LESM A204 Security Practice and Management Unit 8 Cybersecurity 219 HKMU Course Team Course Development Coordinator: Dr Raymond W K Lau, HKMU Developers: Dr Hilton Chan, Consultant Dr Raymond W K Lau, HKMU Instructional Designer: Louise Aylward, HKMU Members: Dr Garland Liu, HKMU Dr Czeslaw Tubilewicz, HKMU External Course Assessor Dr Dennis S W Wong, City University of Hong Kong Production Office for Advancement of Learning and Teaching (ALTO) Copyright © Hong Kong Metropolitan University, 2001, 2011. Reprinted 2021. All rights reserved. No part of this material may be reproduced in any form by any means without permission in writing from the President, Hong Kong Metropolitan University. Sale of this material is prohibited. Hong Kong Metropolitan University Ho Man Tin, Kowloon Hong Kong This course material is printed on environmentally friendly paper. Contents Introduction 1 Computer crime and security 3 What is computer crime? Characteristics of computer crime Computer crime and security surveys 3 7 9 Introducing computer networks and the Internet 10 Understanding network security 14 Legal aspects of computer security 20 Summary 23 References 24 Feedback on activities 25 Telecommunication systems Computer networks The Internet Illustration: computer security in e-commerce 10 11 11 16 Unit 8 Introduction More and more aspects of our daily life are associated with computers. The bus, train, tram, MTR or private car by which you travel to work all have computer parts. The microwave oven that you use to reheat food runs on a computer chip. For years now, I have not written anything by hand but rather have written directly on the computer. Except for withdrawing cash, many people now carry out their banking transactions on the Internet. Computers have revolutionized our daily life. But so have they revolutionized crime. As a result, a whole new area of security is born: computer security. As you will learn, computer security is a highly technical matter that is the special field of professional IT (information technology) experts. As a professional security manager, the technical aspects of computer security are beyond your scope. However, as we have emphasized several times in this course, the job of a modern-day professional security manager requires much more than putting guards at entrances and exits. It requires someone who has a broad basic knowledge of and sensitivity to issues such as criminology, law and socio-political-economic developments. That is why in this course we have included units on or introduced you to these issues. It is easy to learn about things like installing fire hydrants. You do not need a ten-credit course for that. But as we have shown (e.g. in Unit 7), a professional security sense requires much more than things like that to be developed. Moreover, although the technical IT issues of computer security are not the security manager’s area, a basic knowledge of and sensitivity to what computer security is about is required. In large organizations, the security manager is likely to have occasions in which he or she will need to work with IT professionals in planning the organization’s overall security requirements. For instance, the processes and procedures of physical security of large organizations are likely to be computerized. What if these computerized data are being electronically stolen or altered? Clearly, if the security manager were totally ignorant of what computer security is about, he or she would be working at a serious disadvantage. This unit first examines what computer crime is. You learn that there is considerable confusion even among experts on the topic. To overcome such confusion, the issue is examined first with reference to the concept of legal category, and then with reference to the nature of computer crime in relation to computerized data. This allows us to understand that computer security is mainly about protecting computerized data. After that, we introduce you to the characteristics of computer crime, as well as provide you with a brief survey of the state of computer crime. Much of computer crime is committed on and via the Internet. Hence, an understanding of this type of crime and of computer security requires a basic knowledge of the infrastructural basis of the computer network and the Internet. This is done in the second section (‘Introducing computer networks and the Internet’). The following section provides a basic examination of the various aspects of computer security (focusing on network security). You learn about the major threats to network security, 1 2 LESM A204 Security Practice and Management as well as the most common and important measures to ensure network security. The next section (‘Illustration: computer security in ecommerce’) pursues the matter further by focusing on e-commerce security. You learn about what the specific security concerns are, as well as the measures available to address these concerns. The final section looks at the legal aspects of computer security. This picks up from the discussion in the first section in which you learned why and how computerization, especially network computerization, has led to unprecedented legal problems. An examination of Hong Kong’s efforts to deal with the various issues involved is provided. In short, the unit: • examines what computer crime is and describes its characteristics; • provides a basic understanding of computer networks and the Internet; • discusses the major concerns of computer security; • discusses measures to ensure various aspects of computer security; and • discusses various legal aspects of computer security with a focus on Hong Kong. Unit 8 Computer crime and security The first challenge in understanding computer crime and security is defining what computer crime is. What is computer crime? This looks like a simple question, but I can tell you that it is not. To see why, look at the following example of computer crime given by Donn B Parker (1998, 59): For example, extortion and kidnapping involve ransom notes … If the ransom information is written by hand and sent through the postal service, the crime is an ordinary one. If the information is written and communicated electronically, it is a cybercrime. Such a way of defining cyber (or computer) crime seems strange. Let us say the kidnappers make the ransom demand neither by mail nor email (a form of electronic communication), but convey the demand through a simple phone call. Do we call the kidnapping a ‘telephone’ crime? We would, if Parker’s logic in the above quotation is followed. In fact, if a ransom demand conveyed by email constitutes computer crime, we should not call a ransom demand conveyed by post an ordinary crime, but a ‘postal’ crime. Let us consider another example of computer crime mentioned by Parker: A computer-controlled robot stabbed a repairman to death after his associate failed to put the robot into a safe mode for maintenance purposes. Again, it seems rather odd to call this a computer crime. Let us say a repairman is electrocuted when repairing an electrical device, because his colleague forgot to switch on the safe mode for the device. Do we call it an ‘electrical’ crime? Obviously not. In the above examples mentioned by Parker, it seems that the simple involvement of a computer itself constitutes the criterion on which to define computer crime. But, as we all know, more and more aspects of our daily life involve objects (from the microwave oven office workers use to reheat their lunches to the bus they take to go to work) that use computers or computerized parts. This implies that if the mere involvement of computers constitutes the definitional criterion, more and more crimes would become computer crimes. Then, the term computer crime becomes so broad as to make it meaningless. Parker is not alone in facing the difficulty of how to define what computer crime is. Thus, the FBI distinguishes between two types of computer crime: • the computer as the tool of the criminal • the computer as the target of the criminal. 3 4 LESM A204 Security Practice and Management Such a contrast between ‘tool’ and ‘target’ is a commonly used criterion. As you will see shortly, this contrast is useful. However, there are problems with it, too. For instance, a thief steals a PC (personal computer). The computer is the target of the thief, but it seems odd to call it a computer crime instead of simple theft. Take another example. Money launderers use e-banking (carrying out banking transactions such as money transfers from one account to another via the Internet; ‘e’ means ‘electronic’) for money laundering. When this happens, the money launderers use a computerized process (e-banking) as a tool in committing their crime, but there seems to be no good reason why it should be regarded as a computer crime. Instead, it is simple money laundering; the use of e-banking is purely incidental to the crime. Activity 8.1 Some criminals use sophisticated computers to print forged banknotes. According to the FBI’s classification, what kind of crime is this? Do you agree with such a categorization? If so, why? If not, why not? If you look at different texts on computer crime, you will find different definitions. In the above, we only cited the examples of Parker and the FBI for illustration. Why is there such confusion about what constitutes computer crime? This question is difficult to answer. Perhaps experts and law enforcement agencies are overwhelmed by the new phenomenon of computer crime, so instead of trying to think through carefully what it is conceptually, they simply hasten to lump everything criminal in which computers are involved under the general label of computer crime. In any case, what we want to do here is to make you think about the matter more systematically. First, you will recall from Unit 4 that white-collar crime is not a legal category but a sociological-criminological concept. So, the first question we need to ask is whether or not computer crime is a legal category. It is clear that although computer crime in general is not a legal category (i.e. a specific offence), certain specific forms of computer crime can constitute legal categories punishable as such by legislation. For instance, in some countries ‘hacking’ (unauthorized access to computers) is a specific offence. However, this is not the only way to deal with such criminal activities. Let’s say a computer whiz kid writes a virus program that will delete data on the hard disk of the computer struck by the virus and spreads it, thereby wiping out such data of his or her victims. Instead of trying to create a new specific offence for this, many places simply make it a form of criminal damage. In this case, the legal category is criminal damage, not the computer crime of spreading a virus. In sum, it is important to note: 1 The concept of computer crime in general is not a legal category. 2 Some specific forms of computer crime can be, and are, made into legal categories (i.e. specific offences) in some places. Unit 8 3 But (2) is not the only way to deal with such criminal activities. The advantage of the above analysis is that it immediately shows why it is ridiculous to call the above kidnapping case a computer crime. Even if a country or place decides to make as many specific forms of computer crime as possible into legal categories, it is unimaginable to have a specific offence of ‘kidnapping with the ransom demand sent electronically’. It would indeed be crazy if any such attempt were made. The same applies to the other similar examples discussed in this section. A later section examines the legal aspects of computer crime more fully. Let us proceed. Given point (1) above (that computer crime in general is not a legal category), the next question is precisely how we should define computer crime in general. In the following discussion, our purpose is not so much to provide an infallible definition as to provide guidance on how to think about this issue conceptually, which will further enable us to appreciate what computer security is about. Other experts may not entirely agree with our conceptualization, but we think it is superior to the various existing definitions. Take the example of the whiz kid again. It is clear that the data on the victims’ hard disks are the target of the crime (see the FBI’s first class of computer crime). Now consider another case. In shopping with an Internet retailer, you submit details of your credit card electronically. Unfortunately, the retailer’s Web page is insecure (Web page security is discussed later) and the details you submitted were intercepted by a hacker. The hacker subsequently used them to make purchases (retail shopping on the Internet requires details of your name, credit card number and expiry date only; no signature is needed). Here, the hacker uses the Internet as a tool (see the FBI’s second class of computer crime) to obtain data concerning your credit card. In both of the above cases, you will note that data are the target. In the first case, it is computerized data (on the hard disk) that is targeted. In the second case, the victim’s personal credit card data are submitted through a computerized process (e-shopping). In so doing, the credit card data become computerized (digitized), and as a result they become a target that is obtainable by another person through the computerized process of hacking. In short, in both cases, it is computerized data that are targeted. As you know, computers are really only sophisticated machines to handle data. Hence, from this point of view, a valuable way of understanding computer crime is the following: Computer crime is unlawful activities whose target is computerized data. Since these data are computerized, they can only be targeted by means of computerized processes. In contrast to using the mere involvement of computers as a defining criterion, this conceptualization is useful for two reasons. At one and the same time it allows us to avoid the embarrassing pitfalls of, for instance, calling a simple kidnapping case a computer crime; and it enables us to appreciate what computer security is about. Let me explain. You may ask: Just as the kidnapping case remains the same kidnapping case whether the ransom demand is conveyed by phone, post or email, 5 6 LESM A204 Security Practice and Management what is the difference between a criminal physically stealing the victim’s credit card and obtaining its details, and the above example of obtaining the data in the Internet? Indeed, from the legal point of view, both are theft. But in the above, it was explained that even if a certain specific form of computer crime (such as spreading a virus) can be made into a legal category (a specific offence), many countries choose not to do so, and prefer to handle these criminal activities by existing legal categories (such as criminal damage). Hence, although according to the law, both of the above cases are theft, this does not mean that we should not consider the latter case (stealing credit card details on the Internet) a computer crime. In fact, there is a distinct advantage in regarding it as a computer crime (based on the fact that the target is computerized data illegally obtained by computerized processes), because in doing so it enables us to understand what computer security is about. Computer security is about the protection of computerized data. Thus, in the latter case, the security concern is whether or not the retailer’s Web page is secure to protect the transmission of computerized data. In the former case, the security concern is different: it is to avoid being physically pick-pocketed. Computerized theft and physical theft are different and hence call for different security measures. This differentiation does not apply to the kidnapping case. Whether the ransom demand is conveyed by phone, post or email, the security concern remains the same: the physical prevention of getting kidnapped. There is no question of providing security against receiving ransom demand phone calls, ransom demand mail, or ransom demand email. This is why it is ridiculous to call kidnapping a computer crime if the ransom demand is made through email instead of phone or post. But it makes a lot of conceptual and security sense to regard the theft of credit card data that become computerized (by being submitted on the Internet) and illegally obtained through computerized processes as a computer crime. To summarize, in this section we explain that a lot of confusion exists, even among experts, about the term computer crime and how it should be defined. Many define it on the criterion of the mere involvement of computers, which sometimes results in ridiculous labelling. We then explain how computer crime is more usefully conceptualized. This is done first by examining the issues of whether or not computer crimes in general and specific forms of computer crime are legal categories. We then explain that the nature of computer crime is that it is targeted at computerized data that can be illegally obtained only by computerized processes. The usefulness of this conceptualization is shown by how it enables us to understand what computer security is about. Before moving on to the next section, you should note that various terms are used in addition to computer crime, the most common of which is cyber crime. In my view, these two terms (computer and cyber crime) are synonymous. However, there are other terms which really only reflect the abovementioned state of confusion. These include: computer-related crime (as mentioned, fewer and fewer aspects of our daily life are not computerrelated), high-tech crime (how do you define high-tech?), and information crime (can information not be conveyed non-electronically?). Unit 8 Activity 8.2 The following two types of fraud are among the most common on the Internet in the US. For each, explain whether or not you consider it to be a computer crime. 1 Auction fraud: Many auctioneers host a website at which auctions are held electronically. Let’s say you have topped the last bidder for a Ming Dynasty vase. You send the cheque, but the vase never arrives, or it turns out to be a fake. 2 Porn sites: You can get railroaded into one of these sites, and before you know it your phone bill is in the four-digit range, because the site operator has got details of your Web connection and uses it. Characteristics of computer crime Because computer crime concerns digitized data and the bulk of such data are or can be transmitted globally via the Internet, computer crime behaves very differently from traditional crimes. Let’s examine some of its unique features: • Boundary-free crime In cyber crime via the Internet, the criminal can launch a remote attack, in which he is physically in one country while the attack takes place in another country. • Extra-territorial jurisdiction In view of the distributed design of computer networks, it is difficult to define the jurisdiction of the criminal act. For example, in an Internet gambling scenario, the gambling server (the term ‘server’ will be explained later) is in country A, the payment server is in country B, the Web hosting server is in country C, while the program is running on the client computer in country D. Where is the gambling taking place in? • Anonymity Cyber criminals can easily hide their real identities with bogus names and addresses. • Small cost, huge benefit and damage The risk and cost of mugging a man in the street for $1,000 are much smaller than the risk and cost of robbing $1 million from the bank. But in computer crime, in technical complexity and risk, there is virtually no difference between altering financial data of $1 or $1 million. This means that for a relatively low cost, large sums of money can be targeted in computer crime. 7 8 LESM A204 Security Practice and Management • Invaluable information There is no universal formula in calculating information loss. For example, a copy of a company’s customer database is leaked to its competitor. Is it the physical cost of the CD-ROM? The investment costs in building the company’s customer database since the beginning? Or the loss in future revenues, public confidence and good will? • The victim may not be aware until it is too late When you physically lose a credit card, you know about the loss very soon and hence have time to remedy the situation (for example, by calling the credit card company to stop honouring the card). But victims of computer crime are often unaware of their victimization until it is too late — for example, when the credit card statement arrives showing huge purchases that the owner has never made. • Technical complexity — digital evidence Forensic investigation of traditional crime relies on the law of physics and chemistry, such as DNA, ballistic examination, fingerprints, etc. Computer crime investigation involves computer forensics, Internet data analysis, system log analysis, email head analysis, etc. to discover, collect, analyse and recover digital evidence from the cyber trail of a virtual crime scene. • Laissez-faire cyber culture The rapid growth of Internet is largely contributed to by the freeware, ‘copyleft’ (opposite of copyright), shareware and laissez-faire cyber culture. Regulation of the Internet will likely be regarded unfavourably by most Internet users. It is this culture that makes enforcement against computer crime on the Internet much more difficult. Having understood the characteristics of computer crime, we can see that the protection of information over the Internet has created unprecedented legal problems. Enforcement action require international cooperation, increased public awareness, government-private sector collaboration, computer forensics, and internal corporate information security policy. Reading 8.1 1 Chan, H K H (2000) ‘Cyber crime — a global threat to ecommerce’, Computer Society. 2 Carter, D L and Katz, A J (1996) ‘Computer crime and security: the perceptions and experiences of corporate security directors’, Security Journal, 7: 101–8. Unit 8 Computer crime and security surveys Over the years, numerous surveys have been conducted to understand the computer security and crime problem. In 1989, Hoffer and Straub (1989) revealed that 32% of computer abuse was discovered by accident, 45% by normal system controls, and 12.5% by computer security officers and auditors. The Information Security Survey 2000 conducted by the Hong Kong Productivity Council (HKCERT/CC) revealed that 19% of the interviewed companies experienced computer attacks within the last 12 months. Over 90% were computer virus, 3% sabotage, 1% unauthorized access, 1% denial of service (explained later), and 1% system penetration. Vandalism was the dominant type (77%) of website attack, followed by denial of service (15%) and theft of transaction information (8%). Total financial loss amounted to about HK $1.4 million. An interesting finding was that only 18% of the interviewees reported the attacks to the police. In the US, most organizations are concerned with negative publicity and hence are also reluctant to report to the police. The 2001 FBI Computer Crime and Security Survey revealed that 85% of the respondents detected computer security breaches within the last 12 months. The total financial loss was about US $378 million, compared to US $266 million in 2000. The most serious financial loss was due to theft of proprietary information. Thirty-six percent of the respondents had reported the incident to police, 94% detected a computer virus, 91% detected abuse of Internet access privileges by employees, 40% detected external system penetration, and 38% detected denial of service attacks. Reading 8.2 1 Chan, H K H (2001) ‘A comparative study of reported and unreported computer crimes’, UMI Dissertation Services, 10–35. 2 ‘Information Security Survey 2001’ (2001) Hong Kong Productivity Council, October, https://www.ipa.go.jp/security/fy13/report/security_survey/su rvey2001en.pdf 3 Session, W S (1991) ‘Computer crimes — an escalating crime trend’, FBI Law Enforcement Bulletin, February, 12–15. Activity 8.3 1 Compare computer abuses and crimes in the US and Hong Kong. 2 The reporting of computer crime to police in US is higher than Hong Kong. Explain why. 9 10 LESM A204 Security Practice and Management Introducing computer networks and the Internet The bulk of computer crime is committed on the Internet. Hence, the biggest concern of computer security is security on the Internet. In order to understand what is involved in security on the Internet, it is necessary to have a basic understanding of the Internet. Telecommunication systems Computer networks use telecommunications systems to connect the various computers belonging to the same network. Such networks consist of a number of components. Regardless of how far apart the computers belonging to the network are from one another, the components remain the same. They are: 1 the central or host computer which processes information 2 terminals or any input-output devices for accessing information 3 communication channels: the medium carrying information from one computer to another 4 communication processor: the equipment serving as the intermediary between computers and the communication channel 5 computer programs that govern the data traffic. Let me explain what these components are. The first two are computers and can be located anywhere within the network. An example of component 1 is a central computer that provides airline flight schedule data. A user can access the data by means of a desktop computer at home, or a laptop while travelling in a taxi, or even his or her Internet-capable cellular phone while having coffee at Delifrance. The desktop, laptop and cellular phone all constitute the terminal, i.e. component 2. In some networks, some terminals actually host data that can be accessed by other terminals. When this happens, it serves as both component 1 in relation to these data, as well as a terminal (component 2) for accessing data stored in the host computer. Component 3 can be in various forms. Thus, hooking up (connecting) computers within the same office is often done by means of dedicated (i.e. specially for the purpose) wires, whereas linking your home computer to the office network is mostly done using existing telephone lines. Other forms of communication channel include fibre optic cables and wireless media (microwave transmission, satellites, cellular phone transmission, etc.). The function of component 4 is to transform the digital data from the computer (host computer and terminals) into a format that the communication channel (component 3) can transmit, and vice versa. For instance, telephone lines transmit analog signals; hence a communication processor such as a modem is needed to transform digital into analog Unit 8 signals and vice versa, in order for data to be transmitted through the network, and readable in digital form on the computers of the network. Components 1 to 4 are the hardware. Component 5 is the software that controls input and output activities and manages other functions of the network. Computer networks Computer networks are organized hierarchically. At the lowest level, a group of computers is linked together to form a local area network or LAN. In, for example, an office, LAN is the network that links together by means of dedicated wires all of the office’s computers. In an Internet Service Provider (ISP, a firm providing access to the Internet for its endusers), the end-users’ computers (i.e. terminals) are connected to the ISP’s LAN by telephone lines. A group of LANs within the same metropolitan area may be linked together in a regional network. These regional networks are often known as wide area networks (WAN). Thus, communication between two computers belonging to different LANs is done through the WAN that incorporates both LANs. Different WANs are, in turn, connected into higher level networks which are known as backbone networks. By means of such a hierarchical structure, computers in different parts of the world can communicate with one another, with the Internet being the worldwide network. To route data between two computers, their locations must be known to one another. Such locations are known as IP addresses or simply addresses (IP means Internet Protocol). IP addresses are pretty much like telephone numbers, and consist of four groups of numbers (e.g. 202.40.157.163). As you can see, unlike telephone numbers, IP addresses are difficult to memorize. Hence, they are given aliases. For example, the alias of the above IP address is www.hkmu.edu.hk. It is, however, necessary to translate the human readable alias into its IP address. This is done by conversion tables that are stored in the Domain Name Server (DNS). DNS service is usually provided by a dedicated computer on the LAN. You can now understand why email addresses are structured in the form of user@domain. The domain name (e.g. hkmu.edu.hk) behind the sign @ identifies, after translation by the DNS, the IP address of the LAN. The user name in front of the sign @ identifies the specific user within the LAN. The Internet As noted, the Internet is the worldwide network. Its origins can be traced to the 1960s, when the US Department of Defense set up a network called ARPANET to facilitate information exchange among university professors and other research scientists. Later, the US National Science Foundation (NSF) formed a new network called the NSFNET, which 11 12 LESM A204 Security Practice and Management eventually replaced ARPANET as the backbone network (see above) for the research and academic community. It was, however, only in the early 1990s that commercial networks (i.e. ISPs) were connected to the NSFNET. This allowed end-users of these commercial networks to access the NSFNET. More importantly, by means of the NSFNET backbone network, end-users of different ISPs could now communicate with one another. As a result, a gigantic network was created which eventually developed into what we now call the Internet. Today, backbone networks are offered by a host of companies. These networks are connected through interchange points known as Commercial Internet Exchanges (CIX), which have formed into an association. Not surprisingly, large telephone companies and cable operators operate many of these companies. For instance, members of the CIX include: • telecom firms such as AT&T in the US, Cable & Wireless and British Telecom in Britain • cable TV operators such as Time-Warner, Media One, etc. • independent backbone carriers such as PSINet, UUNet, etc. The Internet has many applications, the most common of which include email, news forums, interactive communication (such as ICQ), remote computer access (instructions can be submitted to a remote computer to perform any task on that computer), and information retrieval. Information retrieval is the function that largely accounts for the explosive growth of the Internet. Information can be hierarchically organized into pages, known as Web pages, which contain texts, photo images and audiovisual media, and stored in dedicated computers (known as servers). By connecting to these servers, users can systematically retrieve information. A Web page is identified by its Web address or uniform resource locator (URL). Thus, the URL of HKMU’s homepage is http://www.hkmu.edu.hk. As you can see, the URL contains the domain name, which is the alias of the Web page’s IP address. Anyone can, if he or she wishes, set up his or her own website. The same applies to any organization. To do so, the site’s URL has to be established. As you probably know, the domain name easily identifies the type of organization. Thus, sites of commercial firms are identified by <.com> (<.co> in Britain) in the URL, educational institutions by <.edu> (<.ac> in Britain), non-profit organizations by <.org>, governmental organs by <.gov>, etc. When you set up a website, you have to register your domain name with any one of a number of non-profit organizations that keep centralized records of domain names. When registering, you also provide information on the nature of your website. The reason for this is simple. By doing so, it can be ensured that your domain name is not already used by someone else. Further, you probably know what a search engine (such as Yahoo!) is. When you use a search engine to Unit 8 search for sites on a certain topic (e.g. diving in Bali), the search engine goes through the records of domain names and uses the information on the type of website you supplied to identify the relevant websites. Because communication on the Internet goes in both directions, it is possible to conduct business via the Internet. Thus, many businesses have set up websites not only in order to promote themselves, but also to conduct business transactions. E-business, as such business is called, is of two main types: • B2C or B to C: business selling to consumers, or more generally transactions between business firms and consumers • B2B or B to B: business-to-business transactions In the following activity, you take a look at several B2C examples. Later, we discuss computer network security in relation to e-commerce specifically. Activity 8.4 Check out the kinds of B2C transaction you can conduct on the following websites: • Amazon: http://www.amazon.com • Hongkong Bank (click online@hsbc): https://www.hsbc.com.hk/ • South China Morning Post (click archive): http://www.scmp.com One final point before we move on to the next section. On the Internet, there is no privacy. This lack of privacy can be understood in a number of senses. For instance, the network administrator has a complete record of all of your Internet activities (e.g. the email you send and receive, the websites that you have visited, etc.). Of course, we assume that network administrators observe the ethics of not prying into your activities. The following section explores this issue more fully. Meanwhile, you should note that the lack of privacy (or, conversely, the openness of the Internet, and hence of any computer logged on to it) means that technical sophistication is required to provide security. It also means that forensic investigation into computer crimes is possible by means of collecting (or discovering) and analysing the cyber trail left behind by cyber criminals (though sophisticated cyber criminals are capable of disguising such trails). 13 14 LESM A204 Security Practice and Management Understanding network security This section gives you a basic introduction to the topic of network security. The next section explores the issue of computer security in greater detail by examining security in e-commerce. In a recent survey (2001) conducted by the Information Technology Association of America or ITAA (in conjunction with an accountancy firm) among IT executives, it was found that the major concerns of network security are: 1 privacy and confidentiality: we pointed this out at the end of the previous section 2 data integrity: uncertainty about whether or not data is not interfered with by malicious parties (data integrity is the completeness and soundness of the data) 3 authentication: uncertainty about the true identity and credentials of the parties with whom one communicates 4 infrastructure security: uncertainty about whether or not the network infrastructure is robust enough to withstand malicious attacks. As you can see, security concerns range widely, but basically, we can classify network security threats into two groups: 1 Client-server: Any computer logged on to the Internet (including an ISP’s host-server and its end-users’ terminals) is subject to remote manipulation by a malicious third party. 2 Data and transaction: An unauthorized party without the owner’s knowledge may access confidential data; parties assuming a false identity may carry out transactions. Let us discuss these two groups of threat in greater detail. Under the category of ‘client-server’ threats, the most common types are: • malicious code threats, e.g. computer viruses that instruct the victim’s computer to perform self-destructive tasks, as well as spread to other computers linked to the initial batch of victim computers • unauthorized modification of data contained in the victim’s computer by remote hackers, i.e. destroying data integrity • service overloading, e.g. denial of service (DoS) attacks (targeted at host servers, in which hackers create enormous numbers of data requests from the host server, thereby overloading it, with the result that genuine end-users making genuine service requests from the host server are denied its service) • message overloading, e.g. hackers send a large number of very large files to an email server, causing it to crash. Unit 8 Under the category ‘data and transaction’ threats, the most common types are: • Data security: unauthorized access to confidential data, achieved either through eavesdropping on the network or gaining access to the computer hosting the data. • Message integrity: unauthorized alteration of an important message or document such as a business contract. • Authentication: false identity assumed by parties with whom one communicates or does business on the Internet. Let us now take a general look at some of the typical security measures that can be taken: • Restriction of access: Only legitimate users are allowed to access the network, for instance, by using passwords. However, hackers are able to eavesdrop on the network and obtain the password during its transmission, hence necessitating the further measure of encrypting passwords (see below on encryption). • Establishing a firewall between the network and the Internet: A firewall is typically a computer or a router device (a device that forwards packets of data from one LAN or WAN to another) that stands between the network (typically the LAN) and the Internet, controlling and monitoring all traffic between them. By means of the firewall, computers within the LAN have full access to the Internet, but outside access to the LAN is restricted. For instance, in addition to a user name and password, outside user authentication (based on an IP address and other identifiers) may be required to access the LAN. Moreover, even authenticated outside users may be restricted to perform only certain functions on the LAN. Firewalls are also frequently used to filter incoming data traffic (e.g. filtering out data from pornographic websites — the firewall is able to identify these websites because, as you will recall, when a website is registered, information on the nature of the website has to be provided. There is no point in providing false information, for in that case search engines will not be able to pick up the website correctly, and hence Internet users interested in this kind of websites will not get to know about it). • Data and message encryption: To encrypt data (messages are also data) is to scramble them (by coding techniques based on highly sophisticated mathematics) so that outsiders will not be able to read them (e.g. the number 123, after encryption may, for example, become something like x*=&_|4(#-). Only insiders who have the decrypting (i.e. decoding) algorithms will be able to recover them in their original state. Encryption was first developed for military and diplomatic purposes but is now essential for doing business on the Internet. • Third-party authentication: Two communicating parties on the Internet authenticate each other’s identity through an authenticating third party. We discuss this more fully in the following section. 15 16 LESM A204 Security Practice and Management Activity 8.5 Log on to www.hsbc.com.hk. Click the ‘security’ button on the menu bar at the top of the web browser. A box appears on the screen. What do you read in the box? Now click OK to close the box. Click online@hsbc ‘new user’. Then click ‘apply now’ on the new screen. Select any one of the four options (ATM, Credit Card, etc.) on the new screen. When the new screen appears, click the ‘security’ button on the menu bar at the top of the Web browser. A box appears. What do you read there? Reading 8.3 (optional) Kalakota, R and Whinston, AB (1996) Frontiers of Electronic Commerce, Reading, MA: Addison Wesley, Chapter 5. We recommend and provide you with this reading as an optional reading. It provides a good account of network security. Illustration: computer security in e-commerce In this section, we examine computer security in e-commerce, to give you a fuller idea about computer security in general. Before you read on, it would be useful to go through Reading 8.4. Reading 8.4 Fukuyama, F (2001) ‘The virtual handshake: e-commerce and the challenge of trust’, Merrill Lynch Forum White Paper, http://pratclif.com/fukuyama/fukuyama3.htm. In Activity 8.2, we drew your attention to auction fraud on the Internet. When you shop at a street retailer and pay a deposit for merchandise for subsequent delivery, you trust that the shop will still be there if the delivery fails to occur, so that you can pursue the matter. Of course, sometimes shoppers are defrauded of their deposits by retailers shutting up shop before delivery. However, this is a relatively infrequent occurrence. It’s different on the Internet. Anyone can create a website and sell things or services through it. How can consumers be sure that the website is a genuine and trustworthy business? This simple example shows you that many difficulties face e-commerce, all related to computer security. Let us take a look at what these difficulties are: 1 Authentication: As noted, the need is to ensure the authentic identity of the parties with whom one communicates and transacts business on the Internet. Common authentication measures in cyberspace include Unit 8 PIN (personal identity number) and digital signature, the latter of which is discussed later on in this section. 2 Confidentiality: Consumers must be assured that the personal data they submit via Internet will not be illegally accessed during transmission by third parties. In Activity 8.5, we came across the most effective technique for ensuring confidentiality in this respect, encryption. However, encryption is expensive, and hence only large businesses are able to afford it. If you log on to smaller businesses on the Internet and check their website’s security information, you will find that most of them do not offer encrypted security, and hence it is unsafe to send personal data to them on the Internet. One way to get round this problem is to combine Internet transactions with nonInternet ones. For instance, a hotel resort on Phi Phi Island (Phuket, Thailand) may have a website through which you can make room bookings. Since no encrypted security is provided, clients are not asked to send credit card details to them electronically. Instead, the resort’s bank account number is given. Clients can make the deposit through this bank account and fax the receipt to the resort. On receiving the fax, the room booking is confirmed, and the outstanding amount is paid on arrival at the resort. 3 Data integrity: As already noted, it is important to ensure that data and messages (including documents such as contracts) sent on the Internet are not altered by malicious third parties during transmission. This is particularly important in B2B transactions, since, for instance, an extra ‘0’ added or deleted from the contract sum in a business contract can be financially fatal. Various techniques are available to guard against impairment of data integrity, ranging from a simple checksum operation to the more effective cryptographic technique of hashing. Since these are rather technical, there is no need to explain them in this unit. 4 Availability: In the above, we came across denial of service (DoS) attacks. For businesses doing transactions on the Internet or portals (websites providing a large variety of services such as news, entertainment, etc. to anyone logging on to them, mostly for free, which make money through advertising), a DoS attack can mean significant losses in business revenue and goodwill (the good name of the business, inspiring customers’ trust). You may recall that even giant search engines-cum-portals such as Yahoo! have suffered from DoS attacks. When this happens, data and services from the website become unavailable. 5 Access control: We came across this when discussing firewalls in the previous section. 6 Non-repudiation: let’s say Company A places an order of $1 million with Company B via B’s website. What if B produces the merchandise ordered but then A repudiates that it has ever placed the order? How can it be ensured that when B receives the order from A on the Internet, B can show (if A repudiates having placed the order) that the order could only have originated from A and no one else? In 17 18 LESM A204 Security Practice and Management non-electronically conducted business transactions, the contracting parties’ physical signatures on the contract ensure non-repudiation. In electronic transactions, an effective tool to ensure non-repudiation is the digital signature. As mentioned, a digital signature is able to ensure both authenticity of the contracting parties (or, more generally, communicating parties) as well as non-repudiation. How does it work? For our purpose, it is not necessary to go into details, so only a simplified explanation is given. Since the use of a digital signature incorporates encryption (and decryption), it also serves to ensure data integrity and confidentiality. Organizations as well as individuals that wish to communicate or transact on the Internet while ensuring the above aspects of computer security (authenticity, etc.) can use what is called the digital certificate, which incorporates the digital signature feature. Basically, there are organizations known as Certificate Authorities or CA (in Hong Kong the Post Office offers Certificate Authority services). Any person or organization (called the subscriber) can apply to the CA for a digital certificate (DC). The CA verifies the subscriber’s identity and issues it a DC. All DCs are published in the CA’s repository, so that parties wanting to communicate or transact with a subscriber can check it. The CA provides the subscriber with a pair of ‘public keys’ and ‘private keys’. Now, let’s say subscriber X wants to send a message to subscriber Y. X uses its private key to encrypt the message. Since each subscriber’s private key is unique to it, any message sent using that key could only come from the subscriber. In this way, authenticity is ensured (the identity of the sender of the out-going message is guaranteed through the CA), and so is non-repudiation (since the message could only have been sent by the subscriber with the particular key, it cannot repudiate having sent the message) and confidentiality/data integrity (as a result of the encryption process). On receiving the message, Y can check with the CA’s repository on the validity of the DC of X. If it is in order, Y can obtain X’s public key from the CA, which is used to decrypt the message. In this way, messages transmitted are signed with the digital signature provided for by the pair of private-public keys. The above mechanism is known as the Public Key Infrastructure or PKI. Although it is a very powerful mechanism to ensure computer security in Internet communication and transaction, it, too, has problems. Because of these problems, originally the Hong Kong Post Office’s PKI had a target of issuing more than 100,000 digital certificates in the first year of its launch. However, so far (as of late 2001), only several thousand have been issued. If you are interested in the problems with PKI, read the article ‘Ten risks of PKI: what you’re not being told about public key infrastructure’ by C Ellison and B Schneier, in Vol. XVI (1 Nov 2000) of the Computer Security Journal, available on https://www.schneier.com/wp-content/uploads/2016/02/paper-pki.pdf. Before proceeding to the next section, there is one point worth mentioning. In Unit 7, we called your attention to the need for professional security managers of large organizations and communities to be sensitive to and aware of socio-political-economic developments. In Unit 8 the development of cryptographic technology (such as PKI) for nongovernmental and non-military use, governments actually have reservations, though they see the benefits of its commercial application. The reason is simple. If powerful cryptographic technologies become easily available, criminals can use them too. Communications between criminals can become encrypted, thereby rendering wiretapping and the like useless. If you are interested in this issue, you can read the article by G A Keyworth II and D E Colton, ‘The computer revolution, encryption and true threats to national security’, available from http://www.pff.org/issuespubs/futureinsights/fi3.5computerrevolution.html. Reading 8.5 gives you a simple illustration of such law enforcement concerns. In response to the above, the US Government has legislated to the effect that when a strong cryptographic key is used, the key must be recoverable by the US Government under the concept of the escrowed encryption system. What this means is that for any strong cryptographic system with its encryption and decryption keys, the manufacturer will have to provide, in addition, a backup key, different from the encryption and decryption keys, which can decipher this latter pair of keys. An authorized party keeps the backup key. If needed, the US Government can require that party to let the government use the backup key to break into the cryptographic system. One consequence of this is that if an organization in a country other than the US purchases a cryptographic system from the US, the US Government will be in a position to break into that system, if it deems necessary to do so. Naturally, other governments are not happy with this situation. Some countries, such as Russia, have developed strong cryptographic systems that do not carry with them this condition. Reading 8.5 ‘FBI “big brother” case tests limit of electronic spying’, South China Morning Post, 31 July 2001. Activity 8.6 Visit the website of the HK Post Office (http://www.hongkongpost.gov.hk/) and find out about its PKI services. Post your answer on the discussion board and have a look at your classmates’ ideas. 19 20 LESM A204 Security Practice and Management Legal aspects of computer security On several occasions in the unit, we came across the fact that computerization, and especially the rise and growth of the Internet have led to unprecedented legal problems. A couple of simple examples will show this. Let’s say you make a purchase from a US firm through the Internet. The merchandise arrives damaged. What can you do? Giant Internet shops such as Amazon will ship you a replacement without a problem, for this is part of the service they provide in order to build up a huge customer base. However, smaller shops will not do this. Can you sue them? In theory, yes, but the costs will be prohibitive. Let’s say you do intend to sue a shop in New York. Which set of laws applies? Hong Kong’s, or New York’s? Mostly, e-shops specify that in a dispute, the laws of the place in which they are located are the governing ones. If these laws are very different from those of the place of residence of the buyer and huge sums are involved, the problem can be very troublesome. Even more complicated will be a case such as this: A criminal located in country A electronically directs a computer in country B to issue instructions to a network in country C to erase certain data in that network. Do the laws of country A, B or C apply? In many countries, the basic instrument to legally protect computer security is some form of computer misuse law. In other words, the aim is to make at least the main specific forms of computer crime into legal categories. Generally, such a computer misuse law aims at imposing prohibitions on four different levels: • access to a computer without authorization (i.e. hacking) • access with intent • modification of contents • diverting the use of computer. Locally, the overall approach is not to have a single comprehensive computer misuse statute. In other words, not only is computer crime in general not a legal category in Hong Kong, but many specific forms of computer crime (such as hacking) which can be turned into legal categories are not in Hong Kong. Hence, the major approach is to make amendments to various statutes in order to incorporate prohibitions against offences of the computer crime nature. This is not to say that Hong Kong does not have a mini-computer misuse statute. In 1993, the Computer Crime Ordinance was enacted, part of which purpose is to enact new offences. However, its major purpose is, as stated, to enable the amendment of existing legislation to deal with various forms of computer crime. Existing ordinances amended for such purposes include the Telecommunication Ordinance (Cap. 106), the Crimes Ordinance (Cap. 200), and the Theft Ordinance (Cap. 210). Unit 8 In the Telecommunication Ordinance, a new offence of ‘unauthorized access to computer by telecommunication’ was created as section 27A. This offence is aimed at electronic trespass to any computer system by telecommunication, i.e. on the Internet. There is no need to prove the criminal intent of the intruder. Due to this lesser requirement, the offence only carries a maximum fine of $20,000. A more serious offence is ‘access with criminal or dishonest intent’ under section 161 of the Crimes Ordinance. In this offence, the intruder’s criminal intent to (a) commit an offence, (b) dishonestly deceive, (c) dishonestly gain for himself or another, or (d) dishonestly cause loss to another, has to be proven. It should be noted that the gain or loss mentioned in (c) and (d) do not have to be tangible, and can be temporary or permanent (the ‘temporary’ provision is required because data destroyed as a result of, for instance, a virus attack may sometimes be recoverable). This offence can be liable up to five years of imprisonment. In section 59(1) of the Crime Ordinance, the definition of ‘property’ in relation to Criminal Damage has been extended to include ‘any program, or data, held in a computer or in a computer storage medium, whether or not the program or data is property of a tangible nature’. Furthermore, in section 59 (1A) misuse of a computer is considered to ‘destroy or damage’ property. The misuse of a computer means (a) to cause a computer to function other than as it has been established to function, (b) to alter or erase any program or data, or (c) to add any program or data to the contents of a computer for a computer storage medium. This has widened the concept of criminal damage in cyberspace because of the intangible nature of computer technology. Section 60 stipulates the maximum sentence for misuse of a computer to be ten years of imprisonment. In section 11 of the Theft Ordinance, the offence of ‘Burglary’ has been amended to include misuse of the computer as ‘doing unlawful damage to anything in a building’. The aim of this is not of course against hacking via the Internet. Rather, the aim is that if, for example, a person enters a building unlawfully and deletes all data on the hard disk of a computer, then he commits burglary just as if he removes some tangible property from the building. In section 19 of the same Ordinance, falsifying records kept in a computer or destroying them become punishable. In both section 19 of the Theft Ordinance and section 85 of the Crime Ordinance, the term ‘books’ is amended to include any disk, card, tape, microchip, sound tracks or any other device; and ‘record’ is amended to include a record kept by means of a computer. Activity 8.7 What is the problem with the ‘unauthorized access to a computer by telecommunication’ offence in section 27A of the Telecommunication Ordinance? 21 22 LESM A204 Security Practice and Management The level of hacking in Hong Kong has risen notably over the years (from one reported case in 1993 to 238 reported cases in 1999). Even government sites have been affected, as you have probably heard on the news. The first computer crime prosecution in Hong Kong occurred in March 2000. Three people were accused of stealing 127 passwords on the Internet and selling them to third parties. In addition, they were accused of unlawfully downloading music from the Internet to make saleable CDs. The three pleaded guilty, with one sentenced to six months of imprisonment and the other two to a detention centre. In the last section, we discussed e-commerce and the various security issues associated with it, such as data integrity, non-repudiation and authentication. The rise of e-commerce has obviously led to a host of new legal issues that have to be tackled, such as the legality of online contracts and the evidentiary requirements in disputes and lawsuits. In Hong Kong, the Electronic Transactions Ordinance 2000 (Cap. 553) has been enacted to handle these issues. The Ordinance creates status parity (i.e. equality) between electronic forms of contract and existing physical contracts. Similarly, electronic records and digital signatures acquire the same status as physical, paper-based ones. A legal framework is also established for the operation of CAs (see above). Unit 8 Summary We began this unit by examining what computer crime is. You learned that considerable confusion exists, even among experts on the topic. In order to overcome this confusion, we discussed the issue with reference to the concept of legal category, and to the nature of computer crime in relation to computerized data. This allowed us to understand that computer security is mainly about the protection of computerized data. Much of computer crime is committed on and via the Internet. Hence, you have been provided with a basic introduction to computer networks and the Internet. With this knowledge, computer security (focusing on network security) and e-commerce security were explained to you, in which you learned about the major threats to network and e-commerce security, as well as the most common and important measures to ensure network and e-commerce security. The rise of computerization, especially network computerization, has led to unprecedented legal problems. An examination of the legal aspects of computer security focusing on Hong Kong’s efforts to deal with the various issues involved has been provided. 23 24 LESM A204 Security Practice and Management References Bilingual Laws Information System, http://www.justice.gov.hk. Carter, D L and Katz, A J (1996) ‘Computer crime and security: the perceptions and experiences of corporate security directors’, Security Journal, 7: 101–8. Chan, H KH (2000) ‘Cyber crime — a global threat to e-commerce’, Computer Society. Chan, H K H (2001) ‘A comparative study of reported and unreported crimes,’ UMI Dissertation Services, 10–35. Ellison C and Schneier, B (2000) ‘Ten risks of PKI: what you’re not being told about public key infrastructure’, Computer Security Journal, Vol. XVI, http://www.counterpane.com/pki-risks.html. Fukuyama, F (2001) ‘The virtual handshake: e-commerce and the challenge of trust’, Merrill Lynch White Paper Forum, http://www.ml.com/woml/forum/ecommerce1.htm. Hoffer, J A and Straub Jr, D W (1989) ‘The 9 to 5 underground: Are you policing computer crimes?’ Sloan Management Review, Summer, 35–43. Information Security Survey 2001 (2001) Hong Kong Productivity Council, October, http://www.hongkongcert.org/home.html. Kalakota R and AB Whinston (1995) Frontiers of Electronic Commerce, chapter 5, Englewood Cliffs, NJ: Addison Wesley. Keyworth G A and Colton, D E (1996) ‘The computer revolution, encryption and true threats to national security’, http://www.eff.org/Privacy/ITAR_export/HTML/encry.html. Parker, D B (1998) Fighting Computer Crime: A New Framework for Protecting Information, New York: John Wiley & Sons. Session, W S (1991) ‘Computer crimes — an escalating crime trend’, FBI Law Enforcement Bulletin, Feb., 12–15. 2001 FBI Computer Crime and Security Survey, http://habitantes.elsitio.com/digisign/2001fbisurvey.html Wu R (2000) ‘Electronic transactions ordinance — building a legal framework for e-commerce in Hong Kong’, http://elj.warwick.ac.uk/jilt/00-1/wu.html. Unit 8 Feedback on activities Activity 8.1 This would be considered a computer crime falling into the class of computer as the tool of the criminal. It seems that the crime is more suitably considered a straightforward forgery. The reason is that the technique used in printing is incidental to the crime, and not the substance of the crime itself. Activity 8.2 1 This is straightforward fraud, no different from if you bid for the vase at an auction held in a hotel function room, win it, pay for it, and then receive a counterfeit. Again, as in Activity 8.1, the substance of the crime is the fraud. That the auctioneer holds the auction on the Internet is incidental to the crime. 2 This is a computer crime. The target is computerized data (your Internet account details) obtained by a computerized process when you logged on to the porn site. Activity 8.3 1 In general, Hong Kong is about two years behind the US in trends and patterns. One prevalent form of computer abuse/crime in the US, child pornography, seems to be much less of a problem in Hong Kong. 2 First the amount of loss in computer crime in the US is much greater than in Hong Kong, hence making victims more willing to report the crime to law enforcement agencies. Second, cyber insurance is available in US, but not yet in Hong Kong. This is another major reason why the reporting rate in the US is higher, since reporting to the police is required in order to make insurance claims. Activity 8.4 1 Amazon is the biggest online shop in the world. From personal experience, its service is superior to that of most other online shops. You can buy a lot of things on the site ranging from books (the site began as a bookshop) to computer software; you can sell things on it, too. 2 Once you have registered to carry out e-banking on the Hongkong Bank site, you can carry out almost all kinds of banking transaction on it except withdrawing cash. 3 You can search for news reports on any topic covered in the South China Morning Post going back almost ten years. Once you have identified the report you want, it costs HK$10 to download it. 25 26 LESM A204 Security Practice and Management Activity 8.5 1 In the first case, the box says that the page is not encrypted. This means any data transmitted to that page is insecure, i.e. it is easy for hackers to intercept or eavesdrop on the data during transmission. 2 In the second case, the box says that the page is encrypted. This means that data transmitted to that page is secure, i.e. it is not easy for hackers to intercept or eavesdrop on the data during transmission. 3 The reason why one page is not encrypted and the other is encrypted is simple. In the second page, you are asked to submit important personal data. If the page is insecure (not encrypted), customers will be reluctant to submit personal data, and hence this destroys the purpose of e-banking. Activity 8.7 The word ‘telecommunication’ restricts the above provision against hacking to hacking via telecommunication means. Hacking can, however, be perpetrated via non-communication means, such as an office worker gaining illegal physical access to one of the office computers and hacking into it.