Legal and Security Issues in Ict
Legal and Security Issues in Ict
TABLE OF CONTENT
Page | i
UNIT 1................................................................................................................................... 1
SECURITY FUNDAMENTAL .......................................................................................... 1
Information Security Principles ............................................................................................. 8
Security Concepts ................................................................................................................ 12
UNIT 2................................................................................................................................. 16
ACCESS CONTROL FUNDAMENTALS ...................................................................... 16
Subject and Object Definition.............................................................................................. 18
Accountability Process......................................................................................................... 18
Multifactor Authentication................................................................................................... 19
Authentication Mechanisms................................................................................................. 21
UNIT 3................................................................................................................................. 30
TYPES OF INFORMATION SECURITY CONTROLS. ............................................. 30
Logical Controls................................................................................................................... 30
Physical Controls ................................................................................................................. 36
Administrative controls........................................................................................................ 36
UNIT 4................................................................................................................................. 38
LEGAL ISSUES ................................................................................................................. 38
Cyberspace Privacy Laws and Issues .................................................................................. 38
Child Protection Laws.......................................................................................................... 39
Data Protection Laws (Data Protection Act 843) ................................................................ 39
Electronic Communications Laws (Electronic Communications Act 775) ......................... 39
Law of Contract (act 25, 1960) ............................................................................................ 39
Anti-Spam laws .................................................................................................................... 43
Analyse Privacy Policies...................................................................................................... 49
• Subject typically represents a process (the process takes on the attributes, such as access
rights, of the user or application)
o Owner: creator of a resource
o Group: group of users; membership in the group is sufficient for certain access rights
o World: Users who are not included in the categories of owner and group may be able
to access the resources with limited permissions.
Object: Resource to which access is controlled.
• Read (incl. copy or print); Write (incl. read access; add, modify, or delete); Execute;
Delete; Create; Search (list the files in a directory or search the directory)
Accountability Process
Access control systems are a fundamental part of any organization’s identity proofing system.
Depending on the software or tool, the process is triggered when a person attempts to identify
themselves in the system. Then, your network will perform system checks and grant access if
a user is authorized.
Depending on the arranged limits, you can make changes to the information available and
perform other necessary actions.
dentification is what happens when a user claims an identity, and the process starts for
authentication, authorization, and accountability for that user. A user may identify several
ways, including typing in a username, swiping a card, or scanning his thumb. When a system
issues identification values to users or subjects, it is important that each value is unique, and
usernames should never be shared between users, so that user accountability can be tracked
while in the system. A standard naming scheme should be followed, but care should be taken
that the naming scheme should not describe the user’s position or task (e.g., payroll user).
Authentication
Authentication is making sure the claimed identity is valid. Is the user really who they claim to
be? To do that, often the user claiming an identity must provide additional pieces of information
that corresponds to the identity. For instance, a password or a personal identification number
(PIN) known only to the user is usually required. But sometimes other factors are considered,
including the physical location of the device the user is using for access. There are three
categories or factors of information used to authenticate:
• Something you know (e.g., password, pin, etc.)
• Something you have (e.g., token from cell phone, keys, etc.)
• Something you are (fingerprint, voice recognition, etc.)
Many systems now implement multi-factor authentication, where at least two different pieces
of information from at least two different factor groups above are used to authenticate users.
Employing a second factor in the authentication process represents an additional layer in case
a user’s identification and password has been compromised.
Multifactor Authentication
Multi-factor authentication (MFA) is a multi-step account login process that requires users to
enter more information than just a password. For example, along with the password, users
might be asked to enter a code sent to their email, answer a secret question, or scan a fingerprint.
A second form of authentication can help prevent unauthorized account access if a system
password has been compromised.
Digital security is critical in today's world because both businesses and users store sensitive
information online. Everyone interacts with applications, services, and data that are stored on
the internet using online accounts. A breach, or misuse, of this online information could have
serious real-world consequences, such as financial theft, business disruption, and loss of
privacy.
ADVANTAGES
1. High security level.
2. Unclonable credential.
3. Private key never exposed.
4. Credential can be recovered on wiped devices.
5. Maximum user-friendly UX.
6. Application flexibility.
7. Simple to integrate into 3rd-party systems.
MFA AUTHENTICATION METHODS
Authentication by Knowledge
Knowledge factors are the most used form of authentication. In this form, the user is required
to prove knowledge of a secret to authenticate.
A password is a secret word or string of characters that is used for user authentication. This is
the most used mechanism of authentication. Many multi-factor authentication techniques rely
on password as one factor of authentication. Variations include both longer ones formed from
multiple words (a passphrase) and the shorter, purely numeric, personal identification number
(PIN) commonly used for ATM access. Traditionally, passwords are expected to be
memorized.
Many secret questions such as "Where were you born?" are poor examples of a knowledge
factor because they may be known to a wide group of people or be able to be researched.
Authentication by Possession/Ownership
Possession factors ("something only the user has") have been used for authentication for
centuries, in the form of a key to a lock. The basic principle is that the key embodies a secret
which is shared between the lock and the key, and the same principle underlies possession
factor authentication in computer systems. A security token is an example of a possession
factor.
Disconnected tokens have no connections to the client computer. They typically use a built-in
screen to display the generated authentication data, which is manually typed in by the user.
This type of token mostly uses a "one-time password" that can only be used for that specific
session.
• Respond only with a “yes” or “no” depending on the result of the authentication, rather
than sharing and/or exposing PII, except for special circumstances—such as complying
with anti-money laundering (AML) regulations for customer due diligence (CDD)—
subject to a person’s informed consent and comprehensive information security
measures.
• Have known and easily accessible exception handling and grievance redress protocols
in case the authentication mechanism fails (e.g., a false negative biometric result). A
person should never be denied a right, service, or entitlement (or their access made
more difficult) because of a fault of the ID system.
• Eliminate opportunities for the ID authority or other actors to use transaction metadata
to track or profile the ID holder (e.g., through encryption, hashing, anonymization of
data, decentralization of such data etc.).
• When identity data shared by the ID system and stored by the relying party as part of
the authentication mechanism, ensure that information is secured in order to prevent
loss or compromise.
• Be mandated by relevant laws and regulations, and the specific relationship between
the ID system and the relying party be governed by a legal agreement (e.g., a
memorandum of understanding) setting out respective responsibilities.
Online Authentication
Where relying parties and users have access to internet and/or mobile network connections,
online authentication can be used for both in-person and remote transactions. The ability to
refer to other systems—such as remote servers, data stored in the cloud, web- and mobile-based
applications, etc.—increases the variety of potential online authentication mechanisms, as
shown in Table 34, and the ability to check the validity of a credential. Ultimately, online
authentication provides a higher level of assurance because it offers more potential
The authentication level of assurance provided by online mechanisms varies according to the
specific credentials, authenticators, and protocols used. In addition to choosing authentication
methods with levels of assurance appropriate to the transaction, practitioners must consider
their accessibility and convenience, particularly for vulnerable persons (e.g., low literacy, the Page | 25
elderly, and people with disabilities), and those with unreliable internet or mobile connections.
For example, card-based authentication for remote transactions (e.g., e-services) would require
the purchase and distribution of card and/or biometric readers to each person, which may be a
barrier to adoption.
Table 34. Examples of online authentication mechanisms for in-person and/or remote
transactions
Compatible System
Type Mechanism
Credentials/Authenticators Requirements
FIDO-certified Page | 26
smartphone (e.g.,
On-device Android,
match Windows) or
FIDO-certified smartphone
(fingerprint, external
(e.g., Android, Windows) or
iris, face, PIN) authenticator such
FIDO external authenticator such
unlocks a as a FIDO Security
authentication as a FIDO Security Key +
private key used Key, plus network
authenticators (biometrics or
to authenticate connection
PIN)
against a server between that
device and the
relying party’s
systems
Federation
Federation is the ability of one organization to accept another organization’s identity
credentials for authentication based on inter-organizational trust. The trusting organization
must be comfortable that the other identity provider has acceptable policies, and that those
policies are being followed. Federation protocols and assurance and trust frameworks facilitate
federation of digital identity between organizations. For federation to be effectively used
globally, agreement and mapping with the ISO defined assurance framework and the adoption
of standards are critical (Source: Catalog of Technical Standards).
• A trusting organization can capture and send the credential to the issuing organization
(i.e., an identity provider) for verification, to authenticate an identity. After verification
of the credential, the issuing organization sends a yes/no confirmation and may, when
warranted and consented, send a set of claims giving information about the person,
using federation protocols like SAML (security assertion mark-up language). For
example, service providers in the UK can accept the credentials of multiple identity
providers via the GOV.UK verify system (see Box 38).
• A trusting organization can accept credentials issued by another organization, but still
authenticate and authorize the individual locally. For example, a passport issued one
country is accepted as a valid credential by a receiving country (and could be validated,
for example, through ICAO’s global Public Key Directory or PKD), but the receiving
country’s immigration office still authenticates the holder and requires a visa to
authorize travel.
• Establish a trust framework—i.e., a legally enforceable set of specifications, rules, and Page | 27
agreements that govern a multi-party system—that defines legal rules and operational
rules (e.g., service-level agreements or SLAs).
Authorization
Authorization refers to established rules that determine whether a user has privileges sufficient
to allow them to do some action about a file, data, or a report, etc. For instance, Bob may have
privileges to create, modify, read, and delete files in a certain directory. Whereas Kathy may
only have read privileges in that same directory. Authorization can be more difficult to manage
at scale as compared to identification and authorization. Regarding identification and
authorization, each is binary. The user has a valid id, or he does not. The user provides the
correct password, or she doesn’t. However, authorization may mean both Bob and Kathy have
access to some of the same files, and a mixed number of privileges of what they are allowed to
do. Maintaining authorization rules can be complicated in a sophisticated system which may
have numerous roles which must be accounted for and managed.
Types of Authorization
• Discretionary Access Control (DAC) – DAC determines privileges depending on the
specific user and their access groups. A DAC model allows every object in a system to
be accessed by a particular group or identity. Those in charge of granting authorization
can provide admin permission to other users.
• Mandatory Access Control (MAC) – MAC determines authorization of entities at the
operating system level. MAC commonly governs permissions for threads and
processes, defining which files and memory objects they can access.
Logical Controls
Logical controls are preventative controls that apply information technology software’s and Page | 30
systems to prohibit unwanted access to information within a computer system. Nonphysical
access controls are also referred to as logical controls. These will prevent information assets
from being accessed electronically.
Logical controls that can prevent access to an organization’s informational asset include
Authentication of unauthorized users from being permitted to access a company’s systems.
1) User identification (e.g., username and passwords)
2) Password management: Passwords are generated to protect access from outside, unwanted
users of information. This is a method that is applied to only enabling access to those who are
authorized. Passwords have certain characteristics that will allow them to become more
preventative than others.
3) Network firewalls: Parts of computer systems or networks that are designed to block
unauthorized access while permitting outward communication.
4) Data encryption: A security method that applies information that is encoded and can only be
accessed or decrypted by a user with the correct encryption key. Encrypted data will also
sometimes appear scrambled or unreadable to a person or entity accessing it without
permission.
5) Access control lists: Tables that tell a computer operating system who has the right to access
it. Rights very per user and allows them to have a particular objective (e.g., accessing a file
directory or individual file).
6) Digital certificates: A digital certificate is an electronic “password” that allows a person,
organization to exchange data securely over the internet using the public key infrastructure
(PKI).
7) Data encryption: Data encryption is the process of encoding information so that only the
recipient with the ability to decipher the text can do so.
1. Traditional Firewalls
A traditional firewall is designed to police the flow of traffic that goes in and out of a network,
based on port, protocol, source address and destination address.
When we talk about ‘traditional’ firewall features, we’re talking about the functions that
preceded NGFWs – functions such as:
• Packet filtering, which ensures that incoming and outgoing packets are inspected
before they are allowed to pass through. Packets that match the filter’s set of rules are
forwarded; packets that do not are dropped.
A packet filtering firewall is a network security feature that controls the flow of incoming and
outgoing network data. The firewall examines each packet, which comprises user data and
control information, and tests them according to a set of pre-established rules. If the packet
completes the test successfully, the firewall allows it to pass through to its destination. It rejects
those that don't pass the test. Firewalls test packets by examining sets of rules, protocols, ports,
and destination addresses.
In system networking, packets are formatted units of data carried on packet-switched networks.
These networks can be fault tolerant because they disassemble messages into small pieces, or
packets, and send them separately across the network. When packages pass the firewall and
arrive at their destination, they're reordered to display their information correctly. Done
correctly, packet switching optimizes networks' channel capacity, minimizes transmission
latency, and increases the effectiveness of communications. Packets contain two important
components:
• Headers: Packet headers direct the data to its desired destination. They contain portions
of internet protocol (IP), addressing and any other data required to get the packets where
they're meant to go.
• Payloads: The payload is the user data within the packet. This is the information that's
trying to get to its destination.
TYPES OF PACKET FILTERING
1. Static packet filtering firewall
A static packet filtering firewall requires you to establish firewall rules manually. Similarly,
internal, and external network connections remain either open or closed unless otherwise
adjusted by an administrator. These firewall types allow users to define rules and manage ports,
access control lists (ACLs) and IP addresses. They're often simple and practical, making them
an apt choice for smaller applications or users without a lot of criteria.
2. Dynamic packet filtering firewall
Dynamic firewalls allow users to adjust rules dynamically to reflect certain conditions. You
can set ports to remain open for specified periods of time and to close automatically outside
those established time frames. Dynamic packet filtering firewalls offer more flexibility than
static firewalls because you can set adjustable parameters and automate certain processes.
3. Stateless packet filtering firewall
NAT TYPES
There are three different types of NATs. People and organizations use them for different
reasons, but they all still work as a NAT.
• Static NAT
When the local address is converted to a public one, this NAT chooses the same one. This
means there will be a consistent public IP address associated with that router or NAT device.
• Dynamic NAT
Instead of choosing the same IP address every time, this NAT goes through a pool of public IP
addresses. This results in the router or NAT device getting a different address each time the
router translates the local address to a public address.
• PAT
PAT stands for port address translation. It’s a type of dynamic NAT, but it bands several local
IP addresses to a singular public one. Organizations that want all their employees’ activity to
use a singular IP address use a PAT, often under the supervision of a network administrator.
5. Port Address Translation
Port Address Translation (PAT) is an extension of Network Address Translation (NAT) that
permits multiple devices on a LAN to be mapped to a single public IP address to conserve IP
addresses.
PAT is like port forwarding except that an incoming packet with destination port (external port)
is translated to a packet different destination port (an internal port). The Internet Service
Provider (ISP) assigns a single IP address to the edge device. When a computer logs on to the
Internet, this device assigns the client a port number that is appended to the internal IP address,
giving the computer a unique IP address.
If another computer logs on the Internet, this device assigns it the same public IP address, but
a different port number. Although both computers are sharing the same public IP address, this
device knows which computer to send its packets, because the device uses the port numbers to
assign the packets the unique internal IP address of the computers.
To add or edit PAT:
1. To add a service, click Add in the Port Address Translation table.
To edit a service, select the row and click Edit. The fields are open for modification.
4. Click Save.
Physical Controls
Physical controls are the implementation of security measures in a defined structure used to
deter or prevent unauthorized access to sensitive material.
Examples of physical controls are:
• Closed-circuit surveillance cameras
• Motion or thermal alarm systems
• Security guards
• Picture IDs
• Locked and dead-bolted steel doors
• Biometrics (includes fingerprint, voice, face, iris, handwriting, and other automated
methods used to recognize individuals
Administrative controls
Administrative controls (also called work practice controls) are used in the workplace to reduce
or limit the exposure to a specific hazard. This kind of hazard control works by changing how
work is done when elimination, substitution, or the use of engineering controls is not feasible.
In the Hierarchy of Controls, administrative efforts rank fourth for effectiveness and efficiency.
A legal issue is something that happens that has legal implications and may need the help of a
lawyer to sort out. It is a question or problem that is answered or resolved by the law. Page | 38
Sometimes it is not obvious that a matter will involve the law such as unexpected illness which
might lead to legal questions about employment, mortgages, or insurance for example.
Legal issues can come up in lots of different ways including from planned events in your life,
like buying a home or making a will. They can also appear suddenly, such as family problems,
problems at work or being accused of a crime. Other common legal issues include things like
immigration and asylum, consumer rights, housing problems and issues to do with debt and
money.
Cyberspace Privacy Laws and Issues
Cyberspace can be defined as an intricate environment that involves interactions between
people, software, and services. It is maintained by the worldwide distribution of information
and communication technology devices and networks.
With the benefits carried by the technological advancements, the cyberspace today has become
a common pool used by citizens, businesses, critical information infrastructure, military and
governments in a fashion that makes it hard to induce clear boundaries among these different
groups. The cyberspace is anticipated to become even more complex in the upcoming years,
with the increase in networks and devices connected to it.
REGULATIONS
There are five predominant laws to cover when it comes to cybersecurity:
Information Technology Act, 2000 The Indian cyber laws are governed by the Information
Technology Act, penned down back in 2000. The principal impetus of this Act is to offer
reliable legal inclusiveness to eCommerce, facilitating registration of real-time records with
the Government.
But with the cyber attackers getting sneakier, topped by the human tendency to misuse
technology, a series of amendments followed.
The ITA, enacted by the Parliament of India, highlights the grievous punishments and penalties
safeguarding the e-governance, e-banking, and e-commerce sectors. Now, the scope of ITA
has been enhanced to encompass all the latest communication devices.
The IT Act is the salient one, guiding the entire Indian legislation to govern cybercrimes
rigorously:
Section 43 - Applicable to people who damage the computer systems without permission from
the owner. The owner can fully claim compensation for the entire damage in such cases.