Legal Ethics

  • Uploaded by: theethicalhacker
  • 0
  • 0
  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Legal Ethics as PDF for free.

More details

  • Words: 1,778
  • Pages: 18
Legal and Ethical Aspects of Computer Hacking

ECE4112 – Internetwork Security Georgia Institute of Technology

1

Some History of Hacking • December 1993 USENET posting by Farmer and Venema • Idea of using techniques of an intruder to evaluate system security • Approach can help companies secure systems • Distributed Security Analysis Tool for Auditing Networks (SATAN) ECE 4110 - Internetwork Security

2

Ethical Hacking • Approval from the organization inside which the hacking will occur • Tiger team uses tools and techniques to evaluate security • Inform owner of files and systems before the fact

ECE 4110 - Internetwork Security

3

Hackers • Term coined by the media back when computer time was stolen by unauthorized users • Prior to this media coined term, a Hacker was: “a person who enjoys exploring the details of programmable systems and how to stretch their capabilities; … one who programs enthusiastically.” ECE 4110 - Internetwork Security

4

Learning to Hack • Hacking Schools  Zi Hackademy, Paris  Civil Hackers school, Moscow

• Hacking Classes  This class  Government Training  Company training

ECE 4110 - Internetwork Security

5

Ethical or Not? • So who is responsible for the outcome from these teachings?  It’s the teachers! They are the ones teaching such techniques and tools and inflicting painful examinations.  It’s the students! They are responsible for the actions they decide to take after learning tools that others use to attack. How can you figure out how to defend yourself if you do not understand the attacks? Only through knowledge can you defend yourself ECE 4110 - Internetwork Security

6

The Law • What types of policies are in place? • How do they differ from each other? • What kind of defined lines are there? • Should these laws exist? • Are these laws clear enough?

ECE 4110 - Internetwork Security

7

United States Code Title 18 Crimes and Criminal Procedure • Part 1 > Chapter 119 > Section 2511  Interception and disclosure of wire, oral, or electronic communications prohibited.

• Part 1 > Chapter 121 > Section 2701  Unlawful access to stored communications

http://www4.law.cornell.edu/uscode/18/

ECE 4110 - Internetwork Security

8

Georgia Computer Systems Protection Act HB 822 • Computer Invasion of Privacy  Any person who uses a computer or computer network with the intention of examining any employment, medical, salary, credit, or any other financial or personal data relating to any other person with knowledge that such examination is without authority shall be guilty of the crime of computer invasion of privacy. ECE 4110 - Internetwork Security

9

Patriot Act: • USA Patriot Act: Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act • U.S. government’s anti-terrorism policy

ECE 4110 - Internetwork Security

10

Homeland Security • Department of Homeland Security • Some call this a National Police Force • Connects 22 different Agencies • Exchange of information becomes a norm • Centralized institution with the power to keep track of computer and email usage

ECE 4110 - Internetwork Security

11

Georgia Institute of Technology • Computer and Network Usage Policy  Available for all students and faculty  http://www.oit.gatech.edu/information_s ecurity/policy/usage/

• Authorize users and uses • Privileges for individuals • User Responsibilities  Access to Facilities and Information ECE 4110 - Internetwork Security

12

GIT Computer and Network Usage Policy 4.6. Attempts to circumvent security Users are prohibited from attempting to circumvent or subvert any system.s security measures. This section does not prohibit use of security tools by personnel authorized by OIT or their unit. 4.6.1. Decoding access control information Users are prohibited from using any computer program or device to intercept or decode passwords or similar access control information. 4.6.2. Denial of service Deliberate attempts to degrade the performance of a computer system or network or to deprive authorized personnel of resources or access to any Institute computer system or network are prohibited. 4.6.3. Harmful activities Harmful activities are prohibited. Examples include IP spoofing; creating and propagating viruses; port scanning; disrupting services; damaging files; or intentional destruction of or damage to equipment, software, or data. ECE 4110 - Internetwork Security

13

Policy Maker Questions: • How easy is it to catch hackers and how many hackers have been caught? • Are these policies good enough? • Do the current policies actually define the limits of “hacking”? • Can companies hack into their own systems and find vulnerabilities? • Can other find vulnerabilities for them without being asked to? ECE 4110 - Internetwork Security

14

What if? • A Georgia Tech student uses their personal PC and the school’s network to do a port scan on a commercial web site. • A Georgia Tech student uses their personal PC and a commercial ISP to do a port scan on a commercial web site. • A Georgia Tech student sends a “spoofed mail” from the school account that appears to come from another user. • A Georgia Tech student uses a school computer and password guessing software to access and crack the administrator password. • A Georgia Tech student discovers that another user failed to log off when departing. The student uses the account to send an inflammatory email to the department chair. ECE 4110 - Internetwork Security

15

Lab Enhancements What corrections and or improvements do you suggest for this lab? Please be very specific and if you add new material give the exact wording and instructions you would give to future students in the new lab handout. You may cross out and edit the text of the lab on previous pages to make minor corrections/suggestions. General suggestions like add tool xyz to do more capable scanning will not be awarded extras points even if the statement is totally true. Specific text that could be cut and pasted into this lab, completed exercises, and completed solutions may be awarded additional credit. Thus if tool xyx adds a capability or additional or better learning experience for future students here is what you need to do. You should add that tool to the lab by writing new detailed lab instructions on where to get the tool, how to install it, how to run it, what exactly to do with it in our lab, example outputs, etc. You must prove with what you turn in that you actually did the lab improvement yourself. Screen shots and output hardcopy are a good way to demonstrate that you actually completed your suggested enhancements.

ECE 4110 - Internetwork Security

16

G TISC M ini-Net10-19-2005 Accounting-rtr Cisco 1760.1

#11

NETW ORK/M ASK:VLAN

S2

W eb Server Redhat Apache

Virtual IP Addresses .1

172.16.4.0/24:104 .2

.1

172.16.7.0/24:107

172.16.2.0/24:102

#9 .1

Gateway-rtr Cisco 1760-K9

.1

.2

12

172.16.5.0/24:105

.1

O S PF 0

#7

Cust1-site2-rtr .34 C isco 1760-K9+NAT

Cust1-intr2-rtr Cisco 1760

#27

.2

75.196.15.0/30:157

64.0.1.32/28:151

.1

64.0.1.16/28:152

.1

192.168.30.0/24:154 .17

Web Server Redhat Apache 172.16.2.99 .1

172.16.8.0/24:108

#26

Cust1-site1-rtr Cisco 1760-K9+NAT

64.0.2.0/24:153

.1

.1

#25

.2

.33

.1

EBGP

212.43.0.0/24:100

#10 .1 Engineering-rtr Cisco 1760

O S PF 1

75.196.17.0/24:159

.1 .1

.18

R2

.2

.1

#8

Edge-fwall .4 Cisco PIX-515E

75.196.18.0/24:160

192.168.20.0/24:164 Goodisp-dns Dell Poweredge

.13

Edge2-rtr Cisco 1760-K9

.1

192.168.10.0/24:163

192.168.20.0/24:162

S2

172.16.3.0/24:103

.1

R1

Enterprise-dns Dell Poweredge

.2

.2

Honeynet

192.168.10.0/24:161

.10

192.168.0.0/24:101

.3

172.16.6.0/24:106

BG P

OSPF

RIP

Autonom ous System

199.77.32.0/30:300

.254

O SP F 0

Cust1-hq-rtr Cisco 1760-K9+NAT .1

.49

#23

64.0.1.48/30:150 Goodisp-rtr Cisco 3550-24-EMI (L3)

.50

.2

.1 75.196.14.0/30:156

#28 .1

EB GP

75.196.16.0/24:158

O SP F 0

.254

#29

Cust1-intr1-rtr Cisco 1760

75.196.10.0/24:155

199.107.254.252/30:304

Edge1-rtr Cisco 1760-K9

R9

EBG P .99

“ENTERPRISE” AS 64800

.253

“TIER 1 - om ega” AS 64514 “UNIVERSITY” AS 64900

R3

.10 XP honeypot

.11

S4

H oneynet

CS-rtr Bridge Cisco 1760 .3 .1 .1

.1

.34

.4 PWR

WIC0 ACT/CH0

WIC0 ACT/CH0

ETH ACT

OK

ACT/CH1

ACT/CH1

COL

Admin-vpn .254 Cisco VPN Conc. 3005

138.210.238.0/24:208

R4

R7

.42

.1

.1

Admin-rtr Cisco 1760-K9 .1 .2

#17 .1

S2

.2 .1

138.210.232.0/24:202

.1

.1

R IP

138.210.236.0/24:206

#19

.18

.1

.1

138.210.233.0/24:203

#20

57.35.5.0/24:258

192.168.110.0/24:209

#18 .1 CS W ebserver CS Ftp Server Redhat Apache CS2-rtr Redhat http://ww w.cc.university.edu Cisco 1760

57.35.0.16/30:252

StorageRus-rtr 1760-K9

.1

Cust2-rtr Cisco 1760.1

57.35.10.0/24:260

O SPF 0

57.35.3.0/24:256

R5

.100

138.210.235.0/24:205

.254 Badisp-dns Dell Pow eredge

57.35.0.0/30:253

U niversity-dns Dell Pow eredge

.2

S2

57.35.7.0/24:250

#15

.17 Badisp-rtr Cisco 3550-24-EMI (L3)

.5 138.210.231.0/24:201

.1

.1

EB GP

#14

138.210.234.0/24:204

.43

“BAD ISP” AS 64700

199.110.254.40/30:307

EBG P

.2

138.210.251.0/24:200

#22

.42

“TIER 1 - Sigma” AS 64515

Sigm a2-rtr C isco 2621-XM

.41

199.77.33.0/30:303

#16

138.210.237.0/24:207

#4

.1

Root1-dns Dell Poweredge

“GO OD ISP” AS 64600

62.7.200.32/30:309

G ateway2-rtr .1 Cisco 3550-24-EM I (L3) .1

S4

.254

S2 .17

.242

EB GP

138.210.240.0/24:210

138.210.228.0/24:211

HUB

IBG P

199.77.30.16/30:306 199.77.250.240/30:302

Cust1 W ebserver Redhat Apache http://ww w.cust1.com

199.107.12.0/24:305

#3 .2 Sigma1-rtr.18 Cisco 2621-XM

#2

.241 .33 Om ega-rtr Cisco 2621-XM

.253 .1

199.77.31.0/30:301

EB GP

S4

Redhat honeypot

.1

.151

University Webserver Redhat Apache http://ww w.university.edu

.1

EBG P

62.7.245.252/30:308

Adm in Webserver MS IIS http://www .admin.university.edu

S3

.10

.16

57.35.6.0/24:259 .8

S5

NAS Dell Network Attached Storage

Viz

.9

.11 - .200

Printer W 1 ...

.5

… W 24 TA1

R6

StorageRus W ebserver MS IIS http://w ww.storagerus.com

57.35.4.0/24:257

17

References 1.

Pfleeger, Charles. (2000). Security In Computing (2nd ed.). Upper Saddle River, NJ: Printice Hall PTR.

2.

From RedDragon on IRC, handed to newbies. January 16, 2001. http://newdata.box.sk/2001/jan/are.you.a.hacker.html

3.

Protect Yourselves From Hackers CDs. 2002. http://www.onedollarcds.com/hack

4.

Vasilyev, Ilya V. Civil Hackers' School. April 12, 1999.

5.

Coomarasamy, James. Learning to Hack. December 1, 2001. http://news.bbc.co.uk/1/hi/world/europe/1686450.stm

6.

Georgia Computer Systems Protection Act. Last Modified: June 29, 2002. http://www.security.gatech.edu/policy/law_library/gcspa.html

http://klein.zen.ru/hscool/

7. Title 18, Part 1, Chapter 119, Section 2511 – Interception and disclosure of wire, oral, or electronic communications prohibited. US Code Collection. http://www4.law.cornell.edu/uscode/18/2511.html 8.

Title 18, Part 1, Chapter 121, Section 2701 – Unlawful access to stored communications. US Code Collection. http://www4.law.cornell.edu/uscode/18/2511.html

9.

Minow, Mary. The USA PATRIOT Act and Patron Privacy on Library Internet Terminals. February 15, 2002. http://www.llrx.com/features/usapatriotact.htm

10. Bush Homeland Security bill nears passage by US Congress. The Editorial Board. November 18, 2002. http://www.wsws.org/articles/2002/nov2002/home-n18.shtml 11. Georgia Institute of Technology Computer and Network Usage Policy. Office of Information Technology. Last Modified October 20, 2003. http:// www.oit.gatech.edu/information_security/policy/usage/ 12. Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet. 2nd edition. Prentice Hall. 2003. Page 289. 13. Palmer, C.C. Ethical Hacking. International Business Machines Corporation. Copyright 2001. www.research.ibm.com/journal/sj/403/palmer.html 14. Harvey, Brian. Computer Hacking and Ethics. April 1985. www.cs.berkeley.edu/~bh/hackers.html 15. Shell, Barry. Ethical Hacking. Georgia Straight Weekly, Vancouver, BC. September 14, 2000. http://css.sfu.ca/update/ethical-hacking.html

ECE 4110 - Internetwork Security

18

Related Documents

Legal Ethics
May 2020 23
Legal Ethics
November 2019 37
Legal Ethics
November 2019 33
Legal Ethics
July 2020 10

More Documents from ""