Deployment, Ddos Impact
Total Page:16
File Type:pdf, Size:1020Kb
Professional Information Security Association SEP-2010 PISAPISA JournalJournal ● Personal Data Privacy in Hong Kong ● International Standard on ISM ● DNSSEC: Deployment, DDoS Impact ● Mobile Security: Jailbreak? Mobile App for Banks ● Security Toolsmith: CATCI, Linux Terminal Server ● CONS Reloaded ● Secure Software www.pisa.org.hk Issue 12 Data Privacy 11 Data Privacy in Hong Kong - the OctopusGate and Beyond 13 Topical Issues with Hong Kong Privacy Law DNSSEC 18 DNSSEC 的應用、運作及發展 21 DDoS impact on DNSSEC deployment International Outlook 06 International Standards – Information Security Management 39 CONS Reloaded Intranet 04 Message from the Chair 05 Call for Your Participation 48 Event Snapshot 53 Joining PISA 54 Advertisement Page 2 of 54 An Organization for Information Security Professionals Editor: [email protected] Copyright 2010 Professional Information Security Association Mobile Security 31 Why you don’t want to JB your iPhone 33 Mobile Application for Financial Institutions Security Toolsmith 26 Increasing Availability with CACTI 44 再談木馬程式與上網安全 App Security 36 Secure Software Royalty free images used from www.sxc.hu: Cover : by DoortenJ of Canada #739973_17714216 TOC : by Eastop of Australia #881569_30572512 Page 3 of 54 A Publication of Professional Information Security Association Professional Information Security Association l l a a n n Message from the Chair r r u u o o J J A A S S I I t is my honor and pleasure to re-take the PISA chairperson’s role re- P P I cently after leaving the executive committee in 2005 when PISA was attaining her 5th year anniversary. I recall what I wrote to PISA members in 2005: “PISA has been entering into her 5th year, not only this story has to be continued running, but we also need to inject new elements to make it good and more colorful. Instead of just sitting there and listening to others, I would like to challenge PISA members to take the initiative to write a better story…….” Yes! You did it. PISA has already become one of the prom inent professional associations in the information se- curity arena nowadays both locally and in the region. We have established close connections with international professional institutions such as ISC2, CERT bodies, etc. In Hong Kong, PISA plays a leading role in various areas relevant to information security such as providing advisory supports to the IT professions, awareness education to the general public and address issues to respond to government public consultations. However, they could not be accomplished without your efforts and without your passion. Nevertheless, being information security practitioners, we are all facing a common challenge. The challenge of keeping oneself moving forwarded, driven by emerging technologies and products. For example, while most of the people are still playing around with the new features of mobile phones or trying to learn what cloud computing is, we already need to address enquiries on their vulnerability and security. Being setup for information security practitioners, PISA is providing an important platform for us to learn and to be learnt. Time is really running too fast, another 5 years are almost gone and PISA is entering into her 10th year. Let’s prepare for this new decade and expect for a great celebration in July 2011. Thank you! Andy Ho CISA, CISSP, CISM, CBCP Page 4 of 54 An Organization for Information Security Professionals SEP-2010 l Issue l 12 a a n n Call for Your Participation r r u u o o J J A A S S I he new EXCO likes to invite your active participation to PISA activities. We will continue to organize I interesting programs and project groups. We will have a delegation to Beijing to visit the information P P T security community there. This is a first visit of this kind. EXCO members: (From left) Alan Ho, James Chan, Frank Chow, Jim Shek, Raymond Tang, Andy Ho and WS Lam ContributionContribution toto PISAPISA JournalJournal • To join the Editorial Committee of this professional publication • To contribute to the next issue and make your publication public Next Issue: Issue 13 (Mar‐2011) SC Leung, Chief Editor [email protected] Page 5 of 54 A Publication of Professional Information Security Association Professional Information Security Association l l a a n n r r International Standards – u u Information Security Management o o J J Dale Johnstone Partner Xione Group ([email protected]) A A S S I I Synopsis P P his article provides an update on the progress of work pertaining to ISO/IEC JTC1 SC27 with re- T spect to the development of international standards for the protection of information and informa- tion communications technologies (ICT), in particular relating to the Information Security Management Systems ● information security conformance assessment, ac- SC27 Background creditation and auditing requirements The SC27 Committee – IT Security techniques [1], consists ● Security evaluation criteria and methodology of 5 working groups and has published in excess of 98 Further details of the background to SC27 can be found in International Standards. SC27 functions through the repre- an article published in Issue 7 of the PISA magazine [6]. sentation from 41 participating countries [2] in addition to 18 observing countries [3]. The development of all International Standards within ISO is a collaborative process channeled via a consensus of the ISMS Family of Standards Participating and Observing countries. Everyone has an The Information Security Management Systems and its opportunity to contribute to the International Standards supporting standards (also known as the ISMS Family of development work [4]. Standards) currently consist of 13 individual standards that are either published or under development. A 14th stan- The work of SC27 includes generic methods, techniques dard is expected to be included in the ISMS Family of and guidelines to address both security and privacy aspects. Standards following the next meeting of SC27 to be held in The work of SC27 also encapsulates [5]: Germany, October 2010. Working Group 1 within SC27 develops and maintains each of the following ISMS Family ● Cryptographic and other security mechanisms of Standards (Figure 1). ● Security aspects of identity management, biometrics and privacy [1] http://www.iso.org/iso/iso_technical_committee?commid=45306 [2] See Annex A [3] See Annex B [4] Anyone interested in contributing to the development of International Standards should approach the representing Country entity respon- sible for coordinating membership to ISO. In Hong Kong this entity is the Innovation and Technology Commission, Quality Services Divi- sion, Product Standards Information Bureau www.itc.gov.hk [5] This additional work is not covered in this article [6] Chan, Lydia and Johnstone, Dale, “International Standard for Information Security”, PISA Journal, Issue 7, March 2008, pp 9-11, http://www.pisa.org.hk/pisa-journal/83-journal-issue-07.html (last accessed 25 August 2010) Page 6 of 54 An Organization for Information Security Professionals SEP-2010 l Issue l 12 a a n n r r u u o o J J A A ISO/ Publish Review Title S S IEC (ed) I I 27000 2009 In-Progress Information security management systems -- Overview and vocabulary P P 27001 2005 In-Progress Information security management systems -- Requirements 27002 2005 In-Progress Code of practice for information security management 27003 2010 2012 Information security management system implementation guidance 27004 2009 2012 Information security management -- Measurement 27005 2008 In-Progress Information security risk management 27006 2007 In-Progress Requirements for bodies providing audit and certification of information security management 27007 2012 (E) Development Guidelines for information security management systems auditing 27008 2012 (E) Development Guidance for auditors on ISMS controls 27011 2008 2011 Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 27013 2012 (E) Development Guidance on the integrated implementation of ISO/IEC 20000-1 and ISO/IEC 27001 27014 2012 (E) Development Governance of information security 27015 2012 (E) Development Information security management guidelines for financial and insurance services 270xx 2013 (E) Development Information security management – Organizational economics Figure 1 2700x Supporting Control Stan- Participating Countries. dards Using ISO/IEC 27002 as an example, the most recent com- The ISMS Family of Standards is additionally supported by menting cycle (April 2010) resulted in 250 pages of com- 8 standards that are either published or under development. ments from 16 National Bodies (countries). Current dis- SC27 Working Group 4 develops and maintains each of cussions being debated with respect to ISO/IEC 27002 these supporting Standards as shown in Figure 2. include proposed additions and changes to controls, as an example: ISO/IEC 27002 Development ● Authorization process for information processing facili- Initiatives ties ● Supply Chain Assurance The depth of the discussions and meetings to successfully ● Classification process for information and related assets progress an SC27 International Standard towards publica- ● Classification activity for information and related assets tion is very extensive, with the volume of the written com- ● Mobile Devices ments being a measure of this interaction. Each new pub- ● Security requirements analysis and specification lished version of a Standard goes through a drafting proc- ● Initial training and education ess consisting of a