Legal, ethical and social point of IT Security

Legal, ethical and social point of IT Security
Legal, ethical and social point of IT Security

Want help to write your Essay or Assignments? Click here

Legal, ethical and social point of IT Security

Summary

            Given that private and professional internet users have rapidly become concerned with privacy and data protection the privacy that is accorded famous synchronization services of cloud files for instance Google drive, Drop box and one drive, this matter has gained lots of scrutiny by the press. Some of these services have been reported in the recent past to be sharing their information with government intelligence agencies without warrants.

BitTorrent has been observed to be an alternative by numerous people and by 2014 it already had 3 million users.  This service is totally decentralized and provides most of the same functionality and synchronization that is a replica of cloud computing services. It employs encryption in the transmission of data and alternatively for storage remotely. (Chung, 2015)

The significance of comprehending BitTorrent Sync and its consequent digital investigative implications to law enforcers and forensic investigators is critical to future evaluations.  Given the rise in developments in professional technologies the volumes that are being created by computer machines are now increasing.  For users of mobile machines accessing this data has been a tall order.

With rapid connectivity and increased availability and internet access the notion of resilient storage, high availability and off site back up has been moved from the domain that was mainly a preserve of large corporations and has become rapidly popular with users of computers as well as daily data consumers (Cohen, 2003).

Legal, ethical and social point of IT Security

Want help to write your Essay or Assignments? Click here

Applications like Drop Box and Ever note control the reducing cost of hard disk storage witnessed in Storage as a Service (SaaS) providers for instance Amazon S 3. The key advantage stemming from services like Apple iCloud, DropBox, Microsoft OneDrive, and Google Drive is the fact that their data tends to be a center model that is totally out of the financial reach of the ordinary consumer.

This data can be accessed on various devices without necessarily reformatting partitions or wasting space through a creation of multiple copies of one file for all devices. DropBox and a number of other services have offline applications that permeate the synchronization of data to local folders to be accessed offline.  Each of these services and most of this data can be freely accessed by government intelligence without a warrant.  Consequently, BitTorrent Sync offers this functionality without cloud storage and is thus believed to be the best option (Quick, 2013).

Given its advantages BTSync application is now popular with those who want to replicate and synchronize their files. By the end of 2013 it had attracted 2 million users. This work’s contribution entails a forensic evaluation of BTSync applications for clients left remnants upon installation, its behavior, and artifacts.  An evaluation of the network traffic sequence and file interactions employed as part of the process of interaction are also included.

This information can be of use to digital forensic investigators if BTSync is installed on machines that have been subjected to investigation. It can be employed in the recovery of lost data, modifying this data or locating where it has been synchronized to (Chung, 2015).

Legal, ethical and social point of IT Security

 By knowing the operational nature of BTSync this could assist to get the right direction during digital investigations to extra remote machines where more relevant data could be replicated. This technology is applicable in several crime investigations including, industrial espionage, malicious software distribution and sharing of child exploitation material. The crime that is being investigated is what determines if the remote machines could be owned and put under operation by one suspect or by a cohort that has a mutual goal. 

The protocol is powerful because of the nature of file parts usage where each file is capable of being manipulated and controlled separately. Given that BTSync at times tends to use a DHT in data transfers there is no leading authority that can be used to manage data authentication. Suspect files located on a system could be downloaded from several sources and uploaded to several recipients (Cohen, 2003).

Legal, ethical and social point of IT Security

Want help to write your Essay or Assignments? Click here

Analysis

There are three unique settings that establish the resources employed in peer discovery as well as the available path for transmission of traffic. BTSync employs such peer discovery techniques to ordinary BitTorrentprotocol.  The localized peer discovery packet contains a BSYNC and a ping message type which includes the 20 byte mutual ID of the advertised share, IP address of the sender host as well as the port.

The LAN hosts that receive the packet will drop it if they have no interest in the shared ID.  Hosts that show some interest show it through a UDP packet response to the advertised port.  This response lacks a BSYNC header and the field of data has only the responding peer’s ID (Quick, 2013).

The three IP addresses are hosted on the EC2 cloud service of Amazon. A get peers request is send to the tracker server by the client. Upon reception of this request the IP address of the client is added onto a list of available peers that are active for the specific tracker shared ID. Given that the client requests this list because of the secret possessed by it, the server’s response always has one active peer which is employed in requesting the client’s information.

Peer discovery can be done by clients through the use of a Distributed Hash Table (DHT). In this alternative peers can register their details by use of the secret word and the port. By employing this alternative users could avoid using any kind of tracking server but they could find peer discovery as being slow in nature (Chung, 2015).

Legal, ethical and social point of IT Security

The option of using predefined hosts is the last and undetectable technique of peer discovery.  The user is capable of adding a list of IP addresses and port combinations to shared preferences.  This peer’s list is likely to be directly contacted without necessarily having to look into a BSYNC packet that has a ping type of message.  Just like peer discovery methods BTSync permeates the user to put together several alternatives that impact the manner in which data can be transferred between peers.  If no options are set the seeding host makes attempts to directly communicate with the replicating target (Cohen, 2003).

The forensic analyses of these utilities are problematic in nature. Unless there is a complete up to date local synchronization the data’s entire picture could reside in temporary files. Multiple data centers and volatile storage for instance the RAM of the system. Any forensic evaluation done digitally on these systems should have particular attention on the access method. This is mainly the internet browser that connects to the access page of the service provider.  This temporary access highlights the significance of real forensic methods while carrying out investigations on a suspected machine (Quick, 2013). 

Legal, ethical and social point of IT Security

Want help to write your Essay or Assignments? Click here

If power is disconnected from the suspect’s machine investigators will lose more than access to the clients open documents and this includes authentication documents stored in the RAM such as passwords. There is an extra approach to forensics during cloud storage investigations. This entails access by use of complete client application regardless of whether it has been interfered with by the user. 

Anti-forensic attempts could be applied through a deletion of synchronized folders and uninstallation of the application.  If Dropbox is employed with the application of the client it creates a localized folder which synchronizes contents that are stored in it through an online duplication of the folder. Dropbox usually provides a storage space of 2GB for free but one has the alternative of buying more space (Chung, 2015).

OneDrive is meant to be an absolute online storage facility with the alternative of synchronizing copies of files to the folder of a client.  Most cloud storage facilities offer a method of synchronization that involve a kind of periodic checking to establish if there are changes made to versions that are viewed at a local level. They can also be used to make a comparison of online and offline copies upon re-establishing communication (Cohen, 2003).

Legal, ethical and social point of IT Security

Want help to write your Essay or Assignments? Click here

Just like peer discovery methods, BTSync enables users to configure several options that impact the manner in which data gets transferred from one peer to another. The seeding host makes attempts of directly communicating with the replication target. The traffic tends to be encrypted through default in case it travels out of the local LAN. There is an alternative in application preferences to enhance LAN encryption if it is preferred by the user (Quick, 2013).

If there is a blocked communication between hosts in case they are on different networks safeguarded by firewalls or in LAN segments which are locked by inbound access managed links. When a seeder creates a share it leads to the generation of a master key. It is essentially the all access key that permeates the share owner to modify, add or remove the share contents. The only case in which the key can be distributed to another one is when it becomes a trusted collaborator.  The read only key permeates the receiving user to read the synchronized data but not to modify the source contents whatsoever (Chung, 2015).

When trying to recover lost data it is possible to find that BTSync has been installed on a machine. As a result of anti-forensic measures a number of files may not be recovered from the localized hard disk. If the secret is recovered for some share it is likely that the suspect’s secret synchronization will help forensic investigators to recover the information that is lost from all nodes in the share that are still active. Ordinary forensic analysis of file systems tends to identify synchronized artifacts that are left behind from a certain share combined with successive data synchronization. 

The collected data should be stored in a digital evidence bag. Given the metadata BTSync value that is employed in recovering files that are remotely stored a good P2P based bag should be used. There are no intentions to replace BTSync with BitTorrent to make it a file dissemination utility though it still serves this purpose. This is now being enhanced by websites that offer shared secrets (Cohen, 2003).

Legal, ethical and social point of IT Security

Reference

Chung H, Park J, Lee S, Kang C. (2015) Digital forensic investigation of cloud storage services. Digit Investig;9(2):81–95.

Cohen B. (2003), Incentives build robustness in bittorrent. In Proceedings of the Workshop on Economics of Peer-to-Peer systems, Vol. 6. pp. 68–72.

Quick D, Choo KKR. (2013) Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digital Investigation;10(3):266–77.

Legal, ethical and social point of IT Security

Want help to write your Essay or Assignments? Click here

Implications for Cyber security Stakeholders

Cyber security
Cyber security

Implications for Cyber security Stakeholders

The implications of the cyber security raise several questions that need an exhaustive examination from governments and other stakeholders.  Some of these questions have been noted by the project 2020 initiative of the International Cyber Security Protection Alliance (ICSPA), such as who owns the data in networks and who secures the joins between services, applications, and systems (Cyber Security Protection Alliance, n.d ).

Perhaps the most crucial to answer is who covers and recovers the losses both financial and regarding data recovery. Understanding who covers the loss of cyber-attack in terms of finance and data can help prepare and formulate strategic solutions for cyber security. This is the most important question to examine given that the worst effects of a cyber-attack are loss of money, tarnishing of the organization’s name and loss of customers. The increased cyber-attacks have resulted to a faster growing cyber insurance industry as high profile attacks fuel demand.

Insurance plans like the First Cyber Risk Insurance allows the victim to recover information and income that may have been lost due to a data breach.  This policy includes theft and fraud and covers the loss of the policy holder’s data resulting from cyber-attacks. A forensic investigation on the other hand covers the legal and technical forensic services and examines the impact of the breach while business interruption insurance covers lost income when the insurer is capable of doing business after an attack.

Another type of first-party cyber risk insurance is the computer data loss and restoration that covers any physical damage experienced during cyber-attack. There are several third party insurance covers that insure the policyholder of the liability to a client’s or government after an attack. These types of cover range from litigation and regulatory and notification costs insurance

References

International Cyber Security Protection Alliance. (n.d). Project 2020. Scenarios for the Future of Cybercrime -White Paper for Decision Makers\ European Cyber Crime Center

Want help to write your Essay or Assignments? Click here