answersLogoWhite

0

Computer Security Law

Computer security means protecting the confidentiality, integrity, and availability of information stored on, processed by, and transmitted by computers. In order to achieve this, various governments and organizations have established laws, regulations, and standards for securing computers and the data stored, processed, and transmitted by them. This category is for questions about existing and proposed laws and standards specifically related to computer security including the contents of the laws & regulations, who is legally responsible, who/what the laws/regulations/standards apply to, how the security is evaluated, and how it is documented.

310 Questions

What is resource allocation problem in DAA?

We consider scheduling problems in parallel and distributed

settings in which we need to schedule jobs on a

system offering a certain amount of some resource. Each job

requires a particular amount of the resource for its execution.

The total amount of the resource offered by the system is

different at different points of time. Our goal is to choose a

subset of jobs and schedule them such that at any timeslot,

the total amount of resource requirement does not exceed the

total amount of the resource available at that timeslot. We

wish to maximize the profit of the chosen subset of jobs.

The problem formulation is motivated by its applications

in environments such as cloud computing and bandwidth

allocation in networks. Below, we describe a real-life problem

encountered in scheduling scientific applications on a

massively parallel system.

We now describe a scheduling problem typically faced in

the scenario where a number of users are trying to execute

scientific applications on either a cluster of machines or a

supercomputer. The users have to make reservations for the

resources in order to execute their jobs. But, as there are

multiple users competing for the same resources, a user may

not be allocated all the resources she requested. For the sake

of simplicity, let us assume that the resources are processors

on the supercomputer or machines on the cluster. Consider

a particular user. The number of processors (or machines)

allocated to the user may be different at different points of

time (because of reservation policies and the presence of

critical jobs) The user gets to know in advance the number

of processors allocated to her for each timeslot. The user

has a set of jobs that she wishes to execute. Each job of the

user has a requirement on the number of processors needed

for execution. In addition, each job has a release time, a

processing time, a deadline and a profit. The user would

like to select a subset of jobs and schedule them in such

a way that at any timeslot, the total number of processors

required by the jobs active at the timeslot does not exceed the

total number processor available to the user at that timeslot.

Naturally, the user would wish to choose the subset of jobs

having the maximum profit. We would like to highlight that

such a scenario is frequently encountered in practice. We

assume that a job can be executed on any subset of machines

or processors as long as the resource requirement is met (i.e.,

the machines/processors are identical) and the jobs may not

be preempted. In fact, we consider a more general scenario

where job can even specify a set of time intervals where it

can be scheduled; note that this generalizes the notion of

release time and deadline.

Motivated by scheduling and bandwidth allocation scenarios

such as the above one, we study an abstract problem that

we call the Varying bandwidth resource allocation problem

with bag constraints (BAGVBRAP). We use bandwidth as

a generic term to refer to the quantity of the resource

under contention. So, the input will specify the bandwidth

available at each timeslot, and for each job, its bandwidth

requirement and the different time intervals in which it can

be scheduled. This kind of interval selection or interval

scheduling problems arise naturally in practice. We refer

to [1], [2], [3] for real-life applications of interval selection

and scheduling in parallel and distributed computing and

network management. The BAGVBRAP problem also has

applications in smart energy management. Here, we have a

set of electrical appliances that need to be scheduled over a

period of time, during which the amount of available power

may vary, due to the use of different power sources. The

BAGVBRAP problem generalizes several previously studied

scheduling and resource allocation problems. We next define

the problem and then discuss prior

What is the Oct 1 deadline for PCI Compliance?

As of October 2015, all restaurants and other merchants in in the USA are subjected to Europay, Mastercard, and Visa (EMV) standards, reflecting a shift from magnetic-stripe credit cards to chip-and-pin cards. Considered safer and widely used across Europe and other nations, the chip-based cards require insertion of the card into a terminal throughout the entire transaction. The chip-based cards are less susceptible to fraud becuse the chips are far more difficult and expensive to duplicate and counterfeit than a simple magnetic strip.

EMV compliance is required for credit card acquirers and processors, though it's not mandated for merchants and processors. But merchants assume liability for fraudulent purchases; this shift of risk responsibility has driven many to adopt the new standards and avoid the risk.

Downloading a cracked version of a video game is a form of - what?

Generally what is occurring when a game is "cracked" is that the copy protection has been defeated - so the cracked copy is an illegal copy - violating the copyright of the entity owning the copyright. In simple terms- it is usually theft. If someone downloads a cracked copy of a game they already own and does not share that game with anyone else, the issue is a bit murky.

What is the Security classification system?

The secure class of a system to make sure it is protected and secure from other nations.

Is there any hackers who block your computer and ask you to pay money to unblock it?

That depends on what you mean by "block". If you mean block access to the internet - that's pretty tough to sustain since you can usually resolve the problem by calling your ISP to get them to fix the problem there or by restoring the portions of your operating system that take care of establishing connections to the network and running your browser or other applications that utilize the network.

On the other hand, there are some @sshole criminals who will cause the contents of your files to become encrypted and then demand that you pay money to them to get the necessary cryptographic key to decrypt and restore your files. They usually target companies because they can extort more money from them but they have been known to attack individual users. Like any hostage situation, there is no guarantee that the victim will get the hostage (in this case data) back intact once they have paid the ransom. This is one of many reasons that good practice is to back up all critical files regularly and store them offline separate from the primary storage so that in the event of data loss, you can restore the lost files.

Note that most (albeit not all) of these criminals operate from countries where there are no laws or little enforcement of existing laws to prosecute cyber crimes so victims are usually left with only two choices:

1. try to recover their data another way (hopefully from backups)

or

2. pay the ransom and hope that they will really get their data back.

Involving the law may not do any good if the authorities in the country where the criminals reside are unable or unwilling to prosecute.

I suppose that a sufficiently wealthy and unethical company could hire someone to hack back to the criminals, locate them, and then send some goons to rough them up to get the data back, but that's a pretty shady way to approach it and still not a guarantee that the data would be recovered. Better to use appropriate measures to prevent the intrusion in the first place and have backups to permit recovery if the preventive measures fail.

What is the full form of daa?

In a software security regulations context, DAA stands for Designated Accrediting Authority (as per DoDI 8510.01). This is synonymous with "designated approving authority" and "delegated accrediting authority" - terms which were used in prior DoD IA regulations.

There are obviously different definitions for the acronym in other contexts.

How did they know your latitude and longitude?

Your ISP knows its own latitude and longitude. Your latitude and longitude is assumed to be the same as your ISP.

How might aggregating a lot of unclassified information affect the classification level?

Classification of information is based on the impact it would have if it were disclosed to unauthorized persons. Bits and pieces of information that would have minimal impact in isolation can become very sensitive when aggregated together. Think of it like this: knowing the location of one opposing soldier on a battlefield is useful but doesn't tell you much about what the opposing forces are doing or planning, however as you get information on 10 soldiers it becomes more useful - at 50 it is much more useful - at 100 - at 1000 - more and more useful. In fact by the time you get to 1000 you have a a pretty fair picture of how the opposition is deployed and can make good guesses at their plans and identify weak points. 1000 bits of information that are unclassified when taken separate from each other aggregate to being highly classified when taken together.

What AR 25-2 requires to all users?

As per Section 4-5, paragraph a.(8)(a):

All users must receive IA awareness training tailored to the system and information accessible before issuance of a password for network access. The training will include the following:

  1. Threats, vulnerabilities, and risks associated with the system. This portion will include specific information regarding measures to reduce malicious logic threats, principles of shared risk, external and internal threat concerns, acceptable use, privacy issues, prohibitions on loading unauthorized software or hardware devices, and the requirement for frequent backups.
  2. Information security objectives (that is, what needs to be protected).
  3. Responsibilities and accountability associated with IA.
  4. Information accessibility, handling, and storage considerations.
  5. Physical and environmental considerations necessary to protect the system.
  6. System data and access controls.
  7. Emergency and disaster plans.
  8. Authorized systems configuration and associated CM requirements.
  9. Incident, intrusion, malicious logic, virus, abnormal program, or system response reporting requirements.
  10. INFOCON requirements and definitions.
  11. AUP requirements.

What is fbcdn.net?

Facebook Contet Delivery Network.

That's the place where content of Facebook is stored.

Under what circumstances can a DAA waive the certification requirements?

DAA may waive the certification requirement under severe operational or personnel constraints.

What do Physical security standards include?

From NIST 800.53 rev 4:

Physical and Environmental Protection Policy and Procedures

Physical Access Authorizations

Physical Access Control

Access Control for Transmission Medium

Access Control for Output Devices

Monitoring Physical Access

Visitor Access Records

Power Equipment and Cabling

Emergency Shutoff

Emergency Power

Emergency Lighting

Fire Protection

Temperature and Humidity Controls

Water Damage Protection

Delivery and Removal

Alternate Work Site

Location of Information System components

Information Leakage

Asset Monitoring and Tracking.

==========

Physical access control to spaces where computer assets (computers, networking connections, cabling, etc.) are present.

Physical protection of documented information about instituted protections.

Environmental protections of computers and users to protect availability and integrity (for example, EM interference can compromise integrity of transmitted information)

Physical protections against eavesdropping, interception, alteration, and interference

Tamper evident seals

Protection from physical threats (for example: protecting data center from fires, floods, tornadoes, etc.)

Protection of storage media (tapes, disks, drives, etc) - access control, theft prevention, protection against damage

What is a website that is set up to look exactly like another website with the intention of tricking customers into entering their personal information?

Such a website is usually called a "phishing website" because users are usually sent to them via a phishing message. It can also be legitimately called a "malicious website" because the information harvested from it is then usually used as part of an identity theft.

How does RMF differ from DIACAP?

DoD Information Assurance Certification and Accreditation Process (DIACAP) was based on the controls identified in Department of Defense Directive 8500.1 and Department of Defense Instruction 8500.2. Controls were assigned based on categorizing the system according to Confidentiality (Confidentiality Level - aka "CL" Classified/Sensitive/Public) and Availability (Mission Assurance Category - aka "MAC" I/II/III).

Risk Management Framework (RMF) for DoD Information Technology (IT) replaced DIACAP when the new DoDI 8510.01 was issued on March 12, 2014. Under RMF, systems are categorized according to their requirements for Confidentiality (High/Moderate/Low), Integrity (High/Moderate/Low) and Avaliability (High/Moderate/Low). The controls are further tailored/enhanced by adding addtional control overlays according to whether the system is Classified and/or whether it contains PII. The Navy has added a further overlay based on the CyberSafe grade for the system. All of the controls are derived from NIST SP 800.53 (as of September 2017, in Revision 4).

Where DIACAP had a couple hundred controls to address, RMF has potentially more than a thousand to consider - based on the base control and control enhancements. The greater number of controls is due to greater granularity of the the controls, the addition of more controls addressing Integrity, and many new controls imposing cybersecurity requirements for the supply chain and contracting.

Is downloading copyright files or torrents illegal?

Probably - it does depend on a few things however.

If you do not have the permission of the copyright owner, downloading copyrighted files is, indeed, illegal. As an analog - if you purchase a bootleg copy of a movie that someone made illegally both the seller and the buyer are breaking the law. If you download a copyrighted file without the permission of the copyright owner (which often includes paying them something for the right to download it) you are breaking the law and the person providing it to you is also breaking the law by providing it to you without the owner getting compensated. There are, of course, instances where a copyright owner may permit free downloading of a file but with restrictions on how it is used so that they can maintain their ownership rights. In that case, as long as you are not violating the conditions the owner imposes, you can legally download the file. An example would be that the owner may give others the permission to download the file but they are forbidden to re-distribute it

A system adminstrator is issued privileged and non-privileged user accounts.?

This is an example of applying the principle of least privilege. System administrators need to do a lot of different things on the system. Not all of them require privileged access, consequently they should be using a non-privileged account except when performing duties that require elevated privileges. Setting up the two different types of accounts makes this possible.

This method of impersonating a legitimate organization?

When internet fraudsters impersonate a business to trick you into giving out your personal information, it's called phishing. Like any kind of fraud, it is a crime, but the difficulty of catching the fraudster is increased due to the insulation of the criminal from the target by transient nature of thee accounts they launch their attacks from