Legislation NETW 05A: APPLIED WIRELESS SECURITY By Mohammad Shanehsaz

advertisement
NETW 05A: APPLIED WIRELESS
SECURITY
Legislation
By Mohammad Shanehsaz
February 22, 2005
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Objectives
U.S Federal laws regarding information
security and illegal intrusion
U.S State laws regarding information
security and illegal intrusion
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Acts of US Congress
The U.S. Congress has been active in
creating and maintaining laws that address
wireless and the many different technologies
that affect wireless.
Some of the specific Acts of the U.S.
Congress are:
1998 Identity Theft and Assumption
Deterrence Act

1986 Computer Fraud and Abuse Act

1986 Electronic Communications Privacy Act

This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
1998 Identity Theft and Assumption
Deterrence Act
Was created to address the problem of
identity theft in several concrete ways.
It directed the Federal Trade
Commission to establish the federal
government’s central repository for
identity theft complaints and to provide
victim assistance and consumer
education.
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
1998 Identity Theft and Assumption
Deterrence Act ( continue )
The Act directs that the Commission
establish procedures to:
Log the receipt of complaints by victims
of identity theft
Provide the identity theft victims with
informational materials
Refer complaints to appropriate entities,
including the major national consumer
reporting agencies and law enforcement
agencies
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
1998 Identity Theft and Assumption
Deterrence Act ( continue )
A violation of the act is punishable by
up to 15 years of imprisonment and
$250,000 in fines.
This legislation enables the secret
service, the FBI, and other law
enforcement agencies to combat this
crime.
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
FTC ‘s principal components
In order to fulfill the purposes of the
Act, the commission has developed and
begun implementing a plan that centers
on three principal components:
Toll-free telephone hotline
1-877-ID-THEFT
Identity theft complaint database
Consumer education
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Computer Fraud and Abuse Act
The 1996 Computer Fraud and Abuse Act was enacted
to clarify the definitions of criminal fraud and abuse
for federal computer crimes and further defined the
legal aspects of computer crime to eliminate any
misunderstandings.
The focus of this Act was to protect governmentinterest computers, if compromised pose great risk to
national security
Section 1030 of the Act was amended on October 26,
2001 by section 202 of the USA Patriot Act antiterrorism legislation to expand the ability of service
providers to get government help with hacking, DOS,
and other violations
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Computer Fraud and Abuse Act
The USA patriot Act dramatically changed the
Computer Fraud and Abuse Act, however it
does make it much easier to meet the
definition of “ loss” which is the requirement
that there must be damage and loss
There must be damage and loss which must
exceed $5000
Victims can now add nearly every conceivable
expense associated with the incident to arrive
at $5000 threshold
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Electronic Communication Privacy Act
The ECPA sets out the provisions for
access, use, disclosure, interception,
and privacy protections of electronic
communications.
The law was enacted in 1986 and
covers various forms of wire and
electronic communications.
The law prevents government entities
from requiring disclosure of electronic
communications from a provider
without proper procedure
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Electronic Communication Privacy Act
The ECPA permits providers of
electronic messaging systems including
employers to intercept messages on
their own systems in the course of their
normal operations.
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
State Laws
State laws differ greatly in their statutes
on network penetration and intrusion.
Some states do not consider it a crime,
while others consider it a felony.
Depending on the county, district, or
other local municipality, some may not
prosecute such crime until damage has
reached over $50,000.
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Resources
CWSP certified wireless security
professional, from Mc Graw Hill
This work is supported by the
National Science Foundation under
Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Download