Introduction to MIS Chapter 4

advertisement
Introduction to MIS
Chapter 4
Security, Privacy, Anonymity
Copyright © 1998-2002 by Jerry Post
Introduction to MIS
1
Outline












Threats to Information
Physical Security and Disaster Planning
Logical Security and Data Protection
Virus Threats
User Identification and Biometrics
Access controls
Encryption and Authentication
Internet Security Issues
Privacy
Anonymity
Cases: Healthcare
Appendix: Server Security Certificates
Introduction to MIS
2
Security, Privacy, and Anonymity
Server Attacks
The Internet
Data interception
Monitoring
Introduction to MIS
3





Accidents & Disasters
Employees & Consultants
Business Partnerships
Outsiders
Viruses
Threats to Information
Links to
business
partners
Outside
hackers
Virus hiding
in e-mail
attachment.
Employees & Consultants
Introduction to MIS
4
Security Categories

Physical attack & disasters





Backup--off-site
Cold/Shell site
Hot site
Disaster tests
Personal computers!

Logical



Unauthorized disclosure
Unauthorized modification
Unauthorized withholding

Denial of Service
$$
Introduction to MIS
5
Horror Stories

Security Pacific--Oct. 1978







Stanley Mark Rifkin
Electronic Funds Transfer
$10.2 million
Switzerland
Soviet Diamonds
Came back to U.S.








The Impossible Dream
Stock Manipulation



Insurance
Loans
Fake computer records



The Cuckoo’s Egg
Berkeley Labs
Unix--account not balance
Monitor, false information
Track to East German spy
Old Techniques




Introduction to MIS
Graduate Student
Unix “Worm”
Internet--tied up for 3 days
Clifford Stoll--1989

Equity Funding--1973

Robert Morris--1989
Salami slice
Bank deposit slips
Trojan Horse
Virus
6
Manual v Automated Data




Amount of data
Identification of users
Difficult to detect changes
Speed




Search
Copy
Statistical Inference
Communication Lines
Introduction to MIS
7
Disaster Planning
SunGard is a premier
provider of computer
backup facilities and
disaster planning
services. Its fleet of
Mobile Data Centers
can be outfitted with a
variety of distributed
systems hardware and
delivered at a disaster
site within 48 hours.
Introduction to MIS
8
Data Backup



Backup is critical
Offsite backup is critical
Levels



RAID (multiple drives)
Real time replication
Scheduled backups
Introduction to MIS
9
Power
company
Data Backup
Use the network to
backup PC data.
Use duplicate mirrored
servers for extreme
reliability.
UPS
Frequent
backups enable
you to recover
from disasters
and mistakes.
Introduction to MIS
Offsite backups
are critical.
10
Virus
From: afriend
To: victim
Message: Open
the attachment
for some
excitement.
2
3
1
1. User opens an attached program
that contains hidden virus
2. Virus copies itself into other
programs on the computer
Attachment
01
3A
19
02
54
23
7F
2C
8E
29
Introduction to MIS
05
3C
2E
FA
3F
06
5D
A2
EA
4F
77
83
87
12
73
03
94
62
79
9F
3. Virus spreads until a certain date,
then it deletes files.
Virus code
11
Virus Damage
Attacks
Viruses/Trojans/Worms
1991 1996 2000 2001
62
80
80
89
Attacks on Web servers
24
48
Denial of Service
37
39
Insider physical theft or damage of
equipment
49
42
Insider electronic theft, destruction,
or disclosure of data
24
22
Fraud
13
9
Dataquest, Inc; Computerworld 12/2/91
National Computer Security Association; Computerworld 5/6/96
http://www.info-ec.com/viruses/99/viruses_062299a_j.shtml)
1999 virus costs in the U.S.: $7.6 billion.
Introduction to MIS
12
Stopping a Virus




Backup your data!
Never run applications unless you are certain they are
safe.
Never open executable attachments sent over the
Internet--regardless of who mailed them.
Antivirus software




Needs constant updating
Rarely catches current viruses
Can interfere with other programs
Ultimately, viruses sent over the Internet can be traced
back to the original source.
Introduction to MIS
13
User Identification

Passwords




Dial up service found 30% of
people used same word
People choose obvious
Post-It notes
Alternatives: Biometrics






Hints





Don’t use real words
Don’t use personal names
Include non-alphabetic
Change often
Use at least 6 characters
Introduction to MIS


Finger/hand print
Voice recognition
Retina/blood vessels
Iris scanner
DNA ?
Password generator cards
Comments




Don’t have to remember
Reasonably accurate
Price is dropping
Nothing is perfect
14
Iris Scan
http://www.iridiantech.com/
questions/q2/features.html
EyePass™ System at
Charlotte/Douglas International
Airport.
http://www.eyeticket.com/
eyepass/index.html
Algorithm patents by JOHN DAUGMAN 1994
http://www.cl.cam.ac.uk/~jgd1000/
Introduction to MIS
15
Biometrics: Thermal
Several methods exist to identify a person based on biological characteristics.
Common techniques include fingerprint, handprint readers, and retinal
scanners. More exotic devices include body shape sensors and this thermal
facial reader which uses infrared imaging to identify the user.
Introduction to MIS
16
Access Controls: Permissions in Windows
Find the folder or
directory in explorer.
Right-click to set
properties.
On the Security
tab,assign
permissions.
Introduction to MIS
17
Security Controls

Access Control



Ownership of data
Read, Write, Execute, Delete, Change Permission, Take
Ownership
Security Monitoring



Access logs
Violations
Lock-outs
Users
Accounting
Marketing
Executive
Introduction to MIS
Resource/Files
Balance Sheet
Marketing Forecast
Read/write
Read
Read
Read/Write
Read
Read
18
Additional Controls



Audits
Monitoring
Background checks:
http://www.casebreakers.com/
http://www.knowx.com/
http://www.publicdata.com/
Introduction to MIS
19
Encryption: Single Key

Encrypt and decrypt with the
same key



How do you get the key
safely to the other party?
What if there are many
people involved?
Plain text
message
AES
Key: 9837362
Fast encryption and
decryption



DES - old and falls to brute
force attacks
Triple DES - old but slightly
harder to break with brute
force.
AES - new standard
Encrypted
text
Single key: e.g., AES
Encrypted
text
Key: 9837362
AES
Plain text
message
Introduction to MIS
20
Encryption: Dual Key
Message
Message
Alice
Encrypted
Public Keys
Private Key
13
Use
Bob’s
Public key
Alice 29
Bob 17
Bob
Use
Private Key
Bob’s
37
Private key
Alice sends message to Bob that only he can read.
Introduction to MIS
21
Dual Key: Authentication
Message
Transmission
Message
Encrypt+T+M
Alice
Private Key
13
Use
Alice’s
Private key
Encrypt+M
Encrypt+T
Public Keys
Alice 29
Use Bob 17
Use
Bob’s
Alice’s
Public key
Public key
Bob
Private Key
37
Use
Bob’s
Private key
Bob sends message to Alice:
His key guarantees it came from him.
Her key prevents anyone else from reading message.
Introduction to MIS
22
Certificate Authority

Public key




How does Alice
know that it is
really Bob’s key?
Imposter could sign up for a
public key.
Need trusted organization.
Only Verisign today, a public
company with no regulation.
Verisign mistakenly issued a
certificate to an imposter
claiming to work for Microsoft
in 2001.
Trust the C.A.
C.A. validate
applicants
Public Keys
Alice
Alice 29
Bob 17
Use
Bob’s
Public key
Introduction to MIS
23
Internet Data Transmission
Eavesdropper
Destination
Intermediate
Machines
Start
Introduction to MIS
24
Clipper Chip: Key Escrow
Decrypted conversation
Escrow keys
Judicial or
government office
Intercept
Encrypted conversation
Clipper chip
in phones
Introduction to MIS
25
Denial Of Service
Coordinated flood attack.
Targeted server.
Break in.
Flood program.
Introduction to MIS
Zombie PCs at homes,
schools, and businesses.
Weak security.
26
Securing E-Commerce Servers
1. Install and maintain a working network firewall to protect data
accessible via the Internet.
2. Keep security patches up-to-date.
3. Encrypt stored data.
4. Encrypt data sent across networks.
5. Use and regularly update anti-virus software.
6. Restrict access to data by business "need to know."
7. Assign a unique ID to each person with computer access to data.
8. Don't use vendor-supplied defaults for system passwords and other
security parameters.
9. Track access to data by unique ID.
10. Regularly test security systems and processes.
11. Maintain a policy that addresses information security for employees
and contractors.
12. Restrict physical access to cardholder information.
http://www.visabrc.com/doc.phtml?2,64,932,932a_cisp.html
Introduction to MIS
27
Internet Firewall
Internal company data servers
Firewall router
Company PCs
Keeps local
data from going
to Web servers.
Firewall router
Internet
Introduction to MIS
Examines each
packet and
discards some
types of requests.
28
Privacy
criminal record
complaints
finger prints
transportation
data
medical
records
financial
regulatory
employment
environmental
grocery store
scanner data
credit cards
organizations
purchases
phone
subscriptions
education
Introduction to MIS
financial
permits
census
loans & licenses
29
Cookies
Web server
Send page
Find page. and cookie.
Use cookie to
identify user.
Send
customized
page.
time
Request page. Display page,
store cookie.
Request new
page and
send cookie.
User PC
Introduction to MIS
30
Misuse of Cookies: Third Party Ads
Useful Web site
National ad Web site
Doubleclick.com
Link to ads
Requested
page
Request
page
Hidden
prior
cookie
Useful Web Page
Text and graphics
Ads, and
cookie
[Advertisements]
User PC
Introduction to MIS
31
Wireless Privacy





Cell phones require connections to towers
E-911 laws require location capability
Many now come with integrated GPS units
Business could market to customers “in the
neighborhood”
Tracking of employees is already common
Introduction to MIS
32
Privacy Problems

TRW--1991



Norwich, VT
Listed everyone delinquent on
property taxes




Lost wallet
Impersonator, 2 murders and 2
robberies
NCIC database
Rogan arrested 5 times in 14
months
Sued and won $55,000 from LA
Jeffrey McFadden--1989



Terry Dean Rogan






San Francisco Chronicle--1991


Employees


26 million monitored
electronically
10 million pay based on
statistics
Introduction to MIS
SSN and DoB for William Kalin
from military records
Got fake Kentucky ID
Wrote $6000 in bad checks
Kalin spent 2 days in jail
Sued McFadden, won $10,000

Person found 12 others using
her SSN
Someone got 16 credit cards
from another’s SSN, charged
$10,000
Someone discovered
unemployment benefits had
already been collected by 5
others
33
Privacy Laws

Minimal in US

Credit reports








Right to add comments
1994 disputes settled in 30 days
1994 some limits on access to data
Bork Bill--can’t release video rental data
Educational data--limited availability
1994 limits on selling state/local data
2001 rules on medical data
Europe


France and some other controls
1995 EU Privacy Controls
Introduction to MIS
34
Primary U.S. Privacy Laws

Freedom of Information Act
Family Educational Rights and Privacy Act
Fair Credit Reporting Act
Privacy Act of 1974
Privacy Protection Act of 1980
Electronic Communications Privacy Act of 1986
Video Privacy Act of 1988
Driver’s Privacy Protection Act of 1994

2001 Federal Medical Privacy rules (not a law)







Introduction to MIS
35
Anonymity


Anonymous servers: http://www.zeroknowledge.com
Dianetics church (L. Ron Hubbard) officials in the U.S.





Sued a former employee for leaking confidential documents
over the Internet.
He posted them through a Danish anonymous server.
The church pressured police to obtain the name of the poster.
Zero knowledge server is more secure
Should we allow anonymity on the Internet?


Protects privacy
Can encourage flow of information



Chinese dissenters
Government whistleblowers
Can be used for criminal activity
Introduction to MIS
36
Cases: Healthcare
Introduction to MIS
37
Cases: Eli Lilly
Owens & Minor, Inc.
www.lilly.com
www.owens-minor.com
What is the company’s current status?
What is the Internet strategy?
How does the company use information technology?
What are the prospects for the industry?
Introduction to MIS
38
Appendix: Digital Security Certificates


Digital security certificates are used to encrypt e-mail
and to authenticate the sender.
Obtain a certificate from a certificate authority







Verisign
Thawte (owned by Verisign)
Microsoft
Your own company or agency
Install the certificate in Outlook
Select option boxes to encrypt or decrypt messages
Install certificates sent by your friends and co-workers.
Introduction to MIS
39
Obtaining a Certificate
Introduction to MIS
40
Installing a Certificate
1. Tools + Options + Security
tab
2. Choose your certificate
3. Check these boxes to add
your digital signature and to
encrypt messages.
4. These boxes set the default
choices. For each message,
you can use the options to
check or uncheck these
boxes.
Introduction to MIS
41
Encrypting and Signing Messages
Use the Options
button and the
Security Settings
button to make
sure the Encrypt
and Signature
boxes are
checked. Then
the encryption
and decryption
are automatic.
Introduction to MIS
42
Download