Chapter Cyber Sec
Chapter Cyber Sec
What is Cybersecurity?
- Cybersecurity is the practice of protecting computers, servers, mobile devises,
electronic systems, networks, data and programs from malicious attacks. It's also
known as information technology security or electronic information security
What is Ethics?
- Ethics in the broadest sense refers to the concern that humans have always had for
figuring out how best to live
- practical level: (‘how should we act in this or that situation, based upon our
best theories of ethics?’)
Ethics in Cybersecurity
cybersecurity ethics is a new and under-researched field.
With increasing attention being paid to cybersecurity:
from hacking attacks on major corporations to attacks on critical national infrastructure
- Integrity: Involves maintaining the consistency, accuracy, and trustworthiness of data over
its entire life cycle and its originality
Offenses by CIA
- Offenses against the confidentiality, integrity and availability of computer and
information systems, such as:
1. Unauthorized access to data, systems or services
2. Unauthorized use of data, systems or services
3. Unauthorized interception of data
4. Unauthorized suppression, alteration, deterioration, or destruction of data
5. Interfere with the operation of a system
6. Misuse of data or systems
7. Denial of service or access
8. Unauthorized possession/use of password
9. Generally cybercrime statute prohibited unauthorized access
Threats
- Threats to the information systems and data can be in three categories:
1. Physical and environmental threats
Examples: natural disasters - infrastructure failures - intentional acts
2. Technical threats
Examples: unauthorized access – disclosure – destruction – alteration
3. People threats
Examples: employees – consultants - third parties - unrelated people(hackers)
- Threats could be intentional or unintentional threats
Security Controls
- sometimes called: security measures - security safeguards
- Are based on various controls (process, people and technology)
and it can also be Privacy violations of this sort are often used to get victims to harm
the interests of third-parties
- Harms to property:
property can be indirectly threatened by violations of data privacy, through mechanisms such
as extortion.
However, often property is directly targeted through cyberintrusions that may seek to:
1. misappropriate electronic funds 2. remotely cause damage
3. obtain bank account numbers and passwords
4. steal valuable intellectual property such as trade secrets
5. destruction to an individual or organization’s (digital or physical) property
Example:
it is generally agreed to be the case that if an organization discovers a critical vulnerability in
its software, it should notify its customers/clients of that discovery in a timely fashion so
that they can install a patch (if available) or take other defensive measures
Privacy Policy
- Privacy: is an individual’s right to keep one’s personal information (data) out of public view.
- Privacy Policy: is a statement or a legal document that discloses some or all of the ways a
party gathers, uses, discloses, and manages a customer or client's data
Inference Controls/Statistical Disclosure Limitation
Inference controls: also known as statistical disclosure limitation is a discipline that seeks to
protect data so they can be published without revealing confidential information that can be
linked to specific individuals among those to which the data correspond
- Data breach notification laws are laws that require an individuals or entities affected by a
data breach, to notify their customers and other parties about the breach and take specific
steps remedy the situation based on state legislature
- objectives of a data retention policy keep important information for future use or
reference to organize information so it can be searched and accessed at a later date and to
dispose of information that is no longer needed
- data retention policies within an organization are a set of guidelines that describes
which data will be archived, how long it will be kept, what happens to the data at the end of
the retention period (archive or destroy) and other factors concerning the retention of the
data
- part of any effective data retention policy is the permanent deletion of the retained data
achieving secure deletion of data by:
1- by encrypting the data when stored
2- deleting the encryption key after a specified
Cloud security tradeoffs
- Cloud computing paradigm provides with end-users an on demand access to a shared pool
of resources
Computational resource and storage are two of the most integral services of cloud computing
2- the presence of zero-day vulnerabilities which the cloud computing company may
not be aware of. These tend to provide a means by which the hackers can sniff data on
public cloud thus putting customers at risk
3- Multiple customers having their data stored and managed by a single company
means that anyone can bypass authentication and cause severe damage
4- public clouds are connected to the internet and without virtual private networking
properly secured then clients’ data are exposed to external attacks
6- The huge cache of data on the public cloud makes it difficult for companies to offer
maximum security to their clients who reside in their environment
2- hybrids are hosted on the internet is also a security concern as most breaches are conducted
on the internet
- the second category contains those rights an individual can use to control the
amount and value of personal information given out
The notion of privacy is difficult to accurately define because the definition of privacy
depends on things like:
1- culture 2- geographical location
3- political systems 4- religious beliefs
and a lot more…
Types of Privacy
- Personal Privacy: This type of privacy involves the privacy of personal attributes.
The right to privacy of all personal attributes would mean the prevention of anyone or
anything that would intrude or violate that personal space where those attributes are.
- Institutional Privacy: Institutions and organizations want their data private not only for
business advantages but also for the life of the business.
Need to private:
1- The research data 2- the sales and product data
3- the marketing strategies 4- the activities of the organization
- Medical information: is very personal and very important to all of us. For:
1. personal 2. Employment
3. Insurance purposes
many people want their medical information to be private
- Internet: In this new age, the Internet keeps track of all our activities online.
With an increasing number of people spending an increasing number of time online in:
1. social networks
2. digital convergence
becoming a reality with every passing day, not only will our social life be online but soon all
our lives also will. We want those activities and habits private
Attention will be directed to the two legal landmarks on privacy that are philosophically
richest:
1. Privacy as non-intrusion 2. Privacy as Freedom to Act
Information Gathering
Have you paid enough attention to the number of junk mail, telephone calls during dinner,
and junk emails you have been getting? If so, you may have thought about who has your
name on a list and what they’re doing with it.
In recent years, telemarketers have been having a field day as technological advances have
replaced the door-to-door salesman.
In many cases, we do not preserve our privacy. We have helped information seekers like
companies in gathering and databasing information from us.
We do this:
- every time we apply for discount cards from:
1. grocery stores 2. gas stations
3. merchandise stores
- every time we fill out information on little cards to enter contests
The information they collect from us is put into databases and is later sold to the highest
bidder, usually a marketer
However, with:
1. Globalization 2. the Internet
the doors to the information gathering field have been cast open.
Now:
1. Individuals 2. Companies
3. Organization 4. governments
are all competing, sometimes for the same information
Although the problem is skyrocketing, there is minimum effort to curtail the practice. This is a
result of a number of reasons, the most important of which is 5.4 Privacy 89 that the rate at
which technology is developing is continuously outstripping our legal systems and our ability
to legislate late alone enforce the new laws
Information Gathering
Several attempts have been made including the Gramm–Leach–Bliley Financial Services
Modernization Act aimed to restrict financial institutions such as:
1. Banks 2. Brokerages
from sharing customers’ personal information with third parties
The Act also tries in some way to protect the customer through three requirements that the
institutions must disclose to us:
1. Privacy policy: Through which the institution is bound to tell us the types of
information the institution collects and has about us and how it uses that information
2. Right to opt out: Through which the institution is bound to explain our recourse to
prevent the transfer of our data to third-party beneficiaries
3. Safeguards: Through which the institution must put in place policies to prevent
fraudulent access to confidential financial information
However, the fundamental right is violated every day in many ways. While individual privacy
rights have been violated for years, the advent of the Internet has accelerated the rate and
scale of violations
2. Consumers lack the knowledge of how what they consider a little bit of information
can turn into a big invasion of privacy
Example:
- hackers: are intruders because they wrongfully break into computer systems
whether they cause damage or not.
Examples:
1. Businesses 2. Governments
collect this information from us honestly to provide services effectively.
The information:
- collected is not just collected only to be stored
- may be sold for financial reason
- Differential privacy makes it possible for tech companies to collect and share aggregate
information about user habits, while maintaining the privacy of individual users
Thus, they could protect the privacy of users and resolve data sharing problem
- In many countries, there are guidelines and structures that safeguard and protected privacy
rights.
These structures and guidelines, on the average, fall under the following categories:
- Technical: Through the use of software and other technically based safeguards and
also by education of users and consumers to carry out self-regulation
Sample Vendors:
1. Bitglass 2. CipherCloud 3. Cisco
4. Netskope 5. Vaultive 6. Symantec
7. Skyhigh Networks
- Tokenization: Substituting a randomly generated value (the token) for sensitive data such:
1. credit card numbers 2. bank account numbers
3. social security numbers
After tokenization, the mapping of the token to its original data is stored in a hardened
database. Unlike encryption, there is no mathematical relationship between the token and its
original data
To reverse the tokenization: hacker must have access to the mapping database.
Sample vendors:
1. CyberSource (Visa) 2. Gemalto 3. Liaison
4. MasterCard 5. MerchantLink 6. Micro Focus (HPE)
7. Paymetric 8. ProPay 9. Protegrity
10. Shift4 11. Verifone 12. Thales e-Security
13. TokenEx 14. TrustCommerce 15. Symantec (Perspecsys)
- Big data encryption: Using encryption and other obfuscation techniques to obscure data in
relational databases as well as data stored in the distributed computing architectures of big
data platforms, to protect personal privacy, achieve compliance, and reduce the impact of
cyberattacks and accidental data leaks.
Sample vendors:
1. Gemalto 2. Micro Focus (HPE)
3. Zettaset 4. IBM
5. Thales e-Security
- Application-level encryption: Encrypting data within the app itself as it’s generated or
processed and before it’s committed and stored at the database level.
It enables fine-grained encryption policies and protects sensitive data at every tier in the
computing and storage stack and wherever data is copied or transmitted.
Only authenticated: authorized app users can access the data, even database admins can’t
access encrypted data
Sample vendors:
1. Gemalto 2. Micro Focus (HPE)
3. Thales e-Security
Ethics and Privacy
With the advent of the Internet and electronic messages, confidentiality is a great concern.
Computer technology has raised more privacy questions than it has found answers to:
- Is there any confidentiality in electronic communication?
- Is anything that goes in the clear over public communication channels secure anymore?
- Are current encryption protocols secure enough?
- What laws need to be in place to secure anyone of us online?
- Who should legislate them?
- Who will enforce them?
We need:
1. ethical framework.
2. legal framework
Both these frameworks would probably help.
The question is:
- who will develop these frameworks?
- Who will enforce them?
Chapter #3:
Introduction
- Definitions of Privacy:
“Privacy is the protection of personal data and is considered a fundamental human right.”
- OECD Guidelines, 1980
“The rights and obligations of individuals and organizations with respect to the collection,
use, disclosure, and retention of personal data.” - AICPA/CICA, 2005
Privacy means adherence to trust and obligation in relation to any information relating to
an identified or identifiable individual (data subject).
Management is responsible to comply with privacy in accordance with its privacy policy
or applicable privacy laws and regulations
- G31: relies upon 12 Privacy Principles outlined by the Organization for Economic
Cooperation and Development (OECD)
Generally Accepted Privacy Principles (GAPP)
- By AICPA and CICA task force:
1. Defines 10 Privacy Principles similar to ISACA G31
2. Provides complete guidance on privacy program implementation and auditing
3. Implementation criteria
4. Physical characteristics
5. Consumer purchase history
- Some laws and regulations define the following to be sensitive personal information:
1. Information on medical or health conditions 2. Financial information
3. Racial or ethnic origin 4. Political opinions
5. Religious or philosophical beliefs 6. Trade union membership
7. Sexual preferences
8. Information related to offenses or criminal convictions
Generally Accepted Privacy Principles (GAPP)
- 10 General accepted privacy principles:
- Management: The entity defines, documents, communicates, and assigns
accountability for its privacy policies and procedures
- Notice: The entity provides notice about its privacy policies and procedures and
identifies the purposes for which personal information is collected, used, retained,
and disclosed
- Choice and consent: The entity describes the choices available to the individual and
obtains implicit or explicit consent with respect to the collection, use, and disclosure
of personal information
- Collection: The entity collects personal information only for the purposes identified
in the notice
- Use, retention, and disposal: The entity limits the use of personal information to
the purposes identified in the notice and for which the individual has provided implicit
or explicit consent.
- Access: The entity provides individuals with access to their personal information for
review and update
- Security for privacy: The entity protects personal information against unauthorized
access (both physical and logical)
- Quality: The entity maintains accurate, complete, and relevant personal information
for the purposes identified in the notice
- Monitoring and enforcement: The entity monitors compliance with its privacy
policies and procedures and has procedures to address privacy related complaints and
disputes
Open Data
- Open Data: is a piece of data or content is open if anyone is free to use, reuse, and
redistribute it subject only, at most, to the requirement to attribute and/or share-alike.
- Reuse and Redistribution: the data must be provided under terms that permit
reuse and redistribution
- Universal Participation: everyone must be able to use, reuse and redistribute there
should be no discrimination against fields of endeavour or against persons or groups
- Releasing social and commercial value: Data is a key resource for social and commercial
activities.
- Open data can help drive the creation of:
1. innovative business
2. services that deliver social and commercial value.
- Participatory governance: Open Data enables people to be much more directly informed
and involved in decision-making and facilitation their contribution
- Building trust: Open policy making and data increase the trust of others
Chapter #4
Developing compliant security program
- Reasonable security: requires an appropriate comprehensive information security program
1. From technical perspective
2. Legal requirements
- Identifying requires:
1. Where the data and systems are located
2. Who controls them
3. Which jurisdictions that will impact and which laws must be complied with
- Threats: is anything that has the potential to cause harm (nature or man-made)
- Traditional negligence Law takes the same approach base on the factors:
1. The probability of identified harm (likelihood)
2. The gravity of the resulting injury (impact)
3. The burden (or cost) of implementing adequate precautions
4. In general, the exercise depends on the circumstances of that case and on the
extent of foreseeable danger
- Numerous security laws and regulations expressly require a risk assessment as part
of the security program or (impliedly)
- Many data protection laws expressly require a risk assessment as part of the law
- Most laws require to provide a level of security “appropriate” to the risk (e.g. UAE)
- The implementation of selected security controls is to mange and reduce the risk to a
reasonable and appropriate level
- In addition to risk assessment, other factors are often cited in security statutes and
regulations as:
1. Org. size, complexity and capabilities
2. Nature and scope of the business
3. Nature and sensitivity of information and information systems
4. Infrastructure capabilities
5. State of the art of technology and security
6. Cost of the security
- Information security LAW clearly requires to use the result of security assessment to
identify the appropriate strategy of security controls:
E.g. US banking regulators is risk-based for authentication
Do not accept to implement strong authentication controls without
risk assessment
- Businesses must conduct periodic internal reviews to evaluate and adjust the
information security program as a result of:
1. Testing and monitoring 2. Material changes to the business
3. Changes in technology 4. Changes in threats (internal or external)
5. Other circumstances
6. Environmental or operational changes
- Best practice and developing legal standard may require a periodic review and
assessment (audit) from independent professional party:
1. To certify that the security program meets or exceeds applicable requirements (C.I.A)
2. To adjust the security program
6- Oversee third party service providers
- Businesses often rely on third parties (outsource)
- When the data is in the possession and controlled by a third party, it presents a
challenge to ensure the security
- It is often said “you can outsource the work, but not the responsibility”
- Thus, the third party relationship should be subject to the same risk management,
security, privacy and protection
- The law does not require corporation to implement security controls in a particular
way or use a particular technology:
- HIPAA (may use any security measures) to achieve the objectives
- Other laws impose “reasonable” security measures to protect data (from read, copy,
modify or remove) by access control
- For outsource, most security regulations require that the third parties employ
adequate security controls
Technical Security Controls (System and information integrity):
- Have appropriate controls to protect the integrity of the system and date:
1. Checking data 2. input validity and accuracy
3. data error 4. malicious protection
5. intrusion detection
- Various security regulations require controls to address system and data integrity,
including:
1. System integrity: to protect from unauthorized changes
2. Data integrity: to protect from unauthorized alteration, disclosure or destruction
3. Malicious code protection: for preventing, detecting and reporting of malicious
4. Intrusion detection: tools techniques and procedures for monitoring
- Laws and regulations require to verify employees, agents and contractors to have:
1. Technical expertise 2. Personal integrity
3. Reliability
- Regulations may focus in the work processes (with sensitive data or systems) as:
1. Segregation of duties
2. Dual control procedures (2 level of control)
3. Other personnel management procedures
4. Appropriate supervision of workforce
- Legal: standard for “reasonable security” mandates appropriate security awareness training
and education for employees, to ensure they are aware and comply with the security