About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

NIA #28 - Computer Security Techniques Part II


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
???????????????????? ????????????????????????????????? ????????????????????
? Founded By: ? ? Network Information Access ? ? Mother Earth BBS ?
? Guardian Of Time ??? 17APR90 ??? NUP:> DECnet ?
? Judge Dredd ? ? Guardian Of Time ? ?Text File Archives?
???????????????????? ? File 28 ? ????????????????????
? ????????????????????????????????? ?
? ???????????????????????????????? ?
?????????????? COMPUTER SECURITY TECHNIQUES ?????????????
? Section II - Background ?
????????????????????????????????

Here is Section II of VI Sections that talks in some detail about Computer
Crime, and also sights actual court cases, which may be of some help to
you.

SECTION II - BACKGROUND

$COMPUTER SECURITY BEGINNINGS

Although computer security has been an important requirement in the
military since computer use began, it has been only explicitly recognized
in nonmilitary government and business since the late 1960s. The 1967
American Federation of Information Processing Societies, Spring Joint
Computer Conference session, "Security and Privacy in Computer
Systems" chaired by Dr. Willis Ware of the Rand Corporation, generated new
interest in computer security. Rapid development, stimulated by the
privacy issues and notorious computer crimes in the 1970s, has followed.
Formalized methods for evaluating the adequacy of security soon followed.

On July 27, 1978, the US Office of Management and Budget issued to all
agency heads the Transmittal Memorandum No.1 under Circular No.A-71 on
Security of Federal Automated Information Systems. This memorandum
presents a comprehensive policy regarding establishment of computer
security programs in all nondefense computer centers. It contains a
procedure for adopting security standards, a requirement for security in
all hardware and software procurements, plus guidance on security in all
hardware and software procurements, plus guidance on conducting risk
analyses, performing security audits, developing contingency plans, and
establishing personal security policies. Various roles for the National
Bureau of Standards, General Services Administration, and Civil SErvice
Commission are specified. This memorandum, a significant milestone for
computer security in the federal government, is a well-conceived document
worth of general use.

$MATURING COMPUTER SECURITY

New approaches to reviewing, establishing the needs for, and selecting
computer security controls are emerging as concepts of computer security
mature. Maturation is evident from the routine acceptance of security
and from the type of controls typically used today at the seven sites
visited. At present, the computer security field is characterized by:

: General management recognition and support.

Top management at the sites were interested enough in computer
Security to fully cooperate with the project field teams. Corporate
and agency policies reflecting top management's concern have been
formulated.

: Established specialists in the subject area.

Full-time security researchers and designers in computer science
and technology are developing concepts of trusted computer systems
that will be significantly more secure than current computers.
Many consultants are active in the field. Computer security job
titles and positions have been developed, and hiring by these
titles is practiced.

: Appointment of full-time or part-time computer security officers in
large, well-run computer installations.

The larger organization visited had full-time or part-time computer
security officers. National conferences on computer and computer
security and privacy are currently drawing 700 to 800 computer
security-rated specialists and administrators.

: Computer security products available at resonable prices.

Physical access control systems for computer centers, password
access terminal systems, file access control computer programs,
file detection and suppression equipment, cryptographic systems,
audit program tools and uninterrruptible power supplies for
continuous operation of computers are examples of resonable priced
products ( see also Section VI). In Addtion, the products'
salesmen provide a new source of information and assistance for
security practitioners.

: A precedent-setting federal standard for cryptographic protection.

The first federal information processing standard, the Data
Encryption Standard, was approved by the National Bureau of
Standards and is used in more than 25 products.

: Increasing numbers of effective controls found in well-run computer
installations and well-designed systems.

Section VI identifies 82 generally used controls based on field
investigation of the seven computer sites.

: Practice of formal security review methods.

Task group reviews of computer centers are becoming more common.
The US Office of Management and Budget requires that risk
assessments be performed in all federal agency computer centers at
least once every 3 years. The National Bureau of Standards has
published several reports on conducting risk assessments.

: A body of information documenting loss experience.

Conference proceedings, books, and trade journals include detailed
descriptions of loss cases. Mr. Donn B. Parker at SRI
International, Professor Brandt Allen at the University of Virginia,
The American Institute Of Certified Public Accountants, Mr. Robert
Courtney in New York, and Mr. Jay Bloombecker in Los Angeles have
extensive files of reported computer abuse and crime cases.

: Laws and regulations requiring security.

The Federal and State Privacy Acts, Foreign Corrupt Practices Act,
16 state computer crime statues, and numerous regulations require
or directly imply the need for controls.

: Special insurance polices.

Numerous insurance companies offer policies for protection against
data processing business interruption, errors and ommissions, and
crime.

: Numerous books, journals, news publications, and other writings on
the subject.

The National Bureau of Standards has published more than 40
computer security reports. The Bureau of Justice Statistics,
Department of Justice, has published a series of manuals and guides
on privacy and security. At least four monthly commerical
newsletters and journals, as well as many books on computer
security, are published.

: Specialized audit capabilities.

The Institute of Internal Auditors published the SRI international
Systems Auditability and Control Reports identifying 30 audit
techniques and more than 300 controls. EDP auditing has become an
accepted specialty in audit, and EDP auditors are certified by the
Institute of Internal Auditors and soon also by the EDP Auditors
Association.

$VULNERABILITIES

Admittedly, some potential threats and assets subject to loss are
different from one computer center to another depending on organizational
characteristics and purposes. Some vulnerabilities of a US Department of
Justice computer center will be different than a toy manufacturer's
computer center. However, similar problems among even diverse kinds of
computer centers can lead to adoption of commonly used controls. The
potential threats, the assets at risk, and the vulnerable facilities that
are similar among all computer centers include:

: Potential Threats
- Disgruntled or error-prone employees causing physical destruction and
destruction or modification of programs or data.
- Natural disaster such as fire, flooding, and loss of power and
communications.
- Outsiders or employees making unauthorized use of computer services.
- Outsiders or employees taking computer programs, data, equipment or
supplies.

: Assets Subject To Loss
- Facilities
- Systems equipment
- People
- Computer programs
- Data
- Data storage media
- Supplies
- Services
- Documents
- Records
- Public respect and reputation.

: Common Environments at Risk
- Computer rooms containing computers and peripheral equipment
- Magnetic media (tapes and disks) libraries
- Job setup and output distribution stations
- Data entry capabilities
- Program libraries
- Program development offices
- Utility rooms
- Reception areas
- Communications switching panels
- Fire detection and suppression equipment
- Backup storage
- Logs, records, and journals.

In addition to the vulnerabilities common to all computer centers, some
types of computer centers such as criminal justice operations, research
institutes, insurance companies, and banks have environments,
applications, and types of data that create similar potential threats and
types of asset loss. The vulnerabilities endemic to subsets of similar
computer centers lead to the need for selective controls such as
separation or deletion of names from personal data, batch check summing of
inventory data and possibly data encryption. Some examples of computer
applications and associated risks that are not common to all computer
centers are as follows:

: Processing and storage of personal data
- Intentional or accidental disclosure, modification, destruction or
use of personal data or records of their use.
- Violation of confidentiality rules, personal data regulations, or
privacy laws.

: Processing and storage of secret data (eg, investigative, intelligence,
trade secret, marketing, competitive).
- Intentional or accidental disclosure, modification, destruction, or
use of trade secret or sensitive data or records.
- Violation of rules, regulations, or laws.

: Processing and storage of financial data (eg, account balances,
negotiable instruments input/output, general ledger, accounts
payable/receivable, payroll).
- Financial fraud or theft.
- Accidental financial loss such as lost interest.
- Failure to meet financial report filing dates and other fiduciary
obligations.

: Process control (eg, controlling manufacturing processes,
transportation, meal processing, inventory control, patient
monitoring).
- Intentional or accidental modification, failure, or destruction of
processes.

In addition, special or unique problems can arise in a single computer
center where new technology is adopted and commonly used controls have not
yet emerged. Examples of the new technology include voice data entry,
voice ouput, fiber optics communication, satellite data communications,
and automated offices.

Lastly, several potential sources of unusual threats requiring special
controls have been identified: a computer center built over a burning
underground coal mine, violent labor strife, a computer center in an
airport glide path, rodent or insect infestation, and contract programming
performed by prison inmates.

$CURRENT SECURITY REVIEW AND CONTROL SELECTION PRACTICES

The process of identifying security needs and selecting and justifying
controls is called a security review when carried out in an organized set
of scheduled and budgeted tasks. It is sometimes incorrectly called an
audit. An audit implies independent review by auditors for top management
and owners of an enterprise to discover problems and lack of compliance with
law, regulations, and policy.

The security review method described below is based on identification of
assets, potential threats, and lack of controls. A zero-based method, it
begins by assuming that potential threats and controls have not been
adequately addressed previously. Its purpose is to comprehensively and
exhaustively identify problems in the form of specific vulnerabilities,
their risk, and compensating controls. This approach is thoroughly
justified; losses tend to occur where effective controls are absent.

$A COMMONLY RECOMMENDED REVIEW METHOD

The usual method of security review often described in the literature and
in seminars includes combinations and various oderings of the following
steps:

(1) Organize a task group to conduct the review; establish plans,
assignments, schedules, budgets, and scope; obtain management
approval and support of the plan.

(2) Identify the assets subject to loss; either determine their value,
consequences of loss, and replacement value or rank their importance.

(3) Identify potential threats to the identified assets.

(4) Identify the controls in place or lack of controls that mitigate or
facilitate the potential threats to the assets.

(5) Combine associated potential threats, assets subject to loss, and
lack of mitigating controls; each triple of items constitutes a
vulnerability.

(6) Evaluate and rank the vulnerabilities in terms of greatest to least
expected potential loss; alternatively quantify risk for all or only
the major vulnerabilities in terms of annual frequency of loss and
single case loss in dollars to obtain annualized loss exposure.

(7) Identify actions and controls that would reduce the risks of losses
to acceptably low levels.

(8) Recommend an implementation plan to reduce risk to an overall
acceptably low level.

(9) Carry out the plan and establish ongoing security maintenance and
improvements.

Several steps may be combined or overlapped for task group operating
efficiency. Various methods such as use of questionnaires and loss and
frequency data forms or scenarios can aid in accomplishing the tasks and
documenting the results. Some steps may involve a high volume of data to
warrant use of computer-aided methods. For example, quantified risk
assessment requires expected frequency of loss and dollar value of single
incident loss from both intentional and accidental modification,
destruction, disclosure, use and denial of use (for various periods of
time) for all computer-related threats and assets.

In practice, however, the formalized review approach is rarely taken, or
only severely limited versions are adopted. More likely, only piecemeal
discoveries of vulnerabilities and their solutions happen. These events
are occasioned by other information processing activities such as audits,
loss events, new applications, new or newly enforced requirements,
contracting, or budget studies. If a specific study is conducted, often
obvious, significant vulnerabilities are identified early and actions
taken to reduce their risk even before the final recommendations are made.

$SECUIRTY METHODS IN PRACTICE

A survey of management practices was conducted at the seven field sites.Managers
were asked to describe the process curretnly used to select, justify, and
install computer security controls. Both methodology and organizational factors
were studied. Three typical case studies for a government agency, a research
organization, and a private sector firm are included in Appendix A.

None of the organizations studied used a formal cost-benifit or risk analysis to
evaluate computer security controls. These techniques, which have been heralded
in the literature, were thought to be excesively elaborate and not
cost-effective. Quantitative analyses were considered not appropriate because
of a lack of valid data. Instead, each site primarily used subjective and
somewhat informal piecemeal techniques for assessing the pros and cons of
particular computer security controls.

These subjective techniques can be described as the exercise of prudent care or
subscribing to generally used controls. the words "prudence" and "common sense"
were frequently used in describing what went into these subjective assessment
approaches. Generally used approaches were defined in terms of the practices of
other organizations in similar environments. Management essentially asked, "If
another manager were in my place, would he install and operate the proposed
control?" Factors considered in answering this questing include:

: The controls actually being used by other orgainziations with similar
applications and equipment.

: Reported loss experience.

: The perceived needs of the organization's own operating environment
compared to other organizations with similar environments.

: The increased level of security to be achieved.

: Laws and regulations.

Definitions of generally used controls typically consider a wideranging
control environment. Policies and professional ethical mores, personnel
procedures, and manual procedures can be used to make up for the possible
lack of computer-based controls, especially in computer systems where
security has not been a design and implementation criterion.

Another important factor in the decision to use a particular control was the
influence of outside parties. Clients served by the organizations specified
requirements that had to be met before certain work could be performed and
data could be obtained. these requirements mirrored requirements that in
some instances came from within the organization. External and internal
auditors were other sources of relevant information. Quantitative
information such as the cost to install and operate a control, money to be
saved, or the losses to be prevented ( from catastrophes, lawsuits, or
public embarrassment ) were rarely considered.

Management in most cases did not actively seek information about what is
done elsewhere. Although they used this information when made available to
them and found it to be of great interest and potentially useful, they did
not believe that contacting similar organizations and asking questions were
cost-effective. The exception to this occurred when very costly controls,
such as vaults or electronic lock access systems, were considered.
Management then directed technical personnel to study alternative products
and survey users of the products. Sometimes prioritized lists of desirable
controls were prepared as wish lilsts that could be reviewed whenever
budgets were prepared. The lists were helpful in matching high-priority
controls with limited resources. Controls were viewed as necessary
resource-consuming items rather than revenue generating or cost-saving
items. The time frame was typically 3 to 5 years.

The source of the funds to be used for a control largely dictated the
approval process; if funds were to come from a government grant, from
organizational overhead, or from a client project, then the approval
channels were markedly different in each case. The approvoal process also
varied depending on the time of year when the need for a control was
noticed. If a need was perceived shortly before budgets were prepared, and
installation could be delayed until the next fiscal year, then it was
included in the budget. If installation of a control could not be delayed
until the next fiscal year, then it was included in the budget. If
installation of a control could not be delayed until the next fiscal year,
special procedures were requried to rearrange currently budgeted funds to
obtain additional funds.

Documentation of the decision process was often sparce. Purchase
requisitions and budgets on the proposed control were sometimes the only
formal documents produced. Explicit management approval in these cases was
given when these forms were approved. Larger organization werre more liekly
to require formal documentation that included proposals, signoff sheets,
memos, impact statements, and in rare instances cost-benefit analyses.
Systems development and modification methodologies in some cases included
requirements for considering computer security. Security was reviewed when
a system was designed, redesigned, or modified, but not otherwise. The
concern for security was not dealt with in isolation from other activites.
Typically, a control that was retroisolation from other activites.
Typically, a control that was retrofitted to an existing system was
evaluated in the same manner as a control that was originally designed into
a system. Both were subject to the system development and modification
methodology.

Documentation of control decisions and the resulting changes to be made were
more extensive whenever a control was going to affect people outside the
organization. One organization wrote and maintained a specialized secure
operating system; another developed and installed a security program
package. For these products, strict requirements for system change
justification and documentation existed.

$DECISION-MAKING FACTORS

Typically, the decision to adopt a control was made by the line managers
from the area primarily involved; for example, if an electronic lock access
system would restrict the activities of computer operators, then compuer
operations management would make the decision.

In some instances, security committees that had an advisory role in the
decision to adopt computer security controls were formed. These committees
were composed of higher level managers who represented the following
organizational ares: The legal department, user organizations, applications
development, computer operations, and industrial security. These committees
monitored legal and regulatory requirements , current events, and the
current security systems. In rare cases, the committee had approval
authority.

When a proposed control affected several parts of the organization in a
significant monetary or operational way, then management approval of each of
these areas was usually obtained. Approval by industrial security, legal
counsel, audit, personnel, users, as well as other departments of a compute
center besides the one proposing a control was thus sometimes requred. For
example, if a control would increase the rates for computing services
charged to users, or if it would change the user's interaction with a
computer system, then the users would typically be involved in the decision
process. Occasionally, if many areas were involved, then a higher level
manager who had each of these areas reporting to him decided whether to
adopt a proposed control.

The computer service provider may play different roles in the identification
and approval of the need for a control. The service provider in some cases
was responisble for telling the user what was needed, while in other
organizations the user was responisble for telling the service provider what
was required. In either case, expertise within the computer sevice
provider's organization was relied on. In some organizations, other
departments such as audit and legal counsel were supposed to alert involved
parties to the need for additional controls, but the approval of the changes
still rested with the service provider and the user.

Audit departments were seldom involved in the control requirements and
specification process. Although many authors of computer security works
advocate that auditors be involved in systems design work, this
participation did not generally occur. Some say that this sytem is
adequate--auditors are not supposed to directly participate, which
specification of controls would imply. Auditors were said to only
infrequently review computer controls. Others state that auditors should be
more active in the review of controls, informing management of the need for
improvements. Larger organizations were more likely to have auditing staff
involved in these activities.

Many installations have noted that finding security experts in the computer
field to hire is a problem. In some cases controls were not evaluated or
implemented because of the lack of qualified personnel. the shortage of
experts in the computer security field is particularly acute.

Evidence of the maturing of computer security and the findings from
experience about selection of controls provide the background to consider
the motivation and need for adopting generally used controls. The next
section provides two specific examples of common sources of this motivation
and need and how they may be satisfied by generally used controls.

This section has described the increased recognition of the ned for security
controls and the maturation and status of the process of control selection.
a major factor relevant to decision making regarding computer security is
the legal framework surrondin data and releated computer violations and
liabilities. These issues are addressed in the next section.

$EOF

[OTHER WORLD BBS]
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS