SECTION 6 ©
National Institutes and IT Security Organizations
|
As taught by Prof. Tim Richardson School of Marketing & e-Business, Faculty of Business, Seneca College, Canada
last
updated 2002 Dec 28
|
|
|
The SANS Institute http://www.sans.org
Bethesda, Maryland, USA in their own words "The SANS
(System Administration, Networking, and Security) Institute is a cooperative
research and education organization through which more than 96,000 system
administrators, security professionals, and network administrators share
the lessons they are learning and find solutions for challenges they face.
SANS was founded in 1989."
|
|
What products
does SANS offer people interested in the most contemporary and reliable
internet security information?
SANS offers three different free electronic subscriptions:
|
The ECRC Program is sponsored by the U.S. Department of Defense Joint Electronic Commerce Program Office (JECPO). The Bremerton ECRC is operated by Concurrent Technologies Corporation, EDC of Kitsap County and Olympic College for JECPO |
Electronic Commerce Resource Center
'ECRC'
Bremerton, WA USA The ECRC describes itself as a "clearinghouse and jumpstation for electronic commerce information and resources" |
"The Security Resources page includes resources on a variety of security issues, including document transfers, financial transactions, firewalls, and virus information. The ECRC also offers a free Internet Security Issues seminar" | http://www.becrc.org/security.htm
|
National
Government Involvement in internet crime and e-business Security National
|
|
Chpt 5 Regulatory Environment |
Regulatory
Environment
2nd ed. page 157 Carnivore "Carnivore, as the general public has learned, is a software program that can monitor and track packets of data passing through an ISP's network. Government officials claim that the software will only be used in those instances in which a court order has been obtained to monitor a specific, alleged criminal act. Privacy advocates do not trust the intent or use of the software, and worry that widespread monitoring of e-mail contents will occur." |
"Carnivore attaches a combination
of hardware and software applications to the network of an Internet
Service Provider (ISP) and scans all of the e-mail and other transmissions
to
locate a "target" piece of e-mail or communication from a specific person or suspect. Carnivore can analyze millions of messages per second while it searches for the specific messages that it wants. The FBI is developing
Carnivore to help the agency police cyberspace. Law enforcement officials
have expressed increasing concern over how the Internet is used illegally
for those who would anonymously distribute child pornography, steal confidential
proprietary information or wreak havoc on e-commerce giants by hacking
into their systems".
full online article at
|
|
The FBI's own statement
on their web site about using "Carnivore" at
http://www.fbi.gov/hq/lab/carnivore/carnivore.htm "In recent years, the FBI has encountered an increasing number of criminal investigations in which the criminal subjects use the Internet to communicate with each other or to communicate with their victims. Because many Internet Service Providers (ISP) lacked the ability to discriminate communications to identify a particular subject's messages to the exclusion of all others, the FBI designed and developed a diagnostic tool, called Carnivore. The Carnivore device provides the FBI with a "surgical" ability to intercept and collect the communications which are the subject of the lawful order while ignoring those communications which they are not authorized to intercept. This type of tool is necessary to meet the stringent requirements of the federal wiretapping statutes. The Carnivore device works
much like commercial "sniffers" and other network diagnostic tools
used by ISPs every day, except that it provides the FBI with a unique ability
to distinguish between communications which may be lawfully intercepted
and those which may not. For example, if a court order provides for
the lawful interception of one type of communication (e.g., e-mail),
but excludes all other communications (e.g., online shopping)
the Carnivore tool can be configured to intercept only those e-mails being
transmitted either to or from the named subject."
|
National
Government Involvement in internet crime and e-business Security National
|
The RCMP's
Computer Crime Prevention webpage with sections on
"Emerging Internet-related crimes include piracy, copyright infringement, currency and document counterfeiting, smuggling, hate- and sex-related offences, stalking, extortion, mischief, conspiracy, theft, fraud, and gambling." from an article on the RCMP
web site titled
Maclean's online magazine had a story June 12th, 2000, "Canada's police are only starting to catch up with hackers and other criminals who target online computer users" The article mentions a number of well known internet security situations that have happened and says that "Canada's response has been relatively low-key" written by Chris Wood with
Brenda Ranswell in Montreal and Robert Scott in Toronto
RCMP involvement with e-businesses that have been hit by cyber crime. A recent example (Feb 2000)
is what happened to the HMV website. Basically, it was a denial of service
attack. HMV's site went offline for an hour Feb. 7 after being flooded
with bogus information.
|
click on the screen capture to access this section |
Professional
Security Service Companies |
KPMG Investigation and Security Inc.
part of the large KMPG accounting and consulting group of companies http://www.kpmg.ca/english/services Norman Inkster is the President of KPMG ISI and is best known for being the former Commissioner for the RCMP Many of the large professional
service firms such as KPMG, Price Waterhouse Coopers, Ernst & Young
have publications on their web sites re: e-commerce
|