Case Study 1: The Brazilian Federal Data Processing Service

 

 

 

 

 

 

Case Study 1: The Brazilian Federal Data Processing Service

Amare Alemu

Strayer University

Dr. Albert Dominic

October 16, 2018


BFDPS

Every country on the globe should have to have full understanding of secured business/ data communication when they react with outside world. Security means everything in era of full-of-hackers world. The paper will do: rubric #1, 2, 3, 4, and give a brief conclusion.

Rubric #1

Yes. Brazil faced an ethical problem. According to Constantin (2013), the author suggested that the BFDPS (Serpro), would build a secure email system for Brazil's federal government following media reports that foreign intelligence agencies intercepted electronic communications in the country. The president (Dilma Rousseff) said that creating a secure email system for the federal government is the priority that achieves a secured environment in business data communication as well. Messages require increased security to prevent possible espionage problem. However, Brazilian ethical-problem-complaint (EPC) does not has international support. The rationale suggested as follows.

The desire to combat cyber economic espionage confronts a lack of international law on espionage and industrial espionage. Although a victim country could assert that spying violates the principles of sovereignty and non-intervention, state practice has accepted state-sponsored espionage such that these appeals are not severe claims. Although cyber espionage is sometimes described as "cyber-attacks" and "cyberwar," no government regards cyber espionage of any kind as a prohibited use of force. Other bodies of international law under which espionage issues arise, such as rules on armed conflict and diplomatic relations in peacetime, do not prohibit or severely constrain espionage or economic espionage (Fidler, 2013).

 

 

Rubric #2

Yes. Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Brazilian citizens and government officials, as well as Petrobras, Brazil's national oil company, have been the targets of electronic spying by the NSA and other intelligence agencies, according to media reports based on documents leaked by former U.S. National Security Agency contractor Edward Snowden (Constantin, 2013). This paper believes that the Brazilian government should have protected the problem by using different mechanisms. The rationale for the proper tool suggested that the study by the ISF (‘Information Security Culture’, The Information Security Forum, November 2000) and parallel studies of safety failures in high-hazard environments (referenced in the above ISF report) suggest that as many as 80% of significant security failures could be the result not of poor security solutions but poor security behavior by staff. Hence, a well-focused security program targeted at improving user security behavior could significantly reduce the size of the security-related overhead (Leach, 2003).

 Rubric #3

According to ICANN (2013), the author stated that the leaders of organizations responsible for coordination of the Internet technical infrastructure globally have met in Montevideo, Uruguay, to consider current issues affecting the future of the Internet. Firstly, they reinforced the importance of globally coherent Internet operations and warned against Internet fragmentation at a national level. They expressed strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance. Next, they identified the need for ongoing effort to address Internet Governance challenges and agreed to catalyze community-wide efforts towards the evolution of global multistakeholder Internet cooperation. Further, they called for accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing. Lastly, they also called for the transition to IPv6 to remain a top priority globally. Mainly, internet content vendors must serve content with both IPv4 and IPv6 services, to be fully reachable on the global Internet. The paper did agree with this plan though it would be costly for application. Besides, it suggested the following architectural solutions too.

3.1 Encryption

A private-key encryption is generally held to the same standard of security as public-key encryption (i.e., indistinguishability) even though usage of the two is very different. Secondly, though the importance of secure encryption of single blocks is well known, the security of modes of encryption (used to encrypt multiple blocks) is often ignored. A new notion of security for private-key encryption called encryption unforgeability which captures an adversary’s inability to generate valid ciphertexts (Katz and Yung, 2002)

3.2 Strong Password System

            According to Bauman (n.d), the author suggested that security measures such as passwords are critical when it comes to preventing the unauthorized access of one's computer and mobile devices. In today's world, hackers and other cyber-criminals are continuously finding new ways to gain access to these devices to steal or exploit the information within. Careless use of passwords, however, can be as bad as leaving one's computing devices unprotected. For this reason, people should create and protect their passwords with care.

 

 

Rubric #4

It is in USA government that intelligence agencies determined that vulnerabilities can be prioritized by static rankings recommended by authority organizations such Computer Emergency Response Team (CERT), National Institute of Standard Technology (NIST), Microsoft®, and Symantec®. However, these ratings are static and do not take the system stakeholder utilities into account. Measuring Commercial Off-The-Shelf (COTS) security threats and prioritizing vulnerabilities efficiently can be difficult due to lack of adequate metrics to regulate stakeholder utilities, lack of firm historical data, and the complex and sensitive nature of security (Chen, Boehm and Sheppard, 2007).

           

Conclusion

The paper did rubric #1, 2, 3, and 4.

References

Bauman, A. (n.d). The Importance of Strong, Secure Passwords. Retrieved on 10/09/2018

from https://www.securedatarecovery.com/resources/the-importance-of-strong-secure-passwords

Boehm, B., Chen, Y., and Sheppard, L. (2007). Value Adaptive ….

Retrieved on 10/09/2018 from https://patents.google.com/patent/US8392997B2/en

Constantin, L. (2013). Brazil to Fortify

Retrieved on 10/09/2018 from https://www.computerworld.com/article/2484573/government-it/brazil-to-fortify-government-email-due-to-nsa-revelations.html

Fidler, D. (2013). Economic Cyber Espionage and International Law:

Retrieved on 10/07/2018 from https://www.asil.org/sites/default/files/insight130320.pdf

ICANN (2013). Montevideo Statement on the Future of Internet Cooperation.

Retrieved on 10/07/2018 from https://www.icann.org/news/announcement-2013-10-07-en

Katz, J. and Yung, M. (200). Unforgeable Encryption

Retrieved on 10/09/2018 from https://link.springer.com/chapter/10.1007/3-540-44706-7_20

Leach, J. (2003). Improving user security behavior. Retrieved on 10/09/2018

from https://www.sciencedirect.com/science/article/pii/S0167404803000075              

 

 

 


Comments

Popular posts from this blog

Nаturаl Resource Conservаtion аnd Environmentаl Protection of the Nile River

Assignment 3: Apple versus Samsung

Week 8 Java Project [AmusementPark.java]