The Economic Impact of Cyber Attacks The Global Picture Chapter 10.4 1 NEW: Final Project deadline: December 7, 2:00 am, 2013 2 Risk Assessment Threats RISK Vulnerabilities Consequences 3 Risk Management Framework (Business Context) Understand Business Context Identify Business and Technical Risks Carry Out Fixes and Validate Synthesize and Rank Risks Define Risk Mitigation Strategy Measurement and Reporting 4 Allocating Resources Limited resources Acceptable level of risk Tie technical risk to business risk 5 Making a Business Case Description of the problem List of possible solutions Constraints on solving the problem List of underlying assumptions Analysis of each alternative, including risks, costs, and benefits Summary of why the proposed investment is good 6 Influences on Cyber Security Investment Strategy Regulatory requirements Network history or IT staff knowledge Client requirements Results of internal or external audit Response to current events Response to compromised internal security Reaction to external mandate or request 7 Determining Economic Value Many different ways to determine value Internal rate of return Return on investment Net present value Investment analysis: best way to allocate capital and human resources Accounting measures are inappropriate for evaluating information security inverstments 8 Quantifying Security Difficult problem Not fully understood Limited historical data to estimate likelihood Attacks that are possible but haven’t happened Threat estimation uses: Number and types of assets needing protection Number and types of vulnerabilities that exist in a system Number and types of likely threats to a system 9 Data to be Protected National and global data Enterprise data Technology data Social vulnerability 10 Real Cost of Cyber Attack Damage of the target may not reflect the real amount of damage Services may rely on the attacked service, causing a cascading and escalating damage Need: support for decision makers to Evaluate risk and consequences of cyber attacks Support methods to prevent, deter, and mitigate consequences of attacks 11 Legal and Ethical Issues in Computer Security Chapter 11 Pfleeger: Chapter 11 13 - Farkas CSCE 522 Law and Computer Security International, national, state, and city laws: affect privacy and secrecy Laws: regulate the use, development, and ownership of data and programs Laws: affect actions that can be taken to protect the secrecy, integrity, and availability of computing resources 14 - Farkas CSCE 522 Lack of Legislation Reactive procedures Not addressed improper acts Lack of technical expertise of legal personnel 15 - Farkas CSCE 522 Protection of Computer Systems Protecting computing systems against criminals Protecting code and data Protecting programmers’ and employers’ rights Protecting users of programs 16 - Farkas CSCE 522 Protecting Programs and Data Copyright Patents Trade secrets Protection for computer objects 17 - Farkas CSCE 522 Copyrights Protect the expression of ideas 1978: U.S. copyright law Updated in 1998: Digital Millennium Copyright Act (DMCA) – deals with computers and other electronic media Give the copyright holder the exclusive right to make copies of the expression and sell them to the public Simple procedure to register copyright U.S. copyright expires 70 years beyond the death of last surviving holder 18 - Farkas CSCE 522 Intellectual Property Copyright Does not cover the idea being expressed Applies to original work and it must be in some tangible medium of expression Originality of work! 19 - Farkas CSCE 522 Fair Use The purchaser has the right to use the product in the manner for which it was intended and in a way that does not interfere with the author’s right. Piracy First sale Copyright infringement 20 - Farkas CSCE 522 Copyright for Digital Objects Digital Millennium Copyright Act Digital objects can be copyrighted It is a crime to circumvent or disable anti-piracy functionality It is a crime to manufacture, sell, or distribute devices that disable anti-piracy functionality or that copy digital objects Exempt: when used for educational and research purposes It is legal to make a backup to protect against loss Libraries can make three backups 21 - Farkas CSCE 522 Patent What can be patented? http://www.freepatentsonline.com/crazy.html https://patentimages.storage.googleapis.com/pages/US4344424-1.png 22 Patents Protects inventions – results of science, technology, and engineering Requirement of novelty Truly novel and unique only one patent for a given invention Non-obvious U.S. Patent and Trademark Office: register patent Patent attorney: verifies that the invention has not been patented and identifies similar inventions 23 - Farkas CSCE 522 Patent Infringement Copyright: holder can decide which violations prosecute Patent: all violations must be prosecuted or patent can be lost Suing for patent infringement may cause the patent owner to loose the paten. Infringer may argue that: This isn’t infringement (different inventions) The patent is invalid (a prior infringement was not opposed) The invention is not novel The infringer invented the object first 24 - Farkas CSCE 522 Trade Secret Information that gives one company a competitive edge over the others Must always be kept secret If someone obtains it improperly, the owner can recover Profits Damages Lost revenues Legal cost Reverse Engineering! 25 - Farkas CSCE 522 Protection of Computer Objects Look at Table 11-1 on page 660 to compare copyright, patent, and trade secret Protecting hardware, firmware, object code software, source code software, documentation, web content, domain names, etc. 26 - Farkas CSCE 522 Computer Crime Least clear area of law in computing Separate category for computer crime No access to the physical object Is it a serious crime? Rules of evidence How to prove the authenticity? Threats to integrity and confidentiality How to measure loss of privacy? Value of data How to measure it? 27 - Farkas CSCE 522 Why Computer Crime is Hard to Prosecute? Lack of understanding Lack of physical evidence Lack of recognition of assets Lack of political impact Complexity of case Age of defendant 28 - Farkas CSCE 522 Laws for Computer Crime U.S. Computer Fraud and Abuse Act U.S. Economic Espionage Act U.S. Electronic Fund Transfer Act U.S. Freedom of Information Act U.S. Privacy Act U.S. Electronic Communication Privacy Act HIPAA USA Patriot Act CAN SPAM Act 29 - Farkas CSCE 522 Ethical Issues Ethic: objectively defined standard of right and wrong Ultimately, each person is responsible for deciding what to do in a specific situation Ethical positions can and often do come into conflict 30 - Farkas CSCE 522 Ethics vs. Law Law Ethics Formal, written document Unwritten principles Interpreted by courts Interpreted by each individual Established by legislatures Presented by philosophers, religious, professional groups Applicable to everyone Personal choice Priority decided by court Priority determined by individual Court makes final decision No external decision maker Enforceable by police and courts Limited enforcement 31 - Farkas CSCE 522 It is a Risky World Reading List Pfleeger: Chapter 8 CSCE 522 Farkas 33 Vulnerabilities Security objectives: Prevent attacks Detect attacks Recover from attacks Attacks: against weaknesses in the information systems Need: find weaknesses CSCE 522 Farkas 34 Identifying and Eliminating Weaknesses I. II. III. IV. Vulnerability monitoring Secure system development User training and awareness Avoiding single point of failure CSCE 522 Farkas 35 I. Keeping up with Security Publications Legal publications: how to remove vulnerabilities CERT advisories SANS Security Digest Hacker publications: “how to” exploit known vulnerabilities Security mailing lists CSCE 522 Farkas 36 II. Building Secure Systems 1960s: US Department of Defense (DoD) risk of unsecured information systems 1981: National Computer Security Center (NCSC) at the NSA DoD Trusted Computer System Evaluation Criteria (TCSEC) == Orange Book CSCE 522 Farkas 37 II. Orange Book Orange Book objectives: Guidance of what security features to build into new products Provide measurement to evaluate security of systems Basis for specifying security requirements Security features and Assurances Trusted Computing Base (TCB) security components of the system CSCE 522 Farkas 38 II. Orange Book Levels Highest Security A1 Verified protection B3 Security Domains B2 Structured Protection B1 labeled Security Protections C2 Controlled Access Protection C1 Discretionary Security Protection D Minimal Protection No Security CSCE 522 Farkas 39 II. Orange Book Classes C1, C2: simple enhancement of existing systems. Does not break applications. B1: relatively simple enhancement of existing system. May break some of the applications. B2: major enhancement of existing systems. Will break many applications. B3: failed A1 A1: top-down design and implementation of a new system from scratch. (from lecture notes of Jajodia http:www.ise.gmu.edu) CSCE 522 Farkas 40 II. NCSC Rainbow Series Orange: Trusted Computer System Evaluation Criteria Yellow: Guidance fro applying the Orange Book Red: Trusted Network Interpretation Lavender: Trusted Database Interpretation 41 II. European Criteria German Information Security Agency: German Green Book (1988) British Department of Trade and Industry and Ministry of Defense: several volumes of criteria Canada, Australia, France: works on evaluation criteria 1991: Information Technology Security Evaluation Criteria (ITSEC) For European community Decoupled features from assurance Introduced new functionality requirement classes Accommodated commercial security requirements CSCE 522 Farkas 42 II. United State January 1996: Common Criteria Joint work with Canada and Europe Separates functionality from assurance Nine classes of functionality: audit, communications, user data protection, identification and authentication, privacy, protection of trusted functions, resource utilization, establishing user sessions, and trusted path. Seven classes of assurance: configuration management, delivery and operation, development, guidance documents, life cycle support, tests, and vulnerability assessment. CSCE 522 Farkas 43 II. Common Criteria Evaluation Assurance Levels (EAL) EAL1: functionally tested EAL2: structurally tested EAL3: methodologically tested and checked EAL4: methodologically designed, tested and reviewed EAL5: semi-formally designed and tested EAL6: semi-formally verified and tested EAL7: formally verified design and tested CSCE 522 Farkas 44 II. National Information Assurance Partnership (NIAP) 1997: National Institute of Standards and Technology (NIST), National Security Agency (NSA), and Industry Aims to improve the efficiency of evaluation Transfer methodologies and techniques to private sector laboratories Functions: developing tests, test methods, tools for evaluating and improving security products, developing protection profiles and associated tests, establish formal and international schema for CC. CSCE 522 Farkas 45 Next Class Current issues and future trends Class discussion CSCE 522 Farkas 46