Case Study 1: The Brazilian Federal Data Processing Service
Case Study 1: The Brazilian Federal Data Processing Service
Amare Alemu
Strayer University
Dr. Albert Dominic
October 16, 2018
BFDPS
Every country on the globe should
have to have full understanding of secured business/ data communication when
they react with outside world. Security means everything in era of full-of-hackers
world. The paper will do: rubric #1, 2, 3, 4, and give a brief conclusion.
Yes. Brazil faced an ethical problem. According to Constantin (2013), the author suggested
that the BFDPS (Serpro), would build a secure
email system for Brazil's federal government following media reports that
foreign intelligence agencies intercepted electronic communications in the
country. The president (Dilma Rousseff) said that creating a secure
email system for the federal government is the priority that achieves a secured
environment in business data communication as well. Messages require increased security to prevent possible espionage problem.
However, Brazilian ethical-problem-complaint (EPC) does not has international
support. The rationale suggested as follows.
The desire to combat cyber economic espionage
confronts a lack of international law on espionage and industrial espionage.
Although a victim country could assert that spying violates the principles of
sovereignty and non-intervention, state practice has accepted state-sponsored
espionage such that these appeals are not severe claims. Although cyber espionage
is sometimes described as "cyber-attacks" and "cyberwar," no government regards cyber
espionage of any kind as a prohibited use of force. Other bodies of international
law under which espionage issues arise, such as rules on armed conflict and diplomatic
relations in peacetime, do not prohibit or severely constrain espionage or economic
espionage (Fidler, 2013).
Rubric #2
Yes. Brazil could have previously considered its current
problem and built an original architecture that would have prevented the
problem in question. Brazilian citizens and government officials, as well
as Petrobras, Brazil's national oil company, have been the targets of
electronic spying by the NSA and other intelligence agencies, according to
media reports based on documents leaked by former U.S. National Security Agency
contractor Edward Snowden (Constantin, 2013). This paper believes that the
Brazilian government should have protected the problem by using different
mechanisms. The rationale for the proper tool
suggested that the study by the ISF (‘Information Security Culture’, The
Information Security Forum, November 2000) and parallel studies of safety
failures in high-hazard environments (referenced in the above ISF report)
suggest that as many as 80% of significant security failures could be the
result not of poor security solutions but poor security behavior by staff.
Hence, a well-focused security program targeted at improving user security behavior
could significantly reduce the size of the security-related overhead (Leach,
2003).
Rubric
#3
According
to ICANN (2013), the author stated that the leaders of organizations responsible for
coordination of the Internet technical infrastructure globally have met in
Montevideo, Uruguay, to consider current issues affecting the future of the
Internet. Firstly, they reinforced the
importance of globally coherent Internet operations and warned against Internet
fragmentation at a national level. They expressed strong concern over the
undermining of the trust and confidence of Internet users globally due to
recent revelations of pervasive monitoring and surveillance. Next, they identified the need for ongoing effort to address
Internet Governance challenges and agreed to catalyze community-wide efforts
towards the evolution of global multistakeholder Internet cooperation. Further,
they called for accelerating the globalization
of ICANN and IANA functions, towards an environment in which all stakeholders,
including all governments, participate on an equal footing. Lastly, they
also called for the transition to IPv6 to remain a top priority globally. Mainly, internet content vendors must serve
content with both IPv4 and IPv6 services, to be fully reachable on the global
Internet. The paper did agree with this plan though it would be costly for
application. Besides, it suggested the following architectural solutions too.
3.1 Encryption
A private-key encryption is generally held to the same
standard of security as public-key encryption (i.e., indistinguishability) even
though usage of the two is very different. Secondly, though the importance of
secure encryption of single blocks is well known, the security of modes of
encryption (used to encrypt multiple blocks) is often ignored. A new notion of
security for private-key encryption called encryption unforgeability which
captures an adversary’s inability to generate valid ciphertexts (Katz and
Yung, 2002)
3.2
Strong Password System
According
to Bauman (n.d), the author suggested
that security measures such as passwords are critical when it comes to
preventing the unauthorized access of one's computer and mobile devices. In
today's world, hackers and other cyber-criminals are continuously finding new
ways to gain access to these devices to
steal or exploit the information within. Careless use of passwords, however,
can be as bad as leaving one's computing devices unprotected. For this reason,
people should create and protect their passwords with care.
Rubric
#4
It is in USA government that intelligence
agencies determined that vulnerabilities can be
prioritized by static rankings recommended by authority organizations
such Computer Emergency Response Team (CERT), National Institute of Standard
Technology (NIST), Microsoft®, and Symantec®. However, these ratings are static
and do not take the system stakeholder utilities into account. Measuring
Commercial Off-The-Shelf (COTS) security threats and prioritizing
vulnerabilities efficiently can be
difficult due to lack of adequate metrics
to regulate stakeholder utilities, lack
of firm historical data, and the complex and sensitive nature of security (Chen,
Boehm and Sheppard, 2007).
Conclusion
The
paper did rubric #1, 2, 3, and 4.
References
Bauman, A. (n.d). The Importance of Strong, Secure Passwords. Retrieved on 10/09/2018
from
https://www.securedatarecovery.com/resources/the-importance-of-strong-secure-passwords
Boehm, B., Chen, Y., and Sheppard, L.
(2007). Value Adaptive ….
Retrieved
on 10/09/2018 from https://patents.google.com/patent/US8392997B2/en
Constantin, L. (2013). Brazil to Fortify …
Retrieved
on 10/09/2018 from https://www.computerworld.com/article/2484573/government-it/brazil-to-fortify-government-email-due-to-nsa-revelations.html
Fidler, D. (2013). Economic Cyber Espionage
and International Law: …
Retrieved
on 10/07/2018 from https://www.asil.org/sites/default/files/insight130320.pdf
ICANN (2013). Montevideo Statement on the Future of Internet Cooperation.
Retrieved
on 10/07/2018 from https://www.icann.org/news/announcement-2013-10-07-en
Katz, J. and Yung, M. (200). Unforgeable
Encryption …
Retrieved
on 10/09/2018 from https://link.springer.com/chapter/10.1007/3-540-44706-7_20
Leach, J. (2003). Improving user security behavior. Retrieved on 10/09/2018
from
https://www.sciencedirect.com/science/article/pii/S0167404803000075
Comments
Post a Comment