Information Systems Security Legal, Regulations, and Compliance Not Just Fun & Games Continually on the rise Affects the public and government sectors Crimes go unnoticed or unreported Costs billions of dollars each year Example of Computer Crime ILOVEYOU, SoBIG, Blaster DDoS brings down Excite and Yahoo Extortion for credit card numbers Stealing funds from financial institutions Stealing military secrets Competitors stealing secrets Types of Laws Common Law Criminal Law Tort Law Administrative Law Civil Law Customary Law Religious Law Mixed Law Criminal Profile Script Kiddies – May not understand the ramifications – “Ankle Biters” curious individuals – “Machine Gunners” dispatch 1000s of probes Dedicated Cracker – Chooses victim and gathers intelligence – More dangerous – Has a goal in mind from the start Motivation Grudge – Get back at the company or individual – Terrorist, sympathy, or information warfare Financial Business “Fun” Example Attacks Salami – Carrying out smaller crimes that might go unnoticed Data diddling – Modifying data in the computer to change outcomes Dumpster diving – Obtaining information in the trash can Telephone Fraud Phreakers – Telephone fraud – Red boxing Simulating coins dropped into the phone – Blue boxing Using analog tones to gain long distance – Black boxing Manipulating voltages U.S. Privacy Laws Privacy Act of 1974 – Data held on individuals by government Electronic Communications Privacy Act of 1986 – Prohibits unauthorized eavesdropping Health Insurance Portability and Accountability Act (HIPPA) Gramm Leach Bliley Act of 1999 European Union Reason data being collected must be stated Data cannot be used for other purposes Unnecessary data is not collected Data keep only while needed Only necessary individuals have access No intentional ‘leaking’ of data Transborder information Flows Movement of data across international borders Different regions have different laws Restrictions on flow of financial data Often data flow is taxable Employee Privacy Act Must be in security policy and employees should be aware Ensure monitoring is lawful Possible types of monitoring – Key logging – Cameras – Telephone – email Common Law - Civil Tort law - wrongs against individuals resulting in damage Contract Law Case law built on precedent Determines liability Less of a burden of proof Embodied in the USC Criminal Laws created to protect the public Public in the defendant Can win criminal and lose civil on same case or vise versa More stringent burden of proof Includes jail time or death Administrative Laws Different by industry – FDA, Healthcare, Education, etc. Performance and conduct of organizations, officials, and officers Deals with industry regulations Punishment can be financial or may merit imprisonment US Federal Laws Electronic Communications Act of 1996 – Wiretap act – Stored communication act Computer Fraud and Abuse Act of 1986 – Used in prosecuting computer crimes – “Anti hacking law” Electronic Espionage Act of 1996 – Industrial espionage – Stealing Trade Secrets Intellectual Property Laws Trade secret – Maintains confidentiality of proprietary business data – Owner invested resources to develop – Data must provide competitive value Copyright – Protects original works of authorship – Protects expression of new ideas – Source code is copyrightable – In USA, good for 75 years More Trademark – Protects word, name, symbol, etc. which is used to identify a product or company – Protects a company’s look or feel Patent – Allows owner to exclude others from practicing invention for a time period (20 years) – Invention must be novel and non-obvious Software piracy Copy creator’s work without permission Software protection association (SPA) Business software alliance (BSA) – Washington Federation against software theft (FAST) – London Digital Millennium Copyright Act Illegal to tamper with or break into controls that protect copyrighted materials Only protects copyrighted items Prevent reverse engineering First attempt to enforce was by Adobe against a white hat at DefCon Countries Working Together Countries do not view computer crime the same Government may not work together Evidence rules are different Jurisdiction issues G8 have agreed to fight cybercrime Interpol distributes info about cross-border crimes Violation Analysis Ensure that it is not a user error or misconfiguration Individuals should be in charge of investigating and determining if crime exist Type of investigation – Internal – Law enforcement Law Enforcement vs. Citizens Search must have probable cause – 4th amendment search warrant Private citizen not subject to 4th amendment Private citizen may be a police agent Role of Evidence Material offered to judge and jury May directly or indirectly prove or disprove the crime has been committed Evidence must be tangible – Electrical voltages are intangible – Hard to prove lack of modification Evidence Requirements Material – relevant to case Competent – proper collection, obtained legally, and chain of custody maintained Relevant – pertains to subject’s motives and should prove or disprove a fact Chain of Custody Who obtained it? Where and when was it obtained? Who secured it? Who had control or possession? How was it moved? Types of Evidence Best – Primary, original documents, not oral Secondary – Copies of documents, oral, eyewitness Direct – Can prove fact by itself – Does not need corroborative information – Information from witness More Types Conclusive – Irrefutable and cannot be contradicted Circumstantial – Assumes the existence of another fact – Cannot be used alone to prove the fact Corroborative – Supporting evidence – Supplementary tool More Types Opinion – Experts give educated opinion Hearsay – No firsthand proof – Computer generated evidence Real – Physical evidence – Tangible objects More Types Documentary – Records, manuals, printouts – Most evidence is documentary Demonstrative – Aids jury in the concept – Experiments, charts, animation Hearsay Rule Exception Business record exemption to hearsay rule – Documents can be admitted if created during normal business activity – This does not include documents created for a specific court case – Regular business records have more weight – Federal rule 803(6) Records must be in custody on a regular basis Records are relied upon by normal business Before the Crime Happens Select an Incident Response Team (IRT) Decide whether internal or external Set policies and procedures If internal, include – IT – Management – Legal – PR Incident Handling First goal – Contain and repair damage – Prevent further damage – Collect evidence Evidence Collection Photograph area Dump contents from memory Power down system Photograph internal system components Label each piece of evidence – Bag it – Seal – Sign Forensics Study of technology and how it relates to law Image disk and other storage devices – Bit level copy (deleted files, slack space,etc) – Use specialized tools – Further work will be done on copy Create message digest for integrity Thing to Look For Hidden Files Steganography Slack Space Malware Deleted Files Swap Files Trapping the Bad Guy Enticement – Legal attempt to lure a criminal into committing a crime – Provide a honeypot in your DMZ – Pseudo flaw (software code) – Padded cell (virtual machine) Entrapment – Illegal attempt to trick a person into committing a crime