Information Systems Security Legal, Regulations, and Compliance.

Post on 25-Dec-2015

219 views 2 download

Tags:

transcript

Information Systems Security

Legal, Regulations, and Compliance

Not Just Fun & Games

Continually on the rise Affects the public and government sectors Crimes go unnoticed or unreported Costs billions of dollars each year

Example of Computer Crime

ILOVEYOU, SoBIG, Blaster DDoS brings down Excite and Yahoo Extortion for credit card numbers Stealing funds from financial institutions Stealing military secrets Competitors stealing secrets

Types of Laws

Common Law Criminal Law Tort Law Administrative Law Civil Law Customary Law Religious Law Mixed Law

Criminal Profile

Script Kiddies– May not understand the ramifications– “Ankle Biters” curious individuals– “Machine Gunners” dispatch 1000s of probes

Dedicated Cracker– Chooses victim and gathers intelligence– More dangerous– Has a goal in mind from the start

Motivation

Grudge– Get back at the company or individual– Terrorist, sympathy, or information warfare

Financial Business “Fun”

Example Attacks

Salami– Carrying out smaller crimes that might go

unnoticed Data diddling

– Modifying data in the computer to change outcomes

Dumpster diving– Obtaining information in the trash can

Telephone Fraud

Phreakers– Telephone fraud– Red boxing

Simulating coins dropped into the phone

– Blue boxing Using analog tones to gain long distance

– Black boxing Manipulating voltages

U.S. Privacy Laws

Privacy Act of 1974– Data held on individuals by government

Electronic Communications Privacy Act of 1986– Prohibits unauthorized eavesdropping

Health Insurance Portability and Accountability Act (HIPPA)

Gramm Leach Bliley Act of 1999

European Union

Reason data being collected must be stated Data cannot be used for other purposes Unnecessary data is not collected Data keep only while needed Only necessary individuals have access No intentional ‘leaking’ of data

Transborder information Flows

Movement of data across international borders

Different regions have different laws Restrictions on flow of financial data Often data flow is taxable

Employee Privacy Act

Must be in security policy and employees should be aware

Ensure monitoring is lawful Possible types of monitoring

– Key logging– Cameras– Telephone– email

Common Law - Civil

Tort law - wrongs against individuals resulting in damage

Contract Law Case law built on precedent Determines liability Less of a burden of proof Embodied in the USC

Criminal

Laws created to protect the public Public in the defendant Can win criminal and lose civil on same

case or vise versa More stringent burden of proof Includes jail time or death

Administrative Laws

Different by industry– FDA, Healthcare, Education, etc.

Performance and conduct of organizations, officials, and officers

Deals with industry regulations Punishment can be financial or may merit

imprisonment

US Federal Laws

Electronic Communications Act of 1996– Wiretap act– Stored communication act

Computer Fraud and Abuse Act of 1986– Used in prosecuting computer crimes– “Anti hacking law”

Electronic Espionage Act of 1996– Industrial espionage– Stealing Trade Secrets

Intellectual Property Laws

Trade secret– Maintains confidentiality of proprietary business

data– Owner invested resources to develop– Data must provide competitive value

Copyright– Protects original works of authorship– Protects expression of new ideas– Source code is copyrightable– In USA, good for 75 years

More

Trademark– Protects word, name, symbol, etc. which is used

to identify a product or company– Protects a company’s look or feel

Patent– Allows owner to exclude others from practicing

invention for a time period (20 years)– Invention must be novel and non-obvious

Software piracy

Copy creator’s work without permission Software protection association (SPA) Business software alliance (BSA)

– Washington Federation against software theft (FAST)

– London

Digital Millennium Copyright Act

Illegal to tamper with or break into controls that protect copyrighted materials

Only protects copyrighted items Prevent reverse engineering First attempt to enforce was by Adobe

against a white hat at DefCon

Countries Working Together

Countries do not view computer crime the same

Government may not work together Evidence rules are different Jurisdiction issues G8 have agreed to fight cybercrime Interpol distributes info about cross-border

crimes

Violation Analysis

Ensure that it is not a user error or misconfiguration

Individuals should be in charge of investigating and determining if crime exist

Type of investigation– Internal – Law enforcement

Law Enforcement vs. Citizens

Search must have probable cause– 4th amendment search warrant

Private citizen not subject to 4th amendment Private citizen may be a police agent

Role of Evidence

Material offered to judge and jury May directly or indirectly prove or disprove

the crime has been committed Evidence must be tangible

– Electrical voltages are intangible– Hard to prove lack of modification

Evidence Requirements

Material – relevant to case Competent – proper collection, obtained

legally, and chain of custody maintained Relevant – pertains to subject’s motives and

should prove or disprove a fact

Chain of Custody

Who obtained it? Where and when was it obtained? Who secured it? Who had control or possession? How was it moved?

Types of Evidence

Best– Primary, original documents, not oral

Secondary– Copies of documents, oral, eyewitness

Direct– Can prove fact by itself– Does not need corroborative information– Information from witness

More Types

Conclusive– Irrefutable and cannot be contradicted

Circumstantial– Assumes the existence of another fact– Cannot be used alone to prove the fact

Corroborative– Supporting evidence– Supplementary tool

More Types

Opinion– Experts give educated opinion

Hearsay– No firsthand proof– Computer generated evidence

Real– Physical evidence– Tangible objects

More Types

Documentary– Records, manuals, printouts– Most evidence is documentary

Demonstrative– Aids jury in the concept– Experiments, charts, animation

Hearsay Rule Exception

Business record exemption to hearsay rule– Documents can be admitted if created during

normal business activity– This does not include documents created for a

specific court case– Regular business records have more weight– Federal rule 803(6)

Records must be in custody on a regular basis Records are relied upon by normal business

Before the Crime Happens

Select an Incident Response Team (IRT) Decide whether internal or external Set policies and procedures If internal, include

– IT – Management– Legal– PR

Incident Handling

First goal– Contain and repair damage– Prevent further damage– Collect evidence

Evidence Collection

Photograph area Dump contents from memory Power down system Photograph internal system components Label each piece of evidence

– Bag it– Seal– Sign

Forensics

Study of technology and how it relates to law

Image disk and other storage devices– Bit level copy (deleted files, slack space,etc)– Use specialized tools– Further work will be done on copy

Create message digest for integrity

Thing to Look For

Hidden Files Steganography Slack Space Malware Deleted Files Swap Files

Trapping the Bad Guy

Enticement– Legal attempt to lure a criminal into committing

a crime– Provide a honeypot in your DMZ– Pseudo flaw (software code)– Padded cell (virtual machine)

Entrapment– Illegal attempt to trick a person into committing

a crime