1. Trang chủ
  2. » Công Nghệ Thông Tin

Computer security principles and practice 3rd by williams stallings and brown ch19

41 181 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 41
Dung lượng 6,08 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Computers as targetsInvolves an attack on data integrity, system integrity, data confidentiality, privacy, or availability Involves an attack on data integrity, system integrity, dat

Trang 2

Chapter 19

Legal and Ethical Aspects

Trang 3

“Computer crime, or

cybercrime, is a term used

broadly to describe criminal

activity in which computers or

computer networks are a tool, a target, or a place of criminal

activity.”

From the New York Law School Course on

Cybercrime, Cyberterrorism, and Digital

Law Enforcement

Trang 4

Computers as targets

Involves an attack on data

integrity, system integrity, data

confidentiality, privacy, or

availability

Involves an attack on data

integrity, system integrity, data

Using the computer to store stolen password lists, credit card or calling card numbers, proprietary corporate information, pornographic image files, or pirated commercial software

Computers as communications tools

Computers as communications tools Crimes that are committed online, such as fraud,

gambling, child pornography, and the illegal sale of prescription drugs, controlled substances, alcohol, or guns

Crimes that are committed online, such as fraud, gambling, child pornography, and the illegal sale of prescription drugs, controlled substances, alcohol, or guns

Types of Computer Crime

• The U.S Department of Justice categorizes computer crime based on the role that the computer plays in the criminal activity:

Trang 6

Table 19.1

Cybercrimes Cited in the Convention on Cybercrime (page 2 of 2)

Trang 7

Table 19.2

CERT 2007

E-Crime

Watch Survey Results

(Table can be found on page 614 in the textbook)

Trang 8

Law Enforcement Challenges

• The deterrent effect of law enforcement on computer and network attacks correlates with the success rate of criminal arrest and prosecution

• Law enforcement agency difficulties:

• Convention on Cybercrime introduces a common terminology for crimes and a framework for harmonizing laws globally

Trang 9

The lack of success in bringing them to

justice has led to an increase in their

numbers, boldness, and the global scale of

their operations

The lack of success in bringing them to

justice has led to an increase in their

numbers, boldness, and the global scale of

their operations

Are difficult to profile

Tend to be young and very computer-savvy

Tend to be young and very computer-savvy

Range of behavioral characteristics is wide

Range of behavioral characteristics is wide

No cybercriminal databases exist that can point to likely

suspects

No cybercriminal databases exist that can point to likely

suspects

Cybercriminals

Trang 10

Reporting rates tend to

be low because of a lack

of confidence in law enforcement, concern about corporate reputation, and a concern about civil

liability

Reporting rates tend to

be low because of a lack

of confidence in law enforcement, concern about corporate reputation, and a concern about civil

liability

Cybercrime Victims

Trang 11

Working with Law Enforcement

• Executive management and security administrators need to look upon law enforcement as a resource and tool

• Management needs to:

o Understand the criminal investigation process

o Understand the inputs that investigators need

o Understand the ways in which the victim can contribute positively to the investigation

Trang 12

Unauthorized use

Figure 19.1 Intellectual Property Infringement

Trang 13

Cop y right

• Protects tangible or fixed expression of an idea but not the idea itself

• Creator can claim and file copyright at a national government copyright office if:

oProposed work is original

oCreator has put original idea in concrete form

Trang 14

Copyright Rights

• Copyright owner has these

exclusive rights, protected against

oPantomimes and choreographic works

oPictorial, graphic, and sculptural works

oMotion pictures and other audiovisual works

oSound recordings

oArchitectural works

oSoftware-related works

Trang 15

• Any new and useful

process, machine, article

of manufacture, or composition of matter

Design

• New, original, and ornamental design for an article of manufacture

Plant

• Discovers and asexually reproduces any distinct and new variety of plant

Patent

• Grant a property right to the inventor

• “The right to exclude others from making, using, offering for sale, or selling” the invention in the United States or “importing” the invention into the United States

• Types:

Trang 16

• A word, name, symbol, or device

• Used in trade with goods

• Indicates source of goods

• Distinguishes them from goods of

others

• Trademark rights may be used to:

o Prevent others from using a confusingly

similar mark

o But not to prevent others from making the

same goods or from selling the same

goods or services under a clearly different

mark

Trang 17

organized in such a fashion that it has potential commercial value

Digital content

files, multimedia courseware, Web site content, and any other original digital work

Trang 18

U.S Digital Millennium Copyright ACT

(DMCA)

• Signed into law in 1998

• Implements WIPO treaties to strengthen protections of digital copyrighted materials

• Encourages copyright owners to use technological measures to protect their copyrighted works

o Measures that prevent access to the work

o Measures that prevent copying of the work

• Prohibits attempts to bypass the measures

o Both criminal and civil penalties apply to attempts to circumvent

Trang 19

Fair use Reverse

engineering

Encryption research

Security testing

Personal privacy

Trang 20

Digital Rights Management (DRM)

• Systems and procedures that ensure that holders of digital rights are clearly identified and receive stipulated payment for their works

o May impose further restrictions such as inhibiting printing or prohibiting further distribution

• No single DRM standard or architecture

• Objective is to provide mechanisms for the complete content management life cycle

• Provide persistent content protection for a variety of digital content

types/platforms/media

Trang 22

Figure 19.3 DRM System Architecture

Trang 23

• Overlaps with computer security

• Dramatic increase in scale of information collected and stored

o Motivated by law enforcement, national security, economic incentives

• Individuals have become increasingly aware of access and use of personal information and private details about their lives

• Concerns about extent of privacy compromise have led to a variety of legal and technical approaches to reinforcing privacy rights

Trang 24

Notice Consent Consistency Access

Security Onward transfer Enforcement

European Union (EU)

Directive on Data Protection

• Adopted in 1998 to:

o Ensure member states protect fundamental privacy rights when processing personal information

o Prevent member states from restricting the free flow of personal information within EU

• Organized around principles of:

Trang 25

• Deals with personal information collected and used by federal agencies

• Permits individuals to determine records kept

• Permits individuals to forbid records being used for other purposes

• Permits individuals to obtain access to records and to correct and amend records as appropriate

• Ensures agencies properly collect, maintain, and use personal information

• Creates a private right of action for individuals

Privacy Act of 1974

United States Privacy Initiatives

Also have a range of other privacy laws

Trang 26

appointment of a person responsible, such as a privacy officer, who should provide guidance to managers, users and service providers on their individual responsibilities and the specific procedures that should be followed Responsibility for handling personally identifiable information and ensuring awareness of the privacy principles should be dealt with in accordance with relevant legislation and regulations Appropriate technical and organizational measures to protect personally identifiable information should be implemented.”

Trang 27

Anonymity without soliciting information

Allocation of information impacting unobservability Pseudonymity

Trang 28

Privacy and Data Surveillance

• Demands of homeland security and counterterrorism have imposed new threats to personal privacy

• Law enforcement and intelligence agencies have become increasingly aggressive in using data surveillance techniques to fulfill their mission

• Private organizations are exploiting a number of trends to increase their ability to build detailed profiles of individuals

• Both policy and technical approaches are needed to protect privacy when both

government and nongovernment organizations seek to learn as much as possible about individuals

Trang 29

In terms of technical approaches the requirements for privacy protection for information systems can be addressed in the context of database security

In terms of technical approaches the requirements for privacy protection for information systems can be addressed in the context of database security

• Tamper-resistant

• Cryptographically protected interposed between a database and the access interface

• Analogous to a firewall or intrusion prevention device

• Verifies user access permissions and credentials

• Creates an audit log

The owner of a database installs a privacy appliance tailored to the database content and structure and

to its intended use by outside organizations

The owner of a database installs a privacy appliance tailored to the database content and structure and

to its intended use by outside organizations

An independently operated privacy appliance can interact with multiple databases from multiple

organizations to collect and interconnect data for their ultimate use by law enforcement, an intelligence user, or other appropriate user

An independently operated privacy appliance can interact with multiple databases from multiple

organizations to collect and interconnect data for their ultimate use by law enforcement, an intelligence user, or other appropriate user

Privacy Protection

Trang 30

o Scale of activities not possible before

o Creation of new types of entities for which no agreed ethical rules have previously been formed

• Ethics:

“A system of moral principles

that relates to the benefits and

harms of particular actions, and

to the rightness and wrongness

of motives and ends of those

actions.”

Trang 31

Figure 19.5 The Ethical Hierarchy

Trang 32

Ethical Issues Related to Computers and Information Systems

• Some ethical issues from computer use:

o Repositories and processors of information

o Producers of new forms and types of assets

o Instruments of acts

o Symbols of intimidation and deception

• Those who understand, exploit technology, and have access

permission, have power over these

Trang 33

• Concern with balancing professional responsibilities with ethical or moral responsibilities

• Types of ethical areas a computing or IS professional may face:

• Organizations have a duty to provide alternative, less extreme opportunities for the employee

• Professional societies should provide a mechanism whereby society members can get advice on how to proceed

Professional/Ethical Responsibilities

Trang 34

1 1

Be

a positiv

e stimulu

s a

nd instill confidence

2 2

Be educational

3 3

Provid

e a measure o

f support

4 4

Be

a mea

ns o

f deterrence and disci

pline

5 5

Enhance the profession's public image

Codes of Conduct

• Ethics are not precise laws or sets of facts

• Many areas may present ethical ambiguity

• Many professional societies have adopted ethical codes of conduct which can:

Trang 38

Comparison of Codes of Conduct

• All three codes place their emphasis on the responsibility of professionals to other

people

• Do not fully reflect the unique ethical problems related to the development and use

of computer and IS technology

o Dignity and worth of other people

o Personal integrity and honesty

o Responsibility for work

o Confidentiality of information

o Public safety, health, and welfare

o Participation in professional societies to improve standards of the profession

o The notion that public knowledge and access to technology is equivalent to social power

Trang 39

The Rules

• Collaborative effort to develop a short list of guidelines on the ethics of computer systems

• Ad Hoc Committee on Responsible Computing

o Anyone can join this committee and suggest changes to the guidelines

o Moral Responsibility for Computing Artifacts

• Generally referred to as The Rules

• The Rules apply to software that is commercial, free, open source, recreational, an academic exercise or a research tool

o Computing artifact

• Any artifact that includes an executing computer program

Trang 40

As of this writing, the rules are as follows:

1) The people who design, develop, or deploy a computing artifact are morally responsible for that artifact, and for

the foreseeable effects of that artifact This responsibility is shared with other people who design, develop,

deploy or knowingly use the artifact as part of a sociotechnical system.

2) The shared responsibility of computing artifacts is not a zero-sum game The responsibility of an individual is not

reduced simply because more people become involved in designing, developing, deploying, or using the artifact Instead, a person’s responsibility includes being answerable for the behaviors of the artifact and for the artifact’s effects after deployment, to the degree to which these effects are reasonably foreseeable by that person.

3) People who knowingly use a particular computing artifact are morally responsible for that use.

4) People who knowingly design, develop, deploy, or use a computing artifact can do so responsibly only when they

make a reasonable effort to take into account the sociotechnical systems in which the artifact is embedded.

5) People who design, develop, deploy, promote, or evaluate a computing artifact should not explicitly or implicitly

deceive users about the artifact or its foreseeable effects, or about the sociotechnical systems in which the

artifact is embedded.

Trang 41

• Privacy

• Ethical issues

information systems

• Cybercrime and computer crime

• Intellectual property

computer security

Ngày đăng: 18/12/2017, 15:17

TỪ KHÓA LIÊN QUAN