IS Unit2
IS Unit2
Professional Issues in
Information Security
1
Law and Ethics
2
Organizational Liability and the Need
for Counsel
What if the organization does not behave ethically ?
• If an employee with/without the authorization of the
organization performs an illegal or unethical action
that causes some harm, the organization can be
held financially liable for that action
3
Measures to reduce liability
• Due care: Ensuring that employees know what
constitutes acceptable behavior and know the
consequences of illegal or unethical actions
• Due diligence: making a valid effort to protect
others; continually maintaining level of effort
4
Organizational Laws (Policies)
5
Criteria for policy enforcement
1. Dissemination (distribution) – hard copy/electronic
means
2. Review (reading) – Multiple languages
3. Comprehension (understanding) – Quiz/Assessment
4. Compliance (agreement) – Signed document
5. Uniform enforcement
6
Types of Law
Society
• Civil: manages relationships/conflicts between
organizational entities and people
• Criminal: addresses violations harmful to society
Workplace
• Private: regulates relationships between individuals
and organizations(labour law, contract law)
• Public: regulates structure/administration of
government agencies and relationships with citizens,
employees, and other governments
7
Relevant U.S. Laws for Information
Security
• Why required?
– Implementation of information security legislation
contributes to a more reliable business environment
and a stable economy
• United States has been a leader in the development
and implementation of information security legislation
8
General Computer Crime Laws
1. Computer Fraud and Abuse Act of 1986: cornerstone of
many computer-related federal laws and enforcement
efforts
2. Computer Security Act of 1987( first attempt to establish
minimum acceptable security practices)
3. National Information Infrastructure Protection Act of 1996:
Modified several sections of the CFA act and increased the
penalties for selected crimes(fine to imprisonment upto 2
years)
4. USA Patriot Act of 2001 (included clauses to combat
terrorism-related activities)
5. USA Patriot Improvement and Reauthorization Act of 2006
(for investigating criminal and terrorist activity) 9
General Computer Crime Laws
(cont’d.)
6. In 2006, this act was amended by the USA PATRIOT
Improvement and Reauthorization Act (Gave powers to the
Department of Homeland Security and the FBI in investigating
terrorist activity)
7. PATRIOT Sunset Extension Act of 2011 ( permitted
wiretaps, searching of business records, and the surveillance
of people with suspected ties to terrorism)
8. USA FREEDOM(Uniting and Strengthening America by
Fulfilling Rights and Ending Eavesdropping, Dragnet
collection and Online Monitoring) Act in 2015
10
Privacy Laws
• Privacy has become one of the hottest topics in
information security at the beginning of the 21st
century
• The ability to collect information, combine facts from
separate sources, and merge it all with other
information has resulted in databases that were
previously impossible to create
• As a result it became necessary for governments to
protect their privacy from such organizations
• Privacy laws evolved when many organizations start
collecting, swapping and selling personal information
as a commodity
11
Privacy Laws (cont’d.)
• US Regulations
1. ‘Privacy of Customer Information Section’ of the
common carrier regulation(Organizations should not use
customer information for marketing purposes )
2. Federal Privacy Act of 1974 ( For Government Agencies)
3. Electronic Communications Privacy Act of 1986 (
Regulate the interception of wire, electronic and oral communications )
4. Health Insurance Portability and Accountability Act of
1996 (HIPAA), aka Kennedy-Kassebaum Act( Health
Care Data)
5. Financial Services Modernization Act, or Gramm-
Leach-Bliley Act of 1999 (Banks and Insurance Companies)
12
Privacy Laws (cont’d.)
6. Fraud And Related Activity In Connection With
Identification Documents, Authentication
Features, And Information ( Legislation for Identity
Theft)
13
Export and Espionage Laws
• To protect trade secrets being exported from US
1. Economic Espionage Act of 1996 (EEA) - prevents
illegal sharing of trade secrets
2. Security And Freedom Through Encryption Act of
1999 (SAFE) - provides guidance on use of
encryption techniques
14
Financial Reporting (SoX)
• Financial reporting refers to standard practices to
give stakeholders an accurate depiction of a
company's finances ( revenues, expenses, profits, capital, and
cash flow) as formal records
16
Payment Card Industry Data Security
Standards (PCI DSS)
• Applies for organizations that process payment cards,
such as credit cards, debit cards, ATM cards, store-
value cards, gift cards
• The Payment Card Industry (PCI) Security Standards
Council offers a standard of performance to which
participating organizations must comply
• These regulations are designed to enhance the security
of customers’ account data.
• The regulations include requirements for information
security policies, procedures, and management, as well
as technical software and networking specifications.
17
U.S. Copyright Law
18
Digital Millennium Copyright Act
(DMCA)
• U.S. contribution to reduce the impact of copyright,
trademark, and privacy infringement
• In UK known as Database Right
• Provides protection to individuals for possessing of
personal data and its use and movement
19
Summary of information security
related laws
20
Summary of information security
related laws
21
Summary of information security
related laws
22
Summary of information security
related laws
23
Summary of information security
related laws
24
Summary of information security
related laws
25
State and Local Regulations
26
International Laws and Legal Bodies
29
Australian Computer Security Laws
• Privacy Act 1988:
• Regulates the collection, storage, use, and disclosure of
personal information.
• Applies both to private and public sectors.
• Telecommunications Act 1997:
• Updated as of October 2013;
• contains regulation related to the collection and storage of
privacy data held by telecommunications service providers.
• Corporations Act 2001:
• Updated by the Corporations Regulations of 2001 and 2002;
• focuses on business relationships, but similar to SOX,
contains provisions related to financial reporting and audits.
30
Australian Computer Security Laws
32
Agreement on Trade-Related Aspects
of Intellectual Property Rights
• Created by World Trade Organization (WTO)
• First significant international effort to protect
intellectual property rights
• Outlines requirements for governmental oversight
and legislation providing minimum levels of
protection for intellectual property
33
United Nations Charter
• Makes provision for information security during
information warfare
• Information Warfare is any action to Deny, Exploit,
Corrupt or Destroy the enemy's information and its
functions for protecting ourselves against those actions
34
Ethics and Information Security
35
36
Ethical Differences Across Cultures
• Cultural differences create difficulty in determining
what is and is not ethical
• Difficulties arise when one nationality’s ethical behavior
conflicts with ethics of another national group
– For eg: To Western cultures, many of the ways in which Asian
cultures use computer technology amount to software piracy
• Scenarios are grouped into:
– Software License Infringement
– Illicit Use ( Spreading virus, Hacking etc)
– Misuse of Corporate Resources( using company devices
for personal purpose)
• Cultures have different views on the scenarios
37
Ethics and Education
38
Unethical and Illegal Behavior -
Causes and Countermeasures
• Three general causes of unethical and illegal
behavior: ignorance, accident, intent
• Best methods for preventing an illegal or unethical
activity is use laws, policies, technical controls and
education
• Laws and policies are effective only if there is:
– Fear of penalty
– Probability of being caught
– Probability of penalty being administered
39
Codes of Ethics of Professional
Organizations
• Several professional organizations have established
codes of conduct/ethics
1. Association of Computing Machinery (ACM)
2. International Information Systems Security
Certification Consortium, Inc. (ISC)2
3. System Administration, Networking, and Security
Institute (SANS)
4. Information Systems Audit and Control Association
(ISACA)
5. Information Systems Security Association (ISSA)
6. Global Information Assurance Certification (GIAC)
40
Association of Computing Machinery
(ACM)
• The ACM is a respected professional society that
was established in 1947 as “the world’s first
educational and scientific computing society.
• The ACM’s code of ethics contains specific
references
– to protecting the confidentiality of information,
– causing no harm (with specific references to
viruses),
– protecting the privacy of others, and
– respecting the intellectual property and copyrights of
others
41
International Information Systems Security
Certification Consortium, Inc. (ISC)2
• Focuses on the development and implementation of
information security certifications and credentials
• Administers and evaluates examinations for information
security certifications
• The (ISC)2 code of ethics is for the information security
professionals who have earned an (ISC)2 certification
• It has four mandatory canons:
• “Protect society, the commonwealth, and the infrastructure;
• act honorably, honestly, justly, responsibly, and legally;
• provide diligent and competent service to principals;
• advance and protect the profession.”
42
ISSA Code of Ethics
• ISSA promotes practices that ensure the confidentiality,
integrity, and availability of organizational information
resources.
• ISSA requires the observance of its code of ethics as a
prerequisite for continued membership and affiliation with
the Association
• ISSA Code of Ethics includes an agreement as below:
• As an ISSA member, guest and/or applicant for
membership, I have in the past and will in the future:
– Perform all professional activities and duties in accordance
with all applicable laws and the highest ethical principles;
– Promote generally accepted information security current
best practices and standards;
43
ISSA Code of Ethics (Cont..)
• Maintain appropriate confidentiality of proprietary or
otherwise sensitive information encountered in the course of
professional activities;
• Discharge professional responsibilities with diligence and
honesty;
• Refrain from any activities which might constitute a conflict
of interest or otherwise damage the reputation of or is
detrimental to employers, the information security
profession, or the Association; and
• Not intentionally injure or impugn the professional reputation
or practice of colleagues, clients, or employers.
44
Planning for Security
The Role of Planning
Planning is creating action steps toward goals, and then
controlling them
Planning involves
• Employees
• Management
• Stockholders
• Other outsiders
• The physical and technological environment
• The political and legal environment
• The competitive environment
Information Security Planning
Planning Levels
• Executive summary
• Organizational profile and history
• Strategic issues and core values
• Mission statement and vision statement
• Program goals and objectives
• Appendices (optional)
Most
critical
Threat Identification
Any organization typically faces a wide variety of threats
Each threat presents a unique challenge to information
security
If we assume that every threat can and will attack every
information asset, then the project scope becomes too
complex
Examining to assess a threats potential to endanger an
organization is called threat assessment.
Threats to Information
Security
Prioritizing Threats
Which threats present a danger in the given
situation?
Which is the most dangerous threat?
How much would it cost to recover from a successful
attack?
Which threat requires the greatest expenditure to
prevent an attack?
Specifying Asset Vulnerability
Vulnerabilities
specific avenues that threat agents can exploit to attack an
information asset
Flaw/ weakness in an asset/security procedure/design or control
For each asset, the list of vulnerabilities are identified
The listing depends on the experience and knowledge of
the people creating the list
Vulnerability Assessment of a
DMZ Router
The threats-vulnerabilities-
assets(TVA) Worksheet
Document that shows a comparative ranking of prioritized assets against prioritized
threats, with an indication of any vulnerabilities in the asset/threat pairings.
Risk Assessment
Assigns a risk rating/score to each asset
Risk Score Calculation- Method 1
Risk score is calculated using the formula
as
Risk = (The likelihood of the occurrence of a
vulnerability* The value of the information asset) - The
percentage of risk mitigated by current controls + The
uncertainty of current knowledge of the vulnerability
Example
Asset A has a value of 50 and has vulnerability #1,
likelihood of 1.0 with no current controls
assumptions and data are 90% accurate
Asset B has a value of 100 and has two
vulnerabilities
Vulnerability #2
likelihood of 0.5 with a current control that addresses 50% of its
risk
Vulnerability # 3
likelihood of 0.1 with no current controls
assumptions and data are 80% accurate
Example
Resulting ranked list of risk ratings for the
three vulnerabilities is as follows:
Asset A: Vulnerability 1 rated as 55 =
(50 × 1.0) – 0% + 10%
Asset B: Vulnerability 2 rated as 35 =
(100 × 0.5) – 50% + 20%
Asset B: Vulnerability 3 rated as 12 =
(100 × 0.1) – 0 % + 20%
Risk Score Calculation- Method 2
This involves computing the likelihood,
loss frequency, attack success probability,
loss event frequency and the loss
magnitude
Likelihood and Loss Frequency
Likelihood
It is the probability that a specific vulnerability will be the
object of a successful attack
Is given a overall rating often a numerical value between 0.0
to 1.0
Start
Justifying Controls
(Economic Feasibility Analysis)
services
Training fees
Cost of implementation
Benefit
The value(asset) at risk, losses associated, cost of recovery
Quantitative Risk Assessment
appetite
Documenting Results
When the risk management program has been
completed, series of proposed controls are
prepared
Each information asset-threat pair should have a
documented control strategy that
Clearly identifies any residual risk remaining after the
proposed strategy has been executed