management of information security third edition c hapter 12 l aw and e thics in law a man is guilty...

73
MANAGEMENT of INFORMATION SECURITY Third Edition Chapter 12 Law and Ethics In law a man is guilty when he violates the rights of others. In ethics he is guilty if he only thinks of doing so. – Immanuel Kant

Upload: samantha-price

Post on 18-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

MANAGEMENT of INFORMATION SECURITY Third Edition

Chapter 12Law and Ethics

In law a man is guilty when he violates the rights of others. In ethics he is guilty if he only thinks of doing so. – Immanuel Kant

Page 2: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Objectives

• Upon completion of this chapter, you should be able to:– Differentiate between law and ethics– Describe the ethical foundations and

approaches that underlie modern codes of ethics

– Identify major national and international laws that relate to the practice of information security

Management of Information Security, 3rd ed. 2

Page 3: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Objectives (cont’d.)

• Upon completion of this chapter, you should be able to: (cont’d.)– Describe the role of culture as it applies to

ethics in information security– Identify current information on laws,

regulations, and relevant professional organizations

Management of Information Security, 3rd ed. 3

Page 4: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Introduction

• All information security professionals must understand the scope of an organization’s legal and ethical responsibilities

• Understand the current legal environment – Keep apprised of new laws, regulations, and

ethical issues as they emerge– To minimize the organization’s liabilities

• Educate employees and management about their legal and ethical obligations – And proper use of information technology

Management of Information Security, 3rd ed. 4

Page 5: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Law and Ethics in Information Security

• Laws– Rules adopted and enforced by governments

to codify expected behavior in modern society

• The key difference between law and ethics is that law carries the sanction of a governing authority and ethics do not

• Ethics are based on cultural mores– Relatively fixed moral attitudes or customs of a

societal group

Management of Information Security, 3rd ed. 5

Page 6: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Information Security and the Law

• InfoSec professionals and managers must understand the legal framework within which their organizations operate– Can influence the organization to a greater or

lesser extent, depending on the nature of the organization and the scale on which it operates

Management of Information Security, 3rd ed. 6

Page 7: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Types of Law

• Civil law– Pertains to relationships between and among

individuals and organizations

• Criminal law – Addresses violations harmful to society– Actively enforced and prosecuted by the state

• Tort law – A subset of civil law that allows individuals to

seek redress in the event of personal, physical, or financial injury

Management of Information Security, 3rd ed. 7

Page 8: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Types of Law (cont’d.)

• Private law – Regulates the relationships among individuals

and among individuals and organizations• Family law, commercial law, and labor law

• Public law – Regulates the structure and administration of

government agencies and their relationships with citizens, employees, and other governments

• Criminal, administrative, and constitutional law

Management of Information Security, 3rd ed. 8

Page 9: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Table 12-1a: Key U.S. laws of interest to information security professionals

Management of Information Security, 3rd ed. 9

Page 10: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Table 12-1b: Key U.S. laws of interest to information security professionals

Management of Information Security, 3rd ed. 10

Page 11: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws

• The Computer Fraud and Abuse Act of 1986 (CFA Act)– The cornerstone of many computer-related

federal laws and enforcement efforts – Amended in October 1996 by the National

Information Infrastructure Protection Act• Modified several sections of the previous act, and

increased the penalties for select crimes

Management of Information Security, 3rd ed. 11

Page 12: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

• The Computer Fraud and Abuse Act of 1986 (cont’d.)– Further modified by the USA Patriot Act of

2001• Provides law enforcement agencies with broader

latitude to combat terrorism-related activities • The USA Patriot Act was updated and extended, in

many cases permanently– Through the USA Patriot Improvement and

Reauthorization Act of 2005

Management of Information Security, 3rd ed.

Relevant U.S. Laws

12

Page 13: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• The Computer Security Act of 1987– One of the first attempts to protect federal

computer systems• Established minimum acceptable security practices

– Established a Computer System Security and Privacy Advisory Board within the Department of Commerce

– Requires mandatory periodic training in computer security awareness and accepted computer security practice for all users of Federal computer systems

Management of Information Security, 3rd ed. 13

Page 14: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• The Computer Security Act of 1987 (cont’d.)– Charged the National Bureau of Standards and

the NSA (now NIST) with the development of:• Standards, guidelines, and associated methods and

techniques for computer systems• Uniform standards and guidelines for most federal

computer systems• Technical, management, physical, and

administrative standards and guidelines for the cost-effective security and privacy of sensitive information in federal computer systems

Management of Information Security, 3rd ed. 14

Page 15: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• The Computer Security Act of 1987 (cont’d.)– Charged the National Bureau of Standards and

the NSA ( now NIST) with the development of: (cont’d.)

• Guidelines for operators of federal computer systems containing sensitive information in training their employees in security awareness

• Validation procedures for, and evaluation of the effectiveness of, standards and guidelines

– Through research and liaison with other government and private agencies

Management of Information Security, 3rd ed. 15

Page 16: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• Privacy Laws– Many organizations collect, trade, and sell

personal information as a commodity• Individuals are becoming aware of these practices

and looking to governments to protect their privacy

– Aggregation of data from multiple sources permits unethical organizations to build databases with alarming quantities of personal information

Management of Information Security, 3rd ed. 16

Page 17: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• Privacy Laws (cont’d.)– The Privacy of Customer Information Section

of the section of regulations covering common carriers

• Specifies that any proprietary information shall be used explicitly for providing services, and not for any marketing purposes

– The Federal Privacy Act of 1974 regulates the government’s use of private information

• Ensure that government agencies protect the privacy of individuals’ and businesses’ information

Management of Information Security, 3rd ed. 17

Page 18: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• Privacy Laws (cont’d.)– The Electronic Communications Privacy Act of

1986 • A collection of statutes that regulates the

interception of wire, electronic, and oral communications

– These statutes work in cooperation with the Fourth Amendment of the U.S. Constitution

• Prohibits search and seizure without a warrant

Management of Information Security, 3rd ed. 18

Page 19: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• Health Insurance Portability & Accountability Act Of 1996 (HIPAA)– An attempt to protect the confidentiality and

security of health care data • Establishes and enforces standards• Standardizes electronic data interchange

– Requires organizations that retain health care information to use information security mechanisms to protect this information

• Also requires an assessment of the organization's InfoSec systems, policies, and procedures

Management of Information Security, 3rd ed. 19

Page 20: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• HIPAA (cont’d.)– Provides guidelines for the use of electronic

signatures• Based on security standards ensuring message

integrity, user authentication, and nonrepudiation

– Fundamental privacy principles: • Consumer control of medical information• Boundaries on the use of medical information• Accountability for the privacy of private information

Management of Information Security, 3rd ed. 20

Page 21: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• HIPAA (cont’d.)– Fundamental privacy principles: (cont’d.)

• Balance of public responsibility for the use of medical information for the greater good measured against impact to the individual

• Security of health information

Management of Information Security, 3rd ed. 21

Page 22: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• The Financial Services Modernization Act– Also called Gramm-Leach-Bliley Act of 1999– Applies to banks, securities firms, and

insurance companies– Requires all financial institutions to disclose

their privacy policies• Describing how they share nonpublic personal

information• Describing how customers can request that their

information not be shared with third parties

Management of Information Security, 3rd ed. 22

Page 23: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• The Financial Services Modernization Act (cont’d.)– Ensures that the privacy policies in effect in an

organization are fully disclosed when a customer initiates a business relationship

• Distributed at least annually for the duration of the professional association

Management of Information Security, 3rd ed. 23

Page 24: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• Export and Espionage Laws– Economic Espionage Act (EEA) of 1996

• An attempt to protect intellectual property and competitive advantage

• Attempts to protect trade secrets from the foreign government that uses its classic espionage apparatus to spy on a company

– Also between two companies

– Or a disgruntled former employee

Management of Information Security, 3rd ed. 24

Page 25: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• Export and Espionage Laws – The Security and Freedom through Encryption

Act of 1997 • Provides guidance on the use of encryption• Institutes measures of public protection from

government intervention • Reinforces an individual’s right to use or sell

encryption algorithms• Prohibits the federal government from requiring the

use of encryption for contracts, grants, and other official documents, and correspondence

Management of Information Security, 3rd ed. 25

Page 26: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Management of Information Security, 3rd ed.

Relevant U.S. Laws (cont’d.)

Figure 12-1: Export restrictions

Source: Course Technology/Cengage Learning26

Page 27: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• U.S. Copyright Law– Extends protection to intellectual property,

including words published in electronic formats– ‘Fair use’ allows material to be quoted so long

as the purpose is educational and not for profit, and the usage is not excessive

– Proper acknowledgement must be provided to the author and/or copyright holder of such works

• Including a description of the location of source materials, using a recognized form of citation

Management of Information Security, 3rd ed. 27

Page 28: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• Freedom of Information Act of 1966– All Federal agencies are required to disclose

records requested in writing by any person – Applies only to Federal agencies and does not

create a right of access to records held by Congress, the courts, or by state or local government agencies

• Sarbanes-Oxley Act of 2002– Enforces accountability for the financial record

keeping and reporting at publicly traded corporations

Management of Information Security, 3rd ed. 28

Page 29: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Relevant U.S. Laws (cont’d.)

• Sarbanes-Oxley Act of 2002 (cont’d.)– Requires that the CEO and chief financial

officer (CFO) assume direct and personal accountability for the completeness and accuracy of a publicly traded organization’s financial reporting and record-keeping systems

• As these executives attempt to ensure that the systems used to record and report are sound, the related areas of availability and confidentiality are also emphasized

Management of Information Security, 3rd ed. 29

Page 30: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

International Laws and Legal Bodies

• International trade is governed by international treaties and trade agreements– Many domestic laws and customs do not apply

• There are currently few international laws relating to privacy and information security– Because of cultural differences and political

complexities of the relationships among nations

Management of Information Security, 3rd ed. 30

Page 31: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

International Laws and Legal Bodies (cont’d.)

• European Council Cyber-Crime Convention– Empowers an international task force to

oversee a range of Internet security functions• Standardizes technology laws internationally

– Attempts to improve the effectiveness of international investigations into breaches of technology law

– Goal is to simplify the acquisition of information for law enforcement agents in certain types of international crimes, as well as the extradition process

Management of Information Security, 3rd ed. 31

Page 32: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

International Laws and Legal Bodies (cont’d.)

• The Digital Millennium Copyright Act– A U.S.-based international effort to reduce the

impact of copyright, trademark, and privacy infringement, especially via the removal of technological copyright protection measures

• European Union Directive 95/46/EC – Increases individual rights to process and

freely move personal data

• Database Right– U.K. version of this directive

Management of Information Security, 3rd ed. 32

Page 33: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

State and Local Regulations

• Information security professionals must understand state laws and regulations– Ensure that their organization’s security

policies and procedures comply

• Georgia Computer Systems Protection Act – Has various computer security provisions– Establishes specific penalties for use of

information technology to attack or exploit information systems in organizations

Management of Information Security, 3rd ed. 33

Page 34: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

State and Local Regulations (cont’d.)

• The Georgia Identity Theft Law– Requires that a business may not discard a

record containing personal information unless it shreds, erases, modifies, or otherwise makes the information irretrievable

Management of Information Security, 3rd ed. 34

Page 35: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Policy Versus Law

• Difference between policy and law – Ignorance of policy is an acceptable defense

• Policies must be:– Distributed to all individuals who are expected

to comply with them– Readily available for employee reference– Easily understood, with multilingual, visually

impaired and low-literacy translations– Acknowledged by employee with consent form– Uniformly enforced for all employees

Management of Information Security, 3rd ed. 35

Page 36: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Ethics in Information Security

• The student of information security is not expected to study the topic of ethics in a vacuum, but within a larger ethical framework – Information security professionals may be

expected to be more articulate about the topic than others in the organization

• Often must withstand a higher degree of scrutiny

Management of Information Security, 3rd ed. 36

Page 37: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Ethics in Information Security (cont’d.)

• The Ten Commandments of Computer Ethics – From the Computer Ethics Institute– Thou shalt not:

• Use a computer to harm other people • Interfere with other people's computer work • Snoop around in other people's computer files • Use a computer to steal• Use a computer to bear false witness • Copy or use proprietary software for which you have

not paidManagement of Information Security, 3rd ed. 37

Page 38: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Ethics in Information Security (cont’d.)

• The Ten Commandments of Computer Ethics (cont’d.)– Thou shalt not: (cont’d.)

• Use other people's computer resources without authorization or proper compensation

• Appropriate other people's intellectual output

– Think about the social consequences of the program you are writing or the system you are designing

– Always use a computer in ways that ensure consideration and respect for fellow humans

Management of Information Security, 3rd ed. 38

Page 39: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Ethics and Education

• Differences in computer use ethics– Not exclusively cultural – Found among individuals within the same

country, within the same social class, and within the same company

• Key studies reveal that the overriding factor in leveling the ethical perceptions within a small population is education

• Employees must be trained on the expected behaviors of an ethical employee

Management of Information Security, 3rd ed. 39

Page 40: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Deterring Unethical and Illegal Behavior

• InfoSec personnel should do everything in their power to deter unethical and illegal acts– Using policy, education and training, and

technology as controls to protect information

• Categories of unethical behavior– Ignorance– Accident– Intent

Management of Information Security, 3rd ed. 40

Page 41: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Deterring Unethical and Illegal Behavior (cont’d.)

• Deterrence– Best method for preventing an illegal or

unethical activity– Examples: laws, policies, and technical

controls– Laws and policies and their associated

penalties only deter if three conditions are present:

• Fear of penalty• Probability of being caught• Probability of penalty being administered

Management of Information Security, 3rd ed. 41

Page 42: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Professional Organizations and their Codes of Ethics

• Some professional organizations have established codes of conduct and/or codes of ethics– Members are expected to follow – Codes of ethics can have a positive effect on

an individual’s judgment regarding computer use

Management of Information Security, 3rd ed. 42

Page 43: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Professional Organizations and their Codes of Ethics (cont’d.)

• Security professionals must act ethically– According to the policies and procedures of

their employers, their professional organizations, and the laws of society

Management of Information Security, 3rd ed. 43

Page 44: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Association of Computing Machinery

• A respected professional society– Originally established in 1947 as “the world's

first educational and scientific computing society”

– One of the few organizations that strongly promotes education and provides discounted membership for students

– Code of ethics requires members to perform their duties in a manner befitting an ethical computing professional

Management of Information Security, 3rd ed. 44

Page 45: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

International Information Systems Security Certification Consortium,

Inc. (ISC)2• Code of ethics applies to information

security professionals who have earned one of their certifications – Includes four mandatory canons:

• Protect society, the commonwealth, and the infrastructure

• Act honorably, honestly, justly, responsibly, and legally

• Provide diligent and competent service to principals• Advance and protect the profession

Management of Information Security, 3rd ed. 45

Page 46: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

System Administration, Networking, and Security Institute

(SANS)• Professional research and education

cooperative organization– Over 156,000 security professionals, auditors,

system and network administrators

• SANS GIAC code of ethics requires:– Respect for the public– Respect for the certification– Respect for my employer– Respect for myself

Management of Information Security, 3rd ed. 46

Page 47: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Information Systems Audit and Control Association (ISACA)

• A professional association with a focus on auditing, control, and security

• Membership comprises both technical and managerial professionals

• Has a code of ethics for its professionals

• Requires many of the same high standards for ethical performance as the other organizations and certifications

Management of Information Security, 3rd ed. 47

Page 48: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Information Systems Audit and Control Association (cont’d.)

• Code of ethics tenets– Support the implementation of, and encourage

compliance with, appropriate standards, procedures, and information systems controls

– Perform duties with objectivity, due diligence and professional care, using professional standards and best practices

– Serve in the interest of stakeholders in a lawful and honest manner, maintain high standards of conduct and character, and not engage in acts discreditable to the profession

Management of Information Security, 3rd ed. 48

Page 49: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Information Systems Audit and Control Association (cont.)

• Code of ethics tenets (cont’d.)– Maintain the privacy and confidentiality of

information obtained in the course of their duties

• Unless disclosure is required by legal authority• Such information shall not be used for personal

benefit or released to inappropriate parties

– Maintain competency in their respective fields, and agree to undertake only those activities that they can reasonably expect to complete with professional competence

Management of Information Security, 3rd ed. 49

Page 50: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Information Systems Audit and Control Association (cont’d.)

• Code of ethics tenets (cont’d.)– Inform appropriate parties of the results of

work performed, revealing all significant facts known to them

– Support the professional education of stakeholders in enhancing their understanding of information systems security and control

Management of Information Security, 3rd ed. 50

Page 51: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Information Systems Security Association

• Nonprofit society of information security professionals

• Mission is to bring together qualified practitioners of information security for information exchange and educational development

• Provides conferences, meetings, publications, and information resources to promote information security awareness and education

Management of Information Security, 3rd ed. 51

Page 52: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Information Systems Security Association (cont’d.)

• Promotes a code of ethics– Similar to that of other organizations– “Promoting management practices that will

ensure the confidentiality, integrity, and availability of organizational information resources.”

Management of Information Security, 3rd ed. 52

Page 53: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Organizational Liability and the Need for Counsel

• What if an organization does not support or encourage strong ethical conduct by its employees?

• What if an organization does not behave ethically?

• If an employee, acting with or without the authorization, performs an illegal or unethical act, causing some degree of harm, the organization can be held financially liable for that action

Management of Information Security, 3rd ed. 53

Page 54: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Organizational Liability and the Need for Counsel (cont’d.)

• An organization increases its liability if it refuses to take measures (due care) to make sure that every employee knows what is acceptable and what is not, and the consequences of illegal or unethical actions

• Due diligence requires that an organization make a valid and ongoing effort to protect others

Management of Information Security, 3rd ed. 54

Page 55: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Key Law Enforcement Agencies

• Federal Bureau of Investigation’s InfraGard Program – Promotes efforts to educate, train, inform, and

involve the business and public sector in information security

– Every FBI field office has established an InfraGard chapter and collaborates with public and private organizations and the academic community to share information about attacks, vulnerabilities, and threats

Management of Information Security, 3rd ed. 55

Page 56: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Key Law Enforcement Agencies (cont’d.)

• Federal Bureau of Investigation’s InfraGard Program (cont’d.)– InfraGard’s dominant contribution is the free

exchange of information to and from the private sector in the subject areas of threats and attacks on information resources

Management of Information Security, 3rd ed. 56

Page 57: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Key Law Enforcement Agencies (cont’d.)

• National Security Agency (NSA)– The nation's cryptologic organization– Coordinates, directs, and performs highly-

specialized activities to protect U.S. information systems and produce foreign intelligence information

– Responsible for signal intelligence and information system security

Management of Information Security, 3rd ed. 57

Page 58: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Key Law Enforcement Agencies (cont’d.)

• National Security Agency (cont’d.)– Information Assurance Directorate (IAD)

provides information security “solutions including the technologies, specifications and criteria, products, product configurations, tools, standards, operational doctrine, and support activities needed to implement the protect, detect and report, and respond elements of cyber defense.”

Management of Information Security, 3rd ed. 58

Page 59: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Key Law Enforcement Agencies (cont’d.)

• U.S. Secret Service is a department within the Department of the Treasury– In addition to its well-known mission to protect

key members of the U.S. government• Also charged with the detection and arrest of any

person committing a U.S. federal offense relating to computer fraud, as well as false identification crimes

• Department of Homeland Security– Formed when U.S. Secret Service was

transferred to it from the Department of the Treasury

Management of Information Security, 3rd ed. 59

Page 60: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Managing Investigations in the Organization

• When (not if) an organization finds itself dealing with a suspected policy or law violation– Must appoint an individual to investigate it – How the internal investigation proceeds

• Dictates whether or not the organization has the ability to take action against the perpetrator if in fact evidence is found that substantiates the charge

Management of Information Security, 3rd ed. 60

Page 61: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Managing Investigations in the Organization (cont’d.)

• In order to protect the organization, and to possibly assist law enforcement in the conduct of an investigation – The investigator (CISO, InfoSec Manager or

other appointed individual) must document what happened and how

Management of Information Security, 3rd ed. 61

Page 62: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Managing Investigations in the Organization (cont’d.)

• Forensics – The coherent application of methodical

investigatory techniques to present evidence of crimes in a court or court-like setting

• Digital forensics– The investigation of what happened and how– Involves the preservation, identification,

extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis

Management of Information Security, 3rd ed. 62

Page 63: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Managing Investigations in the Organization (cont’d.)

• Digital forensics (cont’d.)– Like traditional forensics, it follows clear, well-

defined methodologies, but still tends to be as much art as science

Management of Information Security, 3rd ed. 63

Page 64: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Managing Investigations in the Organization (cont’d.)

• Evidentiary material (EM)– Also called item of potential evidentiary value– Any information that could potentially support

the organizations legal- or policy-based case against a suspect

– An item does not become evidence until it is formally admitted to evidence by a judge or other ruling official

Management of Information Security, 3rd ed. 64

Page 65: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

• Digital forensics can be used for two key purposes:– Investigate allegations of digital malfeasance

• A crime against or using digital media, computer technology or related components

– Perform root cause analysis• If an incident occurs and the organization suspects

an attack was successful, digital forensics can be used to examine the path and methodology used to gain unauthorized access, as well as to determine how pervasive and successful the attack was

Management of Information Security, 3rd ed.

Managing Investigations in the Organization (cont’d.)

65

Page 66: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Managing Investigations in the Organization (cont’d.)

• Digital forensics approaches– Protect and forget (a.k.a. patch and proceed)

• Focuses on the defense of the data and the systems that house, use, and transmit it

– Apprehend and prosecute (a.k.a. pursue and prosecute)

• Focuses on the identification and apprehension of responsible individuals, with additional attention on the collection and preservation of potential EM that might support administrative or criminal prosecution

Management of Information Security, 3rd ed. 66

Page 67: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Affidavits and Search Warrants

• Investigations begin with an allegation or an indication of an incident

• Forensics team requests permission to examine digital media for potential EM

• An affidavit is sworn testimony– That the investigating officer has certain facts

they feel warrant the examination of specific items located at a specific place

Management of Information Security, 3rd ed. 67

Page 68: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Affidavits and Search Warrants (cont’d.)

• Search warrant– Permission to search for EM at the specified

location and/or to seize items to return to the investigator’s lab for examination

– Created when an approving authority signs the affidavit or creates a synopsis form based on it

Management of Information Security, 3rd ed. 68

Page 69: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Digital Forensics Methodology

• Steps in the digital forensics methodology1. Identify relevant items of evidentiary value

2. Acquire (seize) the evidence without alteration or damage

3. Take steps to assure that the evidence is at every step verifiably authentic and is unchanged from the time it was seized

4. Analyze the data without risking modification or unauthorized access

5. Report the findings to the proper authority

Management of Information Security, 3rd ed. 69

Page 70: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Management of Information Security, 3rd ed.

Digital Forensics Methodology

Figure 12-2: Digital forensics process

Source: Course Technology/Cengage Learning70

Page 71: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Evidentiary Procedures

• Organizations should develop specific procedures and guidance for their use– Who may conduct an investigation– Who may authorize an investigation– What affidavit-related documents are required– What search warrant-related documents are

required– What digital media may be seized or taken

offline

Management of Information Security, 3rd ed. 71

Page 72: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Evidentiary Procedures (cont’d.)

• Organizations should develop specific procedures and guidance for their use (cont’d.)– What methodology should be followed– What methods are required for chain of

custody or chain of evidence– What format the final report should take, and

to whom it should it be given

Management of Information Security, 3rd ed. 72

Page 73: MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he

Summary

• Introduction

• Law and ethics in information security

• The legal environment

• Ethical concepts in information security

• Professional organizations’ codes of ethics

• Organizational liability and the need for counsel

• Key U.S. Federal agencies

• Managing investigations in the organizationManagement of Information Security, 3rd ed. 73