Law and Ethics for Security

Slides:



Advertisements
Similar presentations
HIPAA AWARENESS TRAINING
Advertisements

Using Information at the University University Secretarys Office
University of Minnesota
IT Security Policy Framework
Configuration management
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Chapter 17 Controls and Security Measures
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
INTERNET and CODE OF CONDUCT
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Business Law for the Entrepreneur and Manager
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Slide #6-1 Law and Security CS461/ECE422 Computer Security I Fall 2010.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Class Discussion Notes MKT April 10, 2001.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Lecture 11: Law and Ethics
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Chapter 4: Laws, Regulations, and Compliance
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Data protection—training materials [Name and details of speaker]
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Privacy and the Law.
Surveillance around the world
Protection of CONSUMER information
Lesson # 7 A Practical Guide to Computer Forensics Investigations
E&O Risk Management: Meeting the Challenge of Change
Chapter 4 Law, Regulations, and Compliance
CompTIA Security+ Study Guide (SY0-401)
Computer Programming I
IA455 Chris Danieli and Zachary gibson
General Date Protection Regulation
Presentation transcript:

Law and Ethics for Security CS461/ECE422 Computer Security I Fall 2011

Overview Cybercrime Intellectual property Law and privacy Ethics

Reading Material Chapter 18 of text Secrets of Computer Espionage: Tactics and Countermeasures, Joel McNamara, Chapter 2. On compass. CyberLaw web course from DoD. http://www.cs.uiuc.edu/class/fa06/cs498sh/cyberlaw

Motivation Need to understand legal environment Protect self/organization From law suits From tainted evidence From attackers Understand personal rights and obligations Caveat: I am not a legal professional...

Four Lanes of the Road CyberLaw course identifies four classes of investigators Service Provider Law Enforcement Intelligence War Fighter Laws affect them differently

Computer Crime Historically difficult to prosecute Lack of computer expertise Laws referred only to the physical Example: computer break in case that had to be stated in terms of lost computer time instead of lost data Victims are hesitant to come forward A bank doesn’t want its customers to know it has been compromised Cheaper/easier just to absorb the cost or pay off the attacker

Role of Computer in Crime Computer is the source of the crime, e.g., theft Existing theft laws apply Computer is means used to commit crime, e.g., net bots Unique to computers Computer used as storage device, e.g., store stolen passwords, proprietary corporate info, pornographic info Computer incidental to the crime, .e.g, computer was used to send email discussing crime, stores spread sheets tracking illegal sales Computer contains evidence to prosecute other crime. Search and seizure concerns

Computer Fraud and Abuse Act (CFAA) of 1986 Criminalize unauthorized access to “protected computers” Federal computers Computers owned by large financial institutions Computers user for communication or interstate commerce Pretty much any computer on the Internet USAPA includes foreign computers if they affect interstate commerce Criminalizes Computer extortion, Computer Fraud, Theft of financial information, trafficking in passwords, transmitting malware. Maximum penalty of 20 years and $250,000 fine Must cause at least $5,000 damage Robert Morris of the original worm sentenced to 400 hours community service and $10,500

Economic Espionage Act of 1996 Addresses theft of trade secrets FBI can be involved in a foreign government is suspected Redefines “goods, wares, or merchandise” to include company's “proprietary economic information”.

Intellectual property from Computer Perspective Software Protected by copyright. In some cases patent Databases If it contains information of commercial value could be protected by copyright Digital content, e.g. audio files, video files, web site content Algorithms Patentable algorithms, e.g. RSA

Digital Millennium Copyright Act (DMCA) Encourages technical controls To prevent access To prevent copying Digital Rights Management (DRM) Service providers must track IP assignment to satisfy DMCA requests

Tension between Privacy and Security Understanding expectations of privacy Relevant laws and technologies 4th amendment Wiretapping Patriot Act Key Escrow/DES Freedom of Information Act

European Union Data Protection Directive Principles of information use: Notice: organization must notify individuals of what information they are collecting on them Consent: individuals must be able to choose whether their information is disclosed Consistency: organization must follow items 1 and 2 Access: individuals can access, update, delete data collected on them Security: organizations must provide adequate security Onward transfer: third parties receiving data must provide same controls Enforcement: individual (or government on individuals behalf) can take action on failure

4th Amendment Fundamental privacy protection The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

USA PATRIOT Act (USAPA) Covers many things In our scope, augments or clarifies previous laws addressing electronic privacy Acronym Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism

Wiretapping Can wiretap only for “serious” crime Require court orders Wiretap act established in 1968 Set of serious crimes has grown, false info on student loan applications? Require court orders Pen Registers and Tap-and-trace devices only capture “header” information, e.g., dialed numbers but not conversation Full wiretap also captures content Must demonstrate probable cause for full wiretap Wiretapping reports http://www.uscourts.gov/Statistics/WiretapRepor ts.aspx

Electronic Wiretapping Electronic Communication Privacy Act of 1986 (ECPA) Expands Wiretap Act to include electronic communications Three exceptions that don’t require court authorization Individual can monitor communication resulting from a break in on her computer Banner that alerts computer is private implies consent to monitoring Monitor to prevent misuse of system (by non-govt entity) USAPA said only a single court jurisdiction needed to be involved in issuing warrants

Electronic Search Stored Communications Act of ECPA Covers privacy of stored electronic data Stored with a third party Since the data is outside your control, you do not have the same expectation of privacy that you would say in your house No search warrant and court order needed Only subpoena and prior notice (to ISP) Google’s transparency report http://www.google.com/transparencyreport/governmentrequests/ What does this mean for cloud computing? Currently being tussled with in court

Ensuring Wiretap Availability Communications Assurance for Law Enforcement Act of 1994 (CALEA) Requires that telecommunication carriers use equipment that is compatible with wiretapping Enforced by FBI group Expensive to comply with Estimated telcos will spend 0.5 to 2.7 billion dollars to comply over 5 years.

CALEA Expansions Recent FCC expansions IP telephony must be CALEA compliant if server-oriented Vonage, yes. Skype, no. Expanded definition of service provider to include Universities 2006 ruling confirms that Universities must comply but private network communication is exempted (e.g., staying within UIUC network)

Foreign Intelligence Surveillance Act (FISA) Addresses intelligence community instead of law enforcement Generally another country is involved Info can be used in criminal courts with restrictions Separate court reviews requests

USAPA extensions to FISA Roving wiretaps Specify target instead of phone number or type of communication May over monitor to gather right data, e.g. Library Reduced Burden of Proof for Pen register Can use on non-citizen simply to further investigation Citizens protected by First Amendment... http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm

FISA and the War fighter Do FISA restrictions apply to the war fighter?

Privacy Functional Requirements Common Criteria functional requirements for privacy Anonymity Cannot determine real user identity Pseudonymity Like anonymity but can make user accountable for resource use Unlinkability Cannot tie together multiple instances of resource use to the same individual Unobservability Others cannot tell that resource is being used

International Law Most western countries have similar laws E.U. Data Protection Act in fact leads in personal privacy Difficulty in enforcing computer crime now Attackers generally bounce through multiple countries Look for talks from NCSA or CITES people French restrictions on Encryption Illegal to use encryption in France until the late 1990’s Now requires registration and key escrow Similar constraints in China and India China laws against speech causing civil unrest Bad press against Google, Yahoo, Cisco, Microsoft and others E.g., “democracy” and “freedom” gets no hits on the Chinese version of Microsoft’s portal

Cryptography Until 1998, US had stringent restrictions on export of strong encryption Cryptography as munitions National Security PGP source and “Warning: this T-shirt may be a controlled munition”, http://www.cypherspace.org/adam/shirt/ In 1996 US government offered to reduce export restrictions for escrow encryption Clipper chip, Capstone, Forezza Encryptions algorithms not fully explained Earlier details of reasons for DES not fully explained Assumed NSA changed design for a backdoor

Industry Pressure on Compliance Three major regulations: Sarbanes-Oxley Act (SOA or SOX) Gramm-Leach-Bliley Act (GLBA) Health Insurance Portability and Accountability Act (HIPAA) Compliance – providing assurance that controls are in place and effective. Not sufficient to just implement security services – must demonstrate continual control and management involvement.

Gramm-Leach-Bliley Act of 1999 Requires financial institutions to protect confidentiality of customers’ nonpublic personal data “Customer Records” Social Security, Drivers License, Birthdate Credit Card Numbers Loan and Account numbers Authorized federal agencies (including SEC and FDIC) to work out the specific regulations Specifies a point employee, risk assessments, regular tests, and process for updating security plan

Health Insurance Portability and Accountability Act of 1996 Requires health-oriented companies to take reasonable safeguards to ensure the integrity and confidentiality of individually identifiable health information Claims or equivalent encounter information Payment and Remittance Advice Claim Status Inquiry/Response Eligibility Inquiry/Response Referral Authorization Inquiry/Response Security of Health and Human Services in charge Drove many technology changes in the health sector

Sarbanes-Oxley Act of 2002 (SOX) Response to Enron Requires companies to produce annual reports on internal financial controls Directed by SEC Cost of compliance Heavy auditing requirements Lack of clarity early on concerned many companies Some companies de-listed rather than comply

Ethics Just because it is legal doesn’t mean it is right And visa versa What are you moral guidelines? Religion Absolute right and wrong Natural law Greatest good Ends justify the means Whatever seems good at the time What my boss tells me

Professional Codes of Conduct ACM http://www.acm.org/about/se-code IEEE http://www.ieee.org/about/corporate/governance/p7-8.html AITP http://www.aitp.org/?page=ConductStandards State of Illinois Ethics training http://www2.illinois.gov/oeig/etcc Boy Scout Law http://usscouts.org/advance/boyscout/bsoathlaw.asp

Conflicts of Interest Between Software Professional and Employer

Find Flaw in Insulin Pump From recent DEFCON presentation. Authentication and encryption problem in wireless Insulin Pump. With 10 lines of perl can remotely adjust pump operation Tell people of flaw? Work with manufacturer? What are the ethical issues and consequences?

Forced Inoculation Discussed in http://www.secureworks.com/research/articles/other_articles/ethics/ You have a piece of software that will fix a vulnerability that is being exploited by the malware du jour Do you send out your own worm to inoculate?

Key Points Laws and policy describe security and privacy intents Laws cover a range of computer issues Intellectual Property Government security enforcement Computer crime Computer investigation Understanding laws important Many laws written without sufficient technical review Impacts you or your company Large societal implications