Top Banner
Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSG Jamil Ghani - FAS Raghav Chandra - KSG Nanthikesan - KSG Jaime Chambron - FAS Angelina Ornelas - KSG Alex C. Snoeren - MIT
41

Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Dec 26, 2015

Download

Documents

Willa Knight
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Information Systems Security:Enabling Future Internet Applications

through Cryptography

STP-307: Business and the Internet

Mark Bayer - KSG Jamil Ghani - FASRaghav Chandra - KSG Nanthikesan - KSGJaime Chambron - FAS Angelina Ornelas - KSG

Alex C. Snoeren - MIT

Page 2: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Components of Security

• Physical Security– Are computer locked up at night?– Are the network cables exposed?

• Digital Security– Is the electronic information protected?

• Privacy Policies– What happens one the information is viewed?

Page 3: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

A Definition of Digital Security

• Confidentiality

• Availability

• Authenticity

• Integrity

• Certifiability

Page 4: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Why Should You Care?

• Personal Privacy• Your information is out there

– Credit and financial information– Educational records– Medical records

• Law Enforcement is Handcuffed– Terrorists, drug traffickers, and pedophiles

• “This is a trade issue!”

Page 5: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Cryptography’s Role

• Currently, an almost unique tool

• Complicated Math Tricks– Encryption provides confidentiality– Signatures provide authenticity, integrity– Certificates provide certifiability

• What about availability?

Page 6: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Measuring Security

• Cryptographic Strength– Key lengths

• Beyond Bits– Different algorithms– “Provably secure” crypto systems– Implementation issues

Page 7: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

How Much Security is Enough?

• Lack of incident information

• Difficulty in predicting future technologies

• Current levels seem “unbreakable”– Brute-force attacks may take forever– Consumers are uninformed about proper levels

• Strength is irrelevant if used improperly

Page 8: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Why Governments Care:Legislative Landscape

• Global scale: U.S. Congress, OECD, EU

• Export controls

• Key Management Infrastructure (KMI)

• Key Recovery - Clipper Titanic of the 90s?

Page 9: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Current Regulations (U.S.)

• Freedom to choose at home

• Export Administration Regulations (EAR)

Page 10: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Pending Legislation (U.S.)

• SAFE Act - 5 versions in the House

• Secure Public Networks Act - in the Senate

• The President’s Plan

Page 11: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Presentation Road Map

• Digital security in the public sector– Virtual university

• Digital security in the private sector– Banks– eShop Plaza

• Government’s role

• Recommendations

Page 12: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

The Public Sector

Page 13: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Digital Security and Virtual Learning

• Why virtual university?• Layout of approach

– Analysis of the Universitat Oberta de Catalunya – Current and Potential digital security issues in

general Virtual Learning– Next steps: issues and approaches

Page 14: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

UOC ARCHITECTURE

Interactive BookCampus Agenda

Cafe Discussion Group

InteractiveSpreadsheet

CampusWorksheet

Library

Bulletin Board

Conferences

Page 15: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

UOC ARCHITECTURE

Interactive BookCampus Agenda

Cafe Discussion Group

InteractiveSpreadsheet

CampusWorksheet

Library

Bulletin Board

Conferences

Page 16: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Digital Security:UOC Applications and Issues

• Administration

• Synchronous Knowledge Delivery

• Student Evaluation

• Maintaining Secure Data Banks

• Access to Resources• Visitor Access

• Multiple-user Access

• Library Access

• Code of Ethics

Page 17: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Digital Security: Current and Potential Issues

Current Virtual Distance Learning Projects• Public Sector• Private Sector

Page 18: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Digital Security: Potential Issues

• Disaggregation of University Functions

• Universal Student ID

Page 19: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Digital Security: Potential Issues

• Standards of DS:• Strength of Encryption

• Authenticity, Certification

• Standards for Accreditation of DS: International coordination & Enforceability

• Keys: Who owns them?• Government?

• Universities?

• Virtual Registrar?

Page 20: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Digital Security:Next Step - Approaches

LEGAL AGENDA• Legalization of Digital Signatures• Standardization of Certification

BUSINESS - GOVERNMENT

PARTNERSHIP• Promotion of Research & Development• Encryption Regulations• Dynamic Legal Framework

Page 21: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

The Private Sector

Page 22: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Growth of Electronic Commerce

$327 Billion by 2002, according to Forrester Research

Page 23: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Field of Dreams: “Build It and They Will Come”

• 77% have not shopped on the Internet

• 86% cite fear of credit card information stolen and misused as a result of Internet shopping

• 56% want government to pass laws protecting personal information collected on the Internet

Page 24: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

eShop Cybermall:A Unique Business Model

Page 25: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Big Brother Is Watching

A Study on Privacy over the Internet by The Federal Trade Commission

Due June 1998

Page 26: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Taming the “Wild Wild Web”

Legal Issue Facing the Net

Page 27: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Big Business

• Dell Computers sells $1M daily in Internet sales• GE, HP - Using Net for transactions - save

$500M yearly • HP Versecure• Marketing, order, processing, fulfillment,

payment, logistics performed on Internet• EDI

Page 28: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Internet Banking

• Facilities offered• Several banks have launched Internet banking-

operations, e.g. ICICI-Infinity• Advantages

• Experimental/Limited in scope

Page 29: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Lacunae

• Liability

• Legal framework

• Forgery/Impersonation

• Taxability

• Convenience

• Pervasiveness

• Confidentiality

Page 30: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Next Steps

• Availability of effective, trustworthy cryptography• Flexible crypto architecture - keep pace with

technology • Suitable domestic legislation, tax policy framework • Supportive technology institutions, legal framework • Educating the consumer• Encouraging banks

Page 31: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Government’s Role

Page 32: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Government and Encryption

• Government policy is the hardware upon which future Internet applications will run– Respond to market forces– Facilitate progress– Solve information asymmetries through consumer

education– Negotiate international agreements

• Encryption is currently an almost unique tool for digital security

Page 33: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Topics of Discussion

• Need for domestic encryption policy

• Potential models

• Why “dumbing down” does not work

• Why “smartening up” does work

• Next steps

Page 34: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Need for Domestic Encryption Policy

• Crime– Terrible Triumvirate - terrorists, drug

traffickers, pedophiles– Realities of crime fighting

• Seamless world– Work-arounds to the rules

• Applications are waiting

Page 35: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Potential Models

• “Wild Wild Web” - Safe Act

• “Dumbing Down” - EAR

• Technical Advisory Committee on Encryption Federal Information Processing Standard (TACEFIPS)

• National Electronic Technologies (NET) Center - amendment to Safe Act

Page 36: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Why “Dumbing Down” Does Not Work

• Key recovery

• Limits on key length

• Review committee

Page 37: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Why “Smartening Up” Works

• Permits the realization of the full potential of Internet applications

• Maintains the government’s lead in encryption

• Responds to fundamental market motivations

Page 38: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Next Steps

• Adopt NET Center

• Standardize usage through collaborative efforts

• Baby steps

Page 39: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Recommendations

• “Smarten up, don’t dumb down.”– NET Center

• Alert the players in advance– KMI exception– EU Privacy Directive

• Keep talking (dialogue, not monologue)– FIPS– OECD

Page 40: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Recommendations (continued)

• Consumer awareness– labeling– “seatbelts and airbags”– liability rules

Page 41: Information Systems Security: Enabling Future Internet Applications through Cryptography STP-307: Business and the Internet Mark Bayer - KSGJamil Ghani.

Beyond Cryptography

• Cryptography is merely today’s technology

• Detecting and legislating crypto is hard– Difficult to identify “plain-text”– Authentication = Confidentiality?

• Other technologies are currently available– Stenography can provide confidentiality– Biometrics can provide authentication