Policy, Regulation, and Ethics: Chapter Thirteen Prepared By: Raval, Fichadia
Policy, Regulation, and Ethics: Chapter Thirteen Prepared By: Raval, Fichadia
Policy, Regulation, and Ethics: Chapter Thirteen Prepared By: Raval, Fichadia
begins with
Organization and
accountability
nurtures
and concerns
implementation of
compliance with
helps prevent/limit
strengthens
Social engineering
Chapter Thirteen Objectives
1. Understand basic concepts of security administration.
Purpose Narrates why this policy is written and how it will benefit the organization.
Policy This is the core of policy – the statement(s) that describe the policy.
Definitions If the policy includes certain terms, these are defined in this area. This allows for a very
specific interpretation of the policy, irrespective of how these terms are used in the
profession.
Responsibilities Identifies who is responsible for enforcement of the policy. If more than one party is
responsible, a clear identification of responsibility of each party with respect to the policy
enforcement should be included.
Administration and Identifies who is responsible to answer questions regarding this policy, to maintain
interpretations records regarding the policy issues and how they were resolved, and to document
violations of the policy and their resoluton.
Amendments/Termination of This part states that (1) the organization reserves the right to modify, amend or terminate
the policy the policy at any time and (2) the policy does not constitute a contract between the
organization and its employees.
Exceptions Here, the policy identifies how to request an exception to the policy, what information
should the request provide, and to whom it should be addressed. Typically, all exception
requests are handled in accordance with an information security exception policy.
Violations/Enforcement Specifies where to report any know violations of the policy, and what consequences could
result from such violations. For example, consequences may result in immediate
suspension of user privileges, a disciplinary action, or reporting the case to appropriate
law enforcement agencies.
Classification of Policies
Various alternative classifications are
possible.
Information security policies may be
categorized:
Using components of an information system.
In terms of physical security and logical security.
As system specific or issue specific.
Policy Development Process
The process must mirror risk management processes.
Identify critical information systems processes and
assets.
Understand what risks each information asset faces.
Identify the asset’s vulnerabilities and anticipate types of
threat the asset might be subject to.
Identify control and security measures to protect the
information asset.
Develop a policy that provide cost effective protection
measures.
Periodically, review the policy in light of changes in the
organization and its environment.
Regulatory Requirements
Regulations exist in the area of information assets
protection, and must be met.
Such regulations typically define the threshold
needs to protect information assets.
Compliance of such requirements provides an
assurance that the entity is meeting needs for
protection of information assets at the levels
required by law.
At the same time, compliance helps the entity
protect its information assets and prosecute those
who compromise the security.
Regulatory Requirements and
Security Objectives
Information assets protection
Authentication
Integrity of logic
Integrity of communication
Confidentiality and privacy
System availability
Computer crimes
Table 13.3. Objectives, vulnerabilities, and regulation
System availability Connection flooding Computer Fraud and Abuse Act (1984, 1986, 1996)
Denial of Service (DNS) attack
Distributed Denial of Service
Ethical Behavior in
Organizations
Ethics: The principles of conduct individuals
and groups use in making and implementing
choices.
Principles of moral conduct are the
foundation for ethical behavior.
Ethical behavior may have implications for
information security.
Frameworks for Ethical
Behavior
A framework is used to determine and evaluate the
ethical dimension of a choice.
Several frameworks have been proposed.
Ethical relativism suggests that ethics is something
a person decides. What is right or wrong is relative
to one’s society.
Utilitarianism argues that what makes an action right
or wrong is outside the action itself; it is determined
by the consequences of the action.
Deontological theories emphasize the internal
character of the act itself. If an action is done from a
sense of duty, then the action is right.
Individuals play many roles in their lives:
The commitments of private life.
The commitments of employee.
The commitments as a (business) leader.
Responsibilities beyond employer’s boundaries.
Differentiating between roles allows one to define
duty more responsibly and in alignment with what
one can do.
There may exist conflicts within each role and
between roles.
Business Ethics
An organization is a group of individuals with shared
values and goals.
Business as an organization should deserve its
place within the society.
Organizational legitimacy is a result of the degree of
congruence between social values associated with or
implied by the firm’s activities and the norms of acceptable
behavior in the larger social system to which they belong.
Individuals as employees should ask questions
concerning consequences of an action, serving
others’ rights, consistency of decisions with basic
values, and feasibility of their actions in the world as
it is.
Ethics and Information
Technology
Old wine in a new bottle?
Argument supporting this notion: No new issues have
surfaced due to the presence of computers.
Argument opposing this notion: Information technology
has created an environment that is quite different and
hence, the dilemmas are different.
An examination of roles of computers makes it easier to
understnd ethics in the context of information technology.
Four possible roles of computers in a man-machine
system
Four Roles of Information
Technology
Nonuse
Discretionary role: Since computer is used at the
discretion of the user, the user controls the ethical
dimension of use (or nonuse), if any.
Facilitation role: In this role, computer makes the
compromise of ethics much easier, but the
fundamental ethical dilemma is the same.
Intrinsic role: Computer is at the core of the
situation. No comparable situation would exist
without the presence of the computer.
New dilemmas that need to be addressed using existing
frameworks.
Social Engineering
Definition: The art and science of getting
people to cooperate in the process of
achieving your own goals. People hacking.
Threats:
To build and maintain sound security systems,
social dimension – the human side – must also be
considered. Attacks on people are easier, require
very little technology, and can be planned and
implemented quickly.
Countermeasures
Signs of a Social Engineering
Attack
The attacker refuses to give contact information.
The attacker shows signs of urgency and rushes
through the process of communication after
establishing an initial rapport.
To suggest familiarity and influence, the attacker
resorts to name-dropping.
There is a likelihood that if necessary, the attacker
would resort to intimidate the prospective informant.
Minor errors in the attacker’s communication are
common, for example, inserting an odd question into
the communication.
Typically, the attack includes a request for forbidden
information.
Social Engineering:
Countermeasures
1. Develop a comprehensive security policy, and revise when
necessary. The security policy should be effectively communicated
to employees, and enforced throughout the organization.
begins with
Organization and
accountability
nurtures
and concerns
implementation of
compliance with
helps prevent/limit
strengthens
Social engineering