Security Trends of File Protection Technology in Israel
Transcription
Security Trends of File Protection Technology in Israel
2008 情財第 0155 号 イスラエルにおけるセキュリティ関連動向調査報告書 Survey on Information Security Situation in Israel Security Trends of File Protection Technology in Israel 2009 年 3 ⽉ GlobalConn LTD Security Trends of o File Protection Technology in Israel 0 Table of Contents Pages Introduction Overview 4-5 6-7 The Technology Used in Industry and Business In Israel for File Protection 1.1 The challenges and threats of security that the Israeli industry faces 8-9 Chapter 2: The Trends and Solutions – Defending technologies 2.1 Strong Authentication 2.2 Authentication Protections 2.3 Directory Integration 2.4 Failed Login Detection 2.5 Password Policy Assessment 2.6 Mirroring Techniques 2.7 On-line/Off-line Protection 2.8 Intrusion Prevention 2.9 Endpoint Security 2.10 Virtualized Security Platform Technology 2.11 Reports management 10-14 10 10 10-11 11 11-12 12 12 13 13 14 14 Chapter 3: Countermeasures – Protection Tools 3.1 Recovery and Anti Deletion 3.1.1 NetZ 3.1.2 SecureOL 3.1.3 DataMills 3.1.4 Repliweb 3.1.5 Covertix 3.1.6 XOsoft 3.1.7 Hexalock 3.2 Protective Security 3.2.1 Finjan 3.2.2 ControlGuard 3.2.3 Sentrigo 3.2.4 Hackstrick 3.2.5 Bsafe Information Systems 3.2.6 Gita Technologies 3.3 Anti Piracy 3.3.1 CheckPoint Software 3.3.2 San Disk (M-Systems) 15-25 Chapter 1: 8-9 15 15 16 16 16-17 17 18 18 18-19 19 19-20 20 20 20-21 21-22 1 3.3.3 3.3.4 3.3.5 3.3.6 3.3.7 3.3.8 Aladdin Cyber Ark Algoritmic Research Applicure Imperva Israel Innovia R&D Ltd 22-23 23 23-24 24 24-25 25-26 Chapter 4: File Protection survey at Business Sectors 4.1 Questionnaire 4.2 Answers 27-30 27-28 28-30 Chapter 5: File Protection at the Israeli Government 5.1 Tehila 5.2 On-line Payments Service (Shoham) 5.3 Israel Cert Computer Emergency Response Team 5.4 The Proceeding Authority 5.5 The Ministry in Charge 5.6 Yael-Government Intra-net System 31-45 35-38 38-39 40-43 44 45 45-46 Chapter 6: The Law in Israel 6.1 New Amendment 6.2 The Right of the Patient’s Law 47-52 50-51 51-52 Chapter 7: The Standardization of File Protection 53-54 Chapter 8: Protecting Files at Storage & Transit 8.1 Techniques and Different Systems 8.1.1 Authentication and Authorization 8.1.2 Confidentiality and Integrity 8.1.3 Availability 8.1.4 Auditing and intrusion detection 8.2 USB –Disk on Key Portable Storage Devices 8.3 Hard Copy and Electronic File Protection at Storage 8.4 File Protection in Cellular Phone and PDA’s 55-67 Chapter 9: File protection – Bluetooth 9.1 Cryptanalysis of the Bluetooth E0 Cipher Using OBDD’s 68-71 70-71 Chapter 10: Cases of File Protection in the Newspapers 72-74 Chapter 11: Researches by Universities and Institute 11.1 Real-Time Implementation for Digital Watermarking in Audio Signals Using Perceptual Masking 11.2 Condor Local File System Sandbox High Level Design Document. 11.3 Un-Trusted Storage 75-87 55-56 56 57 57-58 58-64 64-65 65-67 75-76 77-78 79-83 2 11.4 11.5 Terror on the Internet Struggle with Information Warfare and Possible Damage to Civil Rights Chapter 12: Bibliography 84-85 86-87 88-90 3 Introduction The development of telecommunication technology enabled remote surveillance, inspection and detecting information to be done from a distance, which brought with it business development on one hand but on the other hand privacy offenses. New technology extend the use of the PC at home and at the industry which contains private information, also the attitude of the democratic countries who provide direct contact with the citizen and allow accessibility of information by the public can also cause information offenses. Over the years the need for more sophisticated and advanced technology has arisen. The need to protect files brought with it new systems and technologies and legal measures. These were created to protect privacy, to normative standards and adopt laws to impose severe punishment to detect behavior which violates the law of democratic countries. An enterprise’s most valuable asset is its file system and database which is perhaps the most sensitive segment of an IT company. Many organizations are learning that database assets are vulnerable to both external attackers via Web applications and internal employees who take advantage of more direct privileges. Customer records, financial reports, patient data and other information are all at risk. In addition, compliance with regulatory requirements forces organizations to perform database security assessments. Huge efforts have been carried out by security companies and different research personnel to overcome these kinds of intrusions. Great investment has been dedicated to stop and overcome the evil force. In fact, it is an endless war against the criminals who are trying to permanently obtain information or damage files just for the sake of damage. On the other side, the industry is constantly developing newer and more advanced technologies to overcome any breach of security. 4 All these continuous efforts are needed because file security, like in any other software security, has basic problems which include bugs and weaknesses that hackers exploit. More sophisticated technology and new laws are needed to answer the vulnerability of file protection which if breached, can harm the private person in many ways, at his office or at home. Harm to a private person can occur if their private file, which exists in a public office such as a hospital, or insurance company or in a semi governmental organization or government office such as a water company, electricity company, gas company, or government office is breached. 5 Overview File protection and security has been addressed in past years by substantial research and development of different technologies by security software companies. This field will keep developing as the need for file protection grows. In our report, we will present research from universities and technologies from industry. In fact, we found that industry in Israel keeps researching and developing new products and bringing new ideas to the file protection field. The file protection issue is divided into two segments which need to be protected. Separate systems and technologies are needed for each segment; 1- An attack of the file from an external source, such as hackers or different malicious virus attacks and other technologies which are developed to ruin a file. The external attack against Israel is relatively higher than other countries due to the situation that Israel is in permanent conflict with terror organizations and has been attacked by cyber terror attacks which use the most sophisticated equipment to attempt to affect the security of Israel. 2- An inside intrusion, which can be done on purpose or by negligence. In our report, we will present the technology of some Israeli companies which are in the file protection field. The work will include some laws which were adopted to deal with file protection in Israel and describe some attacks which were aimed at damaging files in Israeli sites. The following subjects will be addressed in this work: The various file protection system used in Israeli businesses due to different security needs. Including examples of medical, banking and insurance files protection systems. It will also include file recovery, anti-deletion, messaging and on-line/offline protection of government agencies and the private sector as well as that of more secured sections in Israel. 6 File protection technologies used in the industry and businesses in Israel. Projects and policies that Israeli government agencies are promoting or using. The Israeli standards that have been set for file protection. File Protection research from Israeli universities. Description of attacks that were published in Israeli newspapers. 7 1. The Technology Used in Industry and Business in Israel for File Protection 1.1 The challenges and threats of security that Israeli industry faces: There are always possible threats to an organization’s files that can come either from outside the organization, such as from hackers and criminals who are trying to corrupt files, and damage them. The motives can also be espionage reasons or threats from inside an organization where an employee has personal motives to attack, damage or corrupt the organization’s files or where the employee wants to steal information or to make changes to the files or database for various reasons. There are also damages caused to files and database due to negligence or caused without bad intention. Following are some examples of reasons for file intrusion: a. Weak Authentication Weak authentication schemes allow attackers to assume the identity of legitimate database users by stealing or obtaining login credentials. An attacker may employ any number of strategies to obtain credentials. b. Automated recording vulnerability Automated recording of all sensitive and/or unusual database transactions should be part of the foundation underlying any database deployment. Weak database audit policy represents a serious organizational risk on many levels. c. Backup Data Exposure Backup file storage media is often completely unprotected from attack. As a result, several high profile security breaches have involved theft of file backup tapes and hard disks. d. Database Platform Vulnerabilities 8 Vulnerabilities in underlying operating systems and additional services installed on a database server may lead to unauthorized access, file corruption, or Denial of Service. The Blaster Worm, for example, took advantage of an operating system vulnerability to create denial of service conditions. e. Legitimate Privilege Abuse Intrusion from inside the organization can happen when a person has access privileges that exceed the requirements of his job function. These privileges may be abused for malicious purposes. f. Privilege Elevation Attackers may take advantage of database platform software vulnerabilities to convert access privileges from those of an ordinary user to those of an administrator. Vulnerabilities may be found in stored procedures, built-in functions, protocol implementations, and even SQL statements. g. Denial of Service Denial of Service (DoS) is a general attack category in which access to network and file applications is denied to intended users. DoS conditions may be created via many techniques. For example, DoS may be achieved by taking advantage of a database platform vulnerability to crash a server. Other common DoS techniques include file corruption, network flooding, and server resource overload (memory, CPU, etc.). Resource overload is particularly common in database environments. The motivations behind DoS are similarly diverse. DoS attacks are often linked to extortion scams in which a remote attacker will repeatedly crash servers until the victim deposits funds to an international bank account. Alternatively, DoS may be traced to a worm infection. Whatever the source, DoS represents a serious threat for many organizations. 9 2. The Trends and Technologies: Solutions - Defending Each of the above threats is addressed and has a solution to it. Following are some of the Israeli industries’ solutions and up-dated technologies: 2.1 Strong Authentication The strongest practical authentication technologies and policies are implemented. Twofactor authentication (tokens, certificates, biometrics, etc.) are preferable whenever possible. Unfortunately, cost and ease of use issues often make two-factor authentication impractical. In such cases, strong username/password policy (minimum length, character diversity, obscurity, etc.) should be enforced. Possibly, often changing the username and password. 2.2 Authentication Protections Unfortunately, despite best efforts at strong authentication, breakdowns occasionally occur. Password policies are ignored; a lucky attacker may successfully use brute force to break even a reasonably strong password; a legacy authentication scheme may be required for practical reasons. To deal with these situations, companies developed different solutions for Login Detection, and Authentication Assessment which provide broadly applicable authentication protection. 2.3 Directory Integration For scalability and ease of use, strong authentication mechanisms should be integrated with enterprise directory infrastructure. Among other possibilities, a directory infrastructure can enable a user to use a single set of login credentials for multiple databases and applications. This makes two-factor authentication systems more cost 10 effective and/or makes it much easier for users to memorize regularly changed passwords. Different technologies in the Israeli market track a range of user attributes that detect compromised login credentials. These attributes include user IP addresses, hostnames, and operating system username and client application. For example, if an attacker manages to gain login credentials by posing as an IT administrator, it would trigger multiple alerts when trying to use stolen credentials. The attacker’s hostname, operating system username, and possibly even the IP address would not match the profile of the real owner of the compromised login credentials. To further illustrate, assuming an attacker manages to compromise a user’s database credentials and operating system credentials and finds a way to use the victim’s actual computer, the technology is still extremely likely to identify the attack. At least two violations come into play: unauthorized query and activity which most likely violates the compromised user’s normal usage profile and the Time of Day – to gain access to the compromised user’s computer, the attacker is likely to use the machine at night or during other offhours. Since dedicated technologies include a model of normal hours, unusual off-hours access will trigger a Time of Day violation. 2.4 Failed Login Detection Optionally enforces a failed database login threshold (count and timeframe) to prevent brute force attacks. 2.5 Password Policy Assessment As part of its active assessment capability, evaluates password policy controls that are enforced by the database. For example, the technology should be able to determine whether or not password length, character diversity, and reset intervals are enforced by the database server. 11 Recovery - File Recovery allows recovery of critical and important documents, or other files, which have been lost by accidental deletion. These files may be lost by emptying the Recycle Bin or using other deletion actions that bypass the Recycle Bin altogether. Such actions include Shift-Delete, command line deletion, deleting excessively large files or using applications that delete files without the Recycle Bin. When a file is deleted from the Recycle Bin, the content of the file still remains on the drive, relatively intact, until the section of the drive it occupies is overwritten by another file. 2.6 Mirroring Techniques Mirroring Techniques is the creation of a remote copy of some files or complete hypermedia document. This technique is used for information that is very popular or served via low-speed connections. It can help in decreasing the network traffic over the Internet backbone. A mature algorithm for mirroring and a standardized portable hypermedia format can ease the distribution of hypermedia documents through the World Wide Web (WWW). The mirroring algorithm can create a remote copy of a complex HTML document stored in another WWW server. The algorithm provides the mirrored file in a portable hypermedia format. The proper use of this environment can decrease the network load during peak periods and can increase the accessibility of the selected hypermedia documents. 2.7 On-line/Off-line Protection There is a rapid increase in sensitive files such as healthcare records, customer records, and financial files. Protecting such file while in transit as well as while at rest is crucial. During its life-cycle, the data travels from various users through various networks and storage systems and ends up in online or offline file archives. Therefore, there exist numerous potential attack points. The file needs to be stored and protected at every stage of its life-cycle. 12 2.8 Intrusion Prevention Technology Intrusion Prevention Technology is a dedicated intrusion detection and prevention system that helps organizations secure their enterprise network, and protect servers and critical files against worms, automated malware, and blended threats both known and unknown. The technology has a hybrid detection engine that leverages multiple detection and analysis techniques to prevent network—and application-layer attacks. The attack confidence indexing allows customers to block only known, legitimate attacks thus ensuring protection without impacting business operations. The technology has multi-alert correlation which identifies patterns in alert activity that would otherwise be reported as separate, unrelated events. The technology also has a dynamic worm mitigation which identifies and blocks rapidly propagating worms. This technology has advantages in the sense that it has strong security to protect the network and business against increasingly sophisticated attacks and attack vendors. As this product has efficient management, it overcomes data overload with tools that provide direct, graphical focus only on important security events associated with critical business systems. 2.9 Endpoint Security Endpoint Security is the first single agent for total endpoint security that combines the highest-rated firewall, network access control, program control, anti-virus, anti-spyware, data security, and remote access. It protects PCs and eliminates the need to deploy and manage multiple agents, the technology includes both file security to prevent data loss and theft and a VPN client for secure remote communications and Malware protection (anti-virus/anti-spyware), file security including full disk encryption, port protection, and media encryption, remote access IPSec VPN, unified endpoint security management. 13 2.10 Virtualized Security Platform Technology for service providers and large-scale environments. The technology is a multi-service security operations platform designed for large-scale environments like data centers and POP networks. The technology enables to manage up to 250 virtual systems including firewall, VPN, intrusion prevention, and secured remote access functionality on a single or clustered, highly scalable hardware platform. This technology enables safe work from far places. It secures the working place and ensures that files are protected and the connection from two distant computers will not enable intruders. 2.11 Reports Management A technology that provides reports which provide managers the possibility to control their networks in order to manage them efficiently and validate the effectiveness of their security policies. The technology is able to deliver critical security intelligence to stakeholders concerned with auditing requirements and maximizing security investments while log file entries contain a wealth of data. The product security administrators can access multiple graphical reports on security, network and end user activity, to help them make informed decisions related to resource allocation, security optimization and regulatory compliance. 14 3. Countermeasures - Protection Tools List of companies for file protection: 3.1 Recovery and Anti Deletion: 3.1.1 NetZ This company develops security software products and services particularly in disaster prevention and recovery. The company developed an all-generic antivirus package. The methods implemented in their product resemble electronic warfare, which provides them their military strength and fail-safe nature. Their product is a software package for Virus Protection, Data Defense, and Disaster Prevention and Recovery. It is a complete generic solution to protect your data and applications from both viruses and data loss, without needing constant and scheduled updating. (www.invircible.com) 3.1.2 SecureOL This company developed a technology that allows any form of attack, whether a virus, worm, Trojan horse or malicious code to enter a PC, without causing any damage. Their concept of “Security by Virtualization” means that each program is segregated from the other, as if each is running on a separate computer. The solution is completely transparent to the user (i.e., the user is oblivious to the product which functions in the “background”), and ensures any assault to be isolated in its own Virtual Environment. Each environment operates simultaneously, without interference from the other environments and without harming the PC. It is as if each program is running on a clean machine and any damage therefore becomes irrelevant. (www.secureol.com) 15 3.1.3 DataMills This company develops a backup to disk solution that has a built-in lifecycle management for incremental backup generations (snapshots). Unlike backup to tapes, this solution provides an instant restore of any file from a multitude of backup generations. The technology is an incremental backup solution that can protect the important files and data from total or partial loss. The product is a high-end Eternal Incremental backup system bundled together with a backup generation manager. The backup generation manager can be easily configured to perform several policies for seamlessly discarding of older backup generations. This way, it may perform frequent snapshots, and at the same time keep for longer periods only the files that are needed. Recovering a file or data from a choice of several backup generations is a single session operation. (www.datamills.com) 3.1.4 Repliweb This company is developing file replication and content synchronization solutions. Their solution enables data replication and file synchronization in a variety of networking environments. The technology gives a solution for large volume file replication and data synchronization and enables content deployment in a variety of networking environments, employing scheduling, recovery and security processes. This technology does not change the system settings, modify the kernel, install device drivers, or add accounts with bypass privileges. It runs on a variety of Windows and UNIX platforms, as well as on NAS devices and is fully compatible with NET and Windows 2003 operating systems. (www.repliweb.com) 3.1.5 Covertix This company developed a technology that enables organizations to track, monitor and control documents and files within and outside of the organization. 16 The system utilizes a concept which transfers the file protection responsibility to the file itself. Each file encapsulates a dynamic set of rules which defines the appropriate protection and thus the file becomes a self-protecting file. The protection is transparent to the end-user, occurring automatically behind the scenes. The protection schema can be modified and updated by the system at any given time. The technology expands Microsoft’s RMS (Rights Management System). For example, it will enable protection of any file type and will provide tracking and reporting capabilities of file location and actions performed. (www.irv.co.il) 3.1.6 XOsoft This company developed an integrated software solution for WAN-enabled business platform continuity. The technology enables corporate information resources to continuously be synchronized and replicated in real time to ensure the data availability and a fast path to recovery from unexpected failures and disasters. This solution provides companies with continuous business data flow, and ensures seamless integrity, reliability and redundancy of business-critical information resources. The company’s products are: a technology for file replication and synchronization of files of any format over the WAN, technology for increased protection for application servers of any type, including open files and system settings, a set of dedicated solutions providing specific application servers with availability assurance and protection against both inadvertent and malicious data corruption, and an undo capability based data rewind technology which allows system administrators to instantly roll back damaged data resources to a previous, valid state. (This company was recently bought by CA) (www.xosoft.com) 17 3.1.7 Hexalock This company develops and markets digital copy protection solutions that help prevent unauthorized copying of digital content when stored on optical or other digital media. This technology offers publishers digital copy protection, so the content owners will be able to optimize their propriety technology and improve their product profitability. With the evolution of the digital-age, as digital content is rapidly becoming accessible to more and more people around the world, it also becomes vulnerable to unauthorized use by sophisticated software crackers and users. Content owners today demand copy-protection tools in order to protect their products throughout the products’ full product life cycle. (www.hexalock.com) 3.2 Protective Security 3.2.1 Finjan This company developed a technology to secure web gateway solutions for the enterprise market. This technology prevents crime-ware and other malicious web content from infiltrating corporate networks and stealing business data. The product, which is real-time security technology, detects malicious content based on the code’s intended criminal action, without using signatures, URLs or reputation attributes. This technology combats a wide array of web threats, including crime-ware, spyware, phishing, Trojans, obfuscated malicious code and other types of malware. By detecting and stopping web-based attacks before they enter the corporate network, this solution helps to protect continuous business operations and secure vital files and information assets. (www.finjan.com) 3.2.2 ControlGuard This company developed the Endpoint Access Manager, an enterprise-grade solution for protecting enterprise files and data. By implementing policy-based 18 control of endpoint access to devices and various media interfaces, the company manages the usage of enterprise files and data and protects it from a wide range of security threats. The technology will prevent copying or moving files and data to removable media and portable devices, such as CDs, memory sticks, PDAs, and smart phones. It shields the network from malicious code copied from portable devices to the endpoint and secures the network from exposure to the outside world through PCMCIA wireless modems, IR interfaces or blue tooth devices. (www.controlguard.com) 3.2.3 Sentrigo This company is developing a technology to secure PC files and safeguard databases. The technology is designed to secure enterprise IT infrastructure against all types of misuse, whether originating outside the organization or perpetrated by sophisticated insiders. The technology protects files and databases by monitoring all files and database transactions, alerting of suspicious activity and if necessary, stopping it in its tracks, using a non-intrusive solution that has no impact on the file or database performance, and is like bullet-proof database protection against all potential intruders, regardless of location, intentions or capabilities. The technology prevents intrusion, file or data theft and attacks on the database, and has a full audit trail for regulatory compliance requirements and compromise assessment. (www.sentrigo.com) 3.2.4 Hackstrick This company is developing security technology Outside-In and Inside-Out Digital Security for protection of classified digital files against unauthorized use and industrial espionage. Their technology, an all-in-one product, defends against external threats (outside-in security) with its full Unified Threat Management (UTM) functionality and addresses the inside-out Security Digital Asset System (SDAS). This solution is used to mark, block, and track sensitive documents sent 19 out through email, Instant Messaging, FTP or other electronic means and report or alert on these transmissions. 3.2.5 Bsafe Information Systems Besafe Information Systems develops network and file-security products for IBM iSeries (AS/400), zSeries (mainframe) and open systems. The technological advancements that have allowed files to be accessed from diverse sources including the Internet and other networked connections and the growth in the amount of sensitive information being stored in today's computer systems brought the development of this technology. Their solution is mainly for large organizations with rigorous security demands such as banks, insurance companies and public institutions for data-processing. (www.bsafesolutions.com) 3.2.6 Gita Technologies Gita Technologies develops a security technology that specialized in the communication security, network protection, encryption technologies, signal intelligence fields both for analysis and production and high-end information security. File and data structures analysis, telephony communication analysis and production, off-line communication analysis and production, IP traffic analysis, analysis systems enabling complex signal research via an advanced operator interface, and integrative solutions. The company’s solutions are used by various government agencies and high end enterprises. 3.3 Anti Piracy 3.3.1 CheckPoint Software Technologies Ltd. CheckPoint developed a technology called “Secure Virtual Network (SVN)” which provides the infrastructure that enables secure Internet Communications. The SVN technology secures business-to-business (B2B) communications between 20 networks, systems, applications and users across the Internet, intranets and extranets. Open Platform for Security (OPSEC) is a software technology open architecture solution that (OPSEC) provides the industry’s enterprise-wide policy management and policy enforcement framework. More than 200 companies which are part of the OPSEC Alliance leverage the OPSEC framework to provide customers choice and an integrated architecture that can centrally manage all aspects of secure enterprise networking. CheckPoint developed a Firewall technology, VPN Gateway (e.g., content security, authentication, authorization and intrusion detection.) The Firewall has a gateway anti-virus and anti-spyware protection against viruses, spyware, and worms at the gateway intrusion prevention integrates network- and application-level defenses including security for VoIP, IM, and P2P file-sharing applications, Web filtering, Advanced Web content filtering based on an extensive database of threat categories and associated URLs Centralized, multi-site management UTM-1 Total Security is the only UTM appliance solution that includes central management for multiple sites preinstalled Clustering for high availability UTM-1 appliances can be clustered as a solution so that both the gateways and the Smart Center servers can failover Six dimensions of Messaging Security Protects against the three major messaging-attack. (www.checkpoint.com) 3.3.2 San-Disk – (M-systems) Development of the USB flash drives gave security a major thought. Password protect USB drive “Cruzer® Professional” provides the freedom of a USB drive and the protection of powerful, hardware-based security to protect the most sensitive files and data. All security features are performed onboard by the drive and not by the operating system. Users can create a private, password-protected section of the drive for secure storage of confidential information; or store lesssensitive files in a public section for easy access and sharing. This sophisticated password protect USB drive includes a lockdown mode when it detects hacker- 21 like behavior, such as consecutive wrong password attempts. These secure USB measures do not reduce the speed of Cruzer Professional, which gives fast transfer rates of 24MB/sec Read and 20MB/sec Write. The password protect USB Cruzer Professional is a plug-and-play device, requiring no driver installation or special usage rights. Encrypted Flash Drive is aimed at the ultra-sensitive security requirements of government agencies and financial institutions. It gives the employees the option to safely extend their work environments to outside their office. This encrypted flash drive allows users to work safely and securely from any location. Rather than rely upon users to secure files, this technology imposes mandatory access control on all files; they are stored in a secure partition that implements the strongest 256-bit hardware-based AES encryption. Since the encryption keys never leave the drive, they are kept safe from software hacking attempts. Stored in a secured area totally sealed, the keys of this encrypted flash drive are also protected against physical tampering attempts. SanDisk has teamed with McAfee Security Company, to provide a solution for Flash Drive Security that protects against malware infection and file leakage. The joint solution of secure USB that includes encryption, password protection, and malware scanning is aimed to give a more broad protection to secure USB flash drives. This solution provides hardware-based encryption on all files together with password protection to safeguard data stored on company-issued drives both within and outside the office environment. 3.3.3 Aladdin Knowledge Systems Ltd. Aladdin develops software security products and tools for software developers and system integrators. This company’s products include the USB-based eToken device for user authentication and e-commerce security; HASP and Hardlock, hardware-based software security systems that protect the revenues of developers; and Privilege, a software licensing and distribution platform. 22 Their “Hardware Against Software Piracy” is a hardware-based software protection system that prevents unauthorized use of software applications, protecting intellectual property. Aladdin is eSafe line of file and content security solution provides proactive, multi-tiered Internet Content Security from the gateway to the desktop, protecting the entire enterprise files and database from: malicious code that destroys or steals digital assets, inappropriate and nonproductive material, the misuse of company resources, and Internet-borne content. (www.aladdin.com) 3.3.4 Cyber Ark Cyber Ark develops a network-file security and e-business. This solution gives security, connectivity and auditing. The company offers two solutions based on the technology. The first technology is a secure Wide Area Network (WAN) for connecting enterprises to their partners, customers, and sub-contractors over the Internet. It enables enterprises to share information directly over the Internet as if they have deployed a shared WAN, but without actually doing so. Various modules enable enterprise users to leverage existing mail, file, and FTP servers securely without any changes in the way they work. The second solution is a Network Vault, a secure repository that provides a safe haven, highly secured regardless of overall network security, to protect critical files and administrative passwords. Based on multiple unified layers of security which serves to protect the single data access channel to the data-storage, the Network Vault protects information at rest as well as while in transit to end users inside the enterprise. It also provides auditing and access control capabilities. (www.cyber-ark.com) 3.3.5 Algoritmic Research This company developed software solutions for network and file security. The technology is a Firewall Analyzer (FA) for firewall auditing. The technology 23 identifies the rules that create security holes, and advises the user about how to close them. It exposes all the hidden risks in the corporate policy and generates a complete audit report that ranks the risks, presents each risk in a descriptive manner, and provides guidance about remedies. Following FA guidelines ensures that there are no “hidden” or unknown risks embedded in the corporate firewall policy. The technology indicates when a rule has changed and whether the change introduces any new risks. Currently, when a new rule is deployed, there is no feedback on the effect on Network Security. The technology analyzes all possible incoming and outgoing traffic, based on a detailed examination of the actual rule set of a firewall. (www.algosec.com) 3.3.6 Applicure This company is developing a solution for comprehensive web protection. This solution prevents exploitation of the core information of the company’s Internetlinked systems, blocking inappropriate usage at the portal and within the company. This gives the option for protection at the company’s web portal, and continues through internal application servers, and extends into the heart of the company’s critical business files and data, its confidential databases. The technology is a software based web application firewall. It’s compatible to the network firewall and other network-based Internet security products by intercepting seemingly legitimate users attempting to use the web application to commit fraud, or to gain access to valuable and confidential files. (www.applicure.com) 3.3.7 Imperva Israel This company developed Dynamic Profiling Firewall. It is aimed to give total application security - protection from web application, database, and worm attacks. The company’s technology gives advanced Enterprise Application Sphere Security Solutions, protecting next generation enterprise application 24 architectures from a wide range of known and unknown attacks. The company’s flagship product is a security solution to provide scalable defense for the entire Enterprise Application Sphere, transparently shielding the Application Sphere. The company detects and prevents intrusion attempts by learning and enforcing normal behavior on Application Sphere components (e.g., company files, web servers, databases). The technology covers risk analysis, security design, audit and penetration tests. (www.imperva.com/) 3.3.8 Innovia R&D LTD. This company developed a new Traceless Biometrics Solution that authenticates a user’s identity without requiring storage of any unique biometric information. Furthermore, the solution does not need to link, write, or bind any unique information to an external device, smart card, or network of any kind. The solution’s method is able to positively recognize and identify the biometric identity in real time without violating the user’s privacy and without leaving any intrinsic traces. The technology is not stored on any database, such as a bank, government, or any other system. Instead, the user securely provides a Token and by that maintains control over it. For example, the technology is called BIdToken. It can replace the PIN associated with an ATM card. Only the combination of physically possessing the ATM and Innovya’s Biometric Identifier (BIdToken), permits the individual to make a transaction at the ATM machine. In this new situation, when a PIN and/or PIN and card are shared with another individual or stolen, the identity of the individual using the card can be determined, allowing only the true owner to use the card. The method for determining the BIdToken is kept secure and therefore it is not possible to determine the non-unique BIdToken or its generation from the fingerprint or other unique biometric identifier by an unauthorized party (reverse engineering). However, a BIdToken can be replaced by another one and still be associated with 25 the real biometrics owner. Innovya’s solution neutralizes the obligation requirements for trust by third parties. 26 4. File Protection Survey at Business Sectors We have surveyed a few different sectors to observe the type of security they use to secure their files and documentation. Following are the sectors we surveyed. We chose large and small companies representing different sectors. We surveyed universities, customer service companies, banks and high-tech companies and private organizations. Following is the questionnaire we presented: 4.1 Questionnaire 1. What kind of technologies for file and data security does your organization use? 2. Which security factors do you choose to put emphasis on: messaging, anti-deletion, file recovery and on-line/off-line protection? 3. Who in the organization chooses these technologies? 4. Do they check if the technology has ISO standards? 5. Is it important whether the technology is purchased by an Israeli company or a foreign company? 6. How often do you check whether the technology is still relevant and, if not, then do you look for new technologies or just get the up-dates? 7. Does your organization produce intrusion reports? 8. What are the organization’s regulations in case of intrusions or penetration to the organization’s computers? 9. If a person from the organization is working from home, what are the organization’s regulations for securing his/her computer and the files on it? 10. If the organization’s laptop is lost, do you have special security that the information on it will not be revealed? 27 As the questionnaire was submitted in Hebrew, we translated it and we gathered all the answers together. Most of the questions of our questionnaire were not answered directly. The answer was “too sensitive, cannot answer.” 4.2 Following are the answers: 1- Most of the enterprises purchase a security technology and tailor it to their needs. In this way, they are sure that even the initial developers will not know how to enter their files and database. Some companies that do not hold sensitive information said that they use the Windows security permission technology. 2- The companies try to cover all factors of security. Some are secured by basic anti-virus or firewall technologies. Most companies put security emphasis on employee’s payroll and Human resources files. All companies advised that they have a daily backup system that is stored in fireproof safes to recover lost files. 3- Most of the enterprises have an IT department or a person who is in charge of database management, or the network manager. This person is in charge of the security issue also in the banks and companies holding on to “sensitive information”. 4- The large enterprises such as banks and insurance companies are restricted to a regulation issued to the Law of Financial Services in June 2007. (More details of the regulation are detailed below). Most companies do require technologies ascertained by ISO standards. 5- The companies are not dedicated to purchasing their security technology from an Israeli company. 6- The relevancy of the technology and its capability to totally secure the companies files and database is checked regularly. 28 7- The companies hold intrusion reports but they were not willing to provide or disclose this information. 8- In the case of intrusion, the companies rely on Regulation 357. 9- Most of the companies that hold sensitive information such as banks do not allow work from home. The high-tech companies use VPN (Virtual Private Network). Technology mostly purchased from the Israeli company CheckPoint. More details about this technology reported later in this report. If a worker needs to copy information, it will be copies on an encrypted disk on key and in the case of a burned disk it will be put in a secured envelope. 10- Companies that hold sensitive files hold private archives and do not send this information to outsourcing archives. There is a regulation that defines the time that information needs to be saved and then burned. There is information which is defined as needs to be “saved forever” and information that is not defined that cannot be archived. Every organization determines which information goes under which classification. We found that the banks in Israel and other enterprises are restricted to a regulation submitted to all institutional bodies in Israel, as defined by the Insurance from 1981. This regulation 357 was written in 30th June, 2007. The regulation provides guidelines for file and data security. The main issue is that the enterprises need to have secure areas, network management, separation environments, means of identification, digital signature, denial prevention mechanisms, working link to the Internet and e-mail system. The Purpose of this regulation is to protect the information of the organization’s clients (and other workers in the field such as insurance agents) from the pool of information risks. 29 The main principle of the regulations is to reduce the risks of using information systems and the exposure of sensitive files and information. This regulation lays out the provisions of the information and filing security. The outline of this regulation is as follows: 1. Management of file and data security 2. Classification of properties and evaluating information security risks 3. Conducting Information Security Risks Surveys and controlled penetration tests 4. Protection from attacks and viruses 5. Backup protection 6. Process of letting out sensitive files and information outside of the organization 7. Reaction to security events of file and information breach 8. Cryptographic systems 9. Connecting employees to the Internet 10. Online services and commerce. Some additional information about the Israeli Technion’s file security regulations: File protection at the Technion is managed by the Computer Center. A technical security forum, supervised by the Computer Center, operates in parallel and includes representatives from several faculties. The forum discusses suggestions and updates to the Technion’s file protection policy, recommends and supervises implementation of yearly programs, performs damage assessment after failure, and issues recommendations to Technion’s management. Among others, the following topics are handled: Policy - Setting general procedures and guidelines for file protection. Regulations - Setting obligatory regulations for the various users. McAfee Anti-virus - Distribution, installation and updates management of the anti-virus software. Firewall - Management of firewall software on Technion servers. 30 5. File Protection at the Israeli Government The use of the filing of documents in the government Database instead of the usage of paper has grown rapidly within the past few years and became inseparable from daily life. The pace of development and expansion of the usage of computers and documentation creates dependability on the computer and its applications. Documents and filing government forms on the PC are established by organizations at all levels of government. Local administrations have all taken a step further to simplify the process of using and searching for files on the government sites which will be elaborated in this report. The potential for e-mail communication between the public and civil servants has grown considerably in the past two years. Some administrations have established e-mail policies and now have a widespread infrastructure that makes such communication technically feasible. To benefit from this infrastructure, the processes will be geared to exploit the facilities. In Israel, the Government has a principal website that provides forms for different needs that the citizens can use, and there are other dedicated departmental sites for additional purposes as well for the convenience of the Israeli citizens. The Government established a single point of entry containing direct links, indexing and search facilities which can simplify and enhance the provision of government information. These services have brought with them need to secure the files of the government websites to ensure the privacy and security of the personal information that is provided through this government’s services. 31 The Israeli Government guaranteed its citizens that by the year 2005, they would look back to this time of pre “e-Government”, and it would seem distant and out-dated, just as the times before cellular phones and the fax machines look to us today. The responsibility of management and administration of the principal government website including securing personal information on files on the site ultimately falls at the central or federal level and under the control of the Prime Ministry Office and Finance Ministry which gives financial support to back the policy decision. The main contributions of the government website are the following: 1. Improving public service as the Government uses Internet technology as an important mechanism to give services to Israeli citizens. 2. Reduction of paperwork, which saves space and contributes to a clean environment. 3. Increasing the dissemination of the Government’s information to the public and increasing the effective publishing medium and contact with the private citizen. 4. Improving the electronic service delivery in the government offices and improving contacts among the government offices. 5. Providing means to support policy initiatives and helping the transparency of the Government, and subsequently helping to obtain public opinion on different issues. In Israel, legislative proposals are published on the web and comments are invited. Relevant comments are submitted to the parliament, and debates and feedbacks are provided electronically. The parliament site also supports a monthly discussion forum with the citizens on a popular issue. 32 Different Government Projects for Security The Government succeeded in securing information which is sent from the Government to the citizens and vice versa. The different projects in e-Government include: Project “Tehila”, is a comprehensive infrastructure to realize “e-Government” services in Israel. Project “Shoham”, is an on-line payment system from and to the Government. Project “Tamar”, provides security for connection to governmental databases by using electronic signatures. The project includes the use of different forms to identify the citizen who gets in contact with the Government. Project “Lehava”, is a telephone-based support center for those citizens who cannot use computers to assimilate the use of information technology in peripheral areas. Project “Merkava”, establishes the realization of “e-Government” program which will improve efficiency and upgrade and simplify the information flow inside government offices. Project for intranet that allows transfer of secured information among government offices. The Government established an inter-office steering committee of managers of government offices headed by the Prime Minister’s General Manager to apply the decision of the Government and to make decisions and adjustments in daily life. Following is a model of five layers which was established to describe the “e-Government” layout technologically, and detail the security systems required for the realization of the “e-Government” program: Layer 1 – Inter-governmental communication infrastructure: The basis of the Government’s ability to take care of it’s citizens is the existence of an intergovernmental communication infrastructure that will allow information flow within the Government and will give the different governmental bodies the 33 ability to provide services under the same umbrella. Without such infrastructure, each office is forced to work independently, and the level of service is directly damaged, both by the lack of unity as well as the fact that not all offices will forward “e-Government” at the desired pace. This layer includes security of the files and information and security during and after the transfer of the information. The Tehila Department is taking care of all the security stages. Layer 2 – Horizontal applications: An inter-governmental layer of horizontal applications and databases in the Government. This application is protected from the point of receiving the application and has security for the database. It is the governmental ERP, covering a variety of subjects which are at the heart of the organization: budget, logistics, manpower, etc. This integration of the information and the systems enables a unified terminology and accessibility needed to reach full integration of services. Layer 3 – Infrastructure for the citizen: This layer is different from the previous layers because it includes communication infrastructure as well as technologies that allow for transparency of only certain governmental systems, while maintaining information security in order to communicate with the citizen. The existence of layers 1 and 2 enables usage of an all-governmental, unified infrastructure for communication with the citizen. Layer 4 – Applications for citizen service: This layer includes the layout of “eGovernment” applications through which the citizen can use on-line sites and perform activities in them. These applications are especially built for public service and are adjusted to the public’s needs. Some of the applications are central but most of them are office-specific. The Tehila project layout security on the files and data that the citizens are communicating. 34 Layer 5 – Support and assimilation: A layer that needs special security because it consists of technologies and physical resources required for education and assimilation of the technology in challenged populations, who are not aware of the needs of security and don’t have a way to contact the Government Agencies through the electronic device. This layer is responsible for closing the digital gap and the actual usage of the systems by the layman. 5.1 Tehila The Israeli Government established a central body that provides Government Ministries and Institutions the ability to connect with citizens and between the government offices themselves, in highly secure services. In this way, the dangers associated with connecting these networks to the Internet are significantly reduced. The Tehila project began in 1997 to answer the growing need of Government Ministries to be connected to the Internet, in order to: Provide services and information, Make use of Internet resources, and Communicate via email with people both in Israel and worldwide. The Tehila project aims to provide a solution to the risks associated with exposing the Government network, in terms of information security, by connecting Government Ministries with appropriate security and control measures. Mission and Goals The mission of the Tehila project is to provide two main services: 1. Secure access to Internet services for Government users. Users receive a “service package” that meets the specific information security requirements. 2. Hosting of Government websites that provide information and services to the public, while using information security mechanisms to protect the data. 35 Among other goals, the Tehila servers have the following programs: 1. A system that checks the amount of e-mail that enters and exits each government site. 2. A system that identifies the attempts to attack from abroad and handles them. 3. A system that collects information about the attempts to attack and analyses it. 4. An automatic system that presents the types of attacks. The goals of the Tehila project To provide Government users with access to basic Internet services, while minimizing the information security risk to Government office computer systems. To make Internet services available to a large number of workers who require them and are unable to access them at their desks due to information security concerns. To build a secure platform upon which Government applications and data can appear on the Internet. To accelerate the entry of Government offices to the Internet world or to any new technology or to improve the communication with the citizens and among the government office or any other site, by creating an inexpensive and readily available infrastructure for creating websites. To provide security solutions when entering the Internet world with the goal of distributing information to citizens. To conserve resources for Government offices that are required to setup Internet infrastructures including: hardware, software and communication infrastructures or any other way of communication, for example covered communication that is not using the Internet or sites that nobody knows about its existence. Tehila Server Farm 36 Tehila’s Server Farm is located in the Government complex. It hosts websites of Government offices or any other covered site and bodies that invest a great deal of effort in exposing information under heavy security which is on-line service as part of the e-Government policy. The Tehila project consists of highly trained staffs, who maintain the Server Farm 24hours-a-day, 7 days a week, with maximum security, using advanced protection methods, including biometrics and special smart cards and more. The Communications Center infrastructure is protected using various means of warning equipment which maintains maximum security. The Server Farm is also protected by a UPS (Uninterruptible Power Supply) system that guarantees that the system will remain available even during emergency situations. The Server Farm is continually backed-up and also stored at an external location. Information Security Tehila uses a variety of resources to maintain its information security goals, beginning with a staff of information and communication security experts and continuing with a variety of products and technologies mainly from Israeli companies and also from leading world companies. Security systems at Tehila face large numbers of attacks yearly and succeed in overcoming them in most cases right away. In some cases, it takes a day or two to overcome the attack. During 2008, there were 90,000 attempted attacks, with 14,000 of them considered significant ones. Tehila’s mail servers process an average of 85,000 messages daily – about 30GB of data. On days with e-mail attacks, there may be as many as 550,000 messages. 37 Each day, approximately 100 virus attacks and attacks of other harmful software are avoided. On days with e-mail attacks, up to 80,000 harmful messages are received. There are about 51,000 warnings of attempts to attack government sites in the control rooms weekly. The most attacked sites in the Government are: The main government site, gov.il. The government payment service. The Treasury Ministry. Pension Funds. The Ministry of Health. 5.2 On-line Payments Service (Shoham) Another project for which Tehila covers security is the Shoham project, which provides for electronic payments to the Government. This project is developing at a fast pace with special security measures to enable the user to purchase products and transfer funds without waiting in queue or searching for the place to pay. It is possible to securely pay taxes and fees through the Internet as well as to purchase services and information that the Government offers its citizens. Tehila developed “Shoham” during 2001 and 2002, and today includes some 20 services out of which 5 are significant (income tax payments, fine payments, license renewals, VAT payments, and corporation taxes). During 2002, a sum of NIS 250,000,000 was collected through the payment system. In order to increase the number of services provided to the citizens and businesses, the project must be further developed, both technologically – by developing suitable software and hardware infrastructures, as well as by increasing the number of services offered to the citizen through it. The Project’s goals were: 38 • Increase the number of services so that every government office/affiliate unit will have a secured digital payment infrastructure, with strong emphasis on central services in the Government (such as tax departments). • Develop designated services for businesses and large organizations. • Increase commerce in the next year for the service up to 20% of the total business activity conducted between the public and the Government. • Support electronic commerce in large magnitudes and prepare a pay-off mechanism that will allow on-line payment with all banking establishments while dealing with information security problems. • Add services such as support for digital products, combining with forms and tenders projects, combining with smart card projects to identify the payer and pull out personal payments. Upon the completion of the second year of operation, it is possible to obtain a range of services from 28 government entities, including the Ministry of Transportation, the Customs and VAT Division, Income and Property Tax Commission, Court of Justice Management and many additional elements. This payment system constitutes a central tier in the online service center that the Government is making available to the public. By operating this system, the Government is able to save bank commissions and fees, while offering the public various payment options, including the use of credit cards and direct debits from bank accounts, without having to sign a standing order. 39 5.3 Israel CERT- Computer Emergency Response Team The Israeli Government established the site www.cert.gov.il in 2005 as part of the Tehila project, to give the public answers to file and Information security on the computers. Its main missions were: 1. Giving the Government answers about information and file security. 2. Processing information from different information resources in file and data security. 3. Coordinating reactions and actions on file and information security breaches. 4. Surveying file and information security in order to improve and make more efficient the Government, and authorizing information and file security events. The CERT staff is part of Tehila which established a new website in May 2007. Its purpose is to locate and alert specific attacks on world wide computers especially attacks on the Israeli Government on-line available websites. One new feature that this site provides is an electronic map of attacks that presents the attacks that are being carried out on the Government’s infrastructures’ website as it happens online. It provides the Tehila team an accurate picture of the amount of electronic attacks that are aimed at the Israeli Government. The warning about file and information breaches The CERT site presents the breaches, problems and bugs that were found in the software and hardware systems, and the level of danger that the breach constitutes. The homepage of the site presents the last warnings that were published by the CERT staff and the crucial breaches and warnings. Each warning includes the full technical details of the problem and the links to the official manufacturer’s announcements, links to additional information and additional solutions, provided CERT has this information. In the warning page, all the warnings that have been published will be shown, it is possible to find a summary of the warnings in order to find a specific warning, according to the manufacturer’s name, the level of danger and the date it was published. 40 CERT’S staff publishes in this site, reports and articles that deal with information, and data and file security. Among other subjects that it publishes, are demolition, vandalizing of the site and other details of file protection. CERT’s site enables everyone the possibility to be automatically updated with new warnings for attacks with RSS (Really Simple Syndication) messages that are sent directly to the computer. This RSS enables a customer to gather and handle a large amount of content that comes from a number of sites. The main difference between Israeli CERT and other CERT groups all over the world is the fact that it is government owned and financed and gives full service to the Israeli Government. Another application the Israeli CERT has is the attack map that provides on-line information on attacks from all over the world on the on-line Government services. Government policies for securing “sensitive files” and governmental database and its institutes: The government offices and its institutes, according to the law, use technological information systems to decisions for supervision, control, development and implementation of government policies enforcement. Definitions by the governmental committee: a. “Information” - news, data, symbols, concepts or instructions that are presented by a human or computer language, or a draft document, which are preserved and handled or stored at any storage possible and are assessed in any possible range. b. “Sensitive information”- any information that is possessed by the Government Ministries, Institutions, or other public authorities, or any kind of information, 41 the final stages of treatment, transporting, storing and saving is required because of being one of the following: 1. Information whose confidentiality, integrity, reliability or its availability may cause vulnerability or damage to: a. The good management of the country. b. The proper operations of Government Ministries or other public authorities. 2. Files containing personal information, protected by the “Privacy Protection Law of 1981.” 3. Files containing economic secrets, commercial, legal, organizational or other secrets, which were provided, voluntarily or due to obligations, by people or corporations to the Government Ministries and Institutes, which are required to keep these secrets, according to the law, or, according to the request of, the people who possess the files and information, or the people who provided it. 4. Files that must be kept according to the law. c. “File and information Security” - all steps and measures that are taken and are implemented in the different offices, whose purpose is to ensure that the file and its information must be protected from: injury and intentional or unintentional exposure, and to protect the availability, integrity, confidentiality and reliability of the information systems. The need to protect “sensitive files” and database, control and supervision derives from a few factors: a. The proper management of government offices and the performance of duties. b. The proper management of the country’s economy. c. The protection of privacy according to the privacy law and its regulations adopted in 1981. d. Securing “sensitive files”. 42 e. Prevention of damage from the investigation process or from a court hearing and protecting a persons’ right to a fair trail. f. Protection of files and database according to law and regulations. The use of essential information in the proper activities of the Ministries is contingent upon the ability to maintain quality, availability, completeness, reliability, secrecy, and confidentiality of the information database and software processes which in turn relates to how the information is collected, processed, saved, assessed and forwarded. The security policy of the Israeli Government: a. Instruct the Director General of each government office to prepare a document for “security policy” which will incorporate “sensitive information” information systems and files that is the responsibility of its office and to implement this security policy in its office and among all its employees according to the instructions of the committee in the Prime Ministers’ Office. b. To instruct the principles of the security of sensitive information and the rules and regulations governing this information to all the office employees that use or have contact with sensitive information and files. The responsibility for the execution of the procedure: The Director General Office has administrative responsibility which includes the preparation of a policy document to protect “sensitive files and information”, the database, information systems, and control and monitoring and to monitor the implementation of the policy. The person who is in charge of the security of files and information has responsibility to prepare the policy document of the office, a document which needs the approval of the Director General. All of the office employees have, without exception, a personal responsibility to act according to the guidelines listed on the policy document and to follow its security procedures. 43 5.4 The Proceeding Authority: By law, the areas of security of files and database systems, the control and supervision will apply to Ministers, and government offices and its authorities, in the following areas: a. Physical security of computers and records of sensitive files. b. Security to access files and information and permits to use this information. c. Security of files that is located within government offices in its buildings and the communications that are passed to areas which do not have supervision or control of the offices. d. Securing computer outputs and different files and information platforms. e. Securing personal computers including laptops. f. Disaster preparation (preparation of alternative operating systems to disable information, communication systems, control and monitoring) which will be evaluated annually to check relevancy. g. Securing sensitive files that are not magnetic or optical (paperwork, official certificates, stamps, etc). h. Conduction of reliability tests on employees that work with sensitive files and information or whose job is related to monitoring or controlling sensitive technology at the office. i. Performing monitoring and inspecting activities of “sensitive files and information” and database. This control will be part of the structured role of the person in charge. 44 5.5 The Ministry in Charge The Treasury Ministry, which is responsible for the Tehila project and which is in charge of fulfilling the government policy regarding security projects, issued recently a public tender which will be valid from February 19 until May 19, 2009 for the establishment, assessment and maintenance of a control and reaction system for file and data protection events – SIEM - Security Event Manager. The tender will be won by an Israeli company that has installed such a system in at least 25 other organizations and that can deal with at least 2000 events in one second. The system must have been installed in at least one Israeli organization that has at least 200 reporting components and deals with at least 500 events in one second. This type of SIEM system helps organizations to handle large volumes of logs that are created by the different security systems and are leveraged to provide efficient security in all. The increasing numbers of logs require the different organizations to establish new regulations in order to keep and to document information regarding security events. The combination of the NBAD (Network Behavior Anomaly Detection) system makes it possible to see what exactly is going on in the networks almost on line. The combination of such a system with a SIEM system enables the analyzing of logs in file security systems on line which creates a powerful and important security instrument. As the government offices have turned the computer into a permanent tool without which, their work would be stopped, any attempt to attack or to enter such a computer system places a danger to the organization. 5.6 Yael-Government Intra-net system The Israeli Government established in 2007, a new Intranet secured system for the Israel Securities Authority in collaboration with Tehila for internal communication to send electronic messages, including transferring files from one computer to the other within the Securities Authority. The system allows the transfer of messages securely with electronic signature, from the Securities Authority to the bodies that are controlled by it 45 such as corporations, fund managers, management companies, file managers, etc. and vice versa from these bodies to the Authority. The system will allow the workers to send messages signed electronically to the mail server in the most secure way. The Authority’s representatives are allowed to access their mail account in this system using a special security token and access the relevant web browser and view the message. This system will replace the current correspondence of mail, fax and e-mail in the near future. This project is part of a large project, “The Government Safe” which was established and is maintained by Tehila- the Treasury Ministry. The purpose of this project is to enable the government bodies to pass written mail in a secured electronic method. The authority drafted the law that will govern this procedure – secured electronic mail which was adopted in 2007. Amendments were also made to the law IN 1968 Security Law. This law also changed other laws that dealt with investment and consultancy. The token which was chosen for this system was specifically developed by the Israeli company Aladdin. The company tailored their technology to the Government’s needs for this system. 46 6. The Law in Israel File protection is included in many laws, such as in the income tax, banking and Patient laws. There are also specific laws that deal directly with file protection which shows the importance of this subject in Israel. One of the most important laws in this field is “The Protection of the Privacy Law” adopted in 1981. This law details the protecting of privacy of Israeli residents. In this law there are three chapters: The first chapter deals with protecting the privacy information of the citizens in PCs and all kinds of database. The second chapter of this law deals with privacy, and more specifically deals with private files which hold database information of private companies, institutes or private persons. The law details even how the information should be kept in sophisticated ways and used in computers. The Israeli law defines a private file which contains “sensitive information” and defines sensitive information. The law gives examples of what is sensitive information such as information about marital stratus, health, economic situation, opinions (such as political opinions, religion, and belief’s). The Justice Minister will publish regulations regarding privacy and sensitive information. According to the law, any person or company that accumulates information about people must ask permission to use it, and then this information must be protected. The law imposes a penalty of 5 years in prison for someone who reveals sensitive information that he obtained. According to the law, every person has the right to demand to omit his name from a private database that collected sensitive information if he so decides. This law prohibits 47 even the Government offices and Government institutes or any municipal institute from releasing any personal information that it has accumulated unless either the law specifically permits these institutes to do so or the information is released because it needs to fulfill its duty. Any public office or Government institute which releases or exposes personal information must register the information which was released. For example, on August 20, 2008, the Databases Registrar revoked a database registration. The Head of the Israeli Law, Information and Technology Authority (ILITA) and the Databases Registrar (the Israeli Privacy and Data Protection Agency) ordered, for security reasons, the registration revocation of two sensitive databases. The decision, a first of its kind in Israel, followed an investigation led by ILITA of a pre-employment testing and evaluation company’s privacy practices. The investigation revealed that an Israeli company allegedly violated substantial provisions of the Privacy Law, some of which constitute a criminal offense. Under the Privacy Law, subject to certain limitations, every computerized, business oriented database must be registered in a governmental database registry held and managed by the Databases Registrar. The law further provides that a database owner must notify the data subject of the purposes for which the data is processed and the identity of third parties to whom the data will be transferred. Other provisions of the law prohibit the processing of personal information for purposes other than the purposes for which the information was provided, and require every database owner to allow data subjects access to their personal records. The Databases Registrar found that this Israeli company transferred assessments and test results to additional employers, without receiving the required consent, presumably in an effort to save the costs of preparing new assessments. This company refused requests made by examinees to access their personal records and failed to provide them with a proper notification of the processing purposes and data transfers. 48 The revocation of the databases’ registration may impose a grave risk on this company’s business, as maintaining an unregistered database is a criminal offense, and can subject it to civil tort claims, as well. This company informed that it does not accept the legal analysis of the Databases Registrar and that it intends to fight the Registrar's decision. 49 Summary One can learn from this law, the importance and seriousness with which Israeli law treats file protection, by even giving the right to the family of a person that passed away to be able to block the release of his personal file which is considered private even after his death. Also, in case a person began litigation and passed away during the law suite, his family can continue the process after his death. Moreover, there is a restriction against personal files in criminal or civilian processes as proof of the person's actions in the past, or of his opinion, behavior, character or even his bad name, all this just to protect his personal privacy. The court has the power to prevent any publication of the personal file and to call back, collect or prevent printing the private information. It can be understood that the Israeli law is related to file protection in the most severe way. The law goes into great detail to protect the files. File privacy of a person is very important and anyone who ignores this basic right, will be punished in the most severe way. 6.1 New Amendment that prohibits various sorts of spam The Israeli Parliament approved at the end of May 2008, an amendment to the Israeli Communication Law that prohibits various sorts of spam: e-mail, fax messages, short text messages, such as cellular SMS and automatic dialing systems. This amendment states that any recipients should know in advance if there is an intention to induce them to spend money. The strict demand requirement for prior consent is mitigated by two exemptions. An advertiser may send a one-time unsolicited offer to businesses to accept further commercial messages. An advertiser may also send unsolicited commercial messages if the receiver of the message is a client or a potential client of the sender, if the message refers to a product or a service similar to products or services purchased by the client in 50 the past from the sender, and if the receiver is given proper opportunity to refuse any further messages. Furthermore, the advertiser must conspicuously indicate that the message is commercial in nature and that the receiver has a right to refuse any further messages. The advertiser must also provide clear contact details for sending refusal notices. The Anti Spam Law became effective in November 2008. Failure to comply with it will subject spammers and senders of commercial offers to statutory damages of up to NIS 1,000 (approximately US $300) per message. The amendment also indicates that a class action may be brought against infringers. This amendment has dual purposes: 3.1 Preventing saturation of PC with Spam. 3.2 Preventing virus files which can contaminate the PC and effect many files and computers. 6.2 The Right of the Patient’s Law This is an additional 1996 law which protects the right of the patient. The medical information of a person is considered “sensitive information”. This law defines what “medical information” is, how to protect it and how to enforce the law against the hospital’s staff while they are working and even after they leave their work. The law goes into details regarding transfer of patient’s medical information by the hospital to a different body, like for example: 1. When the patient himself agrees to it. 2. When the law forces the hospital to transfer medical information. 3. When it is needed to transfer the medical information to another doctor or therapist or another medical organization. 51 4. When the ethics committee has decided to transfer the medical information. 5. When information is transferred for information processing or filing 6. When there is a need to publish the information for research purposes as long as the personal details are not revealed. In every hospital, there is a special committee that has the right to decide if the appeal of the patient to not publish or transfer his file to a different party should be accepted or not. The law imposes punishment on any party that ignores the law or acts against any of its clause previous. 52 7. The Standardization of File Protection in Israel There are two major international standards for file protection: ISO 17799, ISO 27001. These two standards were established in Israel due to the need to protect organizations’ main assets, their file system and data. A certificate issued by the Israel Standard Association for File Protection System will confirm that the organization is taking the right measures to meet its obligation to protect its data and files and at the same time will give the company the assurance that it is working according to the international standards which will help the company to export internationally. The creation of a security system which protects the organizations’ files and data will provide: Identification and management of threats to a file. Definition of the processes of treatment and prevention in a coherent and methodical way. Goals for managing file and information security planning and launching security. Matching of the security to the requirements of the relevant law and regulations. Reduction of expense for damages related to loss of files and information, disability of its restoration and its availability. Effective prevention of fraud. New processes for improvement (even beyond the basic requirements). Greater efficiency for the work processes. Security to customers, confirming that the organization’s highest concern is to protect the organization files and information. The Israeli Standards Institute reviews will help identify whether the file and data security management system is suitable for the requirements of the organization, which points to the improvement at various levels. 53 For many organizations in fields such as medicine, transport service, and finance, file and information system’s failure can be critical and protection against such failure is essential. Businesses and organizations can protect themselves from intrusions and faults or incorrect usage of the system by investing in independent checking systems. ISO Standard 27001 includes comprehensive examination and review of all the security information measures starting from loss of files and information, to penetrating the systems through viruses and online commerce, illegal entries and reconstruction of the system. An information security management system has three main components: 1. Confidentiality - protecting vital information from exposure to unauthorized people. 2. Reliability - maintaining the perfection and accuracy of information software. 3. Availability - ensuring the availability of information and services. These standards carefully check an organization’s risk potential and emphasize areas that need improvement, giving a new level for handling sensitive files and information. The certification process enables the organization to concentrate on the improvement of the organization’s security systems and enables the exchange of information between the people of the organization and its customers and partners. 54 8. Protecting Files at Storage & Transit In this part of file protection, we will bring up techniques and different systems when the file is on transit or in storage. In both cases, it is needed to protect the file from exposing it to undesired intruders. It should be remembered that in many cases a file has to be shared or replicated and kept online which makes the security of it very complicated. In other words, file protection systems are becoming more vulnerable to security breaches which can result in damaging losses. Especially, when there is a rapid increase in sensitive files such as healthcare records, customer records or financial files. Protecting such files while in transit as well as while at rest is crucial. During its life-cycle, the file travels from various users through various networks and storage systems and ends up in online or offline file archives. A lot of potential attack points exist. Therefore, the file needs to be stored and protected at every stage of its life-cycle. Which means, when planning a file protection system, the following factors should be taken into consideration: 8.1 Techniques and Different Systems when the File is on Transit or in Storage 8.1.1 Authentication and Authorization Authentication and Authorization are the most basic security services that any storage system should support. Authentication is the identity of an entity or the source of a message. Therefore, the servers should verify the identity of the producers, consumers and the administrators before granting them appropriate access (read or write) to the file. Authentication can be mutual: that is, the producers and consumers of the file may want to authenticate the servers to establish a reciprocal trust relationship. Message authentication is preformed by an entity to authenticate the origin of messages sent by another entity. Authorization can be preformed by maintaining access control list on the storage 55 server or by using capability certificates that list the access right which grants the holder of the certificate access to the storage. 8.1.2 Confidentiality and Integrity As the file is transferred and stored at one or more remote storage servers, it becomes vulnerable to unauthorized disclosures, unauthorized modifications and attacks. An attacker can change or modify the file while traveling through the network or when the file is stored on disks or tapes. Further, a malicious server can replace current files with valid old versions. Therefore, securing files while in transit as well as when it resides on physical media is crucial. Confidentiality of a file from unauthorized users can be achieved by using encryption while file integrity can be achieved using digital signatures and message authentication codes. Confidentiality and integrity of a file at rest as well as while in transit can be achieved by performing cryptographic operations on the user’s side. This is called end-to-end security where the writers encrypt (and sign) before sending the file to the storage servers and the readers decrypt and verify the integrity of the file on their machines. Encryption and decryption is not done on the server side. If the writers are required to sign their modifications, then the signatures also ensure non repudiation, since the writers cannot deny their modifications. End-to-end security places minimal trust on the storage servers and the file is accessible only to the users with appropriate keys. Therefore, securing these keys is important for the systems that provide end-to-end file security. Further, the keys have to be secured as long as the file is not deleted. Israeli companies developed flash memory, which encrypt the data on the disk on key, by this the data can be transferred physically by the owner from one place to another and in the case the flash memory unit is lost, the files on it will not be reviled as the strong encryption will be impossible to decrypt. 56 8.1.3 Availability Daily business activities, requires continuous file availability whereas on the other side, system failures and Denials of Service attacks are very difficult to prevent. A system that embeds strong cryptographic techniques but does not take measures to ensure availability by backup or to use technology for recovery cannot survive. Key sharing and key management In some cases, especially in a group operation or in normal office activity, file sharing is quite common and normally there is a multi-user net-centric application. Usually the files are encrypted, then in order to share files among the group, there is a need to share keys. Efficient management of these keys is important, as revoking a user from group of users sharing files, or merging two groups will require re-encryption of shared files and re-distribution of new keys. 8.1.4 Auditing and Intrusion Detection Management logs are important in storage systems for system recovery and intrusion detection. Storage systems require attention on the management especially authenticating the people who access the storage as the information it contains could be curtail to the organization. In this case, where many users have access to the storage, it needs key sharing. The storage server authenticates each user and checks whether the user has appropriate privileges before granting any access to the file. Usually this is done by using passwords and access controls. End-to-end security can be achieved where cryptographic means are performed on the client side to keep the file secured from the attacking server as well as other unauthorized users. These systems embed cryptographic means into the file system itself. Cryptographic file systems do not assume shared access to file, do not include key sharing and key revocation mechanisms. 57 A storage-based intrusion detection system is an intrusion detection system embedded in a storage device or a file server. It analyzes access patterns and modification characteristics to the files, anticipating an attack. The main advantage of a storage-based intrusion detection system running directly on the storage servers, is that compromise of a host operating system, does not result in compromise of the storage-based intrusion detection system. Therefore, a storage-based intrusion detection system can still perform in the presence of host compromise. Further, the storage servers can perform inline detection by analyzing every request from the client. The network file system is the most widely used network attack file system. It enables heterogeneous clients to transparently share files stored on remote file servers without having to worry about the location of the files. An authorized client on a legitimate machine can mount the file system stored on the server. Heterogeneity and portability were the driving principles in the design of network file system. The system has two basic components: the client program installed on the client machine and a server program installed on the server machine. The administrator can specify a list of hosts that will be allowed to access the exported directories and the security flavors that a client can use to access the exported file systems. 8.2 USB – Disk on Key Portable Storage Devices Personal storage devices are becoming more and more powerful and have become part of the every day working tool in the enterprise environment. But these devices typically lack security, control and management tools. Employees don’t think twice about taking work home, or out of the office, on the personal disk on key drive. These personal storage devices that people carry around even as gadgets, are being used both innocently to increase productivity and for other less legitimate purposes such as smuggling information out of the enterprise. Even when 58 used with the best intentions, the files and data stored on USB drives is generally not covered by routine company procedures such as backup, encryption, or asset management. It becomes a problem for organizations to keep track of the files and data that are entering or leaving the company via these devices. Keeping the company files and data secure has become a significant challenge for any IT department. Security Implications When the organization’s information is stored on non-secure and personally owned devices, employees put their employer at risk every time they step out the door. Auditing companies are at risk of exposing account numbers, hospitals can be exposed if patient information falls into the wrong hands, and finance companies need to ensure that mission-critical files are not lost. Once company files fall into the wrong hands, the possibility of threats is significant. To minimize the threat of files and data leakage, there are several measures that an enterprise needs to take in order to secure its file and data: 1. The company should define and publicize the organization’s policy for personal storage devices. 2. Institute the use of company-issued personal storage devices. 3. Make sure devices are fully encrypted. 4. Make sure users cannot circumvent security measures. 5. Maintain an audit trail of data stored on devices. 6. Be able to recover data residing on personal storage devices. 7. Make sure the enterprise solution comprehensively provides the ability to control the use of all removable devices, inside and outside the corporate environment, and to centrally manage company-issued USB drives. Further, there are a number of hardware and software solutions ranging from data encryption to authentication, anti-virus protection, and other monitoring options that have been developed in recent years to address these problems. Some solutions, such 59 as blocked ports, encrypted storage devices, and software encryption of data are used, but these do not give all the security that is required to ensure a comprehensive solution for the majority of removable devices. Evaluating access control and encryption are two major elements which are essential in securing data on USB flash drives. Access control, whereby access is granted to decrypt data only to users who have been authenticated as authorized users, is measured by the strength of authentication. At a minimum, a complex password, typically consisting of an 8-character combination of letters and digits, is used to prevent attempts to guess the password. Encryption which is preformed either by software or hardware alters data in order to make it inaccessible without the proper key to decrypt the data, measured by the strength of the algorithm that is used to encrypt the file and by the ability of the software or hardware-based system to generate a truly random encryption key. Fending off Common Attacks It is widely acknowledged that hardware-based encryption implementations can help prevent a range of common attacks more effectively than software-based encryption. But not all hardware-based encryption implementations are equal in strength. Brute Force Attack Brute Force attacks guess the password or the encryption key. An attacker who illegally obtains a USB flash drive can plug it into a computer and use a program designed to guess hundreds of passwords or the encryption key every second, based on algorithms specifically designed for this purpose. These attacks are thwarted both by enforcing the use of complex passwords and by counting and thereby limiting the number of login or decryption attempts. Software implementations cannot prevent these attacks efficiently since they must use the host’s 60 memory to store intermediate results, including the number of login/decryption attempts. This implies that a modestly knowledgeable hacker can locate and then reset the counter without too much effort until the password is discovered. In hardware-based security solutions, access control, encryption and decryption are implemented by a dedicated crypto module located inside the USB flash drive. When hackers run a brute force program on the host computer, the crypto module counts the number of attempts and locks down the USB flash drive, rendering information stored on it inaccessible after a predefined limit is reached. Some systems also destroy the data and the encryption keys on the USB flash drive as an extra precautionary measure. Unlike with software-based solutions, hackers cannot run analysis utilities to locate and reset the counter since the USB flash drive does not allow any external program to run on it and access its memory. Parallel Attack A parallel attack is a brute force attack variant in which the attacker copies the encrypted data from the stolen USB flash drive, shares the data with as many computers as possible that are under his/her control, and then puts them to work in parallel to guess the password offline and unlock the encrypted data. By nature and design, software implementations cannot prevent the attacker from easily copying the encrypted file from the USB flash drive and initiating a parallel offline attack. In contrast, hardware-based implementations prevent the mapping of storage from the USB flash drive to the OS file system until the user enters a correct password. As a result, the attacker cannot copy the USB flash drive contents without first knowing the password. Cold Boot Attack Very recent research by a team at the highly respected Princeton University points to how a little known characteristic of Dynamic Random Accesses Memory (DRAM) can serve as a window of opportunity for a cold boot attack. 61 DRAM is used to store data while the system is running. After power is removed, all content is deleted in a gradual process that can take anywhere between a few seconds and a few minutes. If the chip is cooled by artificial means, the content can be retained for as long as 10 minutes. This characteristic of DRAM memory enables a hacker to read the memory content by cutting power and then performing a cold boot with a malicious operating system. This is deadly for disk encryption products that rely on software to store encryption keys. An attacker can cut power to the computer, then power it back up and boot a malicious operating system that copies the memory content. The attacker can then search through the captured memory content, find the master decryption keys and use them to start decrypting hard disk contents. To retain the content for a longer interval, the hacker can simply chill the DRAM chip before cutting power. A hardware-based encryption system is not vulnerable to a cold boot attack since it does not use the host RAM to store the keys. Malicious Code Malicious code can run on a PC into which a USB flash drive is inserted. This could alter the software-based encryption, including the software itself or the drivers, to disable the encryption. Malicious code can also copy data from the USB flash drive after it has been authenticated, or it can copy the user password and use it after the user logs out of the drive. Hardware-based encryption is not affected by malicious code because it uses a security mechanism that is independent of the PC and its operating system. Choosing the Right Security Activation Software-based encryption can be implemented on all types of media used by the organization. Hardware-based encryption is tied to a specific device; however, this means that it is “always on” as part of the device specifications. This of course makes security a given, requiring no user intervention. In contrast, software-based encryption 62 can be disabled by the user/attacker, or the user can unintentionally forget to enable it, causing data to be stored with no protection. Dependence on Security of Operating System An application’s security depends on the security level of the operating system. A flaw in the operating system is likely to lead to the subsequent vulnerability of the application running on top of it. For instance, a security problem involving the operating system can cause security problems with the cryptographic module implementation. Examples of this phenomenon include operating systems that leak memory contents through swap files and flaws in the memory management and protection schemes of operating systems. Software-based encryption, by nature, depends on high-level operating system services. Hardware-based encryption does not, and is therefore not dependent on the secure implementation of these services to ensure its own level of security. Designed for Usability The level and type of security provided by software-based encryption typically requires driver installation onto the PC operating system to enable the USB flash drive to function properly. When the USB flash drive is used on a foreign PC, it also requires driver installation with the associated risks of incompatible drivers and malicious code transfer. Some hardware-based encryption solutions also require installation of a driver on the host PC, making the driver susceptible to attacks and making the drive more cumbersome to install. More robust hardware-based encryption does not require driver installation, nor any other type of software installation on the host PC. This keeps the encryption independent of the PC while not leaving behind software footprints. Application Code Integrity Application code is stored in memory and is executed on demand or according to prior instructions. If this code is stored in a common memory space which is not necessarily 63 protected as required (as explained in the section on “Brute Force Attack”), an adversary can modify it, causing the USB flash drive to either malfunction or leak critical information. Software-based encryption is much less effective at maintaining application code integrity than hardware-based encryption, which uses a fully contained memory space. In some hardware-based encryption systems, the code is digitally signed against the hardware, verifying software integrity each time the USB flash drive is inserted in the PC to provide an extremely high level of code integrity. Comparing Performance It is generally recognized that hardware-based encryption solutions are superior in terms of throughput capacity and speed as compared with software encryption, with the added benefit of not degrading the performance of other programs or processes that are running. This is because dedicated hardware inside the USB flash drive is used for the encryption/decryption process, rather than latching onto existing processing capacity as in the case of software-based encryption. Of course, not all types of hardware-based encryption deliver equivalent throughput and speed on USB flash drives. The experience of a given company with flash memory management and the type of flash technology used are key factors in evaluating the USB flash drive and its encryption. 8.3 Hard Copy and Electronic File Protection at Storage In recent years, electronic information’s archive has reached an all time high, while storage of information has also increased in organizational importance. In an enterprises’ storage, many factors are involved and must be taken into consideration such as security, safeguarding, cost of management and support. This is the reason that many enterprises outsource their storage to utility-model based service providers. Outsourcing has emerged as a popular and often cost-effective option. However, this raises issues related to data safety and file protection. 64 The performance of the file protection while in storage and the factors of managing, supporting, and safeguarding it are among other considerations of any enterprise that is considering outsourcing the management of its storage. The Israeli Government passed a law concerning the storage obligation for certain sensitive types of files and their security. The law imposes on the manager of the archive a high obligation to protect the hard copy files and legislates how to burn the files when the time is right. The law details which file is sensitive and how long it needs to be kept. Some companies outsource their storage management and some run their storage themselves because of lack of trust of the outsourcing storage. This lack of trust is due to the fact that any person who gets in touch with the file can affect the security of it by changing, adding, coping or taking information. Therefore, many organizations keep the physical file under their control, and if they outsource it, they use encryption. Enterprises that outsource their archive expect comprehensive service which includes fulfilling that the security requirements will be fulfilled according to the law and the rules that the company issued. The service providers need to be concerned about the possibility of reading, writing, or changing the contents of the files. They should be sure that their employees have the integrity and the responsibility of working in such a storage service providing and should have them sign a contract that obliges them to keep secrecy and to secure the files and not to make any use of the file other then the one that was intended for it. 8.4 File Protection in Cellular Phone and PDA’s It is well known that the cellular phone is no longer just a phone. It has become more and more like any other PCs because of the connectivity to the Internet. These third generation devices now have a variety of application abilities and transmit information from one device to another or to a PC or hand-held device. All of this has transformed the mobile phone into a full working station. As such, it is unsurprisingly exposed to virus and worm threats, as well as malicious codes and Denial of Service attacks. 50% of all cellular devices support third generation technology, and therefore they are more 65 exposed to the Bluetooth and Wi-Fi interfaces. This means more use of the cellular phone for Internet surfing, for office works including connecting to files. Until recently, the subject of security was not taken seriously since all communication actions passed through the cellular operator, and its protection of the network was sufficient. However, the new communication abilities have created new demands for security. An additional problem is that communication protocols, on which the cellular networks are based, were not planed to provide built-in information security abilities. Security breaches should be mitigated through the network perimeter systems which operate at the level of the cellular operator and the network service providers. Standardization bodies have started to address the issue and refer to the traditional security solutions without elaborating or setting a uniform standard, therefore each organization chooses what to focus on and how to execute according to its considerations without direction and guidance. The cellular and PDA devices pose new risks to an organization, including the following: Handheld devices can be easier to misplace or to be stolen than a laptop or notebook computer because of their small size and used outside the office. If they do fall into the wrong hands, gaining access to the information they store or are able to access remotely can be relatively easy. Communications networks, desktop synchronization, and tainted storage media can be used to deliver malware to handheld devices. Malware is often disguised as a game, device patch, utility, or other useful third-party application available for download. Once installed, malware can initiate a wide range of attacks and spread itself onto other devices. Similar to desktop computers and cell phones, PDAs are subject to spam, but this can include text messages and voice mail, in addition to electronic mail. Besides the inconvenience of deleting spam, charges may apply for inbound activity. Spam can also be used for phishing attempts. 66 Besides the virus problem, spam mails have become a major nuisance and a security risk to the cellular. Soon, marketing messages on the mobile phones will need filtering and will become a problem. These messages can carry various viruses that directly attack the mobile phone and unlike a file sent to a PC that requires an approval for its opening, in this situation, just receiving the message will open a Back Door for a Trojan horse. Various legislation proposals have been raised for the prohibition of sending spam mails. SMS messages and other kinds of phone messages can be regarded as spam. Such regulations do deal with the definition level, however it is difficult to imagine enforcement abilities in general, and in the cellular world in particular. Responsibility for customer protection Following are questions regarding cellular security: Can the cellular operator take responsibility for information passed between its customers? Are the content services it provides, protected and secured? In the near future, new anti-virus products and personal firewalls will be developed. In addition, special attention should be given to the question of supporting digital signature in cellular phones, and to the management and control of communication interfaces. Cellular operators are starting to cope with the problems with which every ISP is already familiar. 67 9. File Protection – Bluetooth File protection is needed in many applications where files are transferred. One technology that has been addressed is the Bluetooth technology which is used for short range communications. Bluetooth technology is used in a large set of wired and wireless devices such as mobile phones, PDA's, desktop and mobile PC's, printers, digital cameras, and dozens of other devices. Being wireless, Bluetooth is potentially vulnerable to many attacks. It is very difficult to prevent Bluetooth signals from leaking outside the desired boundaries. The possible damage of successful wireless attack starts with the ability to eavesdrop on the file transferred during the communication of two devices, and ends with the ability to fully impersonate other devices. Bluetooth technology has a significant security component, which includes key management, authentication and secrecy. However, the security of the whole system relies on the user’s choice of a secret Personal Identification Number (PIN) which is often much too short. Moreover, Bluetooth designers invented several new cryptographic primitives, which were incorporated into the system. Cryptographers consider fielding new primitives to be risky, because new cryptography is less tested and may contain hidden flaws. Furthermore, Bluetooth is designed for short-range communication, this short-range is perceived as security feature, since an attack is supposed to be quite near the attack target – but as the technology develops the distance for transmission extends. Finally, as Bluetooth gains popularity on PDA’s and laptops, the information that lures attackers grow from cell-phone address books to valuable corporate files. Research has been done regarding the efficiency of the attack on the Bluetooth, which shows that to be successful in the attack, Bluetooth technology needs some special conditions. These attacks can be split into two classes: short key-stream attacks, attacks 68 that need at most 3,100 known key-streams bits: and long key-stream attacks, attacks that require much more known key-stream. Long key-stream attacks are generally not applicable within the Bluetooth settings since a maximal Bluetooth continuous frame is shorter than 3,100 bits. Therefore, all long key-stream attacks are applicable only outside the Bluetooth system. Researchers at the Israeli Technion introduced an experimental passive attack, in which an attacker could find the PIN used during the Bluetooth pairing process. In the pairing process, the researcher assumed that the attacker eavesdropped on an entire authentication process and saved all the messages between A and B. He then used two messages that he identified and compared them. The attacker could use brute force algorithms to find the PIN that was used and enumerated all possible values of the PIN. The researchers then describe implementations of this attack, using three optimization methods. For this purpose, they wrote a special-purpose Bluetooth security suite from scratch. Their fastest optimization employs an algebraic representation of a central cryptographic primitive used in Bluetooth. Their results show that a 4-digit PIN can be cracked in less than 0.3 seconds on an old Pentium III 450MHz computer, and in 0.06 seconds on a Pentium IV 3Ghz HT computer. They then sketch an additional attack that can force Bluetooth devices to repeat the pairing process and make them vulnerable to the first attack. Knowing all of the messages between A and B, it is possible to use each one of the messages to find out the Bluetooth PIN and to crack it. Some different projects have been carried out by different universities and companies in Israel to come-up with the solution to the securing the problem of the files and information that can be stolen using the Bluetooth technology. Work carried out at the Technion Institute by Dr. Tal Keidar, addresses the security scheme in Bluetooth, describing the different mechanisms and protocols. The work also addresses several of the known weaknesses in the security scheme. The work analyses one of the known weaknesses, with regard to the use of “unit keys” and suggests an 69 improvement to overcome this weakness, with minimal impact on the rest of the security scheme and with no significant addition of logic functions. 9.1 Cryptanalysis of the Bluetooth E0 Cipher Using OBDD’s This research was carried out by Dr. Yaniv Shaked and Dr. Avishai Wool, at The Technion, Israel Institute of Technology. The researchers’ thesis relied on the fact that Binary Decision Diagrams (BDDs) Bluetooth employs a stream cipher as the data encryption mechanism. This stream cipher, E0, is based on 4 Linear Feedback Shift Registers of different lengths, along with non-linear combiner logic (finite state machine). The key-stream is XOR-ed with the plaintext, to create the cipher-text, and decryption is performed in exactly the same way using the same stream used for encryption. The research describes an implementation of an attack against E0 that is based on the use of BDDs. They based their work on the work carried out by M. Krause. They used OBDDs instead of FBDDs throughout the algorithm, re-engineering the algorithm to adjust to the different LFSR (Linear Feedback Shift Registers) lengths. They developed an efficient compostable BDD for the compressor, and after discovering that standard BDD algorithms and libraries are very inefficient for this algorithm, they wrote a new BDD code that is optimized for attacking E0. The researchers built several hybrid variants of the basic BDD-based algorithm. These variants include: partially guessing LFSR's initial data, using an intentionally defective compressor, and enumerating the satisfying assignments and testing them. They evaluated their attacks against the full, non-reduced, E0 cipher. Their best research tools can recover the initial state of the LFSRs, for the first time, with a practical space complexity 84MB RAM. The time complexity is 287, slightly higher complexity than reported before; however, the attack is massively parallelizable. In addition to the specifics of Bluetooth, this work describes practical experience with BDD-based 70 cryptanalysis, which so far has mostly been a theoretical concept. The researcher’s conclusion was that after they presented an implementation of a BDD-based attack that is a short key cryptanalysis of the E0 cipher that several significant reductions and changes needed to be made to Krause’s general attack. Their best research tool has a time complexity and has significantly better space complexity than the recent work of which is roughly equivalent to that of the attacks of their colleagues. When two Bluetooth devices wish to establish a secure communication link, they first undergo the pairing and authentication process. At the end of this process, both devices hold a 128 bit secret key. This key is stored in a stable memory area of the two devices, for future communication between these devices. This key is used to generate the encryption key, also known as the session key. Using an algorithm, both devices derive the encryption key from the link key, a ciphering offset number that is generated during the authentication process done prior to the encryption phase, and a public known random number that is exchanged between the devices. The encryption key is then modified into another key. This modification is done to lower the effective size of the session key, according to the effective length the devices have decided upon negotiation in a preliminary phase. 71 10. Cases of File Protection in the Newspapers The Israeli newspapers publish articles from time to time to inform of computer intrusions that occur in the Israeli market. The most attacked countries for computer assaults are Switzerland, Hong Kong, Israel and India. Following are a few examples of intrusions that occurred on purpose to damage files: 1. The people, Daily Mail Edition 4257 date: 27/07/2006: The Science and Technology Committee in the Israeli Parliament advised that in the last few months, the attacks on Government computers increased by 8% and are about 40,000 -79,000 attacks per day. The most preferred sites are: police sites, General Security Services, the Mosad - Israeli undercover intelligence organization, the Government and Prime Ministers’ sites. The Science and Technology Committee held an urgent meeting to discuss the “war on the net” and to be sure that all security measures have been taken to protect the Government site. According to the committee, the average attacks on Tehila servers, the Government project for e-Government site, on normal days are about 10,000 - 15,000. Sometimes, they intensify and can double to 20,000 40,000 attacks, with the peak of attacks at 79,000. It was said that there is direct correlation between the physical conflict and the virtual conflict on the network. The attackers are scanning thousands of ports every day on purpose to find weakness in Government security. The characteristics of the attacks: There are two basic attacks: DoS type which attempts to prevent Government services and to disrupt access to these sites and a second type which attempts to destroy Government files. The Committee advised that the security possibilities 72 are not absolute and there are always possibilities to break into a site. However, the security procedures are very strict and Tehila’s first concern is the file and information security which is secured 24 hours a day by heavy technology. Tehila’s project manager advised that although there are many attacks, the attackers do not succeeded in penetrating the systems. 2. The People: Internet service providers claim that recently there has been an increase of 20% - 30% in attacks on their clients’ sites. They claim that they are doing their utmost to prevent these attacks they have checked that they have complied with all the necessary standards and they have sent letters to all their clients and advised them to protect their computers. 3. The Internet News 14/07/2008: Anonymous people attempted to break into the computer of one of the largest banks in Israel. They intended to steal a file named “business risk” which included sensitive information about the banks customers. It is possible that the intruder is a person that owes money to the bank and wanted to delete his debt to the bank or it is more likely that it was done by private detectives. The bank also checked the possibility that this incident was initiated by a person from inside the bank. 4. The Internet News, 06/07/2008: The website of the Center for Examination and Assessments was broken into and the site was ruined. This Center is in charge of testing and classifying the different candidates to the various faculties. The penetration occurred close to the date of the psychometric examination. The site was closed and was not put back on air for checking the incident and building a better security system. 5. The site for reporting about companies that trade on The Tel Aviv Stock Market was paralyzed during the last half hour of the trading day. The reason the site 73 stopped trading was due to an attempted attack by hackers. During the attack, it was not possible to enter the site, and an error message came-up. This system is not linked to trading on the stock exchange therefore it was difficult to locate possible hackers without disrupting information. 6. Israeli police arrested a suspect for breaking into e-mails of users at the service provider Walla. This person copied intimate image of users and ruined their files. The suspect was arrested following complaints from several young girls that held an e-mail account in the portal, who complained to the portal management. The portal management collaborated with the district police fraud squad in Tel Aviv and followed the attacker’s actions. Once he was identified, the police investigators came to his home and searched his materials on his computer. In this investigation, the attacker admitted that he broke into more than 30 different e-mail boxes. The suspect was brought to the Magistrate's Court in Tel Aviv, where police requested that he be released under restrictive conditions. Presumably, the complaining girls were registered in different forums in the site where they identified themselves with user name and passwords that they also used for their private e-mail accounts. This information led to the exposure of their e-mail and the possible penetration. 74 11. Researches by Universities and Institutes 11.1 Real-Time Implementation for Digital Watermarking in Audio Signals Using Perceptual Masking This research was carried out by Dr. Tal Mizrahi, Dr. Eran Borenstein and their colleagues at The Technion, Israel Institute for Technology. This research presents a technology which will help to protect the authentication and originality of a file. Digital watermarking is the process of embedding information into a digital signal. The signal may be audio, pictures, or video, for example. If the signal is copied, then the information is also carried in the copy. There are two possibilities for watermarking, visible and invisible. In visible watermarking, the information is visible in the picture or video. In invisible watermarking, information is added as digital data to audio, picture or video, but it cannot be perceived as such. An important application of invisible watermarking is to copyright protection systems, which are intended to prevent or deter unauthorized copying of digital media. Steganography is an application of digital watermarking, where two parties communicate a secret message embedded in the digital signal. While some file formats for digital media can contain additional information called metadata, digital watermarking is distinct in that the data is carried in the signal itself. In this research, the researchers emphasized that the watermark is a signature, embedded within a file of an original signal, which in addition to being inaudible to the human ear should also be statistically undetectable and resistant to any malicious attempts to remove it, which means, the embedding system gives the owner of the file the possibility of inserting a signature into his original file. 75 Digital watermarking is one of the most significant copyright protection system. The researchers presented in their work a novel real-time signature embedding system for digital watermark in audio signals. The embedding mechanism enables an owner to insert into his own file a digital watermark in such a way that the audio quality is not reduced. In addition, the watermark should be able to resolve multiple ownership claims, by using the original signal in the signature detection process. This is done by using the human auditory system’s masking characteristics. The detection system enables the owner to check for the existence of the watermark in a tested file. The presented system solves the problem of ownership claims by keeping the original file or parts of it for future ownership claims. The audio signal is divided into segments. For each segment, a local key is calculated and summed up with a general key (independent of the segment) to initiate a pseudorandom noise sequence for the segment. The noise is colored by a filter whose coefficients are calculated according to the psycho-acoustic model. After applying a temporal mask (in order to reduce the pre-echo effect), the colored noise becomes a watermark. The resulting signature is inaudible because it is using the Human Auditory System masking characteristics both in time and frequency domains. The owner can use the detection mechanism which enables him to check for the existence of his signature in a tested media. 76 11.2 Condor Local File System Sandbox High Level Design Document This research was carried out by Dr. Kfir Karmon and colleagues at The Technion, Institute for Technology. This research deals with Condor which is a system developed at the Technion which was developed to implement, deploy, and evaluate mechanisms and policies that support high throughput computing on large collections of distributive owned computing resources. The team of researchers is building software tools that enable scientists and engineers to increase their computing throughput. This system is capable of executing any program submitted to it when running on remote resource, a program can perform various activities, such as reading and writing files, opening network connections and communicating with other remote entities, e.g., database, or hierarchical storage. Condor system does not have mechanisms to prevent malicious attacks such as virus attacks or actions that are preformed to steal confidential information from the execution machines, to distribute spam, initiate distributed coordinated attack on some server, or try to cause local resource malfunction by filling up tmps. These attacks restrict access to specific system resources, such as local file system or network. This problem is particularly critical for the pools with resources running MS Windows, mainly due to the fact that it comes with fairly relaxed default security policy. This current project aims to provide a solution to the problem of resource protection, by allowing to explicitly controlling Condor-invoked program access to local system resources. This solution is called the Resource Body Guard. The vision is to be able to specify Access Control Lists for file system and network, together with restricting the intensity of their usage. For instance, the researchers want to allow the Condor program to write to c:\temp directory, but they disallow it to write more than 500 Kbytes per second and not more than 500MB in total. There are several technical and algorithmic challenges. First, it is vital for this solution to have minimal impact on the locally invoked programs, and on the non-malicious 77 programs invoked by Condor system. Second, a running program should not be able to escape from this solution. And finally the Resource Body Guard solution is required to interact with Condor resource allocation process in order to minimize the amount of programs which can be known in advance to not be allowed to run on a resource. The researchers are currently working only on the aspects of the solution for file system. 78 11.3 Un-Trusted Storage This research was carried out by Dr. Amir Shenhav and Associates atUniversity of Tel Aviv . In this research on Secure Un-trusted storage, network based storage solution, such as Storage Area Networks provide users with the opportunity to outsource storage management, and to achieve good performance when accessing the file. However, crucial security problems arise when the storage environment is no longer trusted. A secure system needs to provide confidentiality, data integrity, authenticity, freshness guarantees and access control. Since the outsource storage companies present poor performance, maybe this is one of the main reasons to limit the adoption of such a solution. The fact that many research works use public-key cryptography, motivates a careful examination of the reasons for its usage, while looking for symmetric key alternatives. Public-key cryptography is used in secure file systems for the following reasons: 1. Key Distribution. The cryptographic algorithms involved in securing the file system require the use of several keys for different operations. Some systems use two types of keys. User keys, that are bound to each user’s identity, and file keys that are assigned to each file, group of files or even to a block in a file, and are handed to the users that share this file. Therefore, a mechanism for key distribution is required. This mechanism may be inband, which means that the file system manages or participates in the distribution process, or out-of-band, assuming an existing key distribution infrastructure. Most of the systems use public-key cryptography to allow secure, confident and authenticated key distribution. 2. Digital Signature. 79 Cryptographic file systems use digital signatures to achieve three goals: data integrity, user authentication and differentiation of readers from writers. The differentiation is an outcome of the asymmetry of public-key signatures between the signer and the verifier. Users who are only allowed to read the file are handed only the public key and thus cannot change the file without being noticed. The importance of this subject can be measured by the research that has been done in this field, the reason for that is because storage security research has attracted growing interest in recent years. Since the storage world advances, it becomes more complicated to secure, yet more vulnerable to attacks. This research emphasizes the different assumption of system architecture, the trust model and security goals in the different works that are reviewed. Most research trusts the file server but wish to protect against malicious users using or snooping the network. The researchers follow the model of un-trusted server storage as in the systems SiRiUS, Plutus and SNAD. SiRiUS and Plutus can be viewed as complementary works: SiRiUS handles key distribution issues but operates as an add-on that does not change the underlying file system; Plutus does not refer to key distribution but presents a new design for the file systems itself, providing efficient random access, filename encryption and revocation. SNAD, like SiRiUS, uses in-band key distribution, but in contrast to SiRiUS, suggests that keys refer to users and not to files. Both SNAD and Plutus are ambivalent concerning the trust they have in the file system. They both require the server or disk to perform checks before reading or writing the data as an access control measure that is effective only if the server has not been compromised. SiRiUS, Plutus and SNAD rely on the public-key cryptography in their design except that file or block encryption is done with symmetric-key algorithm. In SNAD, a symmetric HMAC is suggested as an alternative to signatures – but then the user must rely on the file server to handle the access control and to differentiate readers from writers. The researchers suggest methods to improve the performance of cryptographic file systems by replacing the public-key cryptography with symmetric key algorithms. The 80 main issues they address are in-band key distribution using symmetric key methods and providing data integrity and cryptographic access control without public-key signature. The researchers mentioned some other research and suggested their way of integrity and access control and public-key signature. They suggest two schemes to replace public-key signature with symmetric key techniques, and consider the relevant tradeoffs between the two options. 1. Using master authentication code. The scheme is most suitable for the scenario of a few readers and many writers. 2. If all the users that share a file have written permission, a master authentication code with a signal shared key is sufficient, since each user has an equal right to exchange the file. The researchers suggest adding a single user with a read-only permission. This reader will be able to verify the file integrity against an external adversary, yet to prevent him from changing the file without being detected by the writers. To do this, they require each writer to calculate two master authentication codes on every file update, one with a key shared only by the writers, and another with a key that is common to all the writers and the single reader. The reader can change the second master authentication code since he holds the key, but this will give him nothing as he is the only user that checks this master authentication code. The reader cannot modify the first master authentication code, since only the writers hold its key. To extend the scheme to support more readers, the researchers require the writers to calculate a different master authentication code for every reader. For each of these codes the writer uses a designated key known only to the writers and the appropriate reader. This approach encounters three drawbacks: a) Key management. b) Time added to each write operation to calculate all the codes. c) The overall space consumed. For the problem of key management, the researchers suggest the following scheme: 81 During file creation, the owner generates a random file master code key that is handed only to the writer. Each reader receives a private file reader code key and identifies the identification number. The key of the readers are derived from the master key using a one-way function. There is no need to store multiple reader keys. When the file is updated by one of the writers, he can derive all file reader codes keys, on the fly, from the file master code key. A second drawback of this scheme is that the time and overhead grow with the number of readers of the file. The overhead includes the time needed to derive the readers’ master authentication code keys from the file master code key, and for each update, the time required to calculate all the codes. To lower the first overhead, the researchers suggested deriving the reader keys at file opening. The keys can be saved locally as long as the file is open. The third drawback of this scheme is space. The researchers argue that for a very small number of readers, the space overhead can be similar to a public-key signature requiring about a few hundreds of bytes. It becomes a significant problem as the number of readers grows. To address the problems that result from a large number of readers, we suggest using a combinatorial approach. Instead of adding another key for any additional user, the owner derives a fixed number of keys from his file master code key. These keys will be later used by the writers to calculate a set of master authentication codes using each one of the keys. The owner gives each reader a subset of the derived keys. To verify the file integrity, the reader calculates the master authentication code using his subset of keys and compares them to the corresponding master authentication code. However, this method allows a group of malicious readers to collude and share their keys. Therefore, the security of the rest of the readers is problematic and depends on the size of the set of keys, the size of the subset of keys handed to each user, and the coalition size. 82 Using one time signature, the researcher suggested a different approach which is to look for an efficient signature scheme that presents better performance than a regular public-key scheme, an approach that was used for multicast authentication to use onetime signatures that are based on symmetric-key primitives such as one way hash function. Here, the researchers introduced a scheme that is useful for scenarios where the files permission profile consists of one publisher and many readers. A one time signature is based on a set of public commitments to secrets that the signer randomly generates. Some of the secrets are exposed according to the message to be signed. These secrets serve as a signature and can be validated against the public commitments. However, each set of such committed secrets can be used to sign only one (or a few) messages. In contrast to master authentication code, one-time signatures provide the asymmetry between signer and verifier which can give us the ability to distinguish readers from writers. One-time signatures also provide non-repudiation. 83 11.4 Terror on the Internet This research was carried out by Dr. Ela Oppenhimer, at Bar Ilan University in Tel Aviv. This research examines whether there is a connection between the appearance of cyber terrorism and a crisis which is happening simultaneously (e.g., political, nationalistic and regional crisis). The research indicates that terror and Internet are two notions that are completely different from one another but were combined together in the concept of “information warfare”. Information warfare constitutes an activity which is intended to make one object superior to another object, by damaging the file system of the enemy by using the tool of processing information. Information warfare strategies can be a means of protection and also a warfare tool. Terrorists look for ways which will assist their goal of disrupting daily lives by hitting exposed spots. An example of these spots is the communication networks and also social events which guarantee an extensive media coverage. A vast usage of computing and of communication networks also creates an infrastructure for crimes that can be added under the title: “terrorist attack”; terrorist attacks of this kind have gained a new name: cyber-terrorism. Actions of cyberterrorism can be preformed by individuals and by terror organizations. Usually, a terror organization has its own web site, which represents the organization in a positive light. By using the Internet, these organizations can attain support and sympathy and even recruit new members and followers. The terrorist attacks arena is getting wider and one of its main factors is the Internet. Operating terror via the Internet is inexpensive: all that is needed is a computer, a modem and a highly motivated hacker; these three factors can damage an entire filing system. The attack of a filing system is most highly dangerous, because it can harm important strategic systems. The researcher found that during the last several years, cyberspace has become a battle field or even more accurate, another warfare front that can be seen in every political crisis which is taking place around the globe, such as the crisis between Israel and the Palestinians or the crisis between India and Pakistan, the crisis in the Bask district and in Kosovo and others. This research shows that there definitely exists a connection 84 between the emergence of cyber-terrorism and a political regional and nationalistic crisis, which occurs simultaneously. In these cases, terrorist warfare is another front in the struggle. Furthermore, this research shows that cyber-terrorism can emerge as a completely independent phenomenon. Terror on enemy’s filing systems could happen. Numerous technological innovations in the information age have changed the sociological order. Information became a main factor at this period of time and a dominant one. The cold war between east and west contributed to the development of communication networks which were used as a defense system against enemy’s attack. This process contributed to the development of the Internet which enables combining information from different geographical places feasible. Every day, new addresses are added to the Internet. The Internet gives people full freedom of expression which the terror organizations take advantage of and use in malicious ways. 85 11.5 Struggle with Information Warfare and Possible Damage to Civil Rights This research was carried out by, Dr. Harel Menishri, at Bar Ilan University. This research deals with file protection in modern countries that struggle with terror. It is a research about the USA which is used as an example of all information warfare. The researcher describes the information technology revolution that happened at the end of the last decade, and the deep effect it had on the daily life of every citizen who lives in the western world. This research is based on literary survey and historical research. It focuses on examination of the processes and ways of defending essential national infrastructures in the USA from a computerized attack. The American Government’s activities against cyber terrorists may infringe, on the personal freedom of its citizens and on the citizens of other countries. The researcher emphasizes the fact that damage to these essential systems could damage the modern country’s security and its ability to sustain a sound way of life. The more developed the country, the more dependent it is on computerized information systems, and the more severe the outcome of damage. In our time, cyber warfare constitutes a solution that is both cheap and causes a large damage affect compared with the alternatives. This issue is doubly important in times of security budget cuts and the price increase of weapon systems. According to the researcher, terror organizations might take action against files and information infrastructure systems, while using the Internet medium. The wide dispersion of computers makes it an ideal tool for performing information terror attacks, which may, in some cases, have a result similar to that of terror attacks performed with conventional weapons. The computer from which the attack originates is hard to identify, there is no need for special labs to create it, the training field resides in every house, and every beginning hacker could serve as a terrorist. In other words, one of the characteristics of cyber warfare is the fact that not only countries serve as opponents, 86 but private people – hackers, private companies and organizations while using software tools, which use loopholes in personal computers and are available to all. The researcher indicates that cyber warfare threatens the existence of national infrastructures, and warrants countermeasures which like warfare in other terror intelligence domains, takes place in “grey” areas, and sometimes outside the laws of the country in which it is performed and while abusing basic rights and freedoms. American intelligence is directing its defense of information infrastructure activities towards foreign citizens, as well as against American citizens, through supervising websites, infiltrating personal computers and networks, listening in on telephone conversations, fax and e-mail correspondences and so on, without the knowledge of these citizens, and without having to abide by the eavesdropping laws, or answer to public security. In other words, the technological leadership of American intelligence enables it to use extremely advanced technologies, which sometimes seem like a manifestation of science fiction, in order to thwart their opponents’ actions, while infiltrating personal information systems of citizens and companies from the USA and other countries worldwide. In addition, when confronted with problems created by the eavesdropping laws (for example, being legally unable to eavesdrop on American citizens), the American intelligence can turn to its allies for assistance. Part of this activity relies on special laws, directives and regulations (“The Patriot Act law” and others). The other part is performed in the “grey area”, with the assistance of colleague intelligence bodies to bypass ethical and legal issues. The researcher summarizes the research by saying that the activities of the American defense agencies infringe upon the personal rights of the citizens of the United States as well as the citizens of other countries. The research also shows that in our days, it is impossible to sustain a society without compromising its members’ privacy to a certain degree in the name of public interest. The defense of society requires access to information using intelligence tools and means, which sometimes requires an abuse of privacy. 87 12. Bibliography “A Three-Year Master Plan “E-Government” Initiative 2003-2005”, State of Israel, Ministry of Finance General Accountant Office E-government Imitative. Yizhak Cohen, Senior Deputy to General Accountant. “Bluetooth, security” , http://eprint.iacr.org/2006/072.pdf “Condor Local File System Sandbox High Level Design Document”, the Technion DSL Lab, Israel, November 23, 2006. “Cryptanalysis of the Bluetooth Eo Cipher using OBDD’s”, Yaniv Shaked and Avishai Wool, School of Electrical Engineering Systems, Tel Aviv University. ‘Networked File Systems”, 2007. “Real-Time Implementation for Digital Watermarking in Audio Signals Using Perceptual Masking”, Tal Mizrahi, Eran Borenstein and Associates. Signal and Image Processing Lab, Dept of EE, Technion, Haifa Israel. “Resource Boby Guard-Protecting Resource from Locally Executed Software”, Kfir Karmon, Eran Sevi, Keren Ouaknine, Technion, Haifa, Israel, June 10, 2008. “SAS Companion for the Open VMS Operating Environment”, Technion, Haifa Israel, 2008. Secure Un-trusted Storage, Amir Shenhav, 2005. Securing Cellular Networks-Problems and Threats, 2007 ‘The Evoloution of Storage Service Providers: Techniques and Challenges to Outsourcing Storage”, National Center for Supercomputing Applications, 2008. “The Provision of Information to the Public from Government Database”, State of Israel, Ministry of Finance-Office of the Accountant-General, Government Internet Committee. Brian D. Negin Adv. February 14, 1997. http://www.gov.il/FirstGov/WorldWideEgov/Article_B575C37D-E9C4-435C-8D44-5A http://www.patentim.com/forum_articles.asp?ArticleID=323&Fnumber=30 88 http://www.amalnet.k12.il/sites/commun/law/comi0104.htm http://www.itpolicy.gov.il/vadat_inter_gov/docs/mso37C.pdf http://www.eng.tau.ac.il/~yash/infosec-seminar/NCryptfsPresentation.ppt#258,3,Introduction http://www.itpolicy.gov.il/pirsumim/type.htm#1skirot http://portal.acm.org/citation.cfm?id=1103788&coll=GUIDE&dl=GUIDE&CFID=2140645 &CFTOKEN=78876591&ret=1#Fulltext http://www.ag.mof.gov.il/NR/rdonlyres/A8E43FB6-F0BD-43FB-86788F4E0645D9A7/0/MaarchotMeida.pdf http://www.isa.gov.il/Download/IsaFile_2192.pdf http://www.imperva.com/docs/WP_DB_Security_Assessment_0807LK.pdf http://www.law.co.il/news/computer-crimes/2008/09/08/police-arrested-suspects-ofstealing-computer-informatin/ http://hsdailywire.com/category/Infrastructure http://www.news1.co.il/ArticlePrintVersion.aspx?docID-40515&subjectID=1 http://www.iqc.co.il?categoryId=18263 http://www.sii.org.il/135-1336-he/SII.aspx Personal Meetings with: 1. Check Point Software Technologies Ltd., Security Engineer, Middle East Regional Office 2. SanDisk, Product Marketing Manager- Enterprise Solutions 3. SecITech, Secure Information Technologies Ltd. / Safe-mail.net 4. Hebrew University 5. Technion Israel Institute of Technology 89 6. Representative from Bank Leumi 7. Representative from Bank Otzar Hachyal 8. Representative from Prime Minister is Office, Computer Department 9. Representative from the Ministry for Commerce and Trade 10. Representative from the Israel Institute for Standards 90