Federal Laws For Prosecuting Computer Attacks: Ethics in Information Technology, Fourth Edition
The document discusses implementing trustworthy computing through risk assessment, establishing security policies, educating employees, implementing prevention techniques, detecting intrusions, responding to incidents, and using computer forensics. It outlines the steps involved in these processes and their importance for security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
100 views25 pages
Federal Laws For Prosecuting Computer Attacks: Ethics in Information Technology, Fourth Edition
The document discusses implementing trustworthy computing through risk assessment, establishing security policies, educating employees, implementing prevention techniques, detecting intrusions, responding to incidents, and using computer forensics. It outlines the steps involved in these processes and their importance for security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25
Federal Laws for Prosecuting
Computer Attacks
Ethics in Information Technology, Fourth Edition
Implementing Trustworthy Computing • Trustworthy computing – Delivers secure, private, and reliable computing – Based on sound business practices
Ethics in Information Technology, Fourth Edition
Implementing Trustworthy Computing (cont’d.) • Security of any system or network – Combination of technology, policy, and people – Requires a wide range of activities to be effective • Systems must be monitored to detect possible intrusion • Clear reaction plan addresses: – Notification, evidence protection, activity log maintenance, containment, eradication, and recovery
Ethics in Information Technology, Fourth Edition
Risk Assessment • Process of assessing security-related risks: – To an organization’s computers and networks – From both internal and external threats • Identifies investments that best protect from most likely and serious threats • Focuses security efforts on areas of highest payoff
Ethics in Information Technology, Fourth Edition
Risk Assessment (cont’d.) • Eight-step risk assessment process – #1 Identify assets of most concern – #2 Identify loss events that could occur – #3 Assess likelihood of each potential threat – #4 Determine the impact of each threat – #5 Determine how each threat could be mitigated – #6 Assess feasibility of mitigation options – #7 Perform cost-benefit analysis – #8 Decide which countermeasures to implement
Ethics in Information Technology, Fourth Edition
Risk Assessment (cont’d.)
Ethics in Information Technology, Fourth Edition
Risk Assessment (cont’d.)
Ethics in Information Technology, Fourth Edition
Establishing a Security Policy • A security policy defines: – Organization’s security requirements – Controls and sanctions needed to meet the requirements • Delineates responsibilities and expected behavior • Outlines what needs to be done – Not how to do it • Automated system policies should mirror written policies
Ethics in Information Technology, Fourth Edition
Establishing a Security Policy (cont’d.) • Trade-off between: – Ease of use – Increased security • Areas of concern – Email attachments – Wireless devices • VPN uses the Internet to relay communications but maintains privacy through security features • Additional security includes encrypting originating and receiving network addresses Ethics in Information Technology, Fourth Edition Educating Employees, Contractors, and Part-Time Workers • Educate and motivate users to understand and follow policy • Discuss recent security incidents • Help protect information systems by: – Guarding passwords – Not allowing sharing of passwords – Applying strict access controls to protect data – Reporting all unusual activity – Protecting portable computing and data storage devices Ethics in Information Technology, Fourth Edition Prevention • Implement a layered security solution – Make computer break-ins harder • Installing a corporate firewall – Limits network access • Intrusion prevention systems – Block viruses, malformed packets, and other threats • Installing antivirus software – Scans for sequence of bytes or virus signature – United States Computer Emergency Readiness Team (US-CERT) serves as clearinghouse Ethics in Information Technology, Fourth Edition Prevention (cont’d.)
Ethics in Information Technology, Fourth Edition
Prevention (cont’d.)
Ethics in Information Technology, Fourth Edition
Prevention (cont’d.) • Safeguards against attacks by malicious insiders • Departing employees and contractors – Promptly delete computer accounts, login IDs, and passwords • Carefully define employee roles and separate key responsibilities • Create roles and user accounts to limit authority
Ethics in Information Technology, Fourth Edition
Prevention (cont’d.) • Defending against cyberterrorism – Department of Homeland Security and its National Cyber Security Division (NCSD) is a resource • Builds and maintains a national security cyberspace response system • Implements a cyber-risk management program for protection of critical infrastructure, including banking and finance, water, government operations, and emergency services
Ethics in Information Technology, Fourth Edition
Prevention (cont’d.) • Conduct periodic IT security audits – Evaluate policies and whether they are followed – Review access and levels of authority – Test system safeguards – Information Protection Assessment kit is available from the Computer Security Institute
Ethics in Information Technology, Fourth Edition
Detection • Detection systems – Catch intruders in the act • Intrusion detection system – Monitors system/network resources and activities – Notifies the proper authority when it identifies: • Possible intrusions from outside the organization • Misuse from within the organization – Knowledge-based approach – Behavior-based approach
Ethics in Information Technology, Fourth Edition
Response • Response plan – Develop well in advance of any incident – Approved by: • Legal department • Senior management • Primary goals – Regain control and limit damage – Not to monitor or catch an intruder • Only 56% have response plan
Ethics in Information Technology, Fourth Edition
Response (cont’d.) • Incident notification defines: – Who to notify – Who not to notify • Security experts recommend against releasing specific information about a security compromise in public forums • Document all details of a security incident – All system events – Specific actions taken – All external conversations Ethics in Information Technology, Fourth Edition Response (cont’d.) • Act quickly to contain an attack • Eradication effort – Collect and log all possible criminal evidence – Verify necessary backups are current and complete – Create new backups • Follow-up – Determine how security was compromised • Prevent it from happening again
Ethics in Information Technology, Fourth Edition
Response (cont’d.) • Review – Determine exactly what happened – Evaluate how the organization responded • Weigh carefully the amount of effort required to capture the perpetrator • Consider the potential for negative publicity • Legal precedent – Hold organizations accountable for their own IT security weaknesses
Ethics in Information Technology, Fourth Edition
Computer Forensics • Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence • Computer forensics investigation requires extensive training and certification and knowledge of laws that apply to gathering of criminal evidence
Ethics in Information Technology, Fourth Edition
Summary • Ethical decisions in determining which information systems and data most need protection • Most common computer exploits – Viruses – Worms – Trojan horses – Distributed denial-of-service attacks – Rootkits – Spam – Phishing, spear-fishing, smishing, vishing Ethics in Information Technology, Fourth Edition Summary (cont’d.) • Perpetrators include: – Hackers – Crackers – Malicious insider – Industrial spies – Cybercriminals – Hacktivist – Cyberterrorists
Ethics in Information Technology, Fourth Edition
Summary (cont’d.) • Must implement multilayer process for managing security vulnerabilities, including: – Assessment of threats – Identifying actions to address vulnerabilities – User education • IT must lead the effort to implement: – Security policies and procedures – Hardware and software to prevent security breaches • Computer forensics is key to fighting computer crime in a court of law Ethics in Information Technology, Fourth Edition