0% found this document useful (0 votes)
23 views30 pages

Lecture 4

The document outlines the importance of understanding legal and ethical responsibilities in information security, emphasizing the need for practitioners to stay updated on laws and regulations to minimize risks. It discusses various types of laws, relevant federal laws, and the significance of policies and training in maintaining security within organizations. Additionally, it highlights the role of ethical behavior and cultural differences in shaping security practices.

Uploaded by

Eric Affum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views30 pages

Lecture 4

The document outlines the importance of understanding legal and ethical responsibilities in information security, emphasizing the need for practitioners to stay updated on laws and regulations to minimize risks. It discusses various types of laws, relevant federal laws, and the significance of policies and training in maintaining security within organizations. Additionally, it highlights the role of ethical behavior and cultural differences in shaping security practices.

Uploaded by

Eric Affum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Law & Ethics, Policies &

Guidelines, and Security Awareness


CE372: Information Security
Instructor: Dr Eric Affum

1
Introduction

• You need to understand an organization’s legal,


ethical responsibilities
• To minimize liabilities and reduce risks, the
information security practitioner must:
– Understand current legal environment
– Stay current with laws and regulations
– Watch for emerging issues

2
Terminology (1)
• See also page 89 of textbook
• Cultural mores: fixed morals or customs of a group of people,
form basis of ethics
• Ethics: Rules that define socially acceptable behavior, not
necessarily criminal, not enforced (via authority/courts)
• Laws: Rules that mandate or prohibit behavior, enforced by
governing authority (courts)
– Laws carry sanctions of governing authority, ethics do not
• Policy: “Organizational laws”
– Expectations that define acceptable workplace behavior
– General and broad, not aimed at specific technologies
or procedures
– To be enforceable, policy must be distributed, readily available,
easily understood, and acknowledged by employees
3
Terminology (2)
• Standards, guidelines, best practices: define what must
be done to comply with policy, how to do so
• Jurisdiction: a court’s right to hear a case if a wrong was
committed in its territory or against its citizens
• Long-arm jurisdiction: court’s ability to “reach far” and
apply law (another state, country)
• Case law: documentation about application of law in
various cases
• Liability: legal obligation beyond what’s required by law,
increased if you fail to take due care
• Due care: has been taken when employees know what
is/isn’t acceptable, what the consequences are
• Due diligence: sustained efforts to protect others
4
Types of Law

• Civil: laws governing nation or state


• Criminal: harmful actions to society, prosecuted by the
state
• Tort: individual lawsuits as recourse for “wrongs”,
prosecuted by individual attorneys
• Private: includes family, commercial, labor law
• Public: includes criminal, administrative,
constitutional law

5
Law and Information Security
• In practice, you can be sued for almost
anything; no “absolute” protection against
litigation
• Information security practices can:
– Reduce likelihood that incidents result in lawsuits
– Reduce likelihood that you lose (by showing due
care, due diligence)
– Minimize damages/awards
– Help you respond effectively to incidents
• We’ll focus on criminal laws.

6
Relevant Federal Laws (General)
• Computer Fraud and Abuse Act of 1986 (CFAA)
• National Information Infrastructure Protection Act of 1996
• USA PATRIOT Act of 2001 (made permanent in 2006)
– Broadens reach of law enforcement agencies
– Broadens “protected” information regarding open records law
– Increased accountability, sanctions against money laundering
– National Security Letters: administrative subpoenas with permanent
gag orders
• Telecommunications Deregulation and Competition Act of 1996
• Communications Decency Act of 1996 (CDA) (partly struck down)
• Computer Security Act of 1987: sets minimal federal government
security standards

7
Relevant Federal Laws (Privacy)
• Federal Privacy Act of 1974: Federal government
• Electronic Communications Privacy Act of 1986: Regulates
interception of electronic communications
• Health Insurance Portability and Accountability Act of 1996
(HIPAA), Gramm-Leach-Bliley Act of 1999 (GLBA):
Requires privacy policies in healthcare and financial
industries, restricts sharing & use of customer info
• Family Education Rights and Privacy Act (FERPA):
Restricts distribution of “student academic records” (including
names and grades)
• Freedom of Information Act of 1966: can request info from
gov’t, some info is protected
• FACTA Red Flag regulation of 2009 (ID theft)

8
Relevant Federal Laws (Copyright)
• Intellectual property (IP) protection in U.S., other
countries
• Copyright law extends to electronic formats
• With citations, you can include brief portions of others’
work as reference (“fair use”)
• U.S. Copyright Office website:
http://www.copyright.gov
• Digital Millennium Copyright Act of 1998 (DMCA):
criminalizes circumvention of technological copyright
protection measures (some exceptions)
9
State and Local Regulations
• Restrictions on organizational computer technology
use at state, local levels
• Information security professional responsible for
understanding applicable regulations, compliance
• State of Ohio:
– Ohio Rev. Code §1347: notify data breach victims
– Open records, anti-spam laws

10
International Laws and Legal Bodies
• European Council Cyber-Crime Convention:
– International task force oversees Internet security
functions for standardized international technology laws
– Attempts to improve effectiveness of international
investigations into breaches of technology law

• General Data Protection Regulation (GDPR):


requires website disclosure about data collection,
user consent (Europe)

11
United Nations Charter
• Makes provisions, to a degree, for information
security during information warfare (IW)
• IW uses information technology to conduct
organized and lawful military operations
• IW is fairly new type of warfare, although
military has been conducting electronic
warfare operations for decades

12
Ethics and Information Security

13
Ethical Differences Across Cultures
• Cultural differences create difficulty in
determining ethical behavior
• Difficulties arise when one nationality’s
ethical behavior conflicts with ethics of
another national group
• Example: many ways in which Asian cultures
use computer technology considered piracy

14
Ethics and Education

• Education levels ethical perceptions within a


small group of people
• Employees must be trained in expected
behaviors, especially regarding information
security
• Proper ethical training vital to creating
informed, well prepared, and low-risk system
user
15
Association of Computing Machinery (ACM)

• ACM established in 1947 as “world’s first


educational and scientific computing society”

• Code of ethics contains references to


protecting information confidentiality,
causing no harm, protecting others’
privacy, and respecting others’
intellectual property

16
Computer Security Institute (CSI)
• Provides training to support computer,
networking, and info. security professionals
• Argued for adoption of ethical behavior among
info. security professionals

17
Key U.S. Federal Agencies
• Department of Homeland Security (DHS)
• Federal Bureau of Investigation’s (FBI’s)
National Infrastructure Protection Center
(NIPC)
• National Security Agency (NSA)
• U.S. Secret Service

18
Policy, Standards and Practices
• Communities of interest need to consider
policies as starting point for security efforts

• Policies direct how issues should be addressed


and technologies used

• Security policies are least expensive controls to


execute but most difficult to implement

• Shaping policy is difficult


19
OSU Policies and Standards
• Policies • Standards
– Responsible Use of – University Computer
University Computing & Security Standards:
Network Resources • Min. Computer Security
– Archives & Retention • Critical Server Security
– Merchant Services & Use • Web Server Security
of Credit Cards • DB Server Security
– Deployment, Use of – Local Administrative
Wireless Data Networks Privilege Standard
– Public Records • See http://ocio.osu.edu
– Data Policy
for more details
– Personal Info Disclosure
20
Policy Management
• Policies management needed due to change
• To remain viable, security policies must have:
– People responsible for reviews
– A schedule of reviews
– Method for recommending reviews
– Specific policy issuance and revision date

21
Information Classification

• Information classification an important aspect of policy


(e.g., public, internal, classified)
• Specific company policies may be classified, but
general guidelines shared among companies
• A clean desk policy stipulates that at end of business
day, classified information is properly secured
• Questions:
– Feasibilities?
– Benefits?

22
Security Education, Training, and
Awareness Program
• Security education, training and awareness
(SETA) implementation should follow
security policy
– Designed to reduce accidental security breaches
– Training builds on general knowledge employees
need for their jobs (focused on security aspects)

23
Security Education
▪ Everyone in an organization needs to be trained
and aware of information security; not every
member needs formal degree or certificate in
information security

▪ When formal education for individuals in


security is needed, an employee can identify
curriculum available from local institutions of
higher learning or continuing education

▪ A number of universities have formal


coursework in information security
24
Security Training
• Involves providing members of organization
with detailed information and hands-on
instruction designed to prepare them to
perform their duties securely
• Management of information security can
develop customized in-house training or
outsource the training program

25
Spheres of Security (Fig. 5-15)

26
Design of Security Architecture

• Defense in depth
– Implementation of security in layers
– Requires that organization establish sufficient
security controls and safeguards so that an intruder
faces multiple layers of controls
• Security perimeter
– Point at which an organization’s security
protection ends and outside world begins
– Does not apply to internal attacks from employee
threats or on-site physical threats
27
Security Technology Components
• Firewall: device that selectively allows
information into/out of organization

• Demilitarized Zone (DMZ): “no-man’s land”


between inside, outside networks; some
companies place Web servers here

• Intrusion Detection Systems (IDSs): detects


unauthorized (strange) activity on organizational
network, individual machines, or both

28
Network Security Architecture (Fig. 5-18)

29
Summary
• Laws: state-enforced rules that mandate or
prohibit certain behavior; drawn from ethics

• Ethics: define socially acceptable behaviors


(may vary among groups)

• Policies: organizational laws

• Management needs to “set tone” for security


practices, support their deployment
30

You might also like