Group Exercise - Communication and Information

advertisement
IT for Decision Makers
Security and Networking Issues
GROUP DISCUSSION AND QUESTIONS
Discussion Topic 1: Future security
Computers and networks originally were built to ease the exchange of information. Early
information technology (IT) infrastructures were built around central computers or
mainframe solutions while others were developed around the personal computer. What
some thought impossible became reality and today businesses are being driven by the
power of the personal computer that users access with just a user name and password.
But as the information revolution opened new avenues for IT, it also opened new
possibilities for crime. Attackers used these opportunities to steal passwords and gain
access to information or to create disastrous effects on networks and computers.
The nature of computing has changed over the last few years. Networks are designed and
built to facilitate the sharing and distribution of data and information. Controlling access to
these resources can become a problem because you need to balance the requirement for
access to free information with the value of the content of that information.
Some information is more sensitive in nature than other information; this leads to the need for
security requirements. Today, IT security has progressed to more than just user names and
passwords. It involves digital identities, biometric authentication methods, and modular
security strategies.
Questions:
1. Do home dialup users need to worry about security?
2. How much responsibility should software vendors take for the security of their
software?
3. What will information security be like in the 21st century?
Discussion Topic 2: SMART CARDS
Smart cards are credit card-size devices that carry an
embedded microprocessor and memory and can store and
often process information. Smart cards are growing in
popularity for a number of applications, including
transportation, telecommunications, debit purchasing, and
health care. Smart cards, which are now accepted
significantly in Europe are now gaining momentum in the
United States. The most known delaying factor that have
slowed down the pace of adoption of smart cards in the United States and in some developed
countries is mainly because of the widespread usage of magnetic-stripe credit cards (eg.
VISA, MASTER cards etc). Other major barriers to the success of these cards, despite the
ongoing promotion and trials of the use in most countries, are customer habits, limited
infrastructure and costs of deployment. But of all these issues and other concerns, smart
cards are gaining popularity in the world because they are tamper-resistant, they have high
levels of data control and accountability; the most secure way to handle private
information and they are easy to carry - no cash or coins.
A smart card unlike a credit card, can accept, store, and send information. It can hold as
much as 80 times more data than magnetic-stripe cards (credit cards), and the embedded
semiconductor chip can be either a memory chip with non-programmable logic or a
microprocessor with internal memory. With Cash values, smart cards can be used for all type
of transactions or even money transfers without leaving any electronic trail.
There are 2 main different categories of smart cards - contact and contactless. A contact
smart card can communicate directly through a physical interface by inserting the card into a
smart card reader. A contactless smart card on the other hand can communicate remotely
with the smart card reader via an electromagnetic interface. These non-battery cards are
powered by microwave frequencies and they need to come within 2 to 3 inches of the card
reader to be powered. "Fast card" interfaces, such as those used by transportation fare cards,
have greatly benefited from the contactless interface, which allows a customer to quickly
wave the card near the device, instead of inserting and removing a card, which can slow
down lines.
In addition to the different card interfaces mentioned above, there are also two different types
of smart cards; memory-chip cards and smart cards with microprocessor chips. Memory-chip
cards are cheaper and can only store but can not process information. These smart cards
similar to magnetic-stripe cards in this respect, are used mainly for basic application such as
telephone cards, public transport or shopping - leaving no electronic trail.
Smart cards with microprocessor chips are more secure and can do far more than memorychip cards. The microprocessor lets a card not only store information, but also add, delete,
and manipulate data in its memory. These cards are programmed with more algorithms
capable of more complex task: for example, a health care card can offer a doctor and a
pharmacist different levels of data access while allowing anyone to read basic information,
such as name and emergency contact number. One might think of a microprocessor smart
card as a miniature computer on a plastic plate. It can support applications that offer
advanced services with a high degree of data security.
A smart card basically consists of three parts: a plastic card with or without a magnetic stripe,
an electronic module supporting the electrical contacts and a silicon integrated circuit. All of
the components -- central processing unit, memory, and I/O (Input & Output)-- are in the same
integrated circuit chip with electrical connections tying them together. Thus it is difficult for
foreign signals to tamper with the interconnections of the components inside the chip; this
enhances the security of the smart card.
The need for security and protection of privacy is growing as electronic forms of identification
multiply in our computing-pervasive world. The increasing popularity of the Internet and the
expansion of corporate networks have accelerated the demands to prevent unauthorized data
access. The basic value of smart cards lies in their capability to store personal information
with a high degree of security and portability. They provide hacker-resistant storage for
protecting private keys (unique Identification known to the owner only), account numbers,
passwords, and other forms of personal data. Smart cards also isolate security-critical
computations involving authentication (access verification), digital signatures, and key
exchange from other parts of the system.
Smart cards have already been used to enhance authentication between sites by controlling
access to Intranets and Extranets from outside, and protect the privacy of data, files, and email. And smart cards provide portability for securely moving private information among
systems at work, at home, or on the road. Smart card users will not need to memorize their
passwords or employ a different password for every application - they can carry the cards with
them.
With the growing security concerns of corporate and individuals, smart cards are offering far
more security protections than magnetic-stripe cards.
Question:
Can you feel a lot more secure with a smart card?
Discussion Topic 3: Cyber attack - By Brian McWilliams
KANSAS CITY, MISSOURI, Oct 18, 2001 (Newsbytes via COMTEX) -- A Pakistani hacking
group has defaced a Web server operated by the U.S. government and threatened to hit
American and British military sites unless its demands are met.
A Web server operated by the National Oceanic & Atmospheric Administration (NOAA) was
attacked this morning by a group known as GForce Pakistan, according to records at Alldas, a
Web site defacement archive.
The attackers replaced the site's homepage with their own, which bore the title "GForce
Strikes Back" and contained a 350-word text message. The message said the group would
target "major US military and major British Web sites" in coming days and jeopardize their
internal security. GForce claimed to have "some very high confidential US data" that it would
hand over to officials of Al Qaeda unless the U.S. met several demands. The group's
confusing ultimatum included the removal of U.S. troops from Saudi Arabia, the cessation of
bombing in Afghanistan, and the production of "evidence," among other demands. Al Qaeda
is the terrorist organization blamed for the Sept. 11 attacks on America.
NOAA officials were not immediately available for comment.
The compromised site, located at the Web address http://anburs.kc.noaa.gov, appears to be
part of a network operated by the organization's Aviation Weather Center in Kansas City, Mo.,
and may have been somehow involved in a system for data exchange between the National
Weather Service and the Federal Aviation System known as Alphanumeric Backup
Replacement System (ANBURS).
The server, which was unreachable this morning, was running the Linux operating system and
had open file transfer protocol and telnet ports, according to a scan performed by Alldas.
The message from the attackers said GForce Pakistan condemns the terrorist attacks on the
U.S. but also supports Al Qaeda.
"Usama Bin Laden is a holy fighter, and whatever he says makes sense," said the group's
message.
At the bottom of the defaced page under a heading that read "We Are In No Way Responsible
For This Message" was a section of text announcing the formation of a group called Al-Qaeda
Alliance Online. According to the text, the group will target major U.S. government sites in
coming days.
"We won't hurt any data, as it's unethical. All we want is our message conveyed," said the
message. The text also included this threat aimed at U.S. President George W. Bush and
U.K. Prime Minister Tony Blair:
"The day of judgment is very near for both of you."
On Tuesday, the FBI warned Americans to expect an increase in cyber protests. The
agency's National Infrastructure Protection Center said that besides defacements and denial
of service attacks, the "hacktivists" could also target systems supporting "the national
infrastructure."
Question:
How secure is secure?
Supporting articles from the Web: http://www.guardcentral.com/articles.shtml
Download