Data theft and Identity theft – a Review By

advertisement
Data theft and Identity theft – a Review
By
R. Ramamurthy, Chairman, Cyber Society of India, Chennai, India
geminirama@gmail.com
Pre-bureaucratic society had little need of identification management, since
social interactions were on a small enough scale to rest on trust and personal
recognition. Computerization has made transactional histories more detailed and
networks have made them available to many. As more data have become
available, data has been integrated into available systems, enabling services
never before possible. Information in the digital world can flow freely, and be
copied and stored at almost no expense, and it is on this information that our
transactions have become more dependent. In the increasingly digital realm,
trust depends on transactional history-credit reports, educational history,
employment history, and even criminal or medical history. The extension of trust
is based on transactional histories associated with some common identifier. For
the purpose of this discussion the identifier of identity is defined as the “the
collective aspect of the set of characteristics by which a thing is definitively
recognizable or known. The world of digital identity is full of concepts that at
first glance appear foreign because of the need to give precise definitions to
terms in order to discuss them and specify system behavior using them.
The key to identity authentication is described as “access to data to assist in the
validation, verification, and authentication of personal identifiers.” Validation of
the data is predicted on trust. The heart of identity management lies in the
creation and maintenance of trust. Trust allows for a consumer to have a defined
level of certainty in the authenticity of a credential based on the process by
which it was issued and the security of the token. Whether between individuals,
in commercial interactions or with government institutions, trust is critical for
any relationship. Trust also requires a reliable identity framework. An individual
must be confident in the relevant attributes of other parties in any relationship.
One vision of trust is predictability, manifest in reputation. A reputation must be
reliably tied to an identity, and this connection must be durable over a long
period of time. Reputations require identifiers, and these too must be bound to
the individual. Reputation is possible in pseudonymous or even anonymous
systems but these systems are identity management systems nonetheless. They
simply manage attribute information in a way that protects all personal
identifiers. In an online world, where all identifiers and attributes are in the form
of personal or public information, proper management of this information is
critical. Too little information accumulated precludes enough trust to build a
reputation. Too much information can have a chilling effect on behavior, as
people fear of too much of identifying information.
Moving on to Current identification systems, they rest on confirmation of
personal information, yet that information is not uniformly secure or protected.
The declining value of this verification poses a growing threat to the validity of
these systems, yet any future verification must depend on currently used
documents.
User-centric identity is changing the way identity information is distributed on
the Internet. Instead of users entering their personal information into each web
application they use, user-centric protocol applications allow users to provide
their data via their desktop or via a third party identity provider. This greatly
reduces the need for applications to store identity-related data, but changes the
user-application relationship by introducing a new third party. That new third
party is part of a new emerging service known as an Identity Provider.
As new authentication architectures are being developed and adopted for an
ever-growing number of applications, the privacy of individuals is being eroded
at an unprecedented pace, often with little or no justification at all. New
electronic communication and transaction mechanisms automatically capture and
record identities in central computer systems without individuals even being
aware of it. As more and more personal information is collected and recorded on
central systems, policies and traditional security safeguards to prevent against
leakage and abuse are rapidly becoming ineffective. In a digitally networked
environment
the
functioning
of
services
requires some
mechanism
for
identification. The issues surrounding identity management are complex in part
because the problem is so hard to bound. The set of risks and required analysis
are completely different depending on the apparent crisis one is setting out to
solve. Identity theft has very different causes than other serious crimes, and
wildly divergent risk analyses in terms of costs, probabilities and viable
alternatives.
Data protection is a global issue. Every nation has its own legal remedies and
ways and means to ensure data protection. ID theft is only a part of data theft almost an off-shoot. Many corporates and governments world over have lost
enormous amount of money and reputation due to data theft and id theft. What
is reported as the official figure of loss is just the tip of the ice-berg. Fearing
loss of reputation and other reasons, many individuals, companies and nations
hesitate to report the exact loss which would give a precise insight into the
magnitude of the problem.
Many cases on data scavenging have been reported worldwide. Data owners
and data custodians have to be careful while discarding used and unwanted
data. While e-waste dealing with used and unwanted disks, chips and storage
devices and electronic gadgets are a globally menacing concern, destroying the
data therein is a technological concern. To avoid scavenging and possible
recovery, disks are degaussed and physically destroyed. Much awareness has
to be spread on the use of degaussers and the technological capabilities of
recovering data from anything which is neither degaussed nor physically
destroyed.
Data Management is a significant step towards which all companies, ISPs, NSPs
and governments are heading for and planning. Hence Data Management is
growing in importance too. Taking it as a subject of study in technological
circles, organizations are struggling to cope with the enormity of the situation.
Corporates are putting in a lot of research work on legal, administrative and of
course technological solutions to the problem. There are many tools available
like anti-stegano software to protect against steganography, anti-key loggers to
guard against the ills of a key-logger software and anti-spyware. Here again
technology has to sync with the law of the land, policy of the company, ethical
standards of the organization, individual and private rights enshrined in the
constitution of the particular country. While a hacker will not care to nor bother
to, as his wont, be worried unduly that he is violating the private rights of the
citizen whose data he is accessing. A government or organization with ethical
standard, moral accountability and legal responsibility cannot deploy any antistegano, or an anti-spyware or an anti-key logger software in any of the
systems lest it also should be accused of spying into one’s system.
The solution thus lies in understanding of the problem, study of the legal,
techno,
administrative
and
cultural
standards
of
the
institution
or
the
organization. However it is beyond doubt that whatever be the express legal
provisions of the country or the lack of it, it is and shall be the responsibility of
the data custodian and the data owners to take care of the three factors of
security, namely confidentiality, integrity and availability of the data and thus
ensure the safety of information making it retrievable any time for the rightful
owner. When outsourcing has become the order of the day, in which most of
your data may be in some other hands , adequate safeguards must be taken on
both sides. Further more, there is the ubiquitous insider threats which should
also be tackled in an appropriate manner. ,
The statutory acts and connected rules in several countries have not envisaged
the severity of the loss that can be caused by the Identity theft and deal identity
theft cases under the existing legal provisions, without looking into the enormity
of the loss of money, goodwill, brand image, credibility , time, energy and the
consequent possible loss of business etc., Many countries have not even passed
separate acts for Data protection and safety, including India. This problem needs
to be addressed immediately.
Now let me briefly describe the present Indian scenario on a massive concept of
allotting a Unique Identity number for the entire population of India. You can well
appreciate that the creation of an identity system for India, a country of 1.17
billion people will pose monumental challenges. The project seeks to assign a
unique identity {UID} number to each and every individual in the country that
would remain a permanent identifier right from birth to death of the individual.
From the point of view of any person in the country, the UID offers many
benefits. First and foremost, it would obviate the need for a person to produce
multiple documentary proofs of his identity and end needless harassment that
people face for availing of basic government services like issuance of passports,
driving licences, voter cards, employment cards, ration cards, etc., Backed by
intensive use of technology, it would greatly facilitate easy verification of a
person’s identity and enable a single communication to trigger address changes
in all relevant agencies records.
The UID would enable government to ensure that benefits under various welfare
programmes reach the intended beneficiaries, prevent cornering of benefits by a
few people and minimize frauds. It will help financial inclusion and also would
enable financial institutions to exchange information regarding defaulters and
encourage responsible borrower behaviour. Mostly importantly, the UID is
fundamentally being prepared to identify Indian residents so that better security
can be provided by identifying illegal immigrants and terrorists.
Government agencies face the intricate challenge of effectively and securely
controlling population flows, identifying individuals and managing their access to
services, while
aligning their
strategies with citizen’s expectations for
convenience, security and privacy. Data Management initiatives, especially after
the increased frequency of terrorist attacks around the world, have become a
political imperative of unprecedented urgency for an increasing number of
governments around the world. India’s answer to this challenge is expressed
through the UID scheme.
Enrolment/Registration will be the process determining the overall success of
the scheme. It is vital that the government agencies, in collaboration with the
subcontracted private sector organizations, build a reliable infrastructure that
will be able to accommodate the diverse needs of India’s population. The
challenges they will face include the enormous volume of applicants, the
coverage of all exceptional cases and the building of trust and familiarisation.
Identity authentication will be the most important operational process of a UID
scheme since it will be the means of providing assurance of the claimed identity
of an individual. However, extensive use of Identity Authentication may raise
concerns about citizen expectations and thus authentication processes should be
limited to the minimum level. In most transactions, the service provider need not
know the identity of the individual but only to verify that the returning individual
is the same individual as the one on the previous transaction. In addition, it is
particularly crucial to regulate the uses of data and purposes of collection to
avoid the catastrophic effects of function and identification creep. However we
are happy that a good business model is being worked to make the system easy
for the citizens and to avoid duplication, etc., We are hopeful that it will help
prevention of data theft and identification problems . Perhaps it may be a good
model for being emulated by other developing countries. We can possibly give a
helping hand in this regard.
-----------------------
Download