Lecture 5 Cybersecurity Foundations and Privacy Policy
Lecture 5 Cybersecurity Foundations and Privacy Policy
2016
Lecture 5:
Cybersecurity Foundations & Privacy Policy Background
Office Hours:
442 RH Wednesdays, noon-3pm
Cybersecurity events from the past week of
interest to future (or current) Presidents:
Apple – FBI face-off:
• A moment on the technical details
• Read more on Apple’s security technology:
• https://www.apple.com/business/docs/iOS_Security_Guide.pdf
• Some parallel information for Androidhttps
://source.android.com/security/
Hospital pays ransom of 40 BTC = $17,000
Are regular (e.g. GSM) cellphone calls encrypted?
• Yes, over the air, but not after they get into the wired network
• And the over-the-airencryption is generally not too strong
What about Skype calls?
WH appoints chair, vice-chair of Commission on Enhancing National
Cybersecurity
Readings and Exercises
• For this week, you read:
– How the web works (D is for Digital Chapter 10) and some attacks
– Exercises to show something about how cryptography is used in the
WWW
• Any Questions?
• For next week:
– Reading about
• What’s inside a computer (D is for Digital, Chap 1)
• Security engineering overview (Anderson Chapter 1)
• Today:
– Quick review
– Cybersecurity basics
– Privacy policy basics
Quick review
Technology
• Digital vs analog, and why digital?
• Digital Data representation
• Telephony: Circuit switching to Packet Switching
• Cryptography fundamentals and application:
– True Random vs pseudorandom numbers
– Symmetric vs Asymmetric crypto
– Cryptography in the World Wide Web
Policy
• Legal background on search and seizure
– Writs of Assistance, Fourth amendment
• Wiretapping decisions and legislation
– Katz v. U.S., Smith v. Maryland
– ECPA, CALEA
• Foreign intelligence legislation
– FISA, PATRIOT Act, FISAAA, USA FREEDOM Act
What Does a Computer Look Like (simplified)?
Central User input User
Processing device(s): Display
mouse / keyboard / Other
Unit (CPU) (screen /
touch(pad/screen) /
printer) devices
microphone / camera
Policy Incentives
What you are Both for protectors
supposed to and attackers
enforce/achieve
Mechanism Assurance
Technical means What confidence do
for enforcing we have in individual
policy mechanisms?
• Anderson Fig. 1.1, p. 5
• Note that “incentives” is meant to cover both the incentives of those
protecting the system and those who might attack it – the threat
Mechanisms
Access Control in the computer Authorization
Authentication Access
Protection
Matrix
Data (Policy)
Reference
Principal Do Operation Monitor Object
Source Request Guard Resource
et
Al
M
c/
Ph ord
Ev
S-
ice
Ca
pa
ot
ef
W
me
ss
fil
ol
il e
wd
e
ib
ra
Operations
Subjects Alice: P1 RX RW R RW
R = Read
Bob: P2 RX RW* R *
W= Write
Eve: P3 RX RW R R RW X= eXecute
* * = owner
SU: P4 RWX RWX RWX RWX RWX RWX
* David Alan Sklansky, Too Much Information: How Not to Think About Privacy and The
Fourth Amendment, 102 Cal. L. Rev. 1069 (2014). Available at:
http://scholarship.law.berkeley.edu/californialawreview/vol102/iss5/7
Brief history of government and privacy of
computer-based records
Concern with creation of government databases and potential linkage of
records across agencies – early 1970s
1973: Fair Information Practices (FIPs) code formulated by Dept. of HEW
(forerunner to HHS/HUD) advisory committee:
1. No personal-data record-keeping systems whose existence is secret.
2. There must be a way for an individual to find out what information about
him is in a record and how it is used.
3. There must be a way for an individual to prevent information about him
obtained for one purpose from being used or made available for other
purposes without his consent.
4. There must be a way for an individual to correct or amend a record of
identifiable information about himself.
5. Any organization creating, maintaining, using, or disseminating records of
identifiable personal data must assure the reliability of the data for their
intended use and must take reasonable precautions to prevent misuse of
the data.
Led to passage of Privacy Act of 1974, which applied these principles to U.S.
Federal agencies – governs all Federal “systems of records”
Augmented by Computer Matching & Privacy Protection Act of 1988
U.S. Federal Privacy legislation: “Sectoral”
• Business generally: Federal Trade Commission Act
– FTC has authority to regulate privacy practices under the umbrella of
controlling “unfair business practices”
– FTC can issue “best practice” and other guidance; can sue
• Healthcare: Health Insurance Portability and Accountability Act (HIPAA)
– Defines
• Financial: Fair Credit Reporting Act, 1970
– Provides consumers access to their records held by Credit Reporting
Agencies (e.g., Experian, Equifax, TransUnion) and some rights to
contest/emend/remove information in the record
• Education / Children
– Family Educational Rights and Privacy Act (FERPA) 1974
• Restricts access to educational records
– Children's Online Privacy Protection Act of 1998 (COPPA)
• Limits collection of data online from children younger than 13
• Video Privacy Protection Act (1988) – restricts release of video rental
records; prompted by release of Supreme Court nominee’s records.
States have privacy laws (e.g., breach notification) as well
EU Privacy Regulation: General
Directive 95/46/EC of the European Parliament and of the Council of 24
October 1995 “Data Protection Directive”:
• Aim was to provide a common framework for regulating protection of
personal data to allow free flow of data across borders within EU
• Personal data = “information that relates to an identified or identifiable
natural person”
– The person is the “data subject”
• Data controller: entity that has custody of the data
• Person suffering damage from unlawful processing is entitled to receive
damages from the data controller
• Export of data outside EU permitted under condition that the receiving
country can provide similar level of protection
– This led to the ~2000 “safe harbour” agreement with the U.S.; US
companies would “self certify” that they provided “adequate”
protections
• See: http://ec.europa.eu/justice/data-protection/index_en.htm
7 Safe Harbour Principles ~2000
1. Notice - Individuals must be informed that their data is being
collected and about how it will be used.They must provide
information about how individuals can contact the organization
with any inquiries or complaints.
2. Choice - Individuals must have the option to opt out of the
collection and forward transfer of the data to third parties.
3. Onward Transfer - Transfers of data to third parties may only
occur to other organizations that follow adequate data protection
principles.
4. Security - Reasonable efforts must be made to prevent loss of
collected information.
5. Data Integrity - Data must be relevant and reliable for the
purpose it was collected for.
6. Access - Individuals must be able to access information held about
them, and correct or delete it if it is inaccurate.
7. Enforcement - There must be effective means of enforcing these
rules.
Recent EU/US history
• Austrian privacy activist Max Schrems created a group called
“Europe v Facebook” and files complaint with Irish Data Protection
Commissioner against Facebook
• June 2014: Irish DPC rejects complaint, but Irish High Court
granst review, but then refers to Court of Justice of the EU,
saying Safe Harbour pre-empts Irish review.
• Oct 2015: CJEU rules that
– (1) Ireland still could review EU-US data transfers in spite of
Safe harbor and
– (2) Safe Harbour framwork is invalid. Commercial agreements
between US and EU (contracts) still possible however
• 2 Feb 2016: US/EU announce tentative “Privacy Shield” agreement
– Details not yet known
EU & “Right to be forgotten”
• Concept discussed in Europe for some years
– “Reflects the claim of an individual to have certain data deleted to that
third persons can no longer trace them”
– “The right to silence on past events in life that are no longer
occurring.”
• Example: long ago criminal conviction might be expunged
• Distinct from right to privacy, which covers information not publicly known;
RTBF covers public information to be (perhaps) erased
• May 2014: Google v Mario Costeja Gonzalez: requesting removal of a link to
a Spansih newspaper article about auction of his foreclosed home for a
debt that he had subsequently paid.
– Couldn’t get news article removed because it was lawful and accurate
– But as a search engine and not a media outlet, CJEU ruled Google must
comply and remove article from its search results
– Google has implemented means for doing this, and has now responded to
thousands of additional requests
• In the U.S., this right appears to conflict with first amendment (freedom
of speech) and the notion of transparency
The Frosting
The frosting:
• How Mary Queen of Scots lost her head because of bad
crypto and a Man in the Middle Attack
What’s a “Man in the Middle” attack, or How
Mary Queen of Scots lost her head in 1587
Mary S.
Anthony B.
* +
Francis W. Elizabeth T.
Cipher used by Mary Queen of Scots and
Anthony Babington