Week 08
Week 08
SECURITY:
ESSENTIALS
Daniel
Medina
[email protected]
RECAP
BOUNTY
PROGRAMS
Managed
programs:
HackerOne:
hackerone.com
BugCrowd:
bugcrowd.com
Crowdcurity
/
Cobalt:
cobalt.io
Individual
companies:
hBps://bugcrowd.com/list-of-bug-bounty-programs
BOUNTY
PROGRAMS
Not
always
smooth
to
run
a
program
Yahoo
Bug
Bounty
(shirts
instead
of
$)
Prezi
Bug
Bounty
(hack
of
o-limits
internal
site)
Digital
Ocean
(public
debate
about
vuln)
SpiderOak
Sample
TrueCrypt
Audit
by
iSec
Partners
FEDERAL
CRIMES
The
law:
hBp://www.law.cornell.edu/uscode
hBp://uscode.house.gov
&
its
applicaQon:
hBp://cybercrime.gov
18
USC
1030
Computer
Fraud
&
Abuse
1986,
1994,
1996,
2001,
Originally
about
hackers
Like
this
guy
->
18
USC
2511
Wiretap
(aka
Title
III)
1968,
1986,
Protects
privacy
of
live
communicaQon
Service
providers
exempQon
for
acQons
in
the
"normal
course"
of
business.
18
USC
2701
Stored
CommunicaQons
Applies
to
intenQonal,
unauthorized
access
whereby
the
oender
obtains,
alters,
or
prevents
authorized
access
to
a
wire
or
electronic
communica6on
General
exempQon
for
service
providers
EXAMPLES
Stakkato
/
FBI
Case
216
Spammers
(CAN
SPAM)
Weev
/
ATT
(CFAA)
US v Councilman (SCA)
CYBERSECURITY
LAW
Cyber
Security
Act
(2010,
2012,
2013,
)
ExecuQve
Order
13636:
Improving
CriQcal
Infrastructure
Cybersecurity
NIST
Cyber
Framework
EXTERNAL
REQUIREMENTS
PCI
DSS:
Payment
Card
Industry
SEC
Rules:
e.g.,
Data
RetenQon
(Rule
204-2)
FFIEC
Guidelines:
e.g.,
AuthenQcaQon
FTC
Pseudo-Regulatory
Framework:
e.g.,
FB
http://online.wsj.com/news/articles/SB111620910505034309