28
CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Embed Size (px)

Citation preview

Page 1: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

CYBERCRIME

DEFINED……DETECTED……

DEFEATED!

© Rita Hyland Consulting, LLC

Page 2: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Vision of the Future Computer(a la 1950’s!)

Page 3: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

DEFINED

It is any crime wherein a computer is an essential factor in the perpetration of the crime itself.

However, the difficult question is: what constitutes a crime? How do we detect it and ultimately how can we defeat it!

Page 4: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

The Laws

The Communications Decency Act (CDA) of 1996, Title V of the Telecommunications Act of 1996

Goal: to control internet pornography Janet Reno v Civil Liberties Union – Free speech versus

public interest

Child Online Protection Act (COPA) Section 230: “No provider or user of an interactive computer

service shall be treated as the publisher or speaker of any information provided by another information content provider.”

Star Trek Case - Carafano v. Metrosplash (2003)

Page 5: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Digital Millennium Copyright Act (DMCA) Criminalizes the production and dissemination of technology

that can circumvent measures to protect copyright Online Copyright Infringement Liability Limitation Act

(OCILLA) section 512 of the DMCA – limits the liability of Online Providers

DMCA Case Law Example: Chamberlain v. Skylink

Can Spam Act of 2003 The bill's full name is an acronym: Controlling the Assault of

Non-Solicited Pornography and Marketing Act of 2003. Establishes national standards for the sending of commercial e-mail

Federal Trade Commission enforces the provisions

Page 6: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Unsolicited commercial e-mail is permitted if the following requirements are met:

An opt-out mechanism; A functioning return e-mail address; A valid subject line indicating it is an advertisement; The legitimate physical address of the mailer.

Prohibits the sale or transfer of e-mail addresses through an opt-out request

Prohibits sexually oriented spam without clear markings Criminalizes sending e-mails with a falsified header Pre-empts state anti-spam laws Does not allow e-mail recipients to sue the spammers but this

may be allowed under state law

Page 7: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Can-Spam UPDATE: Federal Trade Commission Action Tuesday January 11, 2005 - FTC froze the assets of several companies & 5 individuals for failing to send an e-mail with the “SEXUALLY EXPLICIT” warning on the header.

Page 8: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

HIPAA – Health Insurance Portability and Accountability Act - 1996

Privacy Standards – HHS promulgated rules regarding confidentiality, access, and disclosures

Security Standards - entities must establish procedures and mechanisms to protect the confidentiality, integrity and availability of electronically protected health information

Most entities must comply by April 21, 2005

Business Associate - Sec. 160.103 includes some of the functions or activities, and all of the types of services, that make a person or entity who engages in them a business associate, if such activity or service involves protected health information.

Page 9: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Sarbanes-Oxley Act of July 30, 2002 Follows in the wake of the high profile scandals such as

Enron and WorldCom Improves accuracy and reliability of corporate disclosures

made pursuant to the securities laws Includes provisions addressing audits, financial reporting

and disclosure, conflicts of interest, and corporate governance of public companies

Title IV - Section 404 - Requires an internal control report CEOs and chief financial officers must personally vouch for

the truth and fairness of their companies' disclosures Accounting profession will be regulated by an independent

board

Page 10: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

GLBA - Gramm-Leach Bliley Act The Financial Modernization Act of 1999 Protects personal financial information held by financial

institutions establishing standards for collection, disclosure and security of data collected.

UPDATE: Massachusetts Bankers Association v. Division of Banks and the Division of Insurance – The US District Court overturned four State restrictions on the sale of insurance – The GLB preempts state law.

Page 11: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

THE CRIMES

Spam – Essentially unwanted e-mails Dictionary Attacks – 40% success rate Internet Protocol Spoofing – Forging the header

to imitate another machine/network Hijacking

Trojan Horse – Non replicating Worm – Self replicating

Open Mail Relays – Routing through third party servers

Phishing – Luring sensitive data by masquerading as a trusted source, such as a bank or credit card

Page 12: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC
Page 13: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

VULNERABILITIES Netsky Worm

Sends out copies using a built-in SMTP engine and spoofed sender name Gathers recipients from infected system Generally mimics an e-mail delivery notification Automatic execution of attachments

W32/Zafi Worm Copies itself to the Windows system folder with a file name of “Norton

Update.exe” Harvests e-mail addresses from Outlook and files on the hard drive

Virus Growth – in 2004 there were 17,000 new viruses introduced, i.e. 46 per day!

Employee Attacks – this is an area of particular vulnerability to firms

WI-FI Capability and Bluetooth – 60% remain unprotected!

Page 14: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

LAW ENFORCEMENT

HHS – enforces HIPAA Securities and Exchange Commission (SEC)

and Public Company Accounting Oversight Board (PCAOB) – oversee the Sarbanes-Oxley Act

Eight Federal Agencies - administer and enforce The Gramm-Leach-Bliley Act

FBI – Federal Bureau of Investigation

Page 15: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

FBI FACTS & STATISTICS IC3 - Internet Crime

Complaint Center 2003 Partnership with the

National White Collar Crime Center

Auction Fraud comprised 61% of complaints

79% of perpetrators are male

64.8% of complainants had e-mail contact with the perp & 19.4% via a web page

USA – 93% of worldwide complaints

Map – Concentration of Internet Fraud Activity

Page 16: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

PREVENTION & DETECTION

$7 Trillion Business – highlights the need for detection and prevention in E-Commerce

Prevention: Security protocols Firewalls Virus Protection Spyware Protection or Detection Automatic filtering features or stand-alone programs Biometrics – fingerprint, voice recognition, ocular

recognition are examples Potential employee scrutiny – Screen for characteristics

such as trustworthiness, loyalty and integrity

Page 17: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

TRANSFERRING THE RISK

First Party Exposures Physical Loss or Damage - traditionally required Indemnity Period – also usually requires physical loss or

damage and even if Electronic Data Processing Media coverage is often limited to the time to replace or restore the lost or damaged media

Employee Dishonesty – normally excluded in the commercial coverage forms

Solutions Expand definitions Remove exclusions

Page 18: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Third Party Exposures Invasion of Privacy – standard CGL usually requires

dissemination, not just gathering of data Infringement of Intellectual Rights – the standard CGL may

not cover web content and “advertising” or the infringing may originate from a third party & not the insured

Damage to third party data, software, programs or computer networks – may not be “property damage” per policy definition

Financial Loss to Customer or Vendor /Professional Liability – no “physical injury to tangible property” as for ex. A DOS attack

Patent Infringement - often not covered by the standard CGL policy

Page 19: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

CARRIERS FIRST RESPONSE

Carriers narrow the standard coverage Expressly stated that computer data is not tangible property

thus if a virus is spread to a vendor or customer, there would be no coverage afforded.

Personal and advertising injury specifically excluded liability arising out of electronic chatrooms and bulletin boards

The traditional broadcasting, telecasting or publishing exclusion was expanded to include Web site design, Internet service provider activities, etc..

Specific exclusion for unauthorized use of domain name, e-mail address, etc.

Some exclude personal and advertising injury arising out of infringement of intellectual property rights.

Page 20: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

CARRIERS OFFER CYBERINSURANCE

Major carriers – stand alone policies for e-commerce risk

Smaller start up companies versus larger companies

Address high-tech exposures such as legal liability to third parties, public relations expense, lost income, cost of recovering data

Awareness of the need for coverage is growing in the market

Page 21: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

UNDERWRITING ISSUES

Is there a written IT Security policy? Does it outline areas of responsibility and access?

Personnel Security – background checks, monitoring, etc.

Computer and Network Protection such as access control, firewalls, anti-virus, remote user control, outsourcing controls, etc.

What is the timetable and procedures for system reviews and checks?

What access controls are in place?

Page 22: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

What tools are in place to recognize an intrusion? To determine source?

What procedures are in place in the event of an intrusion?

What business plan is in place to assure minimal loss in the event of an security breach, DOS, etc.; reporting to authorities; protection of forensic evidence; etc.

What contracts and/or agreements are in place with others who advertise on the insured’s Web site or vice versa?

Are there WLAN’s (Wireless Lans) utilized and if so, what security response protocols are in place?

Page 23: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

E-BUSINESS RISK COVERAGE

Web site publishing liability – such as libel, copyright, trademark, and service mark infringement arising out of web site publications

Network security liability – failed security resulting in unauthorized access to personal data maintained by the insured

Replacement or restoration of electronic data Cyber Extortion Business income and extra expense

ISO Cyber Risk Program 2005

Page 24: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Provisions

Coverage is on a claims-made basis Each Coverage Agreement has its own aggregate

limit as well as an overall policy limit. Defense and claims expense may be within the policy limits and may apply to the deductible

World-wide coverage may need to be endorsed The coverages are optional and allow customization

and flexibility Convenient on-line delivery

ISO Cyber Risk Program 2005

Page 25: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

Limitations

The ISO CyberRisk Program has wide application but is not intended for

Financial Institutions Web content providers Publishers Broadcasters Internet service providers Etc.

ISO plans for expansion of the program Several major carriers have responded to the need

for the coverage with their own E-Commerce Risk Programs

Page 26: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

THE END!

Page 27: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

USEFUL WEB SITES

http://www.webopedia.com http://www.4law.co.il/ http://www.cybercrime.gov/ http://uk.fc.yahoo.com/h/hackattacks.html http://www.e-lawconsultant.com/cybercrime/ http://mishpat.net/law/Cyberlaw/cyber_crime/ http://www.internetnews.com/ http://www.internetintegrity.co.uk/Glossary_Search.asp http://www.naiw.org/HTM/cyber_crime.htm http://www.wikipedia.org http://www.fbi.gov/cyberinvest/cyberhome.htm http://www.sophos.com/ http://www.komando.com/ http://www.ftc.gov/bcp/conline/edcams/infosecurity/

Page 28: CYBERCRIME DEFINED…… DETECTED…… DEFEATED! © Rita Hyland Consulting, LLC

ACKNOWLEDGEMENTS

Insurance Services Office Michael A. Rossi of the Insurance Law Group, Inc. Gary Sorensen, President ZT Planet Steve Sanchez, Technology Underwriter, CNA

Insurance Ed Cohen, Sr. Sales Consultant, Telemanagement

Systems, Inc. Jeff Geyer, Senior Vice President – Hire Golden