About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

NIA #17 - Computer Crime: Computer Security Techni


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
???????????????????? ????????????????????????????????? ????????????????????
? Founded By: ? ? Network Information Access ? ? Founded By: ?
? Guardian Of Time ??? 12APR90 ??? Guardian Of Time ?
? Judge Dredd ? ? Guardian Of Time ? ? Judge Dredd ?
???????????????????? ? File 17 ? ????????????????????
? ????????????????????????????????? ?
? ????????????????????????????????????????????????? ?
?????? COMPUTER CRIME: COMPUTER SECURITY TECHNIQUES ????
? Section I -- Introduction ?
?????????????????????????????????????????????????

Forward:

There will be at least ten files on the subject of Computer Crime, I have
tried to get people to show us just what we can, the ideas that are being
taught to managers, are simple, and crude. You have seen in the first few
files of NIA, just HOW SIMPLE are the techniques? Well here in this
section will be a Governmental view of Computer Crime.

Guardian Of Time

$_SECTION I -- INTRODUCTION

The "Dawn of the Age of Aquarius" has also ushered in the "Age of the
Computer." It is no secret that computers have become indispensable to
almost every form of modern business and government. The rapid expansion
of computer use has created an electronic marketplace where goods and
intellectual products are transferred and paid for entirely by electronic
means. Computers have also created a new method of storage and
representation of assets through electronic data processing systems that
record everything from bank balances to shares of securities. The use of
computers has even advanced to the stage where electronic signatures can
be given unique characteristics making them more easily identifiable and
reliable than human handwriting in many respects.

The new form of assets consists of pulses of electricity, states of
electronic circuits, and patterns of magnetic areas on tape and disks.
The pulses can be converted to the form of checks by a computer printer or
to monetary currency by computer-printed reports that authorize cashiers
to transfer cash from boxes to people or to other boxes. The pulses can
also be converted to printed reports or mechanical functions that cause
actions either manually or automatically involving goods and services.
These negotiable assets, as well as personal information, now are stored
as data in computers, saved on magnetic tape and disks, and sent through
wires and microwave carriers in electronic, electromagnetic wave, and
magnetic forms.

The creation of these new forms of assets, however, has been accompanied by
an increase in the potential for misuse of computers and computer data.
Some of the people who create and work with computer products have the
capability to alter or delete assets stored in computers or to create
totally new assets. The security of these assets, as well as other data
stored in computers, is vital. In this document, computer security
encompasses the integrity, preservation, authorized use, and
confidentiality of data starting with its generation, through its entry
into computers, automatic and manual processing, output, storage, and
finally its use.

One of the primary motives for computer security is protection from
intentionally caused loss. Computer crime is highly publicized and its
nature frequently distorted in the news media. Although there are no
valid representative statistics on frequency or loss, enough loss
experience has been documented (more than 1000 reported cases since 1958)
and even more conjectured to make it clear that computer crime is a
growing and serious problem. Broadly defined, known experience indicates
a high incidence of false data entry during manual data handling before
computer entry. Most losses of this kind are small, but several large
losses of $10 to $20 million have occurred. Unauthorized use of computer
services has also prolifereated, especially with increasing use of dial-up
telephone access to computers. A few sophisticated programmed frauds
inside computer systems or using them as tools for frauds have been found
where detection was mostly accidental. Reported computer crime is
committed mostly by people in positions of trust with special skills,
knowledge and access. The results of known experience indicate the need
for a wide range of basic controls that reduce the likelihood of violation
of trust by these people. Many of these controls that reduce the
likelihood of violation of trust by these people. Many of these controls
are represented in this report.

$_RELIANCE ON COMPUTERS REQUIRES COMPUTER SECURITY

Although computer security has always been needed, even before computers,
interest in it became widespread only after computers came into use,
especially for processing financial and personal data. Computers
facilitate the great concentration of data for powerful means of
processing, and for the first time since the days of manual data
processing computers, provide an opportunity to apply computer security in
effective, uniform, and low-cost ways. At the same time computer use
increases the dangers of large losses from the conentration of intangible
assets in electronic forms and changes the nature of exposures to losses
with assets in these new forms.

Use of computers changes the patterns and degree of trust put in people
who work with data. New occupations staffed by fewer, technology oriented
people, each with greater capacity to do good or harm using computers as
tools have emerged. There is now one computer terminal for every three
white-coller workers.

Computers remove processing and storing of data in their electronic form
from direct human observation. Thus, computer programs that direct the
processing of data whose integrity and correctness must be assured are
necessary tools to see the results of data processing and check the
correctness of data stored in computer media. The procedures by which
data are processed and stored are created by programmers at a different
time and place than when the actual processing occurs. Processing takes
place so rapidly as to be incomprehensible to humans until it is complete,
and intervention is impossible except in preprogrammed ways that where
developed without the possibility of foreseeing all future conditions and
needs.

Organizations that use or provide computer services for governmental and
business purposes have a responsibility to the users, data subjects,
managers and employees, as well as society, to assure computer security in
legal, economic, and ethical terms to avoid loss to themselves and others.
Thus, contractual commitments that specify trade secret protection of
commercial computer program and data file products require that users of
the products apply safeguards. Top management, of course, wants to
continue the success of their organizations and avoid data-related losses.
Data processing employees abide by the computer security policies and
procedures to please management and receive advancements in their jobs.
Society demands responsible treatment of data, the US government, for
example, has attempted to obtain voluntary adherence by business to the
Organization for Economic Cooperation and Development Guidelines on
Protection of Privacy and Transborder Flows of Personal Data. In
addition, professional societies and trade associations apply peer
pressure to meet ethical standards.

Data-related losses from errors, omissions, bad judgment, intentional
acts, and natural events motivate the victims to avoid further loss. Some
controls on loss result in more efficient data handling, reduced insurance
premiums, and lower costs. Compliance with laws and regulation such as the
Privacy Act of 1974, Foreign Corrupt Practices Act, criminal statutes, and
the US Office of Management and Budget Circular A-71 on Computer Security
is required for an orderly society.

All of these factors and more must be taken into account in planning and
establishing computer security. Dangers lurk not where losses have been
anticipated and good controls exist but where vulnerablities have NOT been
anticipated and controls are lacking. Systematic methods are needed to
assure completeness of safeguarding with limited resources that can
resonably be devoted to protection in the complex and changed environments
of data processing brought about by the use of computers.

$_COMMITMENT TO COMPUTER SECURITY

Management is eager to allocate resources that directly increase the
productivity of their organizations. Security seldom adds directly to
productivity; it only assures protection from loss of productivity and
avoids violation of rights, laws and regulations. Therefore, security
might have occurred. If security is effective, it usually goes unnoticed
because loss is averted. Otherwise, security is sometimes seen as costing
money without visible, direct contributions to performance. This makes
security expenditures particularly important to justify and understand.

Fortunately, enlightened management will react rationally to assure
security in their organizations when given resonable options and adequate
justification for doing so. Employees will support and carry out security
when they understand its purpose, receive clear directives, understand
that it is part of their job performance, and are judged on their
adherence to secure practices. Therefore, recommendations for
cost-effective controls must be properly justified and generally accepted.

Methods for conducting security reviews based on risk assessment to
determine vulnerabilities and identify needed controls have been developed
and used to some extent. However, many controls are still selected on a
piecemeal basis when individual needs become evident without comprehensive
review of all needs. This leads to inconsistent security buildup that
leaves serious vulnerabilities and gaps. Security must be mesasured by
the weakest links; losses occur where adequate controls are lacking.
Therefore, methods of review must be developed that are comprehensive as
well as sufficiently practical and low in cost to attract their use.

Data processing and computer security have advanced rapidly to the point
where organizations today do not take action in isolation from what other
organizations are doing. Many organizations have adopted the solutions to
common vulnerability problems developed by others. Applying generally
used security practices and controls is attractive where the problems and
needs are similar among many organizations.

$_CONTRIBUTION OF THIS REPORT TO COMPUTER SECURITY

The study results reported in this document are meant to add materially to
new concepts in computer security. The computer security practices and
controls presented here are those used or endorsed by seven organizations
that are particularly advanced in their computer security. In addition,
the organizations were chosen from among those heavily involved in
manipulating personal data to emphasize the application of security to
issues of privacy. Thus, several of the organizations are processors of
crimminal justice data and one is a processor of life and medical
insurance. The seven participating field site organizations are:

(1) A state law enforcement data center
(2) A county EDP services department
(3) A city data services bureau
(4) A research institute specializing in criminal justice research
(5) A life and casualty insurance company
(6) A center for political studies, which does extensive research on
sensitive topics linked to individuals
(7) A state information services department.

A project team of experienced computer security consultants examined the
seven field site organizations to determine the best controls and
practices in use, as well as the methods of review and selection of
controls and practices that organizations use. This document describes
the 82 controls and practices that were judged as generally acceptable for
good computer security by computer security administrators from all seven
organizations along with two independent security consultants.

In Section II of this report, the background and maturation of computer
security methods, particularly as a basis for new approaches to
evaluating and selecting controls, are described. Common, selective, and
special vulnerabilities are identified. Section III describes presently
used security review methods and the legal concepts of standards of due
care and protecting proprietary interests in computer programs which
contribute to computer security practices and the law.

Section IV, along with more detailed descriptions in Appendix B, presents a
new, baseline concept that can be used along with other methods for
selecting controls and security practices. The principles and benefits of
baseline controls are stated and future baseline development is
considered.

Section V explains the method of investigation, the format used to
describe the controls found in the study, and the five indices of the 82
controls that are described in the last section. The five indices are
identified by topic, objective, area or responsibility, mode, and
environment to facilitate location of specific controls. An overview
summarizing the controls by topic completes Section V.

In Section VI, the controls are presented in ways quite different from
that found in other security literature. A title, control objective, and
general description based on actual usage experience are presented. The
control variants are identified. Strengths and weaknesses found in usuage
are stated. These items are followed by advice on how to audit the
controls, and five more characteristics are briefly identified to complete
the description. Appendix A presents three case studies of actual
selection and approval of controls and a step-by-step method of how a
baseline review could be conducted.

$_EOF

[OTHER WORLD BBS]
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS