250 likes | 436 Views
eSecurity. AIIA / WITSA Policy Forum 9 March 2001. Eric Keser Principal eSecurity Solutions. e-COMMERCE Security Exposures. New Exposures: Public, private, and not-so-private networks Direct connections with business partners Automated business processes Fewer humans in the loop
E N D
eSecurity Solutions eSecurity AIIA / WITSA Policy Forum 9 March 2001 Eric Keser Principal eSecurity Solutions
e-COMMERCESecurity Exposures • New Exposures: • Public, private, and not-so-private networks • Direct connections with business partners • Automated business processes • Fewer humans in the loop • New types of trust relationships = more exposure to threats to security and reliability eSecurity Solutions
e-COMMERCESecurity Attacks • Attacks: • Insiders (83%) and Outsiders (58%) • Easy to learn to hack • www.r00t.org • www.rootshell.com • www.2600.com • www.l0pht.com • www.hackersclub.com • ftp.technotronic.com • oliver.efri.hr/~crv eSecurity Solutions
e-COMMERCESecurity Requirements • To ensure availability of information & services • To securely allow accessto information & services • To prevent loss of integrity of information & transaction • To provide authenticity of all parties • To provide confidentiality of information & transactions • To provide non-repudiation to all parties • To provide an audit log of significant events • To provide fraud prevention and other mis-use controls eSecurity Solutions
e-COMMERCE Technology Solutions 100 • Firewall (81%) • 70-80% mis-configured • Testing 80 % 60 84% External 40 20 72% In-House 0 FIREWALL eSecurity Solutions
e-COMMERCE Technology Solutions 100 • Cryptography • SSL (43%) • SET (47%) • Digital Certificates (69%) 80 % 60 40 20 0 SET SSL FIREWALL Digital Cert. eSecurity Solutions
e-COMMERCE Technology Solutions 100 • Other (81%) • Algorithms • MD5 • SHA • RSA • DES • X.509 • IDEA • Applications • PGP • PEM 80 % 60 40 20 0 SET SSL Other FIREWALL Digital Cert. eSecurity Solutions
e-COMMERCEPeople Solutions • Security Organisational Structure • Roles and Responsibilities • Emergency Response Program • Security Awareness Program • Risk Management Program • Monitoring and Escalation Program eSecurity Solutions
PRIVACY eSecurity Solutions
PRIVACYChanges • Privacy Amendment (Private Sector) Act 2000 is effective 22 December 2001. Imposes privacy obligations for most private sector organisations. • Require compliance with National Privacy Principles (NPPs) or an approved privacy code. eSecurity Solutions
PRIVACYInternational Exchange • Restricts the international transfer of personal information by an Australian organisation. • Recipient country must have in place law, binding scheme or contract which upholds privacy standards equivalent to the NPPs. • Hong Kong, New Zealand and Taiwan have comprehensive privacy regimes in place. eSecurity Solutions
PRIVACYInternational Exchange • Other Asia Pac countries are in process of developing or have in place specific industry codes or guidelines. • Canada and EU similarly have legislation in place. • USA is still developing their self regulatory model. eSecurity Solutions
PRIVACYSystem Issues • Organisations must provide ‘opt outs’ on all direct marketing material. • Systems are generally not capable of efficiently administering such a system – may need to provide two levels of filters eg one flag which records preference not to receive direct marketing but another flag which ensures general information eg bank statements will still be sent to customer. eSecurity Solutions
PRIVACYSystem Issues • Organisations also need to provide individuals with access to their information. • May be an administrative burden where information retained on disparate systems. Also issue where customer representatives are recording ‘notes’ on systems. • Inadequate security measures on systems have not been implemented. eSecurity Solutions
THE LAW eSecurity Solutions
LAWTyranny of Distance • Modern communication lines and Information technology have opened a new area of data transfer, which in turn has developed a new form of criminal element. • With the advent of the cyber criminal, law enforcement have been confronted with inadequate legislation, the requirement to implement new techniques, as well as dealing with cross jurisdictional issues eSecurity Solutions
LAWJurisdictional Issues • Where was the crime committed? • Who should investigate the Crime? • Who will bear the cost of the Investigation? • Who has the appropriate Legislation to pursue the criminal? eSecurity Solutions
LAWPolicing the Internet • Each country has it’s own answer • Most rely on traditional crime legislation to cover crime on the Internet • Different approaches compound the difficulties of successful pursuit and prosecution • Civil remedies can succeed where criminal prosecution is failing eSecurity Solutions
THE LAWWhich Law? • Offences can now occur across the World, but an incident which equates to an offence in one country does not necessarily equal an offence in the other. • A recent example of this is the ‘Love Bug’, an investigation was commenced in the USA (where the spread of a computer virus is recognised as an offence) which led to a suspect being tracked to the Philippines , many problems arose as the country where the suspect was located did not have laws which recognised the spread of a computer virus as an offence. eSecurity Solutions
THE LAWOffence Vs Cost • What was the monetary value of the occurrence • Vs • Cost of sending investigators to the suspects location • Cost of interviewing witness’s at their location • Cost of collating the evidence • Cost of prosecution eSecurity Solutions
THE LAWWhere was it committed? • The simple premise of “where the crime was committed” causes issues for Law Enforcement: • Does the Offender sitting in his bedroom commit the offence from his house? • Or is the offence committed on the server he has just hacked into? • Does the Law Enforcement investigators have the statute to investigate the offence on either side? • Can either area successfully prosecute for the offence? eSecurity Solutions
THE LAWExisting IT crime laws • Computer Trespass (Victorian Statute) • Victorian Statute - Summary Offences Act.1966.7405.9.a. • Improper Use of Telecommunications Services • Commonwealth Crimes Act 85ZE • Defrauding a Carrier • Commonwealth Crimes Act 85ZF eSecurity Solutions
THE LAWOther offences • Criminal damage • Crimes Act.1958.6231.197.1 • Obtain Financial Advantage by Deception • Crimes Act.1958.6231. 82 • Falsification of Documents • Crimes Act.1958.6231. Sec.83A.(9) • Theft? • Crimes Act.1958.74 eSecurity Solutions
eSecurity Solutions Questions