|   | NIA #17 - Computer Crime: Computer Security TechniNOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
 ???????????????????? ????????????????????????????????? ????????????????????
 ?   Founded By:    ? ?  Network Information Access   ? ?   Founded By:    ?
 ? Guardian Of Time ???            12APR90            ??? Guardian Of Time ?
 ?   Judge Dredd    ? ?       Guardian Of Time        ? ?   Judge Dredd    ?
 ???????????????????? ?            File 17            ? ????????????????????
 ?           ?????????????????????????????????           ?
 ?    ?????????????????????????????????????????????????  ?
 ?????? COMPUTER CRIME: COMPUTER SECURITY TECHNIQUES  ????
 ?           Section I -- Introduction           ?
 ?????????????????????????????????????????????????
 
 Forward:
 
 There will be at least ten files on the subject of Computer Crime, I have
 tried to get people to show us just what we can,  the ideas that are being
 taught to managers, are simple, and crude.  You have seen in the first few
 files of NIA, just HOW SIMPLE are the techniques? Well here in this
 section will be a Governmental view of Computer Crime.
 
 Guardian Of Time
 
 $_SECTION I -- INTRODUCTION
 
 The "Dawn of the Age of Aquarius" has also ushered in the "Age of the
 Computer." It is no secret that computers have become indispensable to
 almost every form of modern business and government.  The rapid expansion
 of computer use has created an electronic marketplace where goods and
 intellectual products are transferred and paid for entirely by electronic
 means.  Computers have also created a new method of storage and
 representation of assets through electronic data processing systems that
 record everything from bank balances to shares of securities.  The use of
 computers has even advanced to the stage where electronic signatures can
 be given unique characteristics making them more easily identifiable and
 reliable than human handwriting in many respects.
 
 The new form of assets consists of pulses of electricity, states of
 electronic circuits, and patterns of magnetic areas on tape and disks.
 The pulses can be converted to the form of checks by a computer printer or
 to monetary currency by computer-printed reports that authorize cashiers
 to transfer cash from boxes to people or to other boxes.  The pulses can
 also be converted to printed reports or mechanical functions that cause
 actions either manually or automatically involving goods and services.
 These negotiable assets, as well as personal information, now are stored
 as data in computers, saved on magnetic tape and disks, and sent through
 wires and microwave carriers in electronic, electromagnetic wave, and
 magnetic forms.
 
 The creation of these new forms of assets, however, has been accompanied by
 an increase in the potential for misuse of computers and computer data.
 Some of the people who create and work with computer products have the
 capability to alter or delete assets stored in computers or to create
 totally new assets.  The security of these assets, as well as other data
 stored in computers, is vital.  In this document, computer security
 encompasses the integrity, preservation, authorized use, and
 confidentiality of data starting with its generation, through its entry
 into computers, automatic and manual processing, output, storage, and
 finally its use.
 
 One of the primary motives for computer security is protection from
 intentionally caused loss.  Computer crime is highly publicized and its
 nature frequently distorted in the news media.  Although there are no
 valid representative statistics on frequency or loss, enough loss
 experience has been documented (more than 1000 reported cases since 1958)
 and even more conjectured to make it clear that computer crime is a
 growing and serious problem.  Broadly defined, known experience indicates
 a high incidence of false data entry during manual data handling before
 computer entry.  Most losses of this kind are small, but several large
 losses of $10 to $20 million have occurred.  Unauthorized use of computer
 services has also prolifereated, especially with increasing use of dial-up
 telephone access to computers.  A few sophisticated programmed frauds
 inside computer systems or using them as tools for frauds have been found
 where detection was mostly accidental.  Reported computer crime is
 committed mostly by people in positions of trust with special skills,
 knowledge and access.  The results of known experience indicate the need
 for a wide range of basic controls that reduce the likelihood of violation
 of trust by these people.  Many of these controls that reduce the
 likelihood of violation of trust by these people.  Many of these controls
 are represented in this report.
 
 $_RELIANCE ON COMPUTERS REQUIRES COMPUTER SECURITY
 
 Although computer security has always been needed, even before computers,
 interest in it became widespread only after computers came into use,
 especially for processing financial and personal data.  Computers
 facilitate the great concentration of data for powerful means of
 processing, and for the first time since the days of manual data
 processing computers, provide an opportunity to apply computer security in
 effective, uniform, and low-cost ways.  At the same time computer use
 increases the dangers of large losses from the conentration of intangible
 assets in electronic forms and changes the nature of exposures to losses
 with assets in these new forms.
 
 Use of computers changes the patterns and degree of trust put in people
 who work with data.  New occupations staffed by fewer, technology oriented
 people, each with greater capacity to do good or harm using computers as
 tools have emerged.  There is now one computer terminal for every three
 white-coller workers.
 
 Computers remove processing and storing of data in their electronic form
 from direct human observation.  Thus, computer programs that direct the
 processing of data whose integrity and correctness must be assured are
 necessary tools to see the results of data processing and check the
 correctness of data stored in computer media.  The procedures by which
 data are processed and stored are created by programmers at a different
 time and place than when the actual processing occurs.  Processing takes
 place so rapidly as to be incomprehensible to humans until it is complete,
 and intervention is impossible except in preprogrammed ways that where
 developed without the possibility of foreseeing all future conditions and
 needs.
 
 Organizations that use or provide computer services for governmental and
 business purposes have a responsibility to the users, data subjects,
 managers and employees, as well as society, to assure computer security in
 legal, economic, and ethical terms to avoid loss to themselves and others.
 Thus, contractual commitments that specify trade secret protection of
 commercial computer program and data file products require that users of
 the products apply safeguards.  Top management, of course, wants to
 continue the success of their organizations and avoid data-related losses.
 Data processing employees abide by the computer security policies and
 procedures to please management and receive advancements in their jobs.
 Society demands responsible treatment of data, the US government, for
 example, has attempted to obtain voluntary adherence by business to the
 Organization for Economic Cooperation and Development Guidelines on
 Protection of Privacy and Transborder Flows of Personal Data.  In
 addition, professional societies and trade associations apply peer
 pressure to meet ethical standards.
 
 Data-related losses from errors, omissions, bad judgment, intentional
 acts, and natural events motivate the victims to avoid further loss.  Some
 controls on loss result in more efficient data handling, reduced insurance
 premiums, and lower costs.  Compliance with laws and regulation such as the
 Privacy Act of 1974, Foreign Corrupt Practices Act, criminal statutes, and
 the US Office of Management and Budget Circular A-71 on Computer Security
 is required for an orderly society.
 
 All of these factors and more must be taken into account in planning and
 establishing computer security.  Dangers lurk not where losses have been
 anticipated and good controls exist but where vulnerablities have NOT been
 anticipated and controls are lacking.  Systematic methods are needed to
 assure completeness of safeguarding with limited resources that can
 resonably be devoted to protection in the complex and changed environments
 of data processing brought about by the use of computers.
 
 $_COMMITMENT TO COMPUTER SECURITY
 
 Management is eager to allocate resources that directly increase the
 productivity of their organizations.  Security seldom adds directly to
 productivity; it only assures protection from loss of productivity and
 avoids violation of rights, laws and regulations.  Therefore, security
 might have occurred.  If security is effective, it usually goes unnoticed
 because loss is averted.  Otherwise, security is sometimes seen as costing
 money without visible, direct contributions to performance.  This makes
 security expenditures particularly important to justify and understand.
 
 Fortunately, enlightened management will react rationally to assure
 security in their organizations when given resonable options and adequate
 justification for doing so.  Employees will support and carry out security
 when they understand its purpose, receive clear directives, understand
 that it is part of their job performance, and are judged on their
 adherence to secure practices.  Therefore, recommendations for
 cost-effective controls must be properly justified and generally accepted.
 
 Methods for conducting security reviews based on risk assessment to
 determine vulnerabilities and identify needed controls have been developed
 and used to some extent.  However, many controls are still selected on a
 piecemeal basis when individual needs become evident without comprehensive
 review of all needs.  This leads to inconsistent security buildup that
 leaves serious vulnerabilities and gaps.  Security must be mesasured by
 the weakest links; losses occur where adequate controls are lacking.
 Therefore, methods of review must be developed that are comprehensive as
 well as sufficiently practical and low in cost to attract their use.
 
 Data processing and computer security have advanced rapidly to the point
 where organizations today do not take action in isolation from what other
 organizations are doing.  Many organizations have adopted the solutions to
 common vulnerability problems developed by others.  Applying generally
 used security practices and controls is attractive where the problems and
 needs are similar among many organizations.
 
 $_CONTRIBUTION OF THIS REPORT TO COMPUTER SECURITY
 
 The study results reported in this document are meant to add materially to
 new concepts in computer security.  The computer security practices and
 controls presented here are those used or endorsed by seven organizations
 that are particularly advanced in their computer security.  In addition,
 the organizations were chosen from among those heavily involved in
 manipulating personal data to emphasize the application of security to
 issues of privacy.  Thus, several of the organizations are processors of
 crimminal justice data and one is a processor of life and medical
 insurance.  The seven participating field site organizations are:
 
 (1)     A state law enforcement data center
 (2)     A county EDP services department
 (3)     A city data services bureau
 (4)     A research institute specializing in criminal justice research
 (5)     A life and casualty insurance company
 (6)     A center for political studies, which does extensive research on
 sensitive topics linked to individuals
 (7)     A state information services department.
 
 A project team of experienced computer security consultants examined the
 seven field site organizations to determine the best controls and
 practices in use, as well as the methods of review and selection of
 controls and practices that organizations use.  This document describes
 the 82 controls and practices that were judged as generally acceptable for
 good computer security by computer security administrators from all seven
 organizations along with two independent security consultants.
 
 In Section II of this report, the background and maturation of computer
 security methods, particularly as a basis for new approaches to
 evaluating and selecting controls, are described.  Common, selective, and
 special vulnerabilities are identified.  Section III describes presently
 used security review methods and the legal concepts of standards of due
 care and protecting proprietary interests in computer programs which
 contribute to computer security practices and the law.
 
 Section IV, along with more detailed descriptions in Appendix B, presents a
 new, baseline concept that can be used along with other methods for
 selecting controls and security practices.  The principles and benefits of
 baseline controls are stated and future baseline development is
 considered.
 
 Section V explains the method of investigation, the format used to
 describe the controls found in the study, and the five indices of the 82
 controls that are described in the last section.  The five indices are
 identified by topic, objective, area or responsibility, mode, and
 environment to facilitate location of specific controls.  An overview
 summarizing the controls by topic completes Section V.
 
 In Section VI, the controls are presented in ways quite different from
 that found in other security literature.  A title, control objective, and
 general description based on actual usage experience are presented.  The
 control variants are identified.  Strengths and weaknesses found in usuage
 are stated.  These items are followed by  advice on how to audit the
 controls, and five more characteristics are briefly identified to complete
 the description.  Appendix A presents three case studies of actual
 selection and approval of controls and a step-by-step method of how a
 baseline review could be conducted.
 
 $_EOF
 
 [OTHER WORLD BBS]
 
 |   |