Cryptography and Network Security Chapter 23 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.

Slides:



Advertisements
Similar presentations
Lecture 20 Legal and Ethical Aspects modified from slides of Lawrie Brown.
Advertisements

Ethical and Legal Aspects of Computer Security
Introduction to Copyright Principles © 2005 Patricia L. Bellia. May be reproduced, distributed or adapted for educational purposes only.
Peter D. Aufrichtig, Esq..  Intellectual Property clients look and sound like all other clients.
Lecture 22 Legal and Ethical Aspects
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
US Copyright and Intellectual Property Issues Carol Green.
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Discussion 1 Gather into groups of 3-4 for 15 minutes With reference to the BBC Glass Wall case study, discuss the following question and present three.
Chapter 7.5 Intellectual Property Content, Law and Practice.
UFCEXR-20-1Multimedia Sound Production Multimedia Sound Production and Copyright.
Intellectual Property OBE 118 Fall 2004 Professor McKinsey Some property, very valuable property, exists only in our minds, in our imagination. It is intangible.
Chapter 14 Legal Aspects of Sport Marketing
IP=Increased Profits How to Make Your IP Work For You Rachel Lerner COSE Fall 2006.
C OPYRIGHT — W HAT ’ S THE B IG D EAL Copyright in an Academic Setting.
Keywords: Legislation, Guidelines, Ownership, Copyright, Permissions, Copyright Free LO: You will be able to understand and explain Copyright, Designs.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Copyright Law in Schools By Fran Rader
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
MSE602 ENGINEERING INNOVATION MANAGEMENT
What is Intellectual Property ? Patents- protection of technology Trademarks- protection of domain names and product identity Copyrights- protection of.
Legal and Ethical Issues in Computer Security
11/13/2012ISC329 Isabelle Bichindaritz1 Professional, Legal, and Ethical Concerns in Data Management.
5020 Montrose Blvd., Suite 750 Houston, TX (fax) (mobile) WHAT IN-HOUSE COUNSEL NEEDS TO KNOW ABOUT IP August.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 19 “Legal and Ethical Aspects”.
COPYRIGHT ESSENTIALS Module 1 Retrieved from:
4.1 Chapter 4 Copyrights © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Data Security and Encryption (CSE348) 1. Lecture # 30 2.
What is intellectual property?
Ethical and Social...J.M.Kizza1 Module 5: Intellectual Property Rights and Computer Technology  Computer Products and Services  Instruments of Protection.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
The Quest for Copyright Understanding Miguel Guhlin
Data Security and Encryption (CSE348) 1. Lecture # 29 2.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown, edited by Archana Chidanandan Legal and Ethical Aspects.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
From Article I, Section 8 of the U.S. Constitution: “To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors.
COPYRIGHT ESSENTIALS Module 1. Module One Overview  This module will teach you what copyright is and what is protected by copyright.  Questions this.
April 11, 2011 Objective: Students will identify the important of protecting intellectual property.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 8 Intellectual.
Intellectual Property Legal Implications. What is Intellectual Property? The product of creativity and intellectual endeavour Intellectual Property Rights.
Intellectual Property Law Introduction Victor H. Bouganim WCL, American University.
Legal and Ethical Issues in Computer Security Csilla Farkas
4.1 Chapter 4 Copyrights © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
An Overview of Intellectual Property by John Slaughter September 26, 2009 © John Slaughter All Rights Reserved.
Chapter 18 The Legal Aspects of Sport Marketing. Objectives To introduce the key legal concepts and issues that affect the marketing of the sport product.
Slide Set Eleven: Intellectual Property Patents, Trademarks and Copyrights 1.
The Ethical Use of Electronic Media. Guilford County SciVis V
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 7: Intellectual Property.
Slides by H. Johnson & S. Malladi- Modified by SJF- S'061 Computer and Information Security Chapter 13 Legal and Ethical Aspects.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
Intro to Intellectual Property 3.0
Intellectual Property
INTELECTUAL PROPERTY RIGHTS
Intellectual Property:
Joining the Conversation
Computer Security Ethics and Privacy
INTELLECTUAL PROPERTY RIGHTS
Chapter 9 Internet Law and Intellectual Property
Computer ethics in computer science curriculum
The Ethical Use of Electronic Media.
Intellectual Property
The Importance of Intellectual Property
INTELLECTUAL PROPERTY RIGHTS
Chapter # 6 Intellectual Property
Cryptography and Network Security Chapter 23
INTELLECTUAL PROPERTY RIGHTS IN FINLAND
Presentation transcript:

Cryptography and Network Security Chapter 23 Fifth Edition by William Stallings Lecture slides by Lawrie Brown

Chapter 23 – Legal and Ethical Aspects  touch on a few topics including: cybercrime and computer crime cybercrime and computer crime intellectual property issues intellectual property issues privacy privacy ethical issues ethical issues

Cybercrime / Computer Crime  “criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity”  categorize based on computer’s role: as target as target as storage device as storage device as communications tool as communications tool  more comprehensive categorization seen in Cybercrime Convention, Computer Crime Surveys

Law Enforcement Challenges

Intellectual Property

Copyright  protects tangible or fixed expression of an idea but not the idea itself  is automatically assigned when created  may need to be registered in some countries  exists when: proposed work is original proposed work is original creator has put original idea in concrete form creator has put original idea in concrete form e.g. literary works, musical works, dramatic works, pantomimes and choreographic works, pictorial, graphic, and sculptural works, motion pictures and other audiovisual works, sound recordings, architectural works, software-related works. e.g. literary works, musical works, dramatic works, pantomimes and choreographic works, pictorial, graphic, and sculptural works, motion pictures and other audiovisual works, sound recordings, architectural works, software-related works.

Copyright Rights  copyright owner has these exclusive rights, protected against infringement: reproduction right reproduction right modification right modification right distribution right distribution right public-performance right public-performance right public-display right public-display right

Patents  grant a property right to the inventor to exclude others from making, using, offering for sale, or selling the invention to exclude others from making, using, offering for sale, or selling the invention  types: utility - any new and useful process, machine, article of manufacture, or composition of matter utility - any new and useful process, machine, article of manufacture, or composition of matter design - new, original, and ornamental design for an article of manufacture design - new, original, and ornamental design for an article of manufacture plant - discovers and asexually reproduces any distinct and new variety of plant plant - discovers and asexually reproduces any distinct and new variety of plant  e.g. RSA public-key cryptosystem patent

Trademarks  a word, name, symbol, or device used in trade with goods used in trade with goods indicate source of goods indicate source of goods to distinguish them from goods of others to distinguish them from goods of others  trademark rights may be used to: prevent others from using a confusingly similar mark prevent others from using a confusingly similar mark but not to prevent others from making the same goods or from selling the same goods or services under a clearly different mark but not to prevent others from making the same goods or from selling the same goods or services under a clearly different mark

Intellectual Property Issues and Computer Security  software programs protect using copyright, perhaps patent protect using copyright, perhaps patent  database content and arrangement protect using copyright protect using copyright  digital content audio / video / media / web protect using copyright protect using copyright  algorithms may be able to protect by patenting may be able to protect by patenting

U.S. Digital Millennium Copyright ACT (DMCA)  implements WIPO treaties to strengthens protections of digital copyrighted materials  encourages copyright owners to use technological measures to protect their copyrighted works, including: measures that prevent access to the work measures that prevent access to the work measures that prevent copying of the work measures that prevent copying of the work  prohibits attempts to bypass the measures have both criminal and civil penalties for this have both criminal and civil penalties for this

DMCA Exemptions  certain actions are exempted from the DMCA provisions: fair use fair use reverse engineering reverse engineering encryption research encryption research security testing security testing personal privacy personal privacy  considerable concern exists that DMCA inhibits legitimate security/crypto research

Digital Rights Management (DRM)  systems and procedures ensuring digital rights holders are clearly identified and receive stipulated payment for their works may impose further restrictions on their use may impose further restrictions on their use  no single DRM standard or architecture  goal often to provide mechanisms for the complete content management lifecycle  provide persistent content protection for a variety of digital content types / platforms / media

DRM Components

DRM System Architecture

Privacy  overlaps with computer security  have dramatic increase in scale of info collected and stored motivated by law enforcement, national security, economic incentives motivated by law enforcement, national security, economic incentives  but individuals increasingly aware of access and use of personal / private info  concerns on extent of privacy compromise have seen a range of responses

EU Privacy Law  European Union Data Protection Directive was adopted in 1998 to: ensure member states protect fundamental privacy rights when processing personal info ensure member states protect fundamental privacy rights when processing personal info prevent member states from restricting the free flow of personal info within EU prevent member states from restricting the free flow of personal info within EU  organized around principles of: notice, consent, consistency, access, security, onward transfer, enforcement notice, consent, consistency, access, security, onward transfer, enforcement

US Privacy Law  have Privacy Act of 1974 which: permits individuals to determine records kept permits individuals to determine records kept permits individuals to forbid records being used for other purposes permits individuals to forbid records being used for other purposes permits individuals to obtain access to records permits individuals to obtain access to records ensures agencies properly collect, maintain, and use personal info ensures agencies properly collect, maintain, and use personal info creates a private right of action for individuals creates a private right of action for individuals  also have a range of other privacy laws

Organizational Response  “ An organizational data protection and privacy policy should be developed and implemented. This policy should be communicated to all persons involved in the processing of personal information. Compliance with this policy and all relevant data protection legislation and regulations requires appropriate management structure and control. Often this is best achieved by the appointment of a person responsible, such as a data protection officer, who should provide guidance to managers, users, and service providers on their individual responsibilities and the specific procedures that should be followed. Responsibility for handling personal information and ensuring awareness of the data protection principles should be dealt with in accordance with relevant legislation and regulations. Appropriate technical and organizational measures to protect personal information should be implemented.”

Common Criteria Privacy Class

Privacy and Data Surveillance

Ethical Issues  have many potential misuses / abuses of information and electronic communication that create privacy and security problems  ethics: a system of moral principles relating benefits and harms of particular actions to rightness and wrongness of motives and ends of them a system of moral principles relating benefits and harms of particular actions to rightness and wrongness of motives and ends of them  ethical behavior here not unique  but do have some unique considerations in scale of activities, in new types of entities in scale of activities, in new types of entities

Ethical Hierarchy

Ethical Issues Related to Computers and Info Systems  some ethical issues from computer use: repositories and processors of information repositories and processors of information producers of new forms and types of assets producers of new forms and types of assets instruments of acts instruments of acts symbols of intimidation and deception symbols of intimidation and deception  those who understand / exploit technology, and have access permission, have power over these  issue is balancing professional responsibilities with ethical or moral responsibilities

Ethical Question Examples  whistle-blower when professional ethical duty conflicts with loyalty to employer when professional ethical duty conflicts with loyalty to employer e.g. inadequately tested software product e.g. inadequately tested software product organizations and professional societies should provide alternative mechanisms organizations and professional societies should provide alternative mechanisms  potential conflict of interest e.g. consultant has financial interest in vendor which should be revealed to client e.g. consultant has financial interest in vendor which should be revealed to client

Codes of Conduct  ethics not precise laws or sets of facts  many areas may present ethical ambiguity  many professional societies have ethical codes of conduct which can: 1. be a positive stimulus and instill confidence 2. be educational 3. provide a measure of support 4. be a means of deterrence and discipline 5. enhance the profession's public image

Codes of Conduct  see ACM, IEEE and AITP codes  place emphasis on responsibility other people  have some common themes: 1. dignity and worth of other people 2. personal integrity and honesty 3. responsibility for work 4. confidentiality of information 5. public safety, health, and welfare 6. participation in professional societies to improve standards of the profession 7. the notion that public knowledge and access to technology is equivalent to social power

Summary  reviewed a range of topics: cybercrime and computer crime cybercrime and computer crime intellectual property issues intellectual property issues privacy privacy ethical issues ethical issues