6/23/2015 10:43 PM Lecture 13: Evaluation James Hook CS 591: Introduction to Computer Security.

Slides:



Advertisements
Similar presentations
Nick Feamster Research: Network security and operations Teaching CS 7260 in Spring 2007 CS 7001 Mini-projects: –
Advertisements

A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
5/1/2015 1:53 AM Lecture 11: Assurance & Evaluation James Hook CS 591: Introduction to Computer Security.
The PATRIOT Act, Technology and Records Privacy David L. Sobel General Counsel Electronic Privacy Information Center ECURE 2004 Arizona.
The Patriot ACt. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.
Happy Monday SCREENMY DESK “Theme Song from the Movie The Patriot *CELL PHONES OFF OR ON SILENT, AND IN YOUR BACKPACK, WHICH SHOULD BE PLACED.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
ARREST, SEARCH & SEIZURE
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Government Access To Private Databases By Kathleen Isley and John D’Alessandro.
6/15/2015 3:39 PM Lecture 6: Identity and Data Mining James Hook (Some material from Bishop, 2004) CS 591: Introduction to Computer Security.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
6/30/2015 5:58 PM Lecture 3: Policy James Hook CS 591: Introduction to Computer Security.
Privacy & Personal Information -- Why do we care or do we?
Fourth Amendment Assignment. Amendment 4: Right to Search and Seizure The right of the people to be secure in their persons, houses, papers, and effects,
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
Lisa Morales CIS * Online and offline purchase data * Supermarket savings cards * White pages * Surveys * Sweepstakes and contest entries *
Intelligent Systems Lecture 23 Introduction to Intelligent Data Analysis (IDA). Example of system for Data Analyzing based on neural networks.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
By Marta Telatin and Andrew Koennig 4 TH AMENDMENT.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Privacy. Position A university should NOT be allowed to monitor university network and connected computers for improper activity.
Lecture 7: Requirements Engineering
Lecture 2 Applications of Propositional Logic. Translating English into Logic " The right of the people to be secure in their persons, houses, papers,
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
The Fourth Amendment and the Home By Laura Zajac.
The Fourth Amendment, Technology, and a Right to Privacy
A student’s rights to privacy and freedom of speech in a school setting.  Objective:  Students will describe student rights and constitutional issues.
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
By, Kris Coles Eva Ortega Christina Torres. Veronia School District v. Acton First court case to go to Supreme Court, were the school district demand.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Getting Ready for the NOCTI test April 30, Study checklist #1 Analyze Programming Problems and Flowchart Solutions Study Checklist.
CS154 Formal Languages and Computability Thaddeus Aid Department of Computer Science San Jose State University Spring 2016 Creative Commons Attribution-ShareAlike.
Privacy and the Law.
Limiting the Right of Search
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Matthew Christian Dave Maddox Tim Toennies
Grab a book off the shelf and look it up. (Article V)
Forensics Week 7.
Chapter 14 Searches and Seizures
The Fourth Amendment and the Home
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment.
E-Commerce and Economic Forces
4th amendment By: KEila Aguilar.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
Computer Security Social Legal and Ethical issues
IA455 Chris Danieli and Zachary gibson
How does this Constitutional amendment protect Americans?
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

6/23/ :43 PM Lecture 13: Evaluation James Hook CS 591: Introduction to Computer Security

6/23/ :43 PM Evaluation lohi assure-o-meter

6/23/ :43 PM Evaluation Context: –DoD identifies computer security as important in ‘70s (Anderson 1972) –Recognizes trend toward networking: computing is communication –Economic forces dictate they purchase products built outside of the DoD –Need: Procurement guidelines for DoD to purchase security critical software

6/23/ :43 PM First Step James Anderson’s “Computer Security Planning Study” provides a blueprint Needs analysis: –Multi-level operation –Systems connected to the world –On-line operation –Networks Vision –Security engineering –Secure components (hardware & software) –Handbook of Computer Security Techniques

6/23/ :43 PM Issues How to accelerate maturation of a discipline? Desire: codify best practices What if current practice is insufficient? –Legislate what we think best practices should be! Sullivan and R Anderson present two perspectives on the result –“Orange Book” over promised for formal methods –Organizations failed to deliver most trusted products Good engineers thought they weren’t solving the real problems –Common Criteria attempt to avoid some Orange Book faults Still: some science, some science fiction (EAL 6 and 7) –Can post-hoc analysis ever work?

6/23/ :43 PM Bishop/Sullivan Chapter 18

6/23/ :43 PM Follow up NIST: National Institute of Standards –Founded to make fire fighting equipment interoperable across municipal boundaries –Now tasked with standards that support commerce NSA: National Security Agency –Signals Intelligence –Protect all sensitive information for DoD –Make the Internet safe for commerce (expanded interpretation of mission in last decade)

6/23/ :43 PM NIST and NSA Both agencies are involved in CC and Crypto certification NIST is the agency designated with to evaluated Engineering Assurance Levels and FIPS crypto NSA is the agency designated to evaluate EAL 6 and 7 and DoD crypto

6/23/ :43 PM NSA’s Crypto levels Type 1: Used for classified information. Tamper resistant. No tempest radiation. Uses NSA certified algorithms. Type 2: NSA endorsed for telecommunications. Not for classified data. Government proprietary algorithms. Type 3: NIST certified FIPS crypto Type 4: Registered with NIST but not certified

6/23/ :43 PM Aside: Data Mining, Security, and Privacy In the news last Winter and Spring: –NSA monitoring content outside of FISA (NY Times article) –NSA collecting massive amounts of call data (USA Today article last week)

6/23/ :43 PM References Gary M. Weiss (2005). Data Mining in. In O. Maimon and L. Rokach(eds.), Data Mining and Knowledge Discovery Handbook: A Complete Guide for Practitioners and Researchers, Kluwer Academic Publishers, Data Mining in Corinna Cortes, Daryl Pregibon and Chris Volinsky, "Communities of Interest'', The Fourth International Symposium of Intelligent Data Analysis (IDA 2001), –

6/23/ :43 PM US Constitution Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

6/23/ :43 PM Credit Card Fraud detection Credit Card companies have done nearly real- time analysis of card usage Anomalies are flagged; card holder is contacted Customers have come to expect this service –It is considered a protection and an added value Discuss: –Abuse potential –Does government have a role? Why or why not?

6/23/ :43 PM Telephone Phone companies have collected “call detail data” for a long time Analyze data to build customer profiles One useful technique is the “Community of interest” –Top k callers in period of study (k is usually 9) –Can define a metric on communities –Tends to provide a good surrogate for identity (“Record Linkage Using COI-based matching”)

6/23/ :43 PM Telephone fraud detection Historically, COI-based matching is used to detect a deadbeat customer who has assumed a new network identity Is this a legitimate business use? Is there a potential privacy issue? Discuss potential abuses

6/23/ :43 PM NY Times Story Revealed content of international phone calls between “persons of interest” were monitored outside of FISA –What not use FISA? –What if identity is a surrogate, not a name?

6/23/ :43 PM USA Today Story Several telephone companies providing call detail data to NSA “Largest database ever” Asserts no content being monitored Discussion/Conjecture: –What if they are calculating COI? Or COI-like data? –Could this serve as the source of the “surrogate identities” used for non-FISA wiretaps –If it is reasonable for business to use this technology for fraud detection is it reasonable for the government to exploit it as well? –What other personal information could be obtained from this data?