Cyb 208
Cyb 208
Introduction
Information security policy is the foundation of an organization’s security
program and every organization must keep this in mind so as to protect
critical information assets. Information security prevents unauthorized
disclosure, disruption, access, use, modification, etc. of those critical
information assets using the three principles of Information security, or
the primary tenants, called the CIA triad: confidentiality (C), integrity (I),
and availability(A).
Confidentiality — the protection of information against unauthorized
disclosure
Integrity — the protection of information against unauthorized modification
and ensuring the authenticity, accuracy, non-repudiation, and completeness
of the information
Availability — the protection of information against unauthorized destruction
and ensuring data is accessible when needed.
At all level, organizations must prioritise sensitive data and ways to
adequately protect them from cyber criminals. At a high level, sensitive data
is information that a person or organization wants to keep from being publicly
available because the release of the information can lead to harm such as
identity theft or fraud. In some cases, sensitive data is related to individuals
such as payment information or birth date. In other cases, sensitive data can
be proprietary corporate information.
Introduction
The Federal Information Security Management Act (FISMA) defines
Information Security as “protecting information and information systems
from unauthorized access, use, disclosure, disruption, modification, or
destruction” and goes on to further define Information Security activities
as those “carried out to identify and address the vulnerabilities of a
computer system, or computer network”
The United States National Information Assurance Training and Education
Center (NIATEC) defines information security as “a system of
administrative policies and procedures” for identifying, controlling and
protecting information against unauthorized access to or modification,
whether in storage, processing or transit” (NIATEC, 2006).Information
security emphasizes the need to protect mission-critical information in the
IT arena, thus most of these institutions have described Information
security using three broad information security objectives:
The International Standard: ISO 27001 Code of Practice defines
Information Security as the preservation of three aspects of Information
Confidentiality:
Integrity:
Availability:
Confidentiality
1
Data confidentiality focuses on protecting sensitive information, and
ensuring that Information is only available to those that are authorised to
gain access. Information such as non-public personal information (PII) or
cardholder data (CD), are guided from unauthorized access or disclosure.
Because malicious actors often target confidential information to be used
for identity theft and perpetrating fraud. Confidential data can also include
sensitive corporate information such as trade secrets.
2
Data Availability is one of the information security objectives. It is a
component of Information security according to NIST 2003, Availability
entails timely and reliable access to data and information services for
authorized users. The United States Code Section 3542(b)(2) defined
availability as “Ensuring timely and reliable access to and use of
information. Information availability is a requirement that is intended to
assure that all systems work promptly and service is not denied to
authorized users. This should protect against the intentional or accidental
attempts to either perform unauthorized access and alteration to
organizational information or otherwise cause a denial of service or
attempts to use system or data for unauthorized purposes. A loss of
availability is the disruption of access to or use of information or an
information system.
Data availability focuses on information accuracy, completeness, and
consistency to ensure users can access information when they need it.
Organizations need to establish procedures and processes for data
storage,
disaster recovery, and business continuity. There are other objectives of
Information security such as Accountability, Authentication, and
Non-repudiation
Business risk and other threats to an
organization assets
What is a risk? For the purpose of information security and this lecture, a risk
is any hazard or danger to which your information or equipment is subject.
Storing an expensive computer within reach of an open window is risky.
Allowing students to have access to computerized grade books might also be
considered risky. But even if you now know what a risk is, the question of
what is at risk still remains-and the answer is your critical information's
assets.
An asset is often defined as real property. But not always the case, it is very
possible that your organization's computer equipment is prominently listed on
the critical assets lists especially considering the large amounts of money
that the equipment may cost. But recall that the only reason all those money
were spent on technology in the first place was so that you could manipulate
your organization's information more efficiently-information like student
academic data, special support service files, staff health records, and
organizational financial figures. The equipment is important only because it is
the mechanism by which you access the files that are so essential to the
operation of the enterprise. Information is the real asset in any organization
and, of course, very valuable. Such information and the system that host,
support them must be guided against Risk, Threats and Vulnerabilities
Business risk and other threats to an organization assets
What is a Threat?
3
Manmade Threats (Intentional) Theft Hacking Computer Viruses
Vandalism File Sabotage Unauthorized Copying Arson Wire Taps
Man-made Threats (Unintentional) Equipment Failure Spilled Beverages
Computer Viruses Lost Documentation
Power Fluctuations User Error Heating Units Lost-encryption Keys
Magnetic Fields Air Conditioning Ducts Programmer Error Aging Facilities
Vulnerabilities : Vulnerabilities refer to points within a system that are
open
to attack or damage. What type of attack? That depends on the threat.
Vulnerabilities are the mechanisms by which threats access your system.
Think of a thief (a threat), for example, who is ready to strike your building
(which houses your assets). An open back window through which that thief
might enter the premises is a vulnerability.
Information security Policy Inclusion
Information security policy entails certain control with a policy that
appropriately guides users behavior to reduce the risk. Organization don’t
just write a policy just for the sake of having a policy, Compliance
requirements also drive the need to develop security policies. For
instance, If an organization has a risk regarding Phishing or social
engineering, then there should be a policy reflecting the behavior desired
to reduce the risk of employees being phished or socially engineered. One
such policy would be that the organization must conduct security
awareness training (which includes social engineering tactics and phishing
tactics).
Moreover, a company information security policy (or policies) are
commonly written for a broad range of topics such as the following:
Access control
Identification and Authentication (including multi-factor authentication and
passwords)
Data classification
Encryption
Remote access
Acceptable use
Patching
Malicious code protections
Physical security
Backups
Server security (e. hardening)
Employee on/off-boarding
Change management
What Should You Keep in Mind When Writing an Information
4
Security Policy?
Firstly, we need to understand the role of security policies in an
organization.
It Really Happens!
Disaster at a University –
Turn Key University (TKU) is a medium sized public university located in
Idaho. The institution is situated on a beautiful 25 acre campus, just north of
a major city. The University has a reputation for producing quality graduates
for the surrounding community. Like a typical university bureaucracy, the
school has VC’s office overseeing the Academic Affairs, Administrative
Support Services , Human Resources, Finance, and Information Technology
divisions.
5
The role of security policies in an organization. Turn Key
University (TKU)
Disaster: The Data Breach Issue
Another area of concern was with password complexity. The system didn’t
require users to have strong passwords. Passwords could be as short as
three characters long and didn’t need to include numbers or special
characters. The passwords could be kept forever and most had never been
changed. With the current sophisticated password cracking programs
available on the Internet, hackers could break into the system in seconds.
This seemed very likely as figuring out the system usernames was very
easy. The usernames were based on the name of the user. The first letter
of the username was the first letter of the person’s first name. The last
part of the username was the person’s last name. For example, Gary
Tolman’s username was gtolman. This type of username assignment is
very common, but it can also pose a threat. Each employee’s name was
listed on the TKU website, so a hacker could easily find a username.
Lastly, the system was accessed by a variety of users. They were spread
out between Information Technology, Finance, and the Administrative
Support Divisions, so finding the exact users would be difficult. Anyone in
these divisions could be the source of the leak. Don and the auditor didn’t
know how they were going to trace the culprit, but they knew they had a
daunting task. They started off by interviewing people in the three
divisions. The Administrative Support Services division used the
transaction system to run reports, so the users only had permissions to
run reports. Don and the auditor found that in addition to the approved
users, more people accessed the system. Employees routinely gave out
their login information to student workers and temporary employees to
run reports when they were busy or on vacation. The employees shared
this login information on Post-it® notes,over the phone, and in email. The
department did not have rules explaining proper procedures, so
employees thought these practices were acceptable and the norm.
Throughout the investigative process, the auditor found countless
examples of lax information security throughout the organization.
1. There was a lack of a coordinated security policy, and
2. The policies in place were not being followed.
The Implication:
TKU was very lucky with the outcome of the data breach. Only five hundred
students had their information compromised. While any loss of PII is
unfortunate, high profile data breaches, such as the ones at TJX, show how
losing large amounts of data can be very costly to an institution.
TKU estimated that the tangible costs associated with the breach amounted
to over $600,000 dollars. However, TKU will never know how the breach
affected the university’s reputation
The role of security policies in an organization. What to Keep in
Mind
Ensure The security policies are enforceable
It is important that everyone from the CEO down to the newest of
employees comply with the policies. If upper management doesn’t comply
with the security policies and the consequences of non-compliance with
the policy is not enforced, then mistrust and apathy toward compliance
with the policy can plague your organization. An important element of
making security policies enforceable is to ensure that everyone reads and
acknowledges the security policies (often via signing a statement thereto).
Many security policies state that non-compliance with the policy can lead
6
to administrative actions up to and including termination of employment,
but if the employee does not acknowledge this statement, then the
enforceability of the policy is weakened
Other important Factor to be Kept in Mind When Writing an
Information Security Policy?
7
An information assurance and service development life cycle refers to a
structured process that incorporates information security considerations
throughout the entire lifecycle of a service development project, from
initial planning to deployment and maintenance, ensuring the
confidentiality, integrity, and availability of data at every stage.
Requirements Analysis:
Gather detailed functional and security requirements
Prioritize security controls based on risk analysis
8
Operations and Maintenance:
Ongoing security monitoring and incident response
Patch management and vulnerability remediation
Security updates and configuration changes as needed
Introduction
Information systems have had an impact far beyond the world of business.
New technologies create new situations that we have never dealt with
before. How do we handle the new capabilities that these devices
empower us with? What new laws are going to be needed to protect us
from ourselves? This chapter will kick off with a discussion of the impact of
information systems on how we behave (ethics). This will be followed with
the new legal structures being put in place, with a focus on intellectual
property and privacy.
9
For example, the ability to anonymously make perfect copies of digital
music has tempted many music fans to download copyrighted music for
their own use without making payment to the music’s owner. Many of
those who would never have walked into a music store and stolen a CD
find themselves with dozens of illegally downloaded albums.
Code of Ethics
One method for navigating new ethical waters is a code of ethics. A code
of ethics is a document that outlines a set of acceptable behaviors for a
professional or social group; generally, it is agreed to by all members of
the group. The document details different actions that are considered
appropriate and inappropriate.
In the ACM’s code, you will find many straightforward ethical instructions,
such as the admonition to be honest and trustworthy. But because this is
also an organization of professionals that focuses on computing, there are
more specific admonitions that relate directly to information technology:
No one should enter or use another’s computer system, software, or data
files without permission. One must always have appropriate approval
before using system resources, including communication ports, file space,
other system peripherals, and computer time.
Designing or implementing systems that deliberately or inadvertently
demean individuals or groups is ethically unacceptable.
10
Organizational leaders are responsible for ensuring that computer systems
enhance, not degrade, the quality of working life. When implementing a
computer system, organizations must consider the personal and
professional development, physical safety, and human dignity of all
workers. Appropriate human-computer ergonomic standards should be
considered in system design and in the workplace.
Having a code of ethics can also have some drawbacks. First of all, a code
of ethics does not have legal authority; in other words, breaking a code of
ethics is not a crime in itself. So what happens if someone violates one of
the guidelines? Many codes of ethics include a section that describes how
such situations will be handled. In many cases, repeated violations of the
code result in expulsion from the group.
11
Starbucks, McDonald’s, or even a university. Here is an example of an
acceptable use policy from Virginia Tech.
Just as with a code of ethics, these acceptable use policies specify what is
allowed and what is not allowed. Again, while some of the items listed are
obvious to most, others are not so obvious:
“Borrowing” someone else’s login ID and password is prohibited.
Using the provided access for commercial purposes, such as hosting your
own business website, is not allowed.
Sending out unsolicited email to a large group of people is prohibited.
Intellectual Property
12
provides, it is also necessary to limit the amount of benefit that can be
received and allow the results of ideas to become part of the public
domain.
Outside of the US, intellectual property protections vary. You can find out
more about a specific country’s intellectual property laws by visiting
the World Intellectual Property Organization.
Copyright
Copyright protection lasts for the life of the original author plus seventy
years. In the case of a copyrighted work owned by a publisher or another
third party, the protection lasts for ninety-five years from the original
creation date. For works created before 1978, the protections vary
slightly. You can see the full details on copyright protections by
reviewing the Copyright Basics document available at the US Copyright
Office’s website.
13
copies of it and sells them? Is this allowed? The first sale doctrine is a part
of copyright law that addresses this, as shown below:
The first sale doctrine, codified at 17 U.S.C. § 109, provides that an
individual who knowingly purchases a copy of a copyrighted work
from the copyright holder receives the right to sell, display or
otherwise dispose of that particular copy, notwithstanding the
interests of the copyright owner.
So, in our examples, the copyright owner has no recourse if the collector
destroys her artwork. But the collector does not have the right to make
copies of the artwork.
Fair Use
Another important provision within copyright law is that of fair use. Fair
use is a limitation on copyright law that allows for the use of protected
works without prior authorization in specific cases. For example, if a
teacher wanted to discuss a current event in her class, she could pass out
copies of a copyrighted news story to her students without first getting
permission. Fair use is also what allows a student to quote a small portion
of a copyrighted work in a research paper.
Unfortunately, the specific guidelines for what is considered fair use and
what constitutes copyright violation are not well defined. Fair use is a well-
known and respected concept and will only be challenged when copyright
holders feel that the integrity or market value of their work is being
threatened.
The first US copyright law, which only protected books, maps, and charts,
provided protection for only 14 years with a renewable term of 14 years.
Over time, copyright law was revised to grant protections to other forms of
14
creative expression, such as photography and motion pictures. Congress
also saw fit to extend the length of the protections, as shown in the chart
below. Today, copyright has become big business, with many businesses
relying on the income from copyright-protected works for their income.
Many now think that the protections last too long. The Sonny Bono
Copyright Term Extension Act has been nicknamed the “Mickey Mouse
Protection Act,” as it was enacted just in time to protect the copyright on
the Walt Disney Company’s Mickey Mouse character. Because of this term
extension, many works from the 1920s and 1930s that would have been
available now in the public domain are not available.
Many think that the DMCA goes too far and ends up limiting our freedom
of speech. The Electronic Frontier Foundation (EFF) is at the forefront of
this battle. For example, in discussing the anti-circumvention provision,
the EFF states:
Yet the DMCA has become a serious threat that jeopardizes fair use,
impedes competition and innovation, chills free expression and
scientific research, and interferes with computer intrusion laws. If
you circumvent DRM [digital rights management] locks for non-
infringing fair uses or create the tools to do so you might be on the
receiving end of a lawsuit.
Creative Commons
15
Open-source software has few or no copyright restrictions; the creators of
the software publish their code and make their software available for
others to use and distribute for free. This is great for software, but what
about other forms of copyrighted works? If an artist or writer wants to
make their works available, how can they go about doing so while still
protecting the integrity of their work? Creative Commons is the solution to
this problem.
By using a Creative Commons license, authors can control the use of their
work while still making it widely accessible. By attaching a Creative
Commons license to their work, a legally binding license is created. Here
are some examples of these licenses:
CC-BY: This is the least restrictive license. It lets others distribute and
build upon the work, even commercially, as long as they give the author
credit for the original work.
CC-BY-SA: This license restricts the distribution of the work via the “share-
alike” clause. This means that others can freely distribute and build upon
the work, but they must give credit to the original author and they must
share using the same Creative Commons license.
CC-BY-NC: This license is the same as CC-BY but adds the restriction that
no one can make money with this work. NC stands for “non-commercial.”
CC-BY-NC-ND: This license is the same as CC-BY-NC but also adds the ND
restriction, which means that no derivative works may be made from the
original.
These are a few of the more common licenses that can be created using
the tools that Creative Commons makes available. For a full listing of the
licenses and to learn much more about Creative Commons.
Patent
16
Once a patent is granted, it provides the inventor with protection from
others infringing on his or her patent. A patent holder has the right to
“exclude others from making, using, offering for sale, or selling the
invention throughout the United States or importing the invention into the
United States for a limited time in exchange for public disclosure of the
invention when the patent is granted.”
The job of the patent office is to review patent applications to ensure that
the item being submitted meets these requirements. This is not an easy
job: in 2012, the US Patent Office received 576,763 patent applications
and granted 276,788 patents. The current backlog for a patent approval is
18.1 months. Over the past fifty years, the number of patent applications
has risen from just 100,000 a year to almost 600,000; digital technologies
are driving much of this innovation.
Trademark
17
approved, and registered with the trademark office, such as the Patent
and Trademark Office in the US. A registered trademark has the circle-R
(®) placed next to the trademark.
While most any word, phrase, logo, shape, or sound can be trademarked,
there are a few limitations. A trademark will not hold up legally if it meets
one or more of the following conditions:
The trademark is likely to cause confusion with a mark in a registration or
prior application.
The trademark is merely descriptive for the goods/services. For example,
trying to register the trademark “blue” for a blue product you are selling
will not pass muster.
The trademark is a geographic term.
The trademark is a surname. You will not be allowed to trademark
“Smith’s Bookstore.”
The trademark is ornamental as applied to the goods. For example, a
repeating flower pattern that is a design on a plate cannot be
trademarked.
The rise of information systems has forced us to rethink how we deal with
intellectual property. From the increase in patent applications swamping
the government’s patent office to the new laws that must be put in place
to enforce copyright protection, digital technologies have impacted our
behavior.
Privacy
The term privacy has many definitions, but for our purposes, privacy will
mean the ability to control information about oneself. Our ability to
maintain our privacy has eroded substantially in the past decades, due to
information systems.
18
name;
social security number;
date of birth;
place of birth;
mother‘s maiden name;
biometric records (fingerprint, face, etc.);
medical records;
educational records;
financial information; and
employment information.
Just because companies are required to protect your information does not
mean they are restricted from sharing it. In the US, companies can share
your information without your explicit consent (see sidebar below), though
not all do so. Companies that collect PII are urged by the FTC to create a
privacy policy and post it on their website. The state of California requires
a privacy policy for any website that does business with a resident of the
state.
While the privacy laws in the US seek to balance consumer protection with
promoting commerce, in the European Union privacy is considered a
fundamental right that outweighs the interests of commerce. This has led
to much stricter privacy protection in the EU, but also makes commerce
more difficult between the US and the EU.
Digital technologies have given us many new capabilities that simplify and
expedite the collection of personal information. Every time we come into
contact with digital technologies, information about us is being made
available. From our location to our web-surfing habits, our criminal record
to our credit report, we are constantly being monitored. This information
can then be aggregated to create profiles of each and every one of us.
While much of the information collected was available in the past,
collecting it and combining it took time and effort. Today, detailed
information about us is available for purchase from different companies.
Even information not categorized as PII can be aggregated in such a way
that an individual can be identified.
19
This process of collecting large quantities of a variety of information and
then combining it to create profiles of individuals is known as non-obvious
relationship awareness, or NORA. First commercialized by big casinos
looking to find cheaters, NORA is used by both government agencies and
private organizations, and it is big business.
In the US, the government has strict guidelines on how much information
can be collected about its citizens. Certain classes of information have
been restricted by laws over time, and the advent of digital tools has
made these restrictions more important than ever.
Websites that are collecting information from children under the age of
thirteen are required to comply with the Children’s Online Privacy
Protection Act (COPPA), which is enforced by the Federal Trade
Commission (FTC). To comply with COPPA, organizations must make a
20
good-faith effort to determine the age of those accessing their websites
and, if users are under thirteen years old, must obtain parental consent
before collecting any information.
The Family Educational Rights and Privacy Act (FERPA) is a US law that
protects the privacy of student education records. In brief, this law
specifies that parents have a right to their child’s educational information
until the child reaches either the age of eighteen or begins attending
school beyond the high school level. At that point, control of the
information is given to the child. While this law is not specifically about the
digital collection of information on the Internet, the educational
institutions that are collecting student information are at a higher risk for
disclosing it improperly because of digital technologies.
21