Anum Hasan
Information Security
BESE-27
Lecture 3
Lecture Outline
•   Cyber Law
•   Security policy
•   ISMS
•   Security Controls
•   Security Standards
Cyber Law
• The term “Cyber Law” Refers to all the
  legal and regulatory aspects of the
  Internet and its users
Need for Cyber Law
• A hacker changed the value of insulin in
  a patient’s online prescription who was
  admitted in a hospital the nurse
  injected that quantity and patient
  expired.
⦁   The Electronic Transaction Ordinance 2002
⦁   Prevention of Electronic Crime Ordinance 2008
⦁   PECA 2016
Overview
⦁   The Electronic Transactions Ordinance (ETO), 2002, was the
    first IT-relevant legislation created by national lawmakers.
⦁   Protection for Pakistani e-Commerce locally and globally.
⦁   Protect Pakistan’s critical infrastructure
⦁   It is heavily taken from foreign law related to cyber crime.
⦁   No recognition of electronic documentation
⦁   No recognition of electronic records
⦁   No recognition of evidential basis of documents/records
⦁   Failure to authenticate or identify digital or electronic
    signatures or forms of authentication
⦁   No online transaction system on legal basis.
⦁   Electronic Data & Forensic Evidence not covered.
⦁   No Rules for all of these …
⦁   Electronic Documentation & Records recognized
⦁   Electronic & Digital forms of authentication &
    identification
⦁   Messages through email, fax, mobile phones,
    Plastic Cards, Online recognized.
Sections
   There are 43 sections in this ordinance
   It deals with following 8 main areas relating to e-Commerce.
    ◦ Recognition of Electronic Documents
    ◦ Electronic Communications
    ◦ Web Site
    ◦ Digital Signatures Certification Providers
    ◦ Stamp Duty
    ◦ Attestation, certified copies
    ◦ Jurisdiction
    ◦ Offences
⦁   “Prevention of Electronic Crimes Ordinance, 2007″
    is enforced now
⦁   It was promulgated by the President of Pakistan on
    the 31st December 2007
⦁   The bill deals with the electronic crimes included:
    ◦   Cyber terrorism
    ◦   Data damage
    ◦   Electronic fraud
    ◦   Electronic forgery
    ◦   Unauthorized access to code
    ◦   Cyber stalking
    ◦   Cyber Spamming/spoofing
⦁   It will apply to every person who commits an offence,
    irrespective of his nationality or citizenship.
⦁   It gives exclusive powers to the Federal Investigation
    Agency (FIA) to investigate and charge cases against such
    crimes.
Punishments
⦁   Every respective offence under this law has its distinctive
    punishment which can be imprisonment or/and fine.
Data Damage:
⦁   Whoever with intent to illegal gain or cause harm to the public or
    any person, damages any data, shall come under this section.
    Punishment:
⦁   3 years
⦁   3 Lac
Electronic fraud:
⦁   People for illegal gain get in the way or use any data, electronic
    system or device or with intent to deceive any person, which act or
    omissions is likely to cause damage or harm.
Punishment:
⦁   7 years
⦁   7 Lac
Electronic Forgery:
⦁   Whoever for unlawful gain interferes with data, electronic system
    or device, with intent to cause harm or to commit fraud by any
    input, alteration, or suppression of data, resulting in unauthentic
    data that it be considered or acted upon for legal purposes as if it
    were authentic
Punishment:
⦁ 7years
⦁ 7 Lac
Malicious code:
⦁   Whoever willfully writes, offers, makes available, distributes or
    transmits malicious code through an electronic system or device,
    with intent to cause harm to any electronic system or resulting in
    the theft or loss of data commits the offence of malicious code.
Punishment:
⦁ 5 years
⦁ 5 Lac
Cyber stalking:
⦁   Whoever with intent to harass any person uses computer, computer network,
    internet, or any other similar means of communication to communicate obscene,
    indecent language, picture or image.
⦁   Threaten any illegal or immoral act
⦁   Take or distribute pictures or photographs of any person without his knowledge
⦁   Commits the offence of cyber stalking.
Punishment:
⦁ 3 Years
⦁ 3 Lac
Spamming:
⦁   Illegal electronic messages to any person without the
    permission of the recipient.
Punishment:
⦁   6 month
⦁   50,000
Spoofing:
⦁   Whoever establishes a website, or sends an electronic message
    with a fake source intended to be believed by the recipient or
    visitor or its electronic system to be an authentic source with
    intent to gain unauthorized access or obtain valuable information
Punishment:
⦁ 3 Years
⦁ 3 Lac
Offence                       Imprisonment (years)     Fine
Criminal Access                        3               3 Lac
Criminal Data Access                   3               3 Lac
Data Damage                            3               3 Lac
System Damage                          3               3 Lac
Electronic Fraud                       7               7 Lac
Electronic Forgery                     7               7 Lac
Misuse of Device                       3               3 Lac
Unauthorized access to code            3               3 Lac
Malicious code                         5               5 Lac
Defamation                             5               5 Lac
Cyber stalking                         3               3 Lac
Cyber Spamming                      6 months          50,000
Spoofing                               3               3 Lac
Pornography                            10               -----
Cyber terrorism                       Life           10 Million
Definition
         A symbol, word, or words legally registered or established by use as
          representing a company or product.
         In cyber world URL’s are more like trademarks
         Provides the rights of the owner of a name, symbol, mark for
          protection to avoid consumer confusion. This applies specifically in
          the acquisition of domain names that are appropriate for a business'
          trademark. Trademark protection has typically resided at the nation
          state level, and the global nature of the internet has caused problems
          with the use of certain domain names. A secondary issue is the
          difference in countries with respect to "first to use" versus "first to
          file".
                                                  Cyber Security
   Provision to own over a specific period of time
   Examples are books, music, research journals, website etc.
   License is description given by the owner on how to use the property
   Copy right protection
   Fair use Clause
   Expansion of Top Level Domains (TLD’s)
   A patent is a government authority or license conferring a right or title
    for a set period, especially the sole right to exclude others from making,
    using, or selling an invention
   Patent Right
   Patent Ordinance
   Patent Rules
   Patents Granted by IPO (Intellectual Property Organization of Pakistan)
   Patents Expired
Security Policy, standard and guideline
Policies:High level statements that provide guidance to workers
who must make present and future decision
Standards:Requirement statements that provide specific
technical specifications
Guidelines:Optional but recommended specifications
          Passwords
           will be 8                                 Access to
          characters                             network resource
             long                                 will be granted
                                                 through a unique
                                                    user ID and
  Passwords should                                   password
include one non-alpha
   and not found in
      dictionary
Information Security management
Program
• To reduce risk with policies and guidelines
95752:11-27
              User-level Policy
              • Authentication: Method, Protection,
                Disclosure
              • Importing software: Process, Safeguards,
                Location
              • File protection: Default, Variations
              • Equipment management: Process, Physical
                Security
              • Backups: How, When
              • Problem reporting: Who, How, Emergencies
95752:11-28
              System-level Policy
              •   Default configuration
              •   Installed Software
              •   Backups
              •   Logging
              •   Auditing
              •   Updates
              •   Principle servers or clients
95752:11-29
              Network-level Policy
              • Supported services
              • Exported services: Authentication,
                Protection, Restriction
              • Imported services: Authentication,
                Protection, Privacy
              • Network security mechanisms
Types of Security Policy
Example-Policy for Ex-Employee
NDA and SLA
95752:11-33
              General Tips (1)
              • Replace welcome messages with warning
                messages
              • Put ownership or copyright notices on each
                source file
              • Be certain users are notified of usage policy
              • Notify all users on what may be monitored
              • Keep good backups in safe location
              • When you get suspicious, start a
                diary/journal of observations
95752:11-34
              General Tips (2)
              • Define, in writing, authorization of each user
                and employee & have them sign it
              • Ensure employees return equipment on
                termination
              • Do not allow users to conduct their own
                investigations
              • Make contingency plans with lawyer and
                insurance
              • Identify qualified law enforcement at local,
                federal
Information Security Management
System
    Security v/s Compliance
Compliance in IT is defined as the process of meeting a
third party’s requirements relating to security & related
facilities with the aim of running business operations in a
particular market or adhering to laws or even with a
particular customer.
Compliance
It’s focused on the grounds of third-party
requirements
• Industry regulations
• Government policies
• Security frameworks
• Client/customer contractual terms
Compliance and Security-Based
on Specific Frameworks
 • Compliance studies a company’s security
   processes.
 • These requirements come in the form of
   legislation, industry regulations, or
   standards created from best practices.
 • Many standards are as follows:
 • HIPAA
 • SOX
 • PCI-DSS
 • ISO/IEC 27000 family
  HIPAA
• HIPAA compliance is a fundamental aspect
  of the Health Insurance Portability and
  Accountability Act of 1996 (HIPAA)
• focused on protecting sensitive patient
  health information from being disclosed
  without the patient's consent or knowledge.
SOX
• The Sarbanes-Oxley Act (also called SOX)
  applies to the corporate care and
  maintenance of the financial data of public
  companies.
PCI-DSS
• PCI DSS compliance is the Payment Card
  Industry Data Security Standard created by a
  group of companies who wanted to standardize
  how they guarded consumers’ financial information.
ISO/IEC 27000 Family
• The ISO 27000 family of standards outlines
  minimum requirements for securing information.
    GDPR
• General Data Protection Regulation is a set of
  rules about how companies should process the
  personal data of data subjects.
Reference
• McGraw-Hill CISSP All-in-One Exam Guide
  6th Ed Shon Harris