3
FEATURE Changing Policies Towards Encryption and Internet Security Pa trick Hook T here is an increasing tendency for organizations to put information on the Internet which immediately makes them vulnerable to hacking. What security is available beyond the modem? Of the eight principles that accompany the 1984 Data Protection Act, the last is perhaps the most worrying. Not that there is anything particularly startling about the requirement to take steps to ensure the security of data held. Indeed, the safe custody of property, in whatever form it exists, is an aspect of the job that most already tend to take seriously. The problem with the eighth principle is, to put it simply, the speed of technological advance. Security measures necessary to ensure the confidentiality of data, change almost weekly as software and highly specialist hardware, designed to protect data, are quickly followed by the means to overcome the defence they offer. And while evaluation procedures in Europe (the E standards) and America (the A, B, C and D standards) help to guide the user as to the level of protection offered, ultimately the responsibility rests with him to argue his comer. It is he who must satisfy the regulatory authorities that, not only is the system secure from outside interfaces but that the software works in the way the software house has stated. Fortunately. systems do exist which are able to provide carrying levels of protection against deliberate or accidental interference. And while the ability to obtain protection is, at the highest levels, still limited by export controls, there are signs that even this policy is being replaced by a spirit of compromise. The export controls, designed to ensure that the State always had the ability to read all computer traffic in time of need, are now beginning to be seen as an impediment to commercial enterprise. The more pragmatic approach is, some suggest, the result of a recognition by governments that commerce has a need to communicate in a secure environment if it is to compete in the global market. “There is beginning to emerge a way of building a compromise that seems to have increasing support from governments around the world”, said Peter Dare of IBM’s Security and Integration Solutions. “It is a way of managing the key by which the information is scrambled. That key has to be managed and distributed and there has to be an infrastructure to deal with that, to ensure that the key is available to the authorities when needed. Governments now seem keen on rolling out this compromise solution which will give very good security for the State, businesses and the public who use (encrypted data) while at the same time allowing law enforcement access when it is really necessary.” Without an infrastructure designed to regulate the use of and access to encryption codes, there is a real concern that the ability of the various enforcement agencies, including the police, to gather evidence of wrongdoing, would be negated. On the other hand, a high level of security in the transmission of data over the public telephone lines would obviate the need for expensive, private lines such as the Metropolitan Police Metnet or the UK Police National Network (PNN). In broad terms, computer security is offered at three points. As data passes into or out of a computer system connected to the Internet, it can be interrogated by software programs known as firewalls. An access control mechanism, the firewall looks at requests for entry to the server and judges (a) whether the request comes from a valid source and (b) whether on not it is trying to carry out a valid function. If the transaction is unauthorized it will be blocked. Firewalls will only work with the Internet and do not work with other protocols. The second point is where the sensitive or confidential data is passed along public telephone lines and where the opportunity for eavesdropping exists. 12 Computer Fraud & Security June 1996 0 1996 Elsevier Science Ltd

Changing policies towards encryption and internet security

Embed Size (px)

Citation preview

FEATURE

Changing Policies Towards Encryption and Internet Security

Pa trick Hook

T here is an increasing tendency for organizations to put information on the

Internet which immediately makes them vulnerable to hacking. What security is available

beyond the modem?

Of the eight principles that accompany the 1984

Data Protection Act, the last is perhaps the most

worrying. Not that there is anything particularly

startling about the requirement to take steps to ensure

the security of data held. Indeed, the safe custody of

property, in whatever form it exists, is an aspect of the

job that most already tend to take seriously.

The problem with the eighth principle is, to put it

simply, the speed of technological advance. Security

measures necessary to ensure the confidentiality of data,

change almost weekly as software and highly specialist

hardware, designed to protect data, are quickly followed

by the means to overcome the defence they offer. And

while evaluation procedures in Europe (the E standards)

and America (the A, B, C and D standards) help to guide

the user as to the level of protection offered, ultimately

the responsibility rests with him to argue his comer. It

is he who must satisfy the regulatory authorities that, not

only is the system secure from outside interfaces but that

the software works in the way the software house has

stated.

Fortunately. systems do exist which are able to

provide carrying levels of protection against deliberate

or accidental interference. And while the ability to

obtain protection is, at the highest levels, still limited by

export controls, there are signs that even this policy is

being replaced by a spirit of compromise. The export

controls, designed to ensure that the State always had

the ability to read all computer traffic in time of need,

are now beginning to be seen as an impediment to

commercial enterprise. The more pragmatic approach

is, some suggest, the result of a recognition by

governments that commerce has a need to communicate

in a secure environment if it is to compete in the global

market.

“There is beginning to emerge a way of building a

compromise that seems to have increasing support from

governments around the world”, said Peter Dare of

IBM’s Security and Integration Solutions. “It is a way

of managing the key by which the information is

scrambled. That key has to be managed and distributed

and there has to be an infrastructure to deal with that, to

ensure that the key is available to the authorities when

needed. Governments now seem keen on rolling out this

compromise solution which will give very good

security for the State, businesses and the public who use

(encrypted data) while at the same time allowing law

enforcement access when it is really necessary.”

Without an infrastructure designed to regulate the

use of and access to encryption codes, there is a real

concern that the ability of the various enforcement

agencies, including the police, to gather evidence of

wrongdoing, would be negated. On the other hand, a

high level of security in the transmission of data over

the public telephone lines would obviate the need for

expensive, private lines such as the Metropolitan Police

Metnet or the UK Police National Network (PNN).

In broad terms, computer security is offered at three

points. As data passes into or out of a computer system

connected to the Internet, it can be interrogated by

software programs known as firewalls. An access

control mechanism, the firewall looks at requests for

entry to the server and judges (a) whether the request

comes from a valid source and (b) whether on not it is

trying to carry out a valid function. If the transaction is

unauthorized it will be blocked. Firewalls will only

work with the Internet and do not work with other

protocols.

The second point is where the sensitive or

confidential data is passed along public telephone lines

and where the opportunity for eavesdropping exists.

12 Computer Fraud & Security June 1996 0 1996 Elsevier Science Ltd

FEATURE

Here the data can be scrambled or encrypted so that it remains wholly unintelligible to an eavesdropper or someone to whom the data is sent in error. Finally, security is provided by the operating system and/or the hardware. For the police and other organizations holding sensitive data, there is a legal obligation that the system in place should offer a reasonable level of protection against unauthorized access - the eighth principal of the Data Protection Act. There is, in other words, a requirement for a secure operating platform.

Firewalls

The increasing sophistication of firewall technology means that the level of security offered against unauthorized enquiry from the Internet can be high but it is important to bear in mind that the security gate faces out and not in. Firewalls work only with the Internet protocol and do not address the problem of data corruption by an organization’s own staff which, according to the IT research organization Dataprobe accounts for 93% of all data lost through human intervention. Nor, once it is breached, can the device offer any further assistance in preventing the intruder from ,.tccessing any other part of the system.

“The problem of security on the Internet only really begin\ to become an issue if an organization chooses to allow people access”, said Doug Gibbard of

Leicebtershire Police IT Department. “The moment you fit a modem and the software which allows people outside the building to dial into your systems, you have to ha\ 12 firewall technology to make sure that only those with the necessary authority can get in. Of course the best r!‘pe of security is to have an air gap - fresh air between the machine into which people can dial and the server containing the rest of your database.”

But inevitably there is a trade off, in terms of cost and efficiency, between a given level of security and the effort required to maintain that level. Employing the principal of an air gap would certainly ensure that there was no breach of an organization’s computer system but it would also involve more work in ensuring that the information intended for the Internet was valid and up to date. There are those who doubt the need for the additional effort.

“There might have been an argument for employing

an air gap years ago”, said a spokeswoman for Oracle, “but firewalls are now so good that it is virtually impossible to breach the security that they offer.”

Except, that is, where an authorized user introduces data which has been corrupted by a virus. In these circumstances the firewall in impotent and there is a need for an operating system which tightly controls the areas of the system to which acce6s is granted.

Secure platforms

Two of the most serious threats faced by any organization whose computers interface with others outside the immediate office environment, are those of the virus and deliberate hacking-in by unauthorized personnel. It is for this reason that companies like Data General have developed sophisticated operating systems designed to restrict access to that part of the system for which authority exists and no other. Their Secure Internet Server was launched in February and is being evaluated at the B2 level (in the USA) and E4 (in Europe).

“On a normal non-secure system, by giving certain people the privilege to do certain things within the system, you give them the ability to do anything”, said Berbard Foot, European systems manager at Data General. “The principle of the secure Internet server is that there is a great deal more processing power available to it compared with the standard firewall technology. In turn this permits a detailed analysis of all users of the system, both authorized and unauthorized. By setting up a number of containment areas, users can be restricted from whether or not data has been altered.”

As with the hacker, it is clearly important that the introduction of a virus be detected quickly and operating systems developed by most of the major companies, including Hewlett Packard, IBM and Data General, are able to do this. The Data General system automatically runs the anti-virus program whenever information or a new program is introduced from the Internet.

In the opposite direction, a secure operating system is able to prevent the unauthorized release of information to a third party. A device known as ‘key word filtering’ ensures that documents containing the key words cannot be exported from the system. Key

Computer Fraud & Security June 1996 0 1996 Elsevier Science Ltd

13

FEATURE

weds may be winethin, ‘7 like “This is a confidential

document” and el‘fecti\~cly prevent the deliberate as well

as the accidental release of information.

Encryption

There is nothing new about the idea of encryption; the

word comes I‘rom ancient Greek and means ‘secret

writing’. The technique has been in regular use ever

since. hut it has only been since computers became

widely a\~ailal)le that the ability to encrypt messages has

acquired a si~nil‘icance well beyond the narrow confines

of wartime national security. For some years

organizations ha\:e either employed low level

encryption ax ii means of transferring commercially

sensitive data umnci the world or have gone the route

of ;I pri\,atc tetephonc network. The higher levels of

security offered by highly specialist companies -

mainly in the LJnitecl States of America - have been

restricted by the imposition of export controls.

That is now changing and with it comes the

possibility 01‘ totally secure transmission of data across

public trlL>phoiie lines. With the increasing levels of

international trat‘l‘ic, the opportunity presented by this

change in global policy is significant. The advent of

generally a\,ailable. secure encryption is likely to speed

the process 01‘ change. Ar the highest levels of security

the Mel) has commissioned a consortium led by

Microsoft, No\,cl. Digital. EDS and Nortel to produce a

secure cn\,ironmcnt usin, ~7 commercial off the shelf

products such as Microsoft NT and Novel NetWare.

Due to he dclnonstrated to the IT industry this summer,

there seems little doubt that the collaboration has been

promptecl by ;I \,icw 01‘ the long-term commercial gain

that such ;I prcj.jcct rcprcsc‘nts. But encryptjon on its own,

atthou& immensely \,aluable as a means of security and

the cost effective LISA of rc’hources. requires the added

dimension of lnlst. Both the sender and the receiver of

data need to he cont‘iclent that the data sent is the same

as that rcceivecl. They also riced to be sure that it has not

been intercepted. In response to this requirement,

comp;u~ies like Microsol’t. IBM. Digital, Novel, Domus

and others who ~~I-~K~LICC’ encryption software, have built

in iclrn~it‘ication and authentication) functions which

m~~~he~naticall~ ct-oss check data received against that

sent, ;ilcI-rins iinv :iltcr:ilion\.

‘l’t11\ c.l.!‘l~l~)~t.;ll,tli~ technique. known as a digital

signature, has a further function. It allows the sender to

prove that the message has been received by the person

for whom it is intended since not only has the content

of the message been authenticated but the receiver’s

digital signature has confirmed his receipt.

Even those systems that operate within a discrete

network require protection and it would be a mistake to

imagine that they do not by reason of their private

network require any form of security against outside

interference. Novel, whose NetWare package is used on

about 83% of all networked systems worldwide, runs a

complete set of security tools within itself which

provides a level of security to C2 level in the USA (E2

in Europe).

“It is possible to make individual PCs and servers

secure but when they are connected into a network they

must have a secure network”, said Bruce Graham,

Director of Novel’s Public Sector Marketing.

European Directive

Last July a European Union General Directive on data

protection was agreed by the Council of Ministers which

requires national legislation to be in place by 24 October

1998. As far as the UK is concerned this will almost

certainly mean the introduction of anew Data Protection

Act. The Directive contains several requirements not

currently covered by UK law including:

l the inclusion of some manual records

l a duty on all data users to comply with data

protection rules whether or not registered under the

new system

l provisions designed to ensure that the tmnsfer of

personal data to non-European countries is

adequately protected

On 22 March this year, the Home Office published

a consultation document on the Directive and the Data

Protection Registrar is due, shortly, to publish a series

of papers designed to answer queries on the implications

of the Directive.

14 Computer Fraud & Security June 1996 0 1996 Elsevier Science Ltd