Вы находитесь на странице: 1из 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Information Insecurity
Part III: The Action Plan

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

1 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Cyberspace as a frontierland
Uncharted territory unclear boundaries Unclear or undefined ownership Legislation developing slowly
Navigators Explorers Traders Quacks Crooks Criminals 2 of 44

Many adventurers

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

CYBERSPACE
Criminals and Terrorists Terra Incognita

Land of the Have-Nots Population ~ 6 billion


Non-IP World Wide Web
Deep web

Digital Divide

Cartografia Pietragialla
E. Gelbstein A. Kamal

Explorers Navigators

Information Insecurity Part III: The Action Plan

3 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Survivors guide
Better charts to the cyberspace frontier are being produced. In the meantime Best practices
(keep it simple, do not reinvent the wheel)

Standards
(formalized compatibilities and best practices)

Legislation
(rules of what is not permitted)

Compliance
(with each of the above)
E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

4 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Sources of Best Practices


Enthusiasts and volunteers Professional associations Government departments
Happyhacker ISSA, CASPR UKs CCTA Gartner GIGA IBM KPMG etc
5 of 44

Consultants and commercial providers


Examples of some websites follow

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.happyhacker.org

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

6 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.issa.org

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

7 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.sans.org

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

8 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.itsmf.com

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

9 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.itil-itsm-world.com/security.htm

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

10 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.gigaweb.com

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

12 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

13 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Standards
Formalized definitions that ensure compatibility

De-jure
From Organizations whose mandate is to define standards

De-facto
Usually from vendors Useful and ubiquitous
14 of 44

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

De-jure standards (examples)


Internet Engineering Task Force (IETF)
TCP/IP, Html, POP, STMP, FTP, SSL and many other

International Telecommunications Union (ITU)


Recommendations X.273, Open systems network layer security Recommendations X.509, Authentication framework

International Standards Organization (ISO)


ISO 17799 Code of Practice for the management of Information Security

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

15 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Sources of de-facto standards


Professional associations e.g. the IEEE Institution of Electrical and Electronic Engineers Vendor associations e.g. ECMA European Computer Manufacturers Association Vendors e.g Microsoft, Netscape, Adobe

Examples follow

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

16 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

17 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

European Computer Manufacturers Association

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

18 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Institution of Electrical and Electronic Engineers

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

19 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

20 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Legislation: a little history


Early difficulties
Data and software are incorporeal object old laws are designed to deal with tangible objects Legal regime of intangibles needs to cater for the owner it also needs to cater for persons concerned by the content (privacy) The property status of information was/is unclear Issue 1: the law and the correctness and integrity of data Issue 2: protecting data owners for exclusive use
Some of these remain unresolved in many countries
E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

21 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Legislation: a little history


More early difficulties
Theft, larceny, embezzlement

Older definitions require the offender to take an item of another persons property Fraud Under some legislation, it requires deception of a person (does NOT apply to a computer)

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

22 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Scope of cyber-legislation
Computer misuse Data protection Telecommunications interception National security and anti-terrorism Software copyrights and patents Search and seizure, criminal evidence Contractual obligations for suppliers
E. Gelbstein A. Kamal

(1)

Information Insecurity Part III: The Action Plan

23 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Scope of cyber-legislation
Human rights: right to privacy, right to access Electronic contracts, taxation of e-commerce Censorship Obscene publications Protection of minors Consumer protection
E. Gelbstein A. Kamal

(2)

Information Insecurity Part III: The Action Plan

24 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Scope of cyber-legislation
Organized crime in cyberspace On-line banking and money laundering Gambling in cyberspace Electronic signatures and certificats Defamation and libel in cyberspace National security and anti-terrorism
and much, much more Information Insecurity Part III: The Action Plan

(3)

E. Gelbstein A. Kamal

25 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

First issued in 1994 Updated in 1997

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

26 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Professor David Post and others www.cli.org

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

27 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

International Legislation
OECD: 1983-1985 - Criminalization of computer abuse Council of Europe (COE): 1985 - Work begins towards a convention on cyber-crime United Nations Congress on the Prevention of Crime In November 2001, formal signature by 33 countries of the COE Convention on Cybercrime

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

28 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

The COE Convention


Three primary groups of provisions
Unauthorized computer intrusion, malicious code, the use of computers to commit acts which are already a crime Procedures to capture and retrieve on-line and other information by issuing Retention Orders Cooperation between signatory states to share e-evidence
Additional protocols are being developed

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

29 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Reactions to the Convention


33 States (29 Council Members) plus Canada, Japan, South Africa and the United States of America signed it. It will enter into force once ratified by 5 States (planned mid 2003)
Possible conflicts with existing national legislation Non-signatory States where cybercriminals may act with impunity

Misgivings

Inidividual rights to privacy vs. extended surveillance powers granted to signatory countries Possilibity of personal data being transferred outside Europe to countries with less protective legislation Issuance of warrants seeking evidence and extradition Increased cost of e-business and place restrictions

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

30 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Compliance and certification


General ICT audits, with focus on security
(COBIT guidelines)

Compliance audits against ISO 17799 or similar Security certification services

The selected auditors must be deeply trusted

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

31 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.isaca.org Information Insecurity Part III: The Action Plan

E. Gelbstein A. Kamal

32 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Do-it-yourself kit for ISO 17799 compliance audit www.securityauditor.net


E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

33 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.giac.org

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

34 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.isc2.org

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

35 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.htcn.org

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

36 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Other interested parties


and other civil liberties groups

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

37 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.cfenet.com

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

38 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www1.ifccfbi.gov/index.asp

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

39 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

www.merchantfraudsquad.com

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

40 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

International Chamber of Commerce www.iccwbo.org

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

41 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Beyond insecurity and crime


Cyber-terrorism and Cyber-war call for a new way of looking at our world

and for further action by the International Community


E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

42 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Moving forward
Recommendations for immediate action purpose: help those not yet ready Work to be done purpose: avoid procrastination and develop a Law of Cyberspace before it is too late

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

43 of 44

Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc

Recommendations
1. Become aware of the Information Insecurity problem 2. Devise an information security strategy 3. Implement remedial procedures immediately 4. Seek professional help without delay 5. Identify the gaps in your countrys legislation 6. Encourage the United Nations to embark urgently on a Law of Cyberspace

E. Gelbstein A. Kamal

Information Insecurity Part III: The Action Plan

44 of 44

Вам также может понравиться