CS 208: Computer Science Fundamentals Class 8

Slides:



Advertisements
Similar presentations
Ethics in Information Technology, Fourth Edition
Advertisements

HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
Chapter 4 Privacy.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Lecture 1: Overview modified from slides of Lawrie Brown.
The Islamic University of Gaza
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Ethics in Information Technology, Second Edition
1 Software Testing and Quality Assurance Lecture 37– SWE 205 Course Objective: Learn about ethical issues of software engineering.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Introduction (Pendahuluan)  Information Security.
Per Anders Eriksson
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Professional Ethics in Information Technology By: Romel L. Emperado
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Computer Programming I
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Chapter 2 - Ethics for IT Professionals and IT Users1 Ethics for IT Professionals and IT Users 2 Chapter.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Chapter 4: Laws, Regulations, and Compliance
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Network Security Overview
Ethics in Information Technology, Second Edition 1.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Privacy and the Law.
Add video notes to lecture
COMPUTER SECURITY CONCEPTS
Ethics in Information Technology
Computer and Network Security
Computer Programming I
INFS 452 – Computer Ethics & Society
Introduction to Cryptography
Definition Of Computer Security
Presentation transcript:

CS 208: Computer Science Fundamentals Class 8 Dr. Jesús Borrego Regis University

Agenda Homework 6 Security Privacy Ethics Final Exam

Homework 6 Questions?

Security Defined The NIST Computer Security Handbook defines computer security as: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).

System Security Overview Three main components of security: Confidentiality – protect information so it does not fall into wrong hands Integrity – information modification done through authorized means Availability – authorized users have access to required information (for legitimate purposes) IT security professionals refer to this as the CIA Triad

CIA Triad Confidentiality Integrity Availability Information kept must be available only to authorized individuals Unauthorized changes must be prevented Integrity Confidentiality Information Security Availability Authorized users must have access to their information for legitimate purposes Note: From “Information Security Illuminated”(p.3), by Solomon and Chapple, 2005, Sudbury, MA: Jones and Bartlett.

Threats Disclosure Alteration Confidentiality Integrity Availability Information Security Availability Denial Note: From “Information Security Illuminated”(p.5), by Solomon and Chapple, 2005, Sudbury, MA: Jones and Bartlett.

Security Threats Hackers Trojan Horses Viruses, worms Denial of Service Disgruntled Employees Unauthorized Access Security Awareness Social Engineering Other?

Source: Reynolds, George W. (2010). Ethics in information technology Source: Reynolds, George W. (2010). Ethics in information technology. (4th edition) Cengage Learning.

Security Key Objectives Confidentiality Data confidentiality assures that private or confidential information is not made available or disclosed to unauthorized individuals Privacy assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

Security Key Objectives (Cont’d) Integrity Data integrity assures that information and programs are changed only in a specified and authorized manner System integrity assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system Availability assures that systems work promptly and service is not denied to authorized users

Security Additional Concepts Two further concepts are often added to the core of computer security: Authenticity Accountability

Authenticity The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator Verifying that users are who they say they are and that each input arriving at the system came from a trusted source

Accountability The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity We must be able to trace a security breach to a responsible party Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes

Threats Examples From: Stallings, W. (2012). Operating Systems: Internals and design principles (7th ed.). Upper Saddle River, NJ: Pearson Education.

Passive Attacks Attempts to learn or make use of information from the system but does not affect system resources Are in the nature of eavesdropping on, or monitoring of, transmissions Goal of the attacker is to obtain information that is being transmitted Difficult to detect - do not involve alteration of the data is feasible to prevent the success of these attacks by means of encryption Emphasis in dealing with passive attacks is on prevention rather than detection

Active Attacks Replay Masquerade Modification of messages Modification of the data or creation of a false stream. Four Categories Replay involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect Masquerade takes place when one entity pretends to be a different entity Modification of messages some portion of a legitimate message is altered, or that messages are delayed or reordered, to produce an unauthorized effect Denial of service prevents or inhibits the normal use or management of communications facilities disruption of an entire network either by disabling the network or by overloading it with messages so as to degrade performance

Terminology of Malicious Programs From: Stallings, W. (2012). Operating Systems: Internals and design principles (7th ed.). Upper Saddle River, NJ: Pearson Education.

Relationships Between IT Workers and Society Society expects members of a profession: To provide significant benefits To not cause harm through their actions Actions of an IT worker can affect society Professional organizations provide codes of ethics to guide IT workers’ actions

Professional Codes of Ethics State the principles and core values that are essential to the work of an occupational group Most codes of ethics include: What the organization aspires to become Rules and principles by which members of the organization are expected to abide Many codes also include commitment to continuing education for those who practice the profession

Professional Codes of Ethics (cont’d.) Following a professional code of ethics can produce benefits for the individual, the profession, and society as a whole Ethical decision making High standards of practice and ethical behavior Trust and respect from general public Evaluation benchmark for self-assessment

Professional Organizations No universal code of ethics for IT professionals No single, formal organization of IT professionals has emerged as preeminent Five of the most prominent organizations include: Association for Computing Machinery (ACM) Institute of Electrical and Electronics Engineers Computer Society (IEEE-CS) Association of IT Professionals (AITP) SysAdmin, Audit, Network, Security (SANS) Institute

Certification Indicates that a professional possesses a particular set of skills, knowledge, or abilities in the opinion of the certifying organization Can also apply to products Generally voluntary May or may not require adherence to a code of ethics Employers view as benchmark of knowledge Opinions are divided on value of certification

Certification (cont’d.) Vendor certifications Some certifications substantially improve IT workers’ salaries and career prospects Relevant for narrowly defined roles or certain aspects of broader roles Require passing a written exam, or in some cases, a hands-on lab to demonstrate skills and knowledge Can take years to obtain necessary experience Training can be expensive

IT Professional Malpractice Negligence: not doing something that a reasonable person would do, or doing something that a reasonable person would not do Duty of care: obligation to protect people against any unreasonable harm or risk Reasonable person standard Reasonable professional standard Professional malpractice: professionals who breach the duty of care are liable for injuries that their negligence causes

Common Ethical Issues for IT Users Software piracy Inappropriate use of computing resources Erodes productivity and wastes time Could lead to lawsuits Inappropriate sharing of information, including: Every organization stores vast amounts of private or confidential data Private data (employees and customers) Confidential information (company and operations)

Compliance To be in accordance with established policies, guidelines, specifications, and legislation Sarbanes-Oxley – established requirements for internal controls HIPAA – ensures security and privacy of employee healthcare data Failure to be in conformance can lead to criminal or civil penalties and also lawsuits

Compliance (cont’d.) Audit committee is subset of the board of directors, with oversight for the following activities: Quality and integrity of accounting and reporting practices and controls Compliance with legal and regulatory requirements Qualifications, independence, and performance of organization’s independent auditor Performance of company’s internal audit team

Compliance (cont’d.) Internal audit committee responsibilities: Determine that internal systems and controls are adequate and effective Verify existence of company assets and maintain proper safeguards over their protection Measure the organization’s compliance with its own policies and procedures Insure that institutional policies and procedures, appropriate laws, and good practices are followed Evaluate adequacy and reliability of information available for management decision making

Privacy Laws, Applications, and Court Rulings Financial data Gramm-Leach-Bliley Act (1999) Bank deregulation that enabled institutions to offer investment, commercial banking, and insurance services Three key rules affecting personal privacy Financial Privacy Rule Safeguards Rule Pretexting Rule

Privacy Laws, Applications, and Court Rulings (cont’d.) Opt-out policy Assumes that consumers approve of companies collecting and storing their personal information Requires consumers to actively opt out Favored by data collectors Opt-in policy Must obtain specific permission from consumers before collecting any data Favored by consumers

Privacy Laws, Applications, and Court Rulings (cont’d.) Health information Health Insurance Portability and Accountability Act (1996) Improves the portability and continuity of health insurance coverage Reduces fraud, waste, and abuse Simplifies the administration of health insurance American Recovery and Reinvestment Act (2009) Included strong privacy provisions for electronic health records Offers protection for victims of data breaches

Privacy Laws, Applications, and Court Rulings (cont’d.) State laws related to security breach notification Over 40 states have enacted legislation requiring organizations to disclose security breaches For some states, these laws are quite stringent

Privacy Laws, Applications, and Court Rulings Children’s personal data Children’s Online Privacy Protection Act (1998) Web sites catering to children must offer comprehensive privacy policies, notify parents or guardians about its data-collection practices, and receive parental consent before collecting personal information from children under 13 Family Education Rights and Privacy Act (1974) Assigns rights to parents regarding their children’s education records Rights transfer to student once student becomes 18

Privacy Laws, Applications, and Court Rulings (cont’d.) Electronic surveillance Communications Act of 1934 Established the Federal Communications Commission Regulates all non-federal-government use of radio and television plus all interstate communications Title III of the Omnibus Crime Control and Safe Streets Act (Wiretap Act) Regulates interception of telephone and oral communications Has been amended by new laws

Privacy Laws, Applications, and Court Rulings (cont’d.) Electronic surveillance (cont’d.) Foreign Intelligence Surveillance Act (FISA) of 1978 Describes procedures for electronic surveillance and collection of foreign intelligence information in communications between foreign powers and agents of foreign powers

Privacy Laws, Applications, and Court Rulings (cont’d.) Electronic surveillance (cont’d.) Electronic Communications Privacy Act of 1986 (ECPA) Protects communications in transfer from sender to receiver Protects communications held in electronic storage Prohibits recording dialing, routing, addressing, and signaling information without a search warrant Pen register records electronic impulses to identify numbers dialed for outgoing calls Trap and trace records originating number of incoming calls

Privacy Laws, Applications, and Court Rulings (cont’d.) Electronic surveillance (cont’d.) Communications Assistance for Law Enforcement Act (CALEA) 1994 Amended both the Wiretap Act and ECPA Required the telecommunications industry to build tools into its products so federal investigators could eavesdrop and intercept electronic communications Covered emerging technologies, such as: Wireless modems Radio-based electronic mail Cellular data networks

Privacy Laws, Applications, and Court Rulings (cont’d.) Electronic surveillance (cont’d.) USA PATRIOT Act (2001) Increased ability of law enforcement agencies to search telephone, email, medical, financial, and other records Critics argue law removed many checks and balances that ensured law enforcement did not abuse its powers Relaxed requirements for National Security Letters (NSLs)

Privacy Laws, Applications, and Court Rulings (cont’d.) Export of personal data Organisation for Economic Co-operation and Development Fair Information Practices (1980) Fair Information Practices Set of eight principles Model of ethical treatment of consumer data

Privacy Laws, Applications, and Court Rulings (cont’d.) Export of personal data (cont’d.) European Union Data Protection Directive Requires companies doing business within the borders of 15 European nations to implement a set of privacy directives on the fair and appropriate use of information Goal to ensure data transferred to non-European countries is protected Based on set of seven principles for data privacy Concern that U.S. government can invoke USA PATRIOT Act to access data

Privacy Laws, Applications, and Court Rulings (cont’d.) BBBOnLine and TRUSTe Independent initiatives that favor an industry- regulated approach to data privacy BBBOnLine reliability seal or a TRUSTe data privacy seal demonstrates that Web site adheres to high level of data privacy Seals Increase consumer confidence in site Help users make more informed decisions about whether to release personal information

Privacy Laws, Applications, and Court Rulings (cont’d.) Access to government records Freedom of Information Act (1966 amended 1974) Grants citizens the right to access certain information and records of the federal government upon request Exemptions bar disclosure of information that could: Compromise national security Interfere with active law enforcement investigation Invade someone’s privacy

Privacy Laws, Applications, and Court Rulings (cont’d.) Access to government records (cont’d.) The Privacy Act of 1974 Prohibits government agencies from concealing the existence of any personal data record-keeping system Outlines 12 requirements that each record-keeping agency must meet CIA and law enforcement agencies are excluded from this act Does not cover actions of private industry

Key Privacy and Anonymity Issues Identity theft Electronic discovery Consumer profiling Treating customer data responsibly Workplace monitoring Advanced surveillance technology

Identity Theft Theft of key pieces of personal information to impersonate a person, including: Name Address Date of birth Social Security number Passport number Driver’s license number Mother’s maiden name

Identity Theft (cont’d.) Fastest-growing form of fraud in the United States Consumers and organizations are becoming more vigilant and proactive in fighting identity theft Four approaches used by identity thieves Create a data breach Purchase personal data Use phishing to entice users to give up data Install spyware to capture keystrokes of victims

Identity Theft (cont’d.) Data breaches of large databases To gain personal identity information May be caused by: Hackers Failure to follow proper security procedures Purchase of personal data Black market for: Credit card numbers in bulk—$.40 each Logon name and PIN for bank account—$10 Identity information—including DOB, address, SSN, and telephone number—$1 to $15

Identity Theft (cont’d.) Phishing Stealing personal identity data by tricking users into entering information on a counterfeit Web site Spyware Keystroke-logging software Enables the capture of: Account usernames Passwords Credit card numbers Other sensitive information Operates even if infected computer is not online

Identity Theft (cont’d.) Identity Theft and Assumption Deterrence Act of 1998 was passed to fight fraud Identity Theft Monitoring Services Monitor the three major credit reporting agencies (TransUnion, Equifax, and Experian) Monitor additional databases (financial institutions, utilities, and DMV)

Security, Privacy, Ethics Questions?

Final Exam Due midnight Monday