Security Measures for Small and Medium-Sized Enterprises – Threats to Infrastructure

Infrastructure includes all essential assets and services on which the information system is based, such as the supply of power, communication or processing services. These services are critical to the operation of the information system and exposed to certain threats. The section below describes the most common threats in this area and suggests appropriate protective measures for a small or medium-sized enterprise.

Fire

Fire can be a destructive threat, both to physical media (paper files) and to data stored on electronic devices (loss of availability). The source of this threat may be internal or external, deliberate or accidental. To prevent it, the following instructions should be followed:

Service Interruption

Service interruption means the inability of the IT system to provide the desired service and/or the requested data, and therefore, entails at least a temporary loss of availability. There are specific measures you can use to protect against it:

Denial of Service/Distributed Service

DoS (Denial of Service) or DDoS (Distributed DoS) attacks cause the IT system to overload, resulting in blocking web or network services. They are usually the outcome of a deliberate and malicious act. How can you protect yourself?

Please consult the CIRCL file for more information in case of DDoS attacks: https://www.circl.lu/pub/dfak/DDoSMitigation/

Disrupted Transmission of Wireless Communication

Disrupted transmission of wireless (Wi-Fi) communication may be the result of a DoS attack (botnets, for example), or of a radio wave transmission problem (loss of availability). To avoid these problems, make sure that:

Wireless Network Tapping

Wireless (Wi-Fi) networks do not rely on any physical media. They are transmitted through the air, meaning they can be tapped with a simple passive sensor. This may result in loss of confidentiality for your data. You can avoid this risk by making sure the following security measures are applied:

See also Securing the internal Wi-Fi network and Securing the customer Wi-Fi network.

Interception of Communication

A third party may intercept, corrupt or delete transmitted data (man-in-the-middle attacks) and thereby compromise the confidentiality, integrity or availability of the data. You can protect the transmission of your communications by using the following methods: 

Please consult the CIRCL file for more information about secure communication: https://www.circl.lu/pub/dfak/SecureCommunication/

Network Unavailability

Loss of telecommunications (loss of availability) paralyses IT systems. It is advisable to have access to a redundant source point, if possible with a second telecommunications provider, using different connection equipment tested on a regular basis.

Power Cut

A power cut may cause a loss of availability for the whole IT system. Energy supply is especially vital for organisations that run ‘real-time’ operations. Guard against this threat by having:

Discontinuity of Service Providers

An entity depends on its providers. Unavailability at service provider level can consequently have serious repercussions on its own operations. It is, therefore, preferable to provide:

Infiltrating the Premises

A violation of the secure perimeters may have serious consequences on confidentiality, integrity and availability for any organisation. An ill-intentioned person with access to assets within the company could steal, sabotage or make copies of these assets, causing a lot of damage in the process. Ensure that: