61
Information Assurance and Society The social issues of information assurance and how it affects you

Information Assurance and Society The social issues of information assurance and how it affects you

Embed Size (px)

Citation preview

Information Assurance and Society

The social issues of information assurance and how it affects you

2

What is Information Assurance?

• IA is the hardware, software, policies, and procedures needed to protect information and information systems by ensuring availability, integrity, authentication, confidentiality, and non-repudiation.

• IA implies the ability to protect, detect, and successfully react to information attacks.

• Also called InfoSec (information security)

3

We Depend on Computers

• Every aspect of our lives is increasingly dependent on computerized systems.

• Transportation and communication systems

• Banking and finance

• Manufacturing and retail

However, this information

infrastructure is vulnerable

4

Impact on Society: more info

• The Risks Forum: www.risks.org

• Carnegie Mellon’s CERT: www.cert.org

• National IA Partnership: http://niap.nist.gov/

• Computer Incident Advisory Capability, CIAC http://ciac.llnl.gov/ciac/index.html

5

Example: Computer and Internet Viruses and Attacks

• Very visible cost to society

• Widely reported in the news media

• Computer viruses, worms (Nimda, Code Red, Melissa, SQL Slammer, etc.)

• DDOS attacks

• Identity theft via on-line databases

6

Cost Estimate .

• What is included in cost?– Lost data, lost productivity– Cost of employing security personnel– Cost of “cleaning” and restoring

• Who should collect info?

• Nimda virus estimated at $3 billion

• Code Red estimated at $2.6 billion

7

Famous Viruses

• The Michelangelo virus: In 1992, this virus erased hard drives on artist Michelangelo’s March 6 birthday. The virus actually struck only about 10,000 computers.

• Melissa Virus: A Word macro virus that, when received via e-mail and opened, sent a copy of itself to the first 50 people in the victim’s address book.

• I Love You Virus: The love bug cost the world $15 billion in lost productivity. This virus spread faster than Melissa, spreading itself to everyone in the MS Outlook address book.

8

Increasing Costs

• Whatever the costs, they are increasing.– Cost estimates available at: www.Mi2g.com

and www.net-security.org

• Frequency of incidents is increasing.

• Sophistication and destructiveness of the incidents is increasing.

• Attackers are organized and tools are easy to use and readily available.

9

CERT Current Activity

• A particular strain of virus or worm is considered one incident, e.g. SoBigA

Year 1988 1989

Incidents 6 132

Year 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999

Incidents 252 406 773 1,334 2,340 2,412 2,573 2,134 3,734 9,859

Year 2000 2001 2002 2003

Incidents 21,756 52,658 82,094 137,529

Source: http://www.cert.org/current/current_activity.html

10

HighHigh

Low

1980 1985 1990 1995 2000

password guessing

self-replicating code

password cracking

exploiting known vulnerabilities

disabling audits

back doors

hijacking sessions

sweepers

sniffers

packet spoofing

GUI

automated probes/scans

DoS

www attacks

ToolsTools

AttackersAttackers

IntruderKnowledgeIntruderKnowledge

AttackSophisticationAttackSophistication

“stealth” / advanced scanning techniques

burglaries

network mgmt. diagnostics

Source: FBI 2003

11

Should You Be Concerned?

• Are we as engineers creating faulty products?

• Is it our fault that our products are misused?

• Is it our responsibility to give society the tools to protect itself from the misuse of our products?

12

IA at Santa Clara University

• At SCU, we want our students: – to be aware of the impact of technology on

society– to integrate their personal values with their

engineering education

• Computer security involves– the hardware and software– the people who use or misuse them– the laws and attitudes of society

13

SCU Resources for Ethical Questions of IA

• Markkula Center for Applied Ethics http://www.scu.edu/ethics/

• Center for Science, Technology, and Society http://www.scu.edu/sts/

14

Ethical Questions

• Many are extensions of non-

computer issues to cyberspace– Plagiarism made easy– Software piracy – Product liability– Improper e-mail or Internet use– Violating copyright (including downloading

copyrighted music)– Security vs privacy vs convenience

15

Issues Unique to Cyberspace

• Viruses, worms and other malicious software (malware)

• Browser Cookies, Spam, Spyware, etc

• Computer Crime and Forensics

• Digital Copyright

• Some more legal issues

• Biometrics

• The threat is not limited to cyberspace

Viruses, Worms and other Malicious Software

17

Viruses, Worms, etc.What are they?

• Viruses- a piece of software that attaches to program files. Each time the program runs, the virus runs too and has the chance to reproduce.

• E-mail Viruses- a virus that moves around in e-mail messages and duplicates itself by automatically mailing itself to people in the victim’s e-mail address book.

• Worms- software that can reproduce and use computer networks to propagate. Email viruses can also be classified as worms.

18

Viruses, Worms, etc.What are they?

• Trojan Horses- a computer program that claims to do one thing (it may claim to be a game), but does something malicious when you run it.

• On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, causing denial of service for users of the targeted system. The flood of incoming messages to the target system forces it to shut down, denying service to legitimate users.

19

Viruses, Worms, etc.Where do they come from?

• People create them for various reasons:– Psychology of vandalism: the thrill of creating

destruction.– Fascination of creating something powerful

that spreads quickly (Code Red achieved global saturation in 18 hours).

– Owning the bragging rights in the hacker community.

– Revenge on a company– Financial gain

20

Viruses, Worms, etc.What you should do

• Have anti-virus software and update it frequently – they work!

• Use a strong password (password cracking programs are readily available on the Internet) www.password-crackers.com

• Install security patches (especially Microsoft)

21

Viruses, Worms, etc.A problem for ALL computers

• If your computer is on the Internet you need to protect it.

• Attackers use unguarded systems to launch DDOS attacks and spread malware.

Browser Cookies, Spam and other Annoyances

23

Browser Cookies, Spam and Other Annoyances

• Unlike viruses and worms, these things are perfectly legal.

• Primary issue is user’s privacy

• Spam (and telemarketer) issue: corporate free speech or violation of privacy?

24

Browser Cookies

• Cookies make the web easier to use.

• Piece of text (name-value pair) that a Web server can store on a user’s computer.

• The web site which stored the cookie can later retrieve it. No other information is retrieved.

25

Use of Browser Cookies

• HTML is stateless, so browser cookies allow sites to:– Store user preferences– Accurately determine how many unique users

view a certain page– Handle “shopping carts”

26

What the Issue is

• Web sites can gather a lot of info on you and sell that info to telemarketers and email marketers.– They know which pages within a site you visit and

how frequently.

• Infrastructure providers can create cookies that are visible on multiple sites – The company DoubleClick puts ad banners on many

sites along with small GIFs that cause DoubleClick cookies to be put on your machine

– This cross-site profiling worries privacy advocates

27

Browser Cookies

• In June 2000, the FTC found that 97% of web sites studied collected personal information but only 62% of those sites indicated this to the consumer.

• 57% of the studied sites contained third party tracking devices.

28

Other Annoyances

• SPAM and Spyware • Scams in online auctions: Selling and buying

goods online is popular. But sometimes:• sellers don’t send the goods,• sellers send inferior goods,• price is driven up by shill bidding, and• illegal goods sold.

• Email and Internet Hoaxes– http://hoaxbusters.ciac.org/

Computer Crime and Digital Forensics

30

Computer Crime and Digital Forensics

• Increasing use of computers in crimes.– Web caches helpful in investigations – Incriminating letters recovered from hard

drives – Speed dial numbers on cell phones – Financial records of drug dealers

31

Computer Crime and Digital Forensics

• Increase of computer crimes– Fraud – especially credit card, ATM– Embezzlement (anonymity of computer

makes it easier) – Sabotage, Identity Theft, etc– Network intrusion

32

Network Intrusions

• Remote system access can be achieved in seconds using automated intruder tools.

• Access is sometimes gained for computing resources as well as private data.

• Compromise of a series of remote systems, makes it difficult to trace activities to the true source.

• Firewalls are not enough to ward off increasingly sophisticated penetration efforts.

33

Typical External Network Attack Methodology

Locate system

to attack

Gain useraccess

Covertracks

Installbackdoors

Attackother hosts

Take or alter

information

Engage inother un-

authorizedactivity

Gainprivileged

access

Scanners& Sniffers

Buffer & stack overflow

Erase log files

Create new root users

34

FBI Concerns

Terrorists utilize web sites to: actively recruit members publicize propaganda raise funds

Web sites also contain information: to construct weaponsobtain false identification

35

Issues

• Questions About Penalties– Intent

• Should hackers who did not intend to do damage or harm be punished differently than those with criminal intentions?

– Age• Should underage hackers receive a different

penalty than adult hackers?

– Damage Done• Should the penalty correspond to the actual

damage done or the potential for damage?

Digital Copyright and Digital Property Rights

37

Digital Property Rights

• What is digital property?– Artistic work (computer program?)– Invention (computer chip?)

• Why and when should it be protected?

• What legal vehicle to use?– Copyright– Patent– Trade secret

38

Copyright

• Copyrights are designed to protect expressions of ideas. Ideas are free, however, when an artist expresses those ideas in a work of art, that can be copyrighted. Thus, a copyright applies to a creative work such as a story, painting, or song.

• Copyright gives the author the exclusive right to make copies of the expression and sell them to the public. Copyright laws exist so that artists can earn a living at their art.

39

Copyright: Fair Use

• All copyrighted material is subject to “fair use”. This allows reproduction for “purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use) scholarship or research.”

40

DMCA (1998)

• The “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), are sometimes not used according to the original intent.

• Original intent was to stop copyright pirates from defeating anti-piracy protections added to copyrighted works, and to ban “black box” devices intended for that purpose.

41

DMCA Section 1201

• Section 1201 can be used to stifle free speech and scientific research. Princeton Professor Edward Felten’s team of researchers succeeded in removing a digital watermark in response to a public challenge by Secure Digital Music Initiative.

• When the team tried to present their results at an academic conference, SDMI threatened the researchers with liability under the DMCA.

42

DMCA Example• In 2001, a Russian programmer was jailed for

several weeks when he entered the US. • He had worked on a software program which

allowed owners of Adobe electronic books (“e-books”) to convert them from Adobe’s e-Book format into Adobe Portable Document Format (“pdf”) files, thereby removing copy restrictions embedded into the files.

• His alleged crime was working on a software tool with many legitimate uses, simply because third parties might use the tool to violate copyright.

43

More Legal Issues

• Protection of children on the Internet

• Freedom of speech or libel

• HIPAA and GLB

44

Children and the Internet

• Elementary and secondary schools use web-based learning and provide Internet access to children.

• How to protect children from pornography and inappropriate material and activities?

• Communications Decency Act (CDA 1996); Child Online Protection Act (COPA 1998); Children’s Online Privacy Protection Act (COPPA).

45

Libel on the Internet

First amendment protects free speech.

Defamation is the act of injuring another’s reputation, honor or good name through false written or oral communication.

46

Defamation

• There are 2 parts to defamation: slander (spoken) and libel (written or spoken in a context which gives them longevity and pervasiveness that exceeds slander).

• Broadcasting can be libelous. Libel is more serious than slander.

• How does this apply

to the Internet?

47

Defamation and the Law

• False and injurious statements on a web page are considered libel. The publisher or author can be sued.

• What about anonymous bulletin boards? Who is responsible?

48

Who is Responsible?• The owner or publisher of the web page is

responsible.• Grey area: is that the ISP if the owner is not

identifiable? (if defamatory statement was on an anonymous bulletin board).

• Cubby vs Compuserve (1991): court ruled that Compuserve was not the publisher.

• Oakmont vs Prodigy: Prodigy was held liable as the publisher because it claimed to screen bulletin board postings before they are posted.

• Later Telecommunications Act protects ISPs that try to control their sites.

49

Some Laws

– Computer Fraud and Abuse Act (CFAA, 1986)• It is a crime to access, alter, damage, or destroy

information on a computer without authorization.• Computers protected under this law include:

– government computers,– financial systems,– medical systems,– interstate commerce, and – any computer on the Internet.

50

More Laws

– USA Patriot Act (USAPA, 2001)• Amends the CFAA.• Allows for recovery of losses due to responding to

a hacker attack, assessing damages, and restoring systems.

• Higher penalties can be levied against anyone hacking into computers belonging to criminal justice system or the military.

• The government can monitor online activity without a court order.

51

HIPAA and GLB

• Health Insurance Portability and Accountability Act - 1996– Privacy rules take effect 2003– Security rules take effect 2005

• Gramm Leach Bliley– All financial institutions– Protection of personal information– Rules concerning disclosure

The Threat is not Limited to Cyberspace

53

Cyberspace is Linked to Physical Space

• Much of our critical infrastructure is controlled by computer: SCADA

• 1997 survey of 50 U.S. utilities found that 40 percent of water facilities allow their operators direct access to the Internet, and 60 percent of the SCADA systems could be connected by modem.

54

55

Water Treatment Plant Vulnerable

• November 2001: water treatment facility in Queensland, Australia was attacked via the Internet.

• 1 million liters of raw sewage released into a local park and river.

• The attacker’s first 44 attempts went unnoticed.

56

Nuclear Power Plant Vulnerable

• In January 2003, the "Slammer" Internet worm took down monitoring computers at FirstEnergy's idled Davis-Besse nuclear plant.

• A subsequent report by the North American Electric Reliability Council said the infection blocked commands that operated other power utilities, although it caused no outages.

57

Electrical Grid Vulnerable

• Substations are the electricity distribution points for towns and neighborhoods where high-voltage electricity is transformed for local use. One scenario involves changing the settings on substations' programmable circuit breakers.

• A hacker could lower settings from, say 500 amperes to 200 on some breakers, while raising others to 900.

• Normal power usage could trip the 200 amp breakers and take those lines out of service, diverting power and overloading neighboring lines.

• With their breakers set at 900 amps -- too high to trip -- the overloads would cause transformers and other critical equipment to melt down, requiring major repairs that would prolong a blackout.

58

More about critical infrastructure

Frontline’s “Cyberwar”http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar

59

For More Info

• The Center for Democracy and Technology http://www.cdt.org

• The Electronic Frontier Foundation http://www.eff.org

• The Privacy Rights Clearinghouse http://www.privacyrights.org

• Computer Professionals for Social Responsibility http://www.cpsr.org

60

More Info

• Information: the Reading Room at SANS http://www.sans.org

• Training: the Protocol Analysis Institute http://www.packet-level.com

61

What SCU is Doing

• Program in Information Assurance: CASPIA http://ia.engr.scu.edu