14
Security in Computing Security in Computing Privacy in Computing Legal & Ethical Issues in Computer Security Information Security Management and Security Controls

Security in Computing Privacy in Computing Legal & Ethical Issues in Computer Security Information Security Management and Security Controls

Embed Size (px)

DESCRIPTION

I.Privacy in Computing E.Basic qualities/dimensions/tenets of privacy 1.Consent of information collection 2.Limited use 3.Limited period of retention 4.Limited disclosure 5.Protection of collected information against inappropriate use 6.Controlled access, logging 7.Monitoring of use, logging 8.Policies cannot be weakened once data items are collected.

Citation preview

Page 1: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

Security in ComputingSecurity in ComputingPrivacy in ComputingLegal & Ethical Issues in Computer SecurityInformation Security Management and Security Controls

Page 2: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

I.I. Privacy in ComputingPrivacy in ComputingI. What is privacy

A. Individual Control of personal information

B. Right to declare certain information sensitive

C. Privacy has a cost: giving – or not giving – certain information may have affect how we are treated

D. Computerization did not invent privacy problems, nor will it solve them...

Page 3: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

I.I. Privacy in ComputingPrivacy in ComputingE. Basic qualities/dimensions/tenets of

privacy1. Consent of information collection2. Limited use3. Limited period of retention4. Limited disclosure5. Protection of collected information against

inappropriate use6. Controlled access, logging7. Monitoring of use, logging8. Policies cannot be weakened once data

items are collected.

Page 4: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

I.I. Privacy in ComputingPrivacy in ComputingF. Anonymity, pseudonymity, multiple

identities

Page 5: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

II.II. Principles and PoliciesPrinciples and PoliciesA. Fair information policiesB. Privacy laws – which country?

Page 6: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

III.III. AuthenticationAuthenticationA. Of an:

1. Individual2. Identity3. Attribute

B. Anonymization1. Delivering unique identities from

anonymized data2. Work of Anderson, Sweeney

Page 7: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

IV.IV. Data MiningData MiningA. Privacy-preserving data mining

1. Tradeoff between anonymity and identification for good purpose

2. Joining databases on common data values

3. Aggregating for study of trends, connections

Page 8: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

V.V. Privacy on the InternetPrivacy on the InternetA. Finance

1. Web payments2. Credit cards3. Anonymous payments4. Payments in cases of mutual distrust

B. Retained relationshipsA. CookiesB. Site loginsC. ImpersonationD. Unannounced relationships (tracking)

Page 9: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

V.V. Privacy on the InternetPrivacy on the InternetC. Tracking

1. Web bugs2. Keystrokes logging3. Spyware4. Adware5. hijacking

Page 10: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

VI.VI. Secure e-mailSecure e-mailA. No sender assurance; little ability to

track the origin of a messageB. Insecure channelsC. MonitoringD. Anonymous e-mail and remailersE. Spoofing, spam

Page 11: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

VII.VII. Emerging technologies Emerging technologies (examples)(examples)

A. RFID – Radio-frequency identification1. Definition2. Uses3. Misuses

B. Electronic voting1. Far election principles2. Contrast to fairness of paper ballot,

mechanical voting techniques3. Internet voting4. Voice over IP

Page 12: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

I.I. Legal and Ethical Issues Legal and Ethical Issues in Computer Securityin Computer Security

I. This is a very broad topic – some topics for class discussion based on case studies are:

A. Determining current and national laws concerning personal privacy and computer records, computer fraud, or hacking, given that laws change frequently

B. Review recent prosecutions of computer crime cases to see what laws where used for this prosecution

Page 13: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

I.I. Legal and Ethical Issues Legal and Ethical Issues in Computer Securityin Computer Security

C. How to address the international aspect of computer crime – i.e. when a criminal in one country commits a crime against a computer in another country- Whose law is broken? whose police and courts have jurisdiction? how should the crime be investigated?- What if the transaction is passed through a third country or if the criminal uses an ISP in fourth country?

Page 14: Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

I.I. Information Security Information Security Management and Security Management and Security ControlsControls

I. Key area relating to ISO/IEC code of practice for information security management and security controls in terms of:general principles, best practice recommendations, established guidelines and any specific issues within this area. http://en.wikipedia.org/wiki/ISO/IEC_27002http://www.iso.org/iso/catalogue_detail?csnumber=39612