DIGITAL SECURITY AND INFORMATION ASSURANCE


This blog is created to stimulate academic discussion in partial fulfillment of the degree of Doctorate of Computer Science in DIGITAL SECURITY AND INFORMATION ASSURANCE for the Colorado Technical University, Colorado Springs, Colorado.

Courses includes - EM835 Information Accountability and Web Privacy Strategies; SC862 Digital Security; Quantitative Analysis; Software Architecture and Design - CS854;















Sunday, January 30, 2011

Psychological security traps reviewed from Beautiful Security.

   Psychological security traps echoes what most psychologists knows about the human nature and its quest for innovations and advancement both technologically and in businesses. It highlights what it consider a combination of human error due to mere naiveté and a supposedly learned helplessness as the main culprits in
security woes and technical malfunctions of both old and emerging technologies.  Therefore, Psychological security traps has identified Learned Helplessness and naiveté; Confirmation traps and Functional Fixation as human factors that are responsible for more security failures in the development and implementation of systems and applications. 


Psychological security traps summarized the causative agents of severe security breaches as follows as it relate to Learned Helplessness and naiveté, and Confirmation traps

Systems designers often use shortcuts thereby creating more security vulnerabilities than anticipated.
Repeated frustrations are among the causes of the inability of security professionals of developing less security prone technologies.
The lack of well proven system/application methodology in tracking security vulnerability in products often leads to more exploits daily. For instance, the LOphtcrack software exploited security holes due to poor implementation and the use of cryptographic routines in Window systems. The path of least resistance was used in the development process and thus carries with it serious security and backward compatibility issues.
○ It is fair to say that corporate decision making machinery in itself often tend to affect the throughput of development activities. Whether its effect on security approaches in the development cycle is positive or negative is still debatable.
○ Most companies focus on functionality and quick turn round in security implementation thereby creating more security traps in their environments. I believe that achieving the proper balance between business drivers and providing the best security solutions is very difficult because of conflicting corporate interests.
Taking the path of least resistance to backward compatibility may unknowingly introduce more security issues. All compatibility issues need to be analyzed before being merged with a new product. They could unintentionally and adversely affect the outcome of new developed technologies in term of their security functions.




Functional Fixation
Functional fixation exposes the rudimentary problems of not seeing alternative ways of using tools but only restricted its use to perform a set of tasks.
Private enterprises see security as a cost to running the operation of the companies instead as a revenue generation tool.
Avoiding the confirmation trap syndrome can result in architecting for efficiency and well defined requirements that can result in enhanced security.
One of the greatest hindrances to security implementation is the negative perception at the high corporate level. For instance, security is regarded as a cost extensive venture with no mean of revenue generation.
Corporate entities see government intervention in information security as directly and negatively impacting revenue. The notion is that those security implementations never create revenue.
In oil related industries, the systems design is based on having competitive edge against their competitors and not solely to provide elaborate security to protect their assets and investments.
Security control systems should be separated from the general operation systems thereby reducing risk of attacks.
Always discourage the use of default configuration and settings out of the box as they are prone to attacks and exploitations. It is advisable to remove unnecessary services on systems to prevent the likelihood of local or remote attacks.
Optimal performance is enhanced by running only the desire services and applications on systems.


In summary, the chapter highlights the following as a way forward in ensuring the development of top most security products and implementation.
-          Decisions should be collective and more creative thinking involved and not restricted to handpicked individuals
-          Security decision machinery should be broad and devoid of corporate politics.
-          We should use our technologies as alternative tools and use different approaches to achieve the same goals.
-          Testing should be done using various application and system usage scenarios to detect areas that prone to exploits and vulnerabilities.
-          Lastly, psychological security traps concludes that backward compatibility issues are security problems in technology deployments and are prevalent with all vendors and not limited to Microsoft Windows products, UNIX and Apple computers.


Reference
Oram A., & Viega J. (Eds.). (2009) Beautiful security: Leading security experts explain how they think (pp 1-20). Beijing: O’Reilly Media


Sunday, January 23, 2011

Content For Digital Media.

The content for Digital media comes in different forms and with the use of internet more are discovered on a daily basis. The internet has also made its distribution far exceed the significant growth we observed in the print media in the 20th century. It is important to note that some are user generated. The role that the Digital Millennium copyright act plays as regard copyright protection of original works in digital media have not according to some school of thoughts be really quantified. Some content of digital media nowadays includes but not limited to:


- A photo or image
- A video post e.g. of a breaking news
- An audio file
- A blog post and a tweet
- Collection of web links
- A graphic or chart depicting a report or forecast
- A live chat or webinar
- White papers and a computer or device manuals
- Digital games
- Online streaming recordings
- An eBook. The list is endless.

Reference

Montecino V. (1996). Copyright and the Internet. Retrieved 01/20/11, from
http://mason.gmu.edu/~montecin/copyright-internet.htm




Saturday, January 15, 2011

Digital Copyright Basics 11

                                        
The digital copyright law requires that electronic communications comply with applicable intellectual property law. It makes it mandatory that the contents of electronic communications conform to laws regarding copyright as spelled out in the Federal copyright Act of 1976. Anything contrary to the Act and in compliance with the Digital Millennium Copyright law passed in Oct 1998, requires appropriate permission to distribute protected material in any form not limited to text, photographic images, audio, video, graphic illustrations and computer software and programs.
The US copyright law criminalizes any act of circumventing a system or electronic communication access control whether or not the copyright itself is violated.
It made it a criminal offence to produce, disseminates of technology that has the potential of circumventing measures to protect copyright works. These are some of the usefulness of the digital rights management (DRM) as spelt out in the United States copyright Law.
A copyright law similar to US copyright has been passed by the European Union known as Copyright Directive or simply EUCD. Each member of the European Union uses different legislation to ensure compliance with the EUCD.
            In as much as the US copyright Law prohibits the use of digital copyright materials, a portion of the act known as Title 11 the “Online Copyright Infringement Liability Limitation Act (OCILLA) offers liability protection to online service providers (OSPs) and internet service providers (ISPs) provided they do not encourage or promote the use of unauthorized copyright works in their domains. A part of the OCILLA act also makes it possible for subpoenas to OSPs to reveal the identity of their users if the need ever arises.
            In conclusion, the US copyright act has checks and balances to ensure that digital copyright works are protected from unnecessary abuses and infringements.

Reference:

Information Resources and Communications. Retrieved January 4, 2010 from http://www.ucop.edu/irc/policy/copycommit.html

 The Digital Millennium Copyright Act of 1998 U.S. Copyright Office Summary. Retrieved  January 4, 2010 from http://www.copyright.gov/legislation/dmca.pdf


Information Accountability and Web Privacy Strateg: Information Accountability & Web Privacy Strategie...

Information Accountability and Web Privacy Strateg: Information Accountability & Web Privacy Strategie...: "This blog is created to stimulate academic discussion in partial fulfillment of the degree of Doctorate of Computer Science in Digital..."