as
an important part of this inquiry. BCS sees
this as a good starting point in the vital
upskilling process that needs to happen.
However there are caveats to this
discussion. BCS notes that there is a strong
sense of déjà vu about some of these
initiatives. Similar discussions took place
in Peter Mandelson’s knowledge economy
drive in the 1990s. Now these things must
be actioned.
One route that needs pursuing is
ensuring that there is a tax regime that
stimulates growth, especially as the EU
already looks to the UK as a good exemplar
in this area.
And what about IT professionalism
and digital skills in the civil service itself?
Reportedly, no government departments
are pushing for continuous professional
development – an area BCS understands,
can promote and views as vital for the
March 2015 ITNOW
49
MANIFESTOS
development of the industry.
To help the public at large take
advantage of digital services it was
suggested by BCS that there could be
incentives and help made available so the
public can all use them. There also needs
to be confidence in the system, as there are
still fraud issues and perceptions of cyberdanger that put users off. People will be
reluctant to access online services if there
are no assurances.
Reading’ links). Should the UK improve
access to non-EEA countries?
Tier 1 Exceptional Talent Visas come up
again here: Tech City can make 200 Tier 1
Exceptional Talent Visa applications - is that
enough? Certainly Coadec recommends
relaxing the eligibility criteria, with the idea
of enriching the local workforce.
For BCS an interesting angle here is
professionalism, long a campaign point.
eSkills talks about the new principles of
BCS notes a strong sense of déjà vu. Similar
discussions took place in Peter Mandelson’s
knowledge economy drive in the 1990s.
End-to-end services should be securely
coded. The example of GDS, which has
developed products and services that
people want to use, was mentioned. But,
in the end, BCS wants people to use digital
services because they are the easiest way
rather than because of incentives.
Identity assurance and security
For members of the public this is a big
issue. The Policy Exchange put forward the
concept of an independent data ethics
committee. Its idea is that this would
include not only representatives from
government, business, the charity sector
and legal groups, but from citizens groups
as well. It sees the creation of a Code for
Responsible Analytics to guide the
government in the responsible use of data.
If this included collection and re-use issues,
that would be a good approach.
European and global integration
A European Commission report from 2014
‘Does digital tech create or kill jobs?’
suggests that the skills gap is larger in UK
than in the rest of the EU.
techUK mentions tech exports and
recommends that the next government
should appoint a ‘Digital Trade Czar based
in FCO.’
The work force
A number of the above points could be
added to the issues around the digital and
IT workforce. Coadec usefully asks how the
UK can improve talent access. (see ‘Further
50
ITNOW March 2015
the 21st century: ‘collaboration, openness,
sharing, interdependence and integrity.’ We
may well ask where professionalism is here.
The legislative landscape
The legal aspects of IT, from data protection,
use of big data and perceptions of the public
to the allowing of data use to benefit UK
business are huge – and get bigger when
the EU and global context is taken into consideration.
Coadec comments on data protection,
mentioning that because startups and
SMEs lack the resources of larger
companies they can be particularly affected
by well-meaning but poorly thought out
provisions. They also acknowledge the
historical problem: pre-digital law and
regulation do not take into account such
things as ‘the value of user ratings, social
trust, GPS tracking and verified online IDs.’
Again a general philosophy could be
a good starting point. Policy Exchange
maintains that there should be a
data as the British Library.
Policy Exchange recommends that the
government conduct annual reviews to
ensure that legislation and the regulatory
and legal systems on intellectual property
keep pace with technical change. Is this
laudable goal realistic or even workable?
techUK mentions the recent and much
debated ‘right to be forgotten’ and how
that fits in with the concepts of free speech
and personal data and reputation. It calls
it a retrograde step with unintended
consequences, perhaps an example of
being badly ‘affected by well-meaning
provisions’ mentioned by Coadec.
BCS views: EU and regulation
The UK has had an uneasy relation with the
EU, beyond the toing and froing of political
posturing. The Institute aims to take the
global view into account too. The internet
is global and therefore should be talked
about in a global context - and not all EU
views are shared globally.
EU data protection and privacy
legislation is seen as being too
protectionist. This endangers potential
innovation and growth - fortress Europe.
Whilst the US view is freedom of
information and speech, it is poor around
the issue of net neutrality. The UK should
consider itself to be in a position to
enlighten and present a pathway to follow
– the best of both worlds.
To its credit the EU is pushing digital skills
in education, but in its regulatory frameworks
is less forward-thinking. For example, there
is no regulation for filtering of material linked
to terrorists - no regulatory process around
what should be censored.
Regulation is a two-edged sword.
Policy Exchange: HMRC has 80 times as much data
as the British Library
presumption that a citizen is in control of
their own data – very much in keeping with
web-creator Sir Tim Berners-Lee’s recent
comments on the subject, which BCS
agrees with.
It goes on to say that DP legislation
should focus on use rather than the
collection of data, quoting the stunning
figure that HMRC has 80 times as much
There is a danger of over-regulation,
which could stifle business and restrict
freedoms – especially as UK PLC’s success
is increasingly based on services provided
over the internet.
The BCS view is that generally the
UK approach is ahead in aspiration
and delivery. However, there are issues
around identity assurance. There is a
This document is ‘live’ and developing - give your views on
the issues raised via BCS Policy Hub: http://policy.bcs.org
polarisation in legislation around data and
privacy - with the UK excluded from many
international talks.
Interestingly in the EU, Estonia is said to
be the most innovative, with the UK held
back somewhat with too much legacy as
it moves from heavy industry. Progress
taking a leadership role in having skills
legislation that encourages innovation.
For the elderly there seems to be no
mileage in persuading them to up-skill
and there is no money from government
to do that. They need to cut costs and
cannot afford to offer telephone support.
have made people wary, with the feeling
that adequate security controls are not
yet in place. We have not yet reached
the point where citizens make decisions
based on trust of government.
www.bcs.org
Policy Exchange: ‘Ordnance Survey should make
their maps and data free to use.’
needs to be sped up.
The tech itself
What about the hardware, the metal itself?
Coadec says that the UK needs to
continue to invest in superfast broadband
and raise the level of ambition for digital
infrastructure. Especially taking into
consideration where the next areas of
growth for IT are likely to be. According to
figures from the techUK report, these are
(with value estimates):
• IoT $7.3bn by 2017;
• wearables $70bn 2024;
• 5G 40 fold increase by 2018;
• robotics $29bn 2018;
• autonomous vehicles £28bn by
2020.
As techUK notes these tech trends are
disruptive and global.
Three interesting views come up here:
Coadec suggest that ‘most investment in
digital infrastructure should be funded by
the private sector.’ But we may well ask
where that leaves less well-populated
areas, which are more expensive to get to.
The Policy Exchange gives a specific
example of opening data use, saying that
‘Ordnance Survey should cease to be a
trading fund and be removed from the
Shareholder Executive to make their maps
and data free to use.’
techUK asks for the creation of a major
new IoT programme to clearly articulate
the nation’s ambition to be a world leader
in IoT.
BCS views: The impact on the individual
IT should always be centred on people. So,
as mentioned above, this starts with the UK
This means that the interface needs to be
functional and simple to use.
As mentioned before, Estonia is an
interesting case - a place where everyone
is online. Could that be the aim for the
UK? This raises questions on the extent
of the role of government and where it
should cross-over with the private sector
on, for example, the rollout of high-speed
broadband to the whole population,
regardless of the geographic difficulty in
doing so.
The government also has a huge role in
protecting citizens’ data. As technologies,
app-driven experiences and online traffic
volumes have increased, has the idea of
consent been made no longer viable?
The BCS skills agenda should
include educating parliamentarians –
they are making decisions based on
briefings that may not give a full enough
picture. The BCS campaign strand on
professionalism includes the idea of
accountability – and whilst we would not
expect parliamentarians to be held to the
standards of a fully-fledged IT professional,
education at this level is paramount.
The pace of change outstrips legislation
easily. We are facing a future of work
that will include driverless vehicles,
computerised health diagnoses (see
Watson), streams of data coming from
personal databases and autonomous
machines on the IoT - possibly anonymised,
possibly de-anonymisable.
Individual citizens need to know where
they stand, have a clear view of their rights
and expectations and a way of keeping
abreast with the implications of change.
Notable IT systems failures in the past
Further Reading
Tech UK ‘Securing our Digital Future’
http://bit.ly/1CLpbYV
Coadec ‘The Startup Manifesto’
http://www.coadec.com/wp-content/
uploads/2014/09/Startup-Manifesto.pdf
NIACE Manifesto
https://www.niace.org.uk/sites/default/
files/images/niace_manifesto_skills_for_
prosperity_june2014_bw.pdf
UK Digital Skills Taskforce interim report
http://www.ukdigitalskills.com/wp-content/uploads/2014/07/Binder-9-reduced.
pdf
Policy Exchange Tech Manifesto
http://www.policyexchange.org.uk/
images/publications/technology%20
manifesto.pdf
http://www.nesta.org.uk/publications/
politics-foresight#sthash.X4Ng5WrP.dpuf
http://www.nesta.org.uk/publications/
politics-foresight
COADEC on improving talent access.
http://bit.ly/16E6Y2O
BCS Entrepreneurs
http://www.bcs.org/category/17002
March 2015 ITNOW
51
CES2015
DRIVE-BY
COMPUTING
doi:10.1093/itnow/bwv023 ©2015 The British Computer Society
Images: © BMW nVidia
When Henry Tucker went to CES2014 one of the things he was most impressed by were Audi’s computer
controlled cars. You could park them simply by pressing a button on your smartphone. They could also take the
controls in slow moving traffic, but because of legislation they couldn’t do more than that.
At CES2015, Audi was once again in
attendance with what looked like the same
cars and the same technology. This time
though at least one of the cars drove itself
from California to Las Vegas for CES.
This is the sort of leap forward I was
expecting. After all, the previous year’s car
had control hardware and software the size
of a laptop whereas the previous year had
a whole boot full!
The thing is the technology exists to
make self-driving cars safe. The Audi has
six radars, three cameras, and two light
detection and ranging (LIDAR) units. The
computers that allow the car to analyse the
road, choose the optimal path and stick to
it fit neatly in the boot. What is holding the
industry back is legislation.
The common argument, when people
are presented with computer controlled
52
ITNOW March 2015
cars is, ‘what if the software crashes?’ To
which I would say: is that any different
from your car breaking down? When you
look under the bonnet of modern cars
there are two things you can access
yourself, unless you happen to be a
mechanic, and they are the oil and the
water for the windscreen washer. With a
computer-controlled car it’s exactly the
same.
The other thing people sometimes
say is, ‘what if it goes out of control?’
Now this is clearly from the realms of a
Michael Crichton thriller where the cars
go wrong and start acting malevolently.
Again this isn’t going to happen. Software
and hardware already exists to remotely
disable cars - car rental firms use it to
disable stolen vehicles. Software and
hardware only go out of control because
of human intervention, not through their
own will.
I think that computers will be better
drivers than humans; they won’t take risks,
they’ll stick to speed limits and will be
more efficient.
One thing you do need in order to have
these self-driving cars though are accurate
maps. Paper maps and sat navs are
never 100 per cent accurate. With this in
mind we had a chat with Nokia about its
mapping project called Here.
It is sending cars out around the world
to map roads in amazing detail so that
cars, such as the Audi and every other one,
can drive safely on the roads because it
knows what is ahead of it.
Here also works with technology to
share real-time road information. So, for
example, if you are driving around a bend
and a car is coming the other way it has
sent information up into the cloud to tell
systems that there is an obstacle in the
road. Then, as you go around the bend,
your car receives that information and can
approach it with caution.
Now Audi and Nokia weren’t the
only companies to show off things they
have been working on. In fact most of
the major car manufacturers were in
attendance and there were keynotes from
Ford and Mercedes-Benz. In fact some
commentators are now saying that CES is
more important for the auto industry than
the traditional car shows.
BMW showed an electronic car valet
system that not only parks your car for
you (always a good idea) but then drives
it back to you after you press a button on
your watch. Now if that’s not straight out of
a sci-fi movie I don’t know what is.
It also showed its crash prevention
system that uses laser scanners to
measure the space around the car, so if
you don’t see an obstacle it will and will
then brake accordingly.
QNX, a subsidiary of Blackberry,
showed off a system of driver assistance
that uses sensors, cameras, navigation
engines, cloud-based services, speech
interfaces, and acoustics software to create
experiences that simplify driving tasks,
warns of possible collisions and enhances
driver awareness.
At the 2014 show I spoke to BMW and
they told me about their system for in-car
apps and it now seems that Ford has got
in on the act too. The company showed
off its systems where you can access
your phone’s apps using the app link tool,
including services such as streaming
music app Spotify.
One thing that annoys probably every
driver on the roads worldwide is road
works and the associated traffic jams that
they often cause. The constant stop-start
nature of these jams is something that
Bosch is looking to address with its Traffic
Jam Assist technology that it is introducing
in the first part of 2015 to give drivers
a ‘hands free experience’ in jams up to
around 45mph.
Even companies such as nVidia, which is
usually associated with computer graphics
development, have got in on the act. In
fact at CES2015 the main features of its
stand were two cars. It showed off its new
nVidia Drive CX that features a Tegra X1
processor that is designed to power a car’s
digital cockpit experience such as the sat
nav and entertainment functionality.
It also showed off its nVidia Drive
PX in-car computer that allows for app
development for semi and fully autonomous
driving. One such application is nVidia’s own
Deep Learning that, according to nVidia,
allows your computer to learn from its
surroundings and, to quote nVidia, ‘become
intelligent.’ It also features surround vision,
360 degree cameras, that can be used for
autonomous parking.
Driving around in our cars is,
statistically, one of the most dangerous
things we can do. Technology such as this
will, I think, start to make the road a lot
safer for all of us.
www.bcs.org
nVidia’s pedestrian detect feature
March 2015 ITNOW
53
ACCESSIBILITY
THE
ACCESSIBILITY
BUNFIGHT
Images: © FitLinxx - Sleep Number
‘We anticipate bunfights ahead,’
so said the Chair of NHS
England’s Accessible Information
Standard (AIS) at the first
advisory group meeting. Dr
Howard Leicester MBCS reports
on the current state of
accessibility in the UK.
AIS is now part of the UK Disability
Strategy and is a developing model for
other sectors. Documents in alternative
formats and face-to-face support are ‘in
scope’. However, despite obvious overlaps,
the web was ruled out.
I immediately called for development of
a parallel standard for ‘the orderly conduct
of bunfights’.
Stuck in the very problem I’m trying
to solve, I am a deaf and blind health
informatics academic. Reading, writing
presenting, facilitating are all impossible
for me without technology.
‘The right tools in the right hands help
everyone,’ said Stephen Hawking at the
2012 Technology For Good Awards.
Yet I have found very few, truly
accessible academic texts. My assistive
technology - a screen-reader that converts
onscreen text into synthetic speech or
braille - works with few of the guides and
tools freely available in education and
collectively known as EduApps.
I cannot send a legible text message on
an iPhone without a bluetooth keyboard
The accessibility component of the
Government Digital Service ‘Service
Design Manual’ identify my assistive
technologies as tools for testing
rather than aids for
would-be developers.
doi:10.1093/itnow/bwv024 ©2015 The British Computer Society
Evidence of considerable
need
Accessibility should be
mainstream by now.
Small screen, multienvironment mobile
phones are widespread,
while literacy challenges
are a known, national
problem (the Office for
National Statistics [ONS]
quoted ‘56 per cent of
the Northern Irish adult
population’ as examples,
before updating that page
54
ITNOW March 2015
[‘accessibility policy’] in 2013).
This - from the consultation document
preceding the NHS Information Strategy
- suggests possibilities for mutual
understanding between the IT mainstream
and disabled people through shared
(assistive) technologies:
‘‘Voice recognition software is used to
great effect in a number of clinical settings.
Significant improvements are expected in
devices to allow touch and even gesture
input of information into computers.’
Support for potential professionals, like
me, is unclear. A Freedom Of Information
Request in 2010 showed that Access To
Work (the Government agency supporting
disabled people in work) does not record
job roles or technology provided.
Across university students, ca. 10 per
cent have disabilities (in 2011/12 78,905
out of a total of 870,910). The Higher
Education Statistics Agency provide free
data on students by disability categories,
but not their academic disciplines.
The chart below shows the spread of
impairments reported to HESA in 2011/12,
the latest year for which figures are
available.
‘Learning difficulty’ probably means
dyslexia and is the highest group by far.
Those with sight or hearing loss seem very
under-represented. Data on staff were not
available. It should be noted that these are
self reported impairments. Many people
choose not to reveal any impairments they
may have, so the true numbers will be
higher.
Data on the general population come
from the ONS. Its ecommerce monitoring
development programme includes mobile
and internet use from its existing Never/
Ever online survey .
Between 6 and 7 million people have
never been online. A further 9 million
people are online but in need of help. Most
of the people in these categories are older
or disabled people.
Assumptions about who needs what
might be made based on another ONS
The Society of IT Managers ‘better
connected’ programme found only 25
per cent of council web and mobile sites
met even basic accessibility standards.
Abilitynet have found similar in eNation
reports .
The One Voice Coalition for Accessible
ing process, from version 1 in 1999. WCAG
updated to version 2 in 2010.
WCAG2 is expanding (mapped to and
appropriately adjusted) to cover documents
and software, through general ICT , and to
interactive web pages, via the rich internet
applications (ARIA) programme .
Between 6 and 7 million people have never
been online. A further 9 million people are
online but in need of help
ICT has now merged with the former
e-access forum to become the Digital
Accessibility Alliance advising government.
One Voice also won this pledge at the Lib
Dem’s 2014 main conference:
‘Review anti-discrimination law,
A special working group - on cognition
and learning disabilities - has recently
formed to encompass many traditionally
excluded by the predominance of text. Their
scoping document identifies many groups,
including dyslexia, and many missing
technologies.
WAI is built into
the British standard
(BS8878). It is developing
through several
specialist teams, an
interest group and its
education and outreach
task force. Nevertheless,
I still feel more needs
to be done to make
the WAI approach easy
to understand and
implement, especially by
those like me dependent
on assistive technologies.
product. The Life Opportunities Survey
(LOS). This a regularly repeated major
survey commissioned by the Office for
Disability Issues (ODI). LOS is specifically
designed to measure impairment rates
and impacts of policies.
Impairments are the secondary
consequences of conditions. With ‘chronic
pain’ highest on the list, those most
affected across the full 29 per cent of
the adult population are not the ‘usual
suspects’. But sensory loss, memory and
dexterity challenges do rise markedly with
age.
LOS also shows lower disposable
income in household with at least one
disabled member. Work and education
opportunities are also lower among the
disabled.
Important standards in transition
guidelines and standards on access to
digital goods and services to ensure they
are fit for the modern age and to ensure
fair access to digital public services, the
digital economy and the workplace.’
The underlying standards are
internationally recognised and come from
W3C’s Web Accessibility Initiative (WAI).
There are three connected components:
• Web Content Accessibility
Guidelines (WCAG) - covering
webpages and systems;
• Authoring Tool Accessibility
Guidelines (ATAG) - for content
management systems
• User Agent Accessibility
Guidelines (UAAG) - notably
combining browsers with Assistive
Technologies.
ATAG and UAAG are currently in the updat-
Join the bunfight
I focus on health. It keeps doors open in all
other sectors of society.
We know the scale and we have the
data to estimate needs. The accessibility
standards, though not fully developed, are
essentially in place.
The AIS Chair, who launched the
bunfight, also said ‘I’ll buy the champagne
if we pass full stage approval.’
Now is the time to make the party
happen. Support NHS England through the
BCS Digital Accessibility Specialist Group
and all its connections.
The champagne is on order, and I’ve
promised to provide the buns!
www.bcs.org/groups/dasg
March 2015 ITNOW
55
BRIEFING: BUSINESS INTELLIGENCE
STATE OF PLAY REPORT
doi:10.1093/itnow/bwv025 ©2015 The British Computer Society
Image: iStockPhoto/135161171
BUSINESS INTELLIGENCE
January 2014 saw BCS, The Chartered
Institute for IT produce its first State of
Play report on business intelligence (BI).
What’s changed for 2015? Brian Runciman
MBCS reports.
The 2015 IT spending forecast from
computerworld.com listed five areas
where respondents expected increased
spending, and third position went to
analytics and business intelligence.
Harnessing big data through enterprise
analytics, data mining and BI had 38 per
cent of IT executive respondents to the
survey expecting to spend.
They quote Gartner analyst Richard
Gordon on the new data coming into the
enterprise: ‘There’s a wave of data coming
from customers and social media. And as
the internet of things rolls out, there will
be even more information on customers.
Businesses are scrambling to figure out
how they can extract value from that
information.’
According to Andrew Brust, Research
Director of Gigaom Research, in each
of the last few years there has been an
overarching theme in the data arena. He
says that ‘2012 was the year big data
became really hot; 2013 was the year it
grew more accessible, through SQL-onHadoop; and 2014 was the year it became
far more versatile, with the addition of
YARN and Spark. 2015 will be the year
Hadoop matures.’
Whilst that may mean that there are
no huge breakthroughs, Brust notes that
the maturing of BI technologies will see
a move to more standardisation, more
adoption and therefore a more successful
integration of BI into the enterprise.
He predicts that Hadoop will become
more usable, more adoptable by the
enterprise and more developer friendly.
More on Hadoop, NoSQL and relational
databases are in the Gigaom report
‘Outlook: Big data and analytics in 2015’.
The mention of analytics in that title is
key – there has been a lot more coverage
56
ITNOW March 2015
during 2014 on the role of analytics. BI
solutions are more readily embraced the
more obvious their benefit is, so easy-touse analytics are key to a successful BI
platform.
Big data continues to be a muchbandied phrase, especially as it relates to
predictive analytics, but of course many
industries have been using data and
analytics for decades – the new tools just
make it much easier. One article in the
BCS report shows the potential benefits
of predictive analytics for the healthcare
industry. IT Professional magazine
examines what is truly new in terms of
predictive analytics, and what it means for
the IT industry.
Pat Saporito from the SAP Global Center
of Excellence for Analytics, says that BI
centres of excellence can play a key role
in managing corporate growth and in
enhancing the ‘analytic IQ’ of business
managers and owners. He shows that
centres of excellence can define and
operationalise a Bl strategy, and ensure
that the analytics get put into action.
Amongst other areas discussed, the
BCS report highlights pieces that look at
the need for supply chain organisations to
use effective business intelligence tools to
stay competitive; the role of real-time data
warehousing as a powerful technique to
achieve operational business intelligence;
and the increasing use of BI outside
commercial organisations.
For example, public sector offices in
the US are now expected to perform
like private industries in collecting and
providing pertinent information, according
to one piece in the report. Even though
the use of BI in the public sector is still
in its infancy, the case study from the
DeKalb Country Government located in
Georgia, which has implemented business
intelligence tools for its data management
including social services, billing and public
safety, makes for an interesting read.
In other areas, there are three case
studies looking at the use of business
intelligence tools by accounting firms
in the USA. And in terms of practical
applications, the BCS report covers an
article on how one Fortune 500 company
built itself a real-world Microsoft BI
dashboard; a piece on how BI can support
marketing strategies, based on a case
study approach; and an article on how
to take control of your BI with the tools
offered by SharePoint 2013 and Microsoft
SQL Server 2012.
Strategy
Best practices for business intelligence
This short article presents a list of 11 best
practices for business intelligence, which
the writer has adopted from a number of
online resources. They include: the need
for solutions to produce findings that are
immediately actionable and trustworthy;
and having constant input from business
leaders to keep IT on the right track. The
key point, according to experts, is to form
an ongoing partnership with business, so
the resulting BI solutions are embraced as
easy-to-use and strategically relevant.
By Dennis McCafferty
Source: CIO Insight, October 2014
Selecting the BI platform for your
organisational requirements
This article discusses ways of finding the
right business intelligence (BI) platform
for business enterprises and government
agencies. The writer describes the factors
which typically define the different types of
BI tool users. He also explains the different
integration characteristics and the level
of importance on which evaluation of a BI
platform should be based.
By John Matelski, DeKalb County
To get these articles and more
login to the BCS secure area, go to
‘My Knowledge’ then ‘State of Play
reports’
Members: login
in the secure a to ‘My Knowledge’
a to see furthe
listings witrhed
irect links r
Government (Georgia), and president of the
Independent Oracle Users Group
Source: Database Trends & Applications,
June/July 2014
Analytics
Getting started with predictive analytics
This article reports on the emergence of
business intelligence, and particularly
predictive analytics, in the healthcare
industry. The writer describes what
predictive analytics is and its potential for
the healthcare industry, and then goes into
various cases of how it is being used by
marketers and medical professionals in
the USA. One hospital, for example,
targeted people considering a
mammogram with a campaign about its
mammography equipment, greatly
increasing take-up. The article includes
a section on best practices for putting
together a predictive analytics strategy.
By Lauren Drell and Julie Davis
Source: Marketing Health Services, autumn
2014,
Big data and predictive analytics:
what’s new?
There’s a lot of noise about big data,
especially about its role in the new and
exciting field of ‘predictive analytics’, but
many industries have been using data and
analytics for decades. This article
examines what is truly new in terms of
predictive analytics, and what it means for
the IT industry.
By Seth Earley, Earley & Associates
Source: IT Professional, January 2014
SAP, Oracle Lead Sluggish BI and
Analytics Software Market
This article discusses research by Gartner
that showed the global business
intelligence (BI) and analytics software
market rose to US$14.4 billion in 2013,
with annual growth slowing to 8 percent.
Macro-economic factors were the most
important reason behind slower growth,
but it was also due to IT budgets remaining
flat and confusion on how to use
analytics. At a segment level, businesses
were moving from reporting-centric to
analysis-centric tools. SAP had the largest
share of the worldwide market with Oracle
in second place.
By Nathan Eddy
Source: eWeek, May 2014
Business process analytics using a big
data approach
Business users can continuously improve
their processes by using advanced
analytics methods and emerging
technologies, such as business intelligence
systems, business activity monitoring,
predictive analytics, and behavioural
pattern recognition. However, the high
volumes of event data produced by the
execution of processes during the business
lifetime prevent business users from
efficiently accessing timely analytics data.
This article presents a technological
solution using a big data approach to
provide business analysts with visibility on
distributed process and business
performance. The proposed architecture
lets users analyse business performance
in highly distributed environments with a
short time response.
By Alejandro Vera-Baquero, Ricardo ColomoPalacios, Universidad Carlos III de Madrid,
Spain, and Owen Molloy, National University
of Ireland
Source: IT Professional, November 2013
BI performance
Benefits and barriers to corporate
performance management systems
Corporate performance management
(CPM) systems using business intelligence
technologies can help enterprises
monitor and manage business
performance. In this research, we explored
and presented empirical evidence on the
key benefits of, and barriers to, the use
of CPM systems through a survey of 283
organisations across North America and
China. We identified three key benefits and
ten inhibiting barriers. The research
findings are useful for multinational
organisations that are planning, or are in
the process of implementing or reviewing
their CPM systems, as well as for consulting
companies that are assisting with such
systems implementations in different
regions.
By William Yeoh, Deakin University, Australia;
Gregory Richards, University of Ottawa,
Canada; Wang Shan, Renmin University of
China, Beijing, China.
Source: Journal of Computer Information
Systems, autumn 2014
Succeeding with BI
This article focuses on the significant role
of the business intelligence centres of
excellence (BI COE) in managing corporate
growth and in enhancing the analytic
intelligence quotient (IQ) of business
managers and owners. The writer says that
today Bl COEs define and operationalise a
Bl strategy, and ensure that the analytics
get put into action. She lists the practices
to consider including in a BI COE, such as
ensuring data is trustworthy, and providing
easy access to reports and analytics.
By Pat Saporito, SAP Global Center of
Excellence for Analytics
Source: Best’s Review, October 2014
An overview of information tools and
technologies for competitive intelligence
building: theoretical approach
The paper looks at competitive intelligence
(CI), which is a subset of BI, and concerns
collecting and analysing information about
the behaviours of the various markets’
actors in order to make decisions based on
market trends. This type of information is
mainly of a semi-structured or unstructured
nature, in contrast to the well-structured
information used in BI. The research study
is mainly exploratory and descriptive in
nature, with the objective of providing an
overview of CI issues and investigating the
various information tools and technologies
for CI building. It also highlights the most
important differences between BI and CI.
By Celina M Olszak, University of Economics,
Katowice, Poland
Source: Issues in Informing Science &
Information Technology, 2014
March 2015 ITNOW
57
DIGITAL LEADERS RESEARCH
WHAT DIGITAL LEADERS
WANT AND NEED
doi:10.1093/itnow/bwv026 ©2015 The British Computer Society
Image: iStock/511665345
Everyone wants a larger budget, but when only 8 per cent of participants feel that their organisation has
enough resources and more than 79 per cent indicate that they need enhanced IT skills among their
existing workforce or additional IT staff, the digital leader has plenty on their plate for 2015.
Brian Runciman MBCS reports.
For the fourth year BCS, The Chartered
Institute for IT has run a survey looking
at the needs of the digital leader. And the
faster the development of IT systems, the
more the business views and key problems
stay much the same.
For example, fifty five per cent of
participants rate business transformation
and organisational change as among their
organisation’s top three management
issues for the next 12 months. This is
followed by strategy and planning (50%)
and operational efficiencies (48%).
Businesses are clearly seized of
the need for IT to effect change in
their business dealings and internal
organisation. As would be expected, SMEs
and corporates have slightly differing
needs: Among SMEs the issue most likely
to be in the top three over the next 12
months is strategy and planning (59%).
For companies with over 250 employees,
business transformation and organisational
change (61% versus 40%) and operational
efficiencies (53% versus 36%) are more
likely to be high priorities than for SMEs.
58
ITNOW March 2015
Some issues were mentioned in the
‘free text’ part of the survey that will
undoubtedly become more common
concerns in the medium-term, such as,
regulatory response (which perhaps only
comes onto the radar when legislation is
more immediately looming); and platform
rationalisation.
Specifics: top IT topics
As to specific issues that need to be
addressed, it’s no surprise to see the
greatest number of respondents (60%)
rate information security as among their
organisation’s top three IT topics for the
next 12 months. This was followed closely
by areas that have moved well out of the
‘jargon’ phase and into business critical
applications: cloud computing (55%) and
mobile computing (53%).
These are the same three issues that
were identified in last year’s survey.
However, the order has changed with
information security and cloud computing
going up one place and mobile computing
dropping two places.
Analysis by number of employees
shows that information security is the
top answer for both SMEs and large
companies (over 250 employees).
Mobile computing is more likely to
be a high priority for larger companies
compared with SMEs (56% versus 45%),
whereas social media is more likely to
be a high priority for SMEs compared
with larger organisations (24% versus
9%) – perhaps a reflection of the shift in
marketing approaches.
The next concerns for the large
organisation were big data (36%) and agile
(22%).
Some of the issues much-discussed
in the media are not yet really on the
business radar in a large way, perhaps
indicating their niche market status at
present. These were the internet of things,
with only 11 per cent representation, and
3D printing with a paltry one per cent.
Other topics mentioned were agile and
operational alignment; robust IT for SMEs;
hosted telephony, general IT reliability
issues; the government digital agenda;
human-centred computing; network
bandwidth growth and new platforms.
One commenter made a valid point
on the range of new services becoming
importance.
Only eight
percent included
‘identifying the
capabilities
of your IT
professionals’
as a top three
priority – with
14 per cent
considering the
IT skills shortage
in their top three
and 16 per
cent counting
performance
management in
their top three.
Having said that, the survey suggests
that recruitment and retention is a higher
priority for more companies compared
with 2014 (up from 14% to 20%).
‘CEO’s in large enterprises are idiots - they no (sic)
nothing about the processes the IT department
uses for risk acceptance and design.’
cloud opportunities, networking, and the
extraction of meaning from big data.
This need came from a smaller business:
‘Up-to-date knowledge of suitable SME lowcost apps and software packages that can be
customised and integrated into our business.’
Concerns came from both ends of the
tech spectrum, from disruptive technologies
to legacy tools and services. Keeping skills
current and identifying the correct new
technologies for the business to implement
is viewed as a big challenge, and the depth
of technical skills came up in a number of
guises. One comment on a specific need
mentioned ‘automation and orchestration
experience skills’, and delineated that
comment with this rider: ‘true experience:
not just app UI, connectivity experience,
device experience, app experience and data
experience.’
A progressive business need that IT can
assist greatly with was identified by one
commenter: ‘expertise in certain languages
such as Brazilian Portuguese, Arabic and
Hebrew’ in their digital products.
The comment from one respondent on
‘technically competent management’ leads
nicely into our next section.
mainstream, saying that whilst
‘implementing digital culture and practice,’
is vital in the 21st century, organisations
still need to be looking at why they
would use these technologies, not just
implementing technologies because of the
‘look’ of them.
Larger organisations are more likely than
SMEs to need additional suitably qualified IT
staff (58% versus 43%).
Other concerns that cropped up, although
in much smaller numbers, were effective
corporate and IT governance; business
change expertise; and, to quote a comment,
‘better CEOs and other execs who understand
The skills and resources conundrum
As noted in the introduction, only eight per
cent of participants feel that their
organisation has enough resources to
address the management issues and IT
trends that their company has prioritised.
More than half (53%) indicate that they
need enhanced IT skills among their existing
workforce – with the same number
requiring additional suitably qualified IT
staff.
Strangely, activities that would support
the above requirements were rather
fragmented – certainly in terms of relative
There is a need for, ‘quality managers who
understand much more than simple economics.’
digital tech and its impact on organisations’
(on which more later). Business skills and
soft skills were also mentioned.
Biggest IT skills gaps: techy
The IT skills gap section garnered the
biggest ‘free text’ response in the Institute’s
survey. IT leaders care about this subject!
The usual suspects were much in
evidence: IT security, taking advantage of
Biggest IT skills gaps: people
The people issues surrounding IT skills are
broad ranging. Let’s start with a refreshingly
honest assessment of those at the top:
‘CEO’s in large enterprises are idiots - they
no (sic) nothing about the processes the IT
department uses for risk acceptance and
design - and are more interested in shiny
things or things that make them look good.
They need to think about what they are
doing and stop poncing about
pretending to know what they are doing
when it is clear that they have never
worked in IT for real, ever.’
Some comments on this problem were
more circumspect (helpful?) – summed up
well with the need for ‘understanding of
March 2015 ITNOW
59
DIGITAL LEADERS RESEARCH
the business and bridging the gap with the
organisation’s vision,’ and, ‘understanding
of the business objectives driving IT
choices.’
The gap in knowledge is more than just
in management for some. One person said
businesses could do without ‘outdated staff
looking back at when they could operate in
“god mode” and dictate to everyone what
they were given - and now moaning that
the world has moved on. IT departments
themselves are in danger of becoming the
biggest blocker on effective organisational
modernisation.’
One comment mentioned the need for,
‘quality managers who understand much
more than simple economics - people
are the key resource to be managed and
encouraged, not beaten into submission.’
Other places where soft and hard skills
one person citing ‘silos of knowledge - not
specifically because information sharing
is poor, but because the organisation is
small and we have specialists in individual
areas.’ Some larger organisations face
related situations, with some commenting
on the breadth of skills now needed in IT
people, making them look for those who
can play multiple roles in a team and have
knowledge of different technologies to
support business partners.
Here’s a laudable, if tough, goal.
‘We need future proofing abilities - the
organisation is running to stand still at the
moment.’
Churn is an issue, with some
organisations finding that the capabilities of
new recruits are insufficient to slot into the
existing workforce when an organisation
loses existing skilled personnel.
‘We need future proofing abilities - the organisation
is running to stand still at the moment.’
may overlap, and mentioned specifically
by commenters as problem areas
included simple experience: commercial
knowledge and experience; the need
for more and better project managers;
implementing agile methods; and fostering
an entrepreneurial culture.
A further wrinkle on the ‘hybrid
managers’ idea came with several
commenters pointing to the importance of
IT people being properly involved in selling
the organisational strategy and getting it
over the line and into delivery.
Some commented on the implications
of outsourcing, asking for, in one case:
‘In-house staff (project coordinators) to
be better capable of querying delivery of
solutions provided by the private sector.’
This respondent notes that skills are lost
to outsourcing and with them an ability to
respond to new technologies.
Specific types of organisation face
particular sets of issues. A public sector
digital leader lamented: ‘As a public sector
organisation it is difficult to recruit suitably
qualified staff due to the limitations on
salary (nationally agreed salary scales).
Even training our own staff will not
fully address the issues. This is further
complicated by the organisation seeing
efficiencies of technology adoption without
the necessary investment in the backend
staff to make these efficiencies a reality.’
SMEs faced something a little different,
60
ITNOW March 2015
One organisation’s loss is another’s
gain in this scenario, of course, with
those leaving sometimes doing so to go
onto better careers, a by-product of a
competitive workforce market.
One commenter gave an interesting
solution to some of these issues: ‘Our
organisation operates on a lean staffing
model, with skills augmented from external
service providers.
The model envisages the system
landscape and architecture to be designed
in-house and bringing in external suppliers
to provide the requisite infrastructure
and applications.’ This organisation still
has needs though: ‘Having a good system
architect and IT security experts are the
key gaps that the organisation faces.
in sub-standard agents without the skill
sets necessary. This causes major delays
and they incur penalties.’
Another ‘people issue’ is around an
increasingly aware consumer base. A
public sector digital leader said that they
need people with ‘digital awareness in
service design, to ensure we’re as digitally
savvy as our citizens’
Then there are the problems in actually
finding those with skills in emerging trends
– by definition a small recruitment pool.
This creates a tension when trying to be
innovative, with one digital leader saying
that the organisation suffers from ‘too
much time spent “keeping the lights on”
and not enough time spent innovating.’
The next three to five years
Looking three to five years’ ahead, the
same three main issues are expected to be
at the top of the list of priorities. However,
the order is slightly different, with strategy
and planning coming out top (46%),
followed by operational efficiencies (44%),
and business transformation and
organisational change (42%).
When asked which IT topics will be
the top three priorities in three to five
years’ time, information security is
again the top answer with 54 per cent.
This is followed by big data (42%), cloud
computing (40%) and mobile computing
(39%). The information security concern is
the top answer for both SMEs and large
companies.
There are a number of issues which
are expected to become a higher priority
in this time frame - the two showing the
highest percentage increase (compared
with plans for the next 12 months) are
succession planning (up from 9% to 17%)
‘We spend too much time “keeping the lights on”
and not enough time innovating.’
Supplier (service) management is a close
second.’
Biggest IT skills gaps: hybrid
As implied by the last section sometimes
the skills gaps are not in the organisation
itself but in their suppliers. Several
commenters pointed to the issues
surrounding assessing skills within their
outsourced partners. One respondent
complained that, ‘IT capability is being
delivered by an outsource agent who puts
and performance management (up from
16% to 23%).
Compared with the priorities for the next
12 months the IT topic showing the biggest
rise is internet of things (up from 11% to
28%). 3D printing goes up only one per cent
in this context.
Other areas mentioned as being of
medium-term concern were supply chain
integration; embedded wearable security;
other wearables; and predictive analytics.
For SMEs cloud computing is expected
to be the second priority (42%), whereas for
larger companies big data was anticipated
to be the second priority (47%).
People issues seem to be in the category
of ‘we’ll get there eventually’ with the IT
skills shortage, performance management
and recruitment and retention issues
all scoring higher is this future-looking
question than in immediate priorities.
More forward-looking were some of
the technical concerns that may impact
the business. Mentioned specifically
were concerns over the complexity of
virtual environments; polyglot systems
maintenance and migration to a post-Java
script web.
Sleepless nights?
The final question BCS posed in this survey
was: When considering upcoming changes
and trends in the IT industry, what is it that
is most likely to keep you awake at night?
Again, the answers were a mix of the
expected, and some thoughtful ideas on the
longer term.
As ever, security is at the top...and
came in a variety of guises: information
risk and security; availability; security and
stability in cloud computing and security
breaches. There were a lot of mentions
of topic-specific security issues around,
for example, the internet of things; smart
solutions; the compliance agenda, and
general reputational risk. Zero-day exploits
and the ever-changing nature of security
threats, were also mentioned.
Some issues were perceptual, for
example (all commenters’ views):
• The build-up of technical debt by
making wrong product selections;
• The illusions of remote access: that
everything is an app that appears to
have no cost;
• The speed of competitor change,
with the risk of products becoming
outdated;
• The possible effects of the revised
data protection legislation in 2017;
• The corrosive effect of hype and
•
•
•
•
•
•
nonsense in IT;
Slow change in large organisations,
ticking boxes around superficial
initiatives to comfort senior
management;
Cloud hosting being seen as the
panacea for everything by the
business without necessarily
thinking things through – hence also
the integration of different cloud
platforms;
The change in computers caused by
the exascale revolution;
Technically incompetent
management;
The burden of legacy;
Responding to change in a large
enterprise environment. Agile works
at small scale, but it is difficult to
scale without it turning back into
compressed waterfall.
Financially based concerns included (again,
from comments):
•
•
•
nannounced changes to suppliers/
U
customers systems;
Provision of high-speed broadband
to customers for free;
Cost of software licensing Microsoft vs open source.
Some have identified bigger issues. One
commenter laments ‘the complete lack of
human beings involved in recruitment applicant tracking systems have reduced
the quality of the recruitment process to
almost useless.’
And there are ever-present dichotomies,
for example the combination of the
need for computer security and privacy
protection against the public expectation of
easy and quick access. If this tension leads
to shortcuts, that will cause problems. One
commenter warns about the government’s
desire to integrate and adopt collaborative
data sharing without full investigation into
the consequences in terms of resources
and IT security.
Alarms are also raised at the risks
associated with cloud computing and the
US government’s stance on data stored on
infrastructure belonging to US companies
- with the associated data protection
nightmare.
One commenter warns of a ‘collapse
of trust in online systems because of
over-complexity and lack of attention to
resilience and security.’
Positive notes to end on
So, there’s plenty for the digital leader to
do, consider, worry about, look forward to…
and clearly many of them, whilst
concerned about the risks, take an
admirably positive view, one that takes
people rather than just cold technology into
account.
One commenter’s chief concern? Being
‘people-centric: developing systems that
the public want to use.’
Another points to the importance of the
shift of capability from traditional IT roles
to a more distributed user-oriented model,
whilst maintaining control and governance
over the enterprise architecture.
Here are some final answers to ‘When
considering upcoming changes and trends
in the IT industry, what is it that is most
likely to keep you awake at night?’
•
•
•
‘Nothing - that’s why I have a CIO!’
‘Not a lot - that is what claret is for.’
‘I’m confident that we are up to the
challenge.’
The full research is available to BCS
members in the Members’ Secure Area at
bcs.org
March 2015 ITNOW
61
FROM THE BLOGS
BCS JOURNALS
GAMIFICATION AND PROJECTS
The term ‘project gamification’ caught
Project Eye’s attention. As some of the
Project Eye team have had brushes with
delivering project management training,
the idea of using computer games to
simulate project scenarios sounded great.
Given the sophistication of computer
gaming platforms, there could be some
interesting development out there.
It started out with so much promise.
Project Eye looked at a report on project
gamification published by its old friends at
APM, which directed it on to the insights
of Dan Pink on the nature of motivation. If
you have got 18 minutes to spare, his TED
presentation is really worthwhile.
He presents a body of scientific research
that shows that financial incentives can
improve work performance on mechanistic
tasks. However, for more creative and
problem-solving tasks (which Project
Eye guesses includes most software
project activities) an intrinsic interest in
the challenge of the task is more likely to
generate superior performance. In these
cases, financial incentives can actually get
in the way.
Some have promoted gamification as
a way of increasing intrinsic motivation.
Gamification refers to the use of computer
games thinking and mechanisms in
non-computer games environments. The
key elements that have been taken from
computer games are:
• points – you get points for getting
things right and achieving things;
• rewards – you get some kind of
reward if you get lots of points
(apparently this might even be
financial rewards!);
• badges – you can also get some
kind of recognition for your
successes;
• leader boards – you are publicly
ranked competitively with your
co-workers.
One Project Eye acquaintance of mature
years commented that this reminded him
exactly of what his teachers at his north
Kent grammar school did decades ago.
The idea of games is that they should
have an element of fun, but in today’s
cut-throat, competitive, work environment
gamification just sounds awful. Is this just
Project Eye? (Project Eye has just been
reminded it should stress that this is a
personal view and should not be taken as
reflecting any policy formulated or position
taken by BCS, The Chartered Institute for IT
FREE WILKES AWARD PAPERS
as a learned institution).
Much of the research that Dan Pink
described has been around for decades.
The classic ways of increasing the intrinsic
interest of work have been job expansion
– increasing the range of tasks carried out
by an individual, such as getting software
developers to carry out some business
analysis roles – and job enrichment, letting
a worker carry out some tasks previously
carried out by managers, such as when
maintenance programmers are allowed
to talk directly with end users. This seems
to be a much more promising approach
in the world of IT projects than silly point
scoring.
Still the whole point of Project Eye is
to stimulate heated debate. Can project
gamification really be as irrelevant to IT
projects as Project Eye perceives? Put us
right below – but we can’t promise you
any points, rewards or badges for your
contributions.
The winning papers for The Computer Journal Wilkes Award for 2014 have been announced.
Exceptionally, this year the prize has been awarded to two joint winners. These articles are now available
free online, the extracts appear below.
A movable architecture for robust spatial
computing
David H. Ackley, Daniel C. Cannon and Lance
R. Williams, Computer Science, University of
New Mexico, Albuquerque, USA
For open-ended computational growth, we
argue that: (1) instead of hardwiring and
hiding component spatial relationships,
computer architecture should soften and
expose them; and (2) instead of relegating
reliability to hardware, robustness must
climb the computational stack toward the
end users.
We suggest that eventually all truly
large-scale computers will be robust
spatial computers - even if intended neither
for spatial tasks nor harsh environments.
This paper is an extended introduction for
the spatial computing community to the
movable feast machine (MFM), a computing
For the links mentioned in this post, to
comment and to get regular PM updates
visit:
www.bcs.org/blogs/projecteye
Interacting with Computers The Interdisciplinary Journal of
Human-Computer Interaction
62
ITNOW March 2015
•
•
•
Volume 27, issue 1, January 2015 special
issue: Methods for Studying Technology in
the Home, contains the following papers:
friends;
searching for special deals or
employment;
finding or accessing local services;
staying up to date with news.
For these 11 million people though, does
the digital concern outweigh the
benefits? Let us know what you think
and how these fears might be better
addressed.
To be part of the debate and get further
updates on digital skills visit:
www.bcs.org/digitalskillsblog
•
•
doi:10.1093/itnow/bwv028 ©2015w The British Computer Society
doi:10.1093/itnow/bwv027 ©2015 The British Computer Society
doi:10.1093/itnow/bwu111 ©2014 The British Computer Society
Skills For A Digital World
Digital education starts early in schools,
with children expected to be fully digitally
literate by the time they leave. After this
time, and for people who are not
considered digital natives or not interested
in computers, the onus is very much on
the individual to develop skills.
In the Government Digital Inclusion
Strategy, 21 per cent of the UK population
is quoted as lacking basic digital skills.
This could be down to a lack of access,
skills, motivation or trust, but to put this
into perspective, it means around 11
million people are not benefitting from the
digital world.
There are numerous initiatives by the
government and other organisations, such
as Barclays’ Digital Eagles and the Tech
Partnership, that offer help to encourage
more people online. At BCS, we provide IT
user qualifications to schools, universities,
training centrwes, local authorities and
employers which aim to support digital
skills development from the classroom to
the workplace.
Digital skills could enable people to
benefit from things such as:
• savings by shopping online;
• flexibility of paying bills online;
• keeping in touch with family and
On selecting the nonce length in distancebounding protocols
Aikaterini Mitrokotsa (1,2) Pedro Peris-Lopez
(3), Christos Dimitrakakis(1) and Serge
Vaudenay (1) from (1) EPFL, Lausanne,
LATEST CONTENTS
EVERYONE BENEFITS FROM DIGITAL SKILLS
Last year marked the 25th anniversary of
the WWW. During this time digital
technology has transformed every aspect
of public, private and working life.
model in the spirit of an object-oriented
asynchronous cellular automata.
We motivate the approach and then
present the model, touching on robustness
mechanisms such as redundancy,
compartmentalisation and homeostasis.
We provide simulation data from
prototype movable elements such as
self-healing wire for data transport and
movable ‘membrane’ rings for spatial
segregation, and illustrate how some larger
computations like sorting or evaluating a
lambda expression can be reconceived for
robustness and movability within a spatial
computing architecture.
•
•
•
•
Formal Aspects of Computing Applicable Formal Methods
Volume 27, Number 1contains the
following papers:
• Synthesizing bounded-time
2-phase fault recovery
Mixed methods for HCI research in • Modeling and enhancement of the
the home
IEEE 802.11 RTS/CTS scheme in an
Disruption as a research method
error-prone channel
for studying technology use in
• Integrating stochastic reasoning
homes
into Event-B development
At home with users: a comparative • Formal probabilistic analysis of
view of living labs
detection properties in wireless
Researching young children’s
sensor networks
everyday uses of technology in the • Verification of distributed systems
family home
with the axiomatic system of MSVL
Seeing the first-person perspective • Denotational semantics and its
in dementia
algebraic derivation for an eventTailored scenarios
driven system-level language
Switzerland; (2) University of Applied Sciences
of Western Switzerland (HES-SO), Geneva,
Switzerland; (3) Carlos III University of Madrid,
Madrid, Spain.
Distance-bounding protocols form a family
of challenge - response
authentication protocols that have been
introduced to thwart relay attacks. They
enable a verifier to authenticate and to
establish an upper bound on the physical
distance to an untrusted prover.
We provide a detailed security analysis of
a family of such protocols. More precisely,
we show that the secret key shared between
the verifier and the prover can be leaked
after a number of nonce repetitions. The
leakage probability, while exponentially
decreasing with the nonce length, is only
weakly dependent on the key length.
Our main contribution is a high probability
bound on the number of sessions required
for the attacker to discover the secret, and
an experimental analysis of the attack
under noisy conditions. Both of these show
that the attack’s success probability mainly
depends on the length of the used nonces
rather than the length of the shared secret
key. The theoretical bound could be used by
practitioners to appropriately select their
security parameters.
While longer nonces can guard against
this type of attack, we provide a possible
countermeasure which successfully
combats these attacks even when short
nonces are used.
To view these papers visit:
www.oxfordjournals.org/our_journals/
computer_journal/wilkes_award.html
BCS Members can get a reduced
subscription rate to Interacting with
Computers and Formal Aspects of
Computing:
www.bcs.org/category/17544
ITNOW March 2015
63
F_UOD_0356 UDOL IT advert v2_Layout 1 02/02/2015 17:34 Page 1
THE COMPUTER JOURNAL
RECOMMENDED
READY TO ADVANCE YOUR
CAREER IN COMPUTING?
doi:10.1093/itnow/bwv029 ©2015 The British Computer Society
This paper presents an analysis of the
energy consumption of an extensive
number of the optimisations a modern
compiler can perform.
Using GCC as a test case, a set of
10 carefully selected benchmarks are
evaluated for five different embedded
platforms. Hardware power measurements
on each platform are taken to ensure
all architectural effects on the energy
consumption are captured.
It is shown that fractional factorial
design can find more optimal combinations
than relying on built-in compiler settings.
The relationship between run-time and
energy consumption is explored and
scenarios are identified where they are and
are not correlated.
A further conclusion of this study is
that the structure of the benchmark
has a larger effect than the hardware
architecture on whether the optimisation
will be effective, and that no single
optimisation is universally beneficial for
execution time or energy consumption.
Performance Modelling and Simulation
of Three-Tier Applications in Cloud and
Multi-Cloud Environments
The authors are with the Department of
Computer Science and Information Systems,
Cloud Computing and Distributed Systems
64
ITNOW March 2015
A significant number of cloud applications
follow the 3-tier architectural pattern.
Many of them serve customers worldwide
and must meet non-functional
requirements such as reliability,
responsiveness and Quality of Experience
(QoE). Thus the flexibility and scalability
offered by clouds make them a suitable
deployment environment.
Recent developments have shown
that using multiple clouds can further
increase an application’s reliability and
user experience to a level that has not
been achievable before. However, research
in scheduling and provisioning 3-tier
applications in clouds and across clouds is
still in its infancy. In this article, therefore,
an analytical performance model of 3-tier
applications in cloud and multi-cloud
environments is proposed. It takes into
account the performance of the persistent
storage and the heterogeneity of cloud
data centres in terms of virtual machine
performance.
Furthermore, it allows for modelling
of heterogeneous workloads directed
to different data centres. The CloudSim
simulator is used, and extended, in this
work.
Reusing Garbage Data for Efficient
Workflow Computation
The authors are with: IBM Center for
Advanced Studies (Atlantic), University
of New Brunswick, Canada; Faculty
of Mathematics & Computer Science,
University of Lethbridge, Canada; and
School of Computer Engineering, Nanyang
Technological University, Singapore.
High-performance computing systems,
including clusters, grids and the most
recent clouds, have emerged as attractive
platforms to tackle various applications.
One significant type of application in
HPC systems is workflow computation,
which has been applied in various
scientific and engineering domains.
Workflow computation frequently
produces intermediate result files, which
become garbage after being used and are
usually cleaned up without making any
contribution to future computation.
In this paper, it is argued that such
garbage data could be useful for
future computation and should not be
immediately cleaned up. This is because
workflow computation usually contains
multiple instances that may share some
common data products produced in
the past. This sharing scheme provides
opportunities to reuse the historical data
to speed-up subsequent computation and
simplify re-computation due to faulty or
crashed runs.
To this end, a garbage data manager
(GDM) is proposed, for the workflow
computation in HPC systems. The GDM
organises and manages the garbage
data for batch schedulers to enhance the
performance of subsequent computation.
The Computer Journal
The Computer Journal has published
advances in the field of computer
science for over 55 years.
Members can get heavily discounted
subscription rates:
www.bcs.org/cjournal/subscribe
Courses starting in May, September or February include:
n
n
Andrew Lee Managing Director
William Hill Online
£19.99
BCS member price
ISBN 978-1-78017-254-5
BSc (Hons) Computing and Information Technology (top up)
MSc Information Technology
Study part-time, 100% online – no exams.
Call us on 01332 594000 or visit www.derby.ac.uk/IT
Whether you’re starting out, moving up or starting again
WE’RE READY WHEN YOU ARE
BC1074_ld__ad_itnow_hp_af.qxp_Layout
1 03/02/2015 14:36 Page 1
bcs.org/books/agile
© BCS, The Chartered Institute for IT, is the business name of The British Computer Society
(Registered charity no. 292786) 2015
BC1078/LD/AD/0215
This article is available on open access.
The authors are with the Department of
Computer Science, University of Bristol and
Embecosm, Lymington.
(CLOUDS) Laboratory, The University of
Melbourne, Australia.
Whether you are looking to update your web, database and
network management skills or seeking a Masters degree to help
you move up the career ladder, our online distance learning
courses give you the flexibility to study alongside your work and
personal commitments.
‘This book outlines
a pragmatic view
across all agile
frameworks.
Its approach is at
the heart of how we
continually evolve
the delivery and
cultural effectiveness
of our organisation.'
CAREERS IN
IT SERVICE
MANAGEMENT
This new series of practical
books provides informed
career development guidance
for IT professionals.
Includes CPD advice, practical
tips and case studies.
For more information and sample chapters, visit bcs.org/itroles
Also available from all major booksellers and ebook stores.
© BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2015
BC1074/LD/AD/0215
The following papers are from The Computer Journal, issue , Volume 58, 2015. The overviews are largely
based on the abstracts. They are provided by Editor-in-Chief, Professor Fionn Murtagh.
Identifying Compiler Options to Minimize
Energy Consumption for Embedded
Platforms
BC1078_ld_ad_itnow_qp_ma.qxp_Layout 1 03/02/2015 17:00 Page 1
LEFT OF THE INSIDE BACK COVER
No photos please
Is it sad that while I was at CES 2015
recent BCS campaigns keep coming into
my mind? asks Brian Runciman MBCS.
Let’s start with the Women in IT
campaign we did last year. The problems
women face in society in general are
inevitably linked in with any industry
specific situation such as ours. So when
Henry, BCS Editor-in-Chief, and I were
looking at an (impressive) display of 80
inch 4k TVs, we were not surprised to see
close-ups of roses lightly covered with
water droplets, so far so generic.
But then the ladies started appearing.
Initially beautiful faces, where you could
clearly see the makeup in skin pores....
perhaps this is making a subversive point,
we thought.
Then, and this is not a joke (on any level),
two lightly clad ladies appeared, pillow
fighting. If it wasn’t so awful it would be
funny, summing up in a nutshell some of
the issues to be addressed.
I won’t mention manufacturers, but TV
folks were far from the only offenders.
An audio company had a cage dancer,
all the IoT and wearable manufacturers
seemed to have a thin attractive female
on a treadmill (irony!). There was a lot of
unconscious (?) sexism about.
I took a couple of photos of these
examples planning to run them with this
piece, but then felt weird about it. If I post
those photos it would start to feel like the
‘sidebar of shame’ on a well known UK
national newspaper’s website. So they
are gone from my phone, even though
I originally took them with the best of
satirical intentions.
It occurred to me that we could
illustrate this story with a picture of Henry
(our Editor-in-Chief) and me, but then
realised THAT would be sexist in this
context. Then I thought we could get our
pictures taken with a female techie, or a
female mover and shaker in the industry,
and realised that would be patronising.
Then I got confused trying to work out
the implications, ethics and political
correctness of the situation and my head
literally exploded (not literally).
Anyway, this is why BCS works so hard
on the ethical side of things.
The magnificent seven
The first session at CES had lots of
numbers of varying interest and the
obligatory (?) Yul Brynner reference.
Steve Koenig, Director, Industry
Analysis at CEA split the global consumer
technology market into two main areas:
mature, including the US, Asia Pacific and
Europe; and developing - the rest.
The thrust of this session was the
popularity of our ever-more loved/invasive
devices and CEA’s predictions for 2015
usage. Unsurprisingly smartphones are
still the main driver, described by Koenig
as the leader (Yul) of the Magnificent
seven: digital cameras, desktop PCs,
tablets, laptops, video game consoles and
doi:10.1093/itnow/bwv030 ©2015 The British Computer Society
Urrghh....
Some of the marketing terms at CES made me a bit queasy. Would any selfrespecting dad or mum refer to themselves as a ‘data-driven parent’? And while we
are looking at this particularly egregious example, if parents need to be ‘empowered’
to ‘stay connected to their newborn’, they are not ready for parenthood!
66
ITNOW March 2015
LCD TVs. Not sure which one is Charles
Bronson, as he seemed to prefer a
different sort of hardware...
One interesting question was posed in
passing: will hardware battles soon be a
thing of past as cloud delivery takes hold?
The three screens
The three screen motif refers to
smartphones, tablets and TVs. The first
two will have a 46 per cent share of the
tech market this year. Indeed they’ve been
rapidly ballooning (as was I in Vegas) for a
while now. Will that continue?
Yul Bryner will move around 1.5 billion
units this year, a 19 percent growth rate
- slowing down but huge. New low cost
handsets coming in 2015 will see 75 per
cent of that, mostly in developing markets.
More than a third of that in China alone.
The likes of Oneplus, coolpad and xiaomi
are pressurising Apple and Samsung in
China. But these companies have global
aspirations too.
Tablet (Steve McQueen?) unit sales are
predicted to hit 337 million this year, again
a slight taper in growth. Like smartphones
a lot of lower cost models are coming
in. Koenig referred to this as ‘maturation
and modification’: a number of players,
a number of form factors, screen sizes
making tablets, phablets, phone and laptop
forms mutate.
TV (surely Robert Vaughan) used to be
called the small screen, but that doesn’t
work now does it? The TV market has
returned to growth: 2 per cent for 2015.
The average screen size for 2015 will be
a not inconsiderable 43 inches. 60 inch
plus LCDs are getting larger shares too.
(Apparently 60 is the new 50!)
4k ultra HD will see a 150 percent unit
increase for 2015 to 23.3 million, with
China dominating demand. Existing 1080p
will be good for consumers because they’ll
get...cheaper, cheapish, cheap (relatively)!
Connected TV will grow, quelle surprise!
60 percent of TVs will be connected
devices in the US, for example, during
2015. What of the curved screen? At
present the numbers are tiny: barely 1 per
cent of the market.
The trends at CES 2015 were largely
as expected: smart watches, health and
fitness tech (mostly wearables), new
automotive tech and the internet of things.
Information:
the new
currency
IRMS
Conference
2015
The Celtic
Manor Resort
17-19 May
Book your place at Europe’s premier information
and records management event now at
www.irmsconference.org.uk
@IRMSConference
#IRMS15
Public Seminars and In-House Training
p
Enterprise Architecture
p
TOGAF™ 9 Certification
p
Zachman Certification
p
Architecture Skills
p
Corporate IT Strategy
p
Enterprise Investment
p
Implementing Change
p
Business Architecture
p
Business Processes
p
Business Rules
p
Requirements Process
p
Business Analysis
p
Data Modelling
p
Information Strategy
p
BI, Big Data & Analytics
p
Data Quality
Conferences
p
Master Data Management and
Data Governance Conference Europe 2015,
18-21 May 2015, London
p
Enterprise Architecture and Business
Process Management Conference Europe 2015
15-18 June 2015, London
p
TDWI BI Summit
7-9 September 2015, London
p
Business Analysis Conference Europe 2015
21-23 September 2015, London
p
Enterprise Data & Business Intelligence
Conference Europe 2015
2-5 November 2015, London