Information Society Security Risks
Attacks Origin Consequences RISKS...
The Attacks Availability Integrity Confidentiality
The Origin ACCIDENTS Physical Accidents Breakdowns Loss of essentialservice Force majeure ERRORS Operational, conceptual or implementation errors MALEVOLENCY Theft - Sabotage Fraud Logical Attacks Dispersion
The Consequences Direct and indirect losses Material and immaterial losses Supplementary Expenses and operational losses Losses of assets ( goods, money ) Civil responsibility Sabotage of the enterprise operations Injure the business image Damage the competitive capability
Risk Management Prevention Protection Detection After incident recovery Transfer to insurance Repression
The RISKS Major Dead or alive unacceptable insurance inadequate Minor probability of incident x severity temporary acceptable prevention and/or insurance
Types of Problems Intrusion Viruses Quality of information Confidentiality Intellectual rights Criminality - security
Who is responsible ? Who is the organizer ? How identify the actors ? Law applicable ? Questions
Intrusion Alteration Destruction Access - theft data programs Theft of resources
Who can use the INTERNET ? What can they do on the INTERNET ? Who authorizes ? How can it be controlled? INTERNET Usage Politics
Protection against Intrusion Barriers (firewalls) Access Control –identification –authentication signature –authorization classification Cost calculation Access Journalisation
Methods of Violation CLASSIC pass-word attacks brute force encryption and comparisons social engineering
Methods of Violation (cont) MODERN interception of data Ethernet sniffing Keyboard Logging Monitoring X-Windows Modified Utilities (login, in.telnetd, in.ftpd, finger,...) Attacks based on protocols Encapsulated or wrong configured utilities (NIS, NFS, TELNET, FTP, WWW, R-commands, Sendmail, …)
FIREWALLS Everything that is not permitted is forbidden ? Everything that is not forbidden is allowed ? All the incoming and outgoing traffic should pass the firewall !
Limitations of FIREWALLS Session-jacking of a connected and authorized user Tunnel interfere with an authorized traffic Circumvention usage of an alternative access Weaknesses of certain applications
Problems with FIREWALLS Reduction of the network throughput Recovery in case of breakdowns Not 100 % reliable Generate a blind confidence Insufficient Installation Tests Permanent Upgrades required The danger is not only external Logs control work Static defense
Protection against Alteration Seal (electronic seal) Protection against destruction Safety copies
VIRUSES Impossible to avoid The ideal antidote does not exists The viruses grow in number and complexity Decontamination is a highly specialized job
QUALITY of INFORMATION Newspapers have degenerated. They may now be absolutely relied upon. Oscar Wilde ( ).
Data Reliability
Access Control Encryption symmetric keys asymmetric keys
Encryption Individual Society Legal Status of encryption ?
INFORMATION BATTLE Espionage Industrial Espionage Criminality Terrorism
Information Highway and Society Cost of access and usage Info-poors and info-riches Contents surveillance Impose access restrictions
Code of conduct Censure ? Regulation ‘sensitive Information’ via the information highway
Protection of intellectual rights Serial number Copyright registration Encryption Product marks
Private life protection
ELECTRONIC COMMERCE PARTY AUTHENTICATION AUTHORIZATION CONFIDENTIALITY INTEGRITY - NON ALTERATION JOURNALISATION NON REFUSION at EMISSION and at RECEPTION
SECURITY is and will always be in the first place a HUMAN PROBLEM!
Not connecting is the only 100 % security