23-1 Last time Administering Security  Security planning  Risk Analysis.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Copyright Infringement
Chapter 10 Privacy and Security McGraw-Hill
Ethics CS351. What are ethics? Dictionary: –1. A system or set of moral principles. –2. The rules of conduct recognized in respect to a particular class.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Adapted from David G Kay -- SIGCSE 2003 Intellectual Property -- Introduction What is Intellectual Property? Should creators be assured control of their.
Computer Engineering 294 IP R.Smith 5/ Intellectual Property What is it? Why is it important? – What is it designed to do? What are its basic forms?
© Suzanne Scotchmer 2007 Contents May Be Used Pursuant to Creative Commons Attribution-NoDerivs-NonCommercial Common Deed 1.0 Attribution-NoDerivs-NonCommercial.
Intellectual Property OBE 118 Fall 2004 Professor McKinsey Some property, very valuable property, exists only in our minds, in our imagination. It is intangible.
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
Data Security GCSE ICT.
COMM 226 Intellectual property rights Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University,
Intro to Intellectual Property 05/13/2015. Exponential Inventor Intro to Intellectual Property 05/13/2015 Why is IP Important? Everyone makes a big deal.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Legal and Ethical Issues in Computer Security
Today discussion Intellectual property. What exactly is intellectual property ? Types of intellectual property. Patents, Trademarks and Designs. The ”BIG.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
Protecting your product What is Intellectual Property (IP)? Legal rights that result from intellectual activity in the industrial, scientific, literary.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
The Legal Environment What laws and regulation apply to businesses?
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Computers in Society Week 4: Intellectual Property – Software Patents and Copyrights The Open Source Movement.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
Intellectual Property Basics
AOF Entrepreneurship Unit 3, Lesson 10 Intellectual Property Protections Copyright © 2009–2012 National Academy Foundation. All rights reserved.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Computer security By Isabelle Cooper.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Impacts of I.T. Ethical, Social, legal and economic impacts on I.T.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer Security By Duncan Hall.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
4/17: Ethical & Social Issues in IS
Legal and Ethical Issues in Computer Security Csilla Farkas
Security and Ethics Safeguards and Codes of Conduct.
Intellectual Property (IP) Overview: “Tools You Can Use” Christopher D. McKinney Director Office of Technology Transfer Vanderbilt University September,
CHAPTER 8 Legal, Privacy and Ethical Issues in Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Graphic Ownership Digital Rights Management Intellectual Property Rights.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
The Business of Naming Your Business: The Importance of Distinguishing Trade Names and Trademarks Presented By: Kelley Clements.
Online Safety! By: Michelle Deng.
A Gift of Fire Third edition Sara Baase
How to build a good reputation online
Legal and Ethical Issues in Computer Security
Welcome to IST e-Lab Entrepreneurship Lab, 3rd Session, 06 November 2017.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTELLECTUAL PROPERTY AND CYBER PIRACY
Intellectual Property Lawyers
Why ISO 27001? Subtitle or presenter
Why ISO 27001? MARIANNE ENGELBRECHT
Ethical Hacking.
Intellectual Property
Chapter # 6 Intellectual Property
Jackie Hutter, MS, JD What Innovators Need to Know about IP Protection: A Business-Focused Approach Jackie Hutter, MS, JD
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

23-1 Last time Administering Security  Security planning  Risk Analysis

23-2 This time Physical security Legal and ethical issues  Intellectual property

23-3 Physical security All the firewalls in the world won't help you defend against an attacker who physically steals your laptop off your desk  See the Data Loss archive from last week for many examples of personal information being lost in incidents just like this We need to protect the physical machines, as well as the software and data

23-4 Physical threats There are two major classes of physical threats:  Nature, e.g.: Fire Flood Blackouts  Human, e.g.: Vandals Thieves Targetted attackers What are the major differences in the security controls needed to protect against these two classes?

23-5 Physical controls against humans Last time, we looked at being able to recover from natural disasters  Many of these techniques will also be useful against thefts, etc. This time, we will discuss what additional measures are necessary to protect against humans  Need to not only recover from the loss, but also deal with the release of potentially sensitive data

23-6 Vandals Some human attacks aren't actually after the data Sir George Williams (later Concordia U) “Computer Centre Incident” of 1969 — the largest student uprising in Canadian history How would you control this kind of threat?

23-7 Thieves Most thefts are after what?  Hardware?  Software?  Data? We've already talked about controls against theft of software and data What about hardware?

23-8 Targetted attackers What if the thieves are actually targetting you? Now what are they most likely to be after?  Hardware?  Software?  Data?

23-9 Protecting offline data We have a good sense of how to protect data on an active machine hooked up to a network What about data sitting on a shelf?  Backup tapes / disks  Printouts / reports What happens after they're on the shelf? Why is offline data like this attractive to attackers?

23-10 Protecting offline data It's obviously harder for a network-based attacker to get at that kind of data But what about a physical attacker?  Thief  Insider How do you safely dispose of data?  Paper  Magnetic media  Optical media

23-11 Putting it together So now we know how to protect:  Programs  Operating Systems  Networks  Internet applications  Databases  Physical computers and data How can we test if we've done it right?

23-12 Tiger teams Tiger teams are teams of security professionals You can hire them to try to break into your site, systems, networks, etc.  And tell you what's wrong

23-13 Legal protections Remember this from lecture 1: How can we defend against a threat?  Prevent it: block the attack  Deter it: make the attack harder or more expensive  Deflect it: make yourself less attractive to attacker  Detect it: notice that attack is occurring (or has occurred)‏  Recover from it: mitigate the effects of the attack In addition to (sometimes instead of, unfortunately) using technological defences, we can also use legal defences

23-14 Legal protections The most obvious legal protections are against threats to hardware If someone steals a laptop, it's completely straightforward that he can be charged with a crime What if someone copies the laptop's hard disk, but leaves the laptop where it is? This is much newer law, and is often less clear  Caveat: IANAL; this course does not consitute formal legal advice. :-)‏

23-15 Overview of IP In contrast to real property, so-called “intellectual property” (IP) differs in important ways:  It is non-depletable  It is replicable  It has minimal marginal cost So the laws for IP differ from the laws for real property, and indeed are much more complicated Four kinds of IP concern us:  Trade secrets, trademarks, patents, and copyrights

23-16 Overview of IP These four kinds of IP:  Cover different kinds of intangibles  Convey different rights  Have different durations  Have different registration requirements  (But are nonetheless often confused for each other!) Note: IP law is similar, but not identical, in Canada and the US; we will make note of the most important differences

23-17 Trade secrets This is the simplest kind of IP You want to protect some secret information  The formula for Coca-Cola  The method for computing how many airline seats to oversell  Your new O(n) sorting algorithm Just don't tell anyone, and call it a trade secret  Unfortunately, you have to tell someone, or it's not useful  You get legal protection if that person passes it on

23-18 Reverse engineering Reverse engineering is the process of taking a finished product, and taking it apart to figure out how it works  If someone successfully does this, you've lost your trade secret protection  General rule for trade secrets: it has to be a secret A similar rule applies to software, with some caveats we'll see later RC4 was originally a trade secret, but it was reverse engineered in 1994

23-19 Trademarks Even though the RC4 algorithm was no longer protected, its name was! Trademarks protect names, brands, logos To get one, make a legal filing showing that you are using the name in commerce  This lets you sue others who use that name in a confusing manner Domain names are often protected under trademark law

23-20 Patents Applies to inventions, which must be:  Novel  Useful  Nonobvious The bargain is that:  You tell everyone how your invention works  In exchange, you get to have a monopoly over it for 20 years The most difficult form of IP to obtain

23-21 Cryptography patents Many cryptographic algorithms are (or were) patented Notably:  Diffie-Hellman (expired 1997)‏  RSA (expired 2000)‏  IDEA (block cipher used in early PGP, expires 2012)‏  Lots of patents on elliptic curve cryptography Since 2000, you could pick a good unpatented example of each type of crypto

23-22 Recap Physical security Legal and ethical issues  Intellectual property

23-23 Next time Legal and ethical issues  Copyright and paracopyright  Computer crime  Redress for software failures  Codes of professional ethics