Nets, Webs and the Information Infrastructure/Viruses, Privacy and Security
What is a virus?Edit
PCWebopedia (http://www.webopedia.com) defines a computer virus as “a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.”
The term virus has become a catch-all name for all malicious computer programs. Strictly speaking, a virus is a type of electronic infection. The most common forms of infection are the email virus, worm and trojan program.
An email virus moves around in email messages, and usually replicates by automatically mailing itself to the addresses in the victim’s email address book.
A worm infiltrates existing computer networks through security holes. It uses the network to scan for other computers where the worm can reside and replicate itself.
A trojan program is a computer program that claims to do one thing (e.g., it claims to be a game) while taking other actions that the user is not aware of (e.g., copying and sending files to another computer). Trojan programs usually do not replicate automatically. Their activities may range from erasing or modifying files, sending email, or sending private information through the Internet.
Why do virus outbreaks cost companies money?Edit
The following are some of the ways that virus outbreaks increase company expenditures:
Computer breakdowns. Viruses are capable of crippling a computer by erasing or changing important files. They can clog networks, resulting in delays in legitimate computing tasks. This reduces productivity.
Virus cleanup required. When a computer is infected by a virus, the expertise of IT personnel is required to get rid of the virus. Some companies call in IT experts to remove viruses. Other companies choose to employ full time personnel to troubleshoot and guard their system against virus outbreaks.
Lost data / Data recovery. There are instances when data is lost due to a virus outbreak. This data will need to be rebuilt or gathered again.
Security measures. Companies devote a portion of their IT budgets to prevent virus contamination of their networks. This means investments in anti-virus and other security software or hardware.
How can technology prevent virus outbreaks?Edit
Virus infections can be prevented through a combination of good anti-virus software and good user habits.
Virus scanning - Scanning refers to the inspection of computer data to check whether there are viruses. Some scanning software inspect data as they are being introduced to a computer.
Common sense - The most effective defense against viruses are a person’s habits in using the computer. For example, users shouldn’t download email attachments without scanning them for viruses.
Virus fix - A virus fix is run on an infected computer to repair any damage caused by a virus. Virus fixes are the result of studying the effects of a virus on a computer. Thus, by its very nature, a virus fix becomes available only after a new virus is reported.
In the Internet realm, a cookie is a message stored by a Web site in a user’s computer. It contains information that a Web site can retrieve when the user re-visits the Web site. During the user’s subsequent visits, the appearance of the Web site is adjusted based on the information that is “remembered” by the cookie. (Strictly speaking, because the cookie is stored in the computer, the Web site “remembers” the computer and not the user.)
Cookies work like a doctor entering data into a patient’s card. When the patient returns to the doctor, information about the patient’s previous visits helps the doctor provide better service to the patient.
Cookies can store login information so that users do not need to type in this information every time they return to a site. Cookies can also determine the interests of a particular user by the sequence of sites that the user visits, by the information the user submits, or by the topics that the user chooses to view. Cookies can also store data about an ongoing transaction in order to continue the transaction at a later time.
For example, an online shopper, Almira, goes to an online bookstore (like Amazon.com) to buy a book about Elvis Presley. Almira will have a virtual shopping cart where she can store books related to Elvis. Cookies are used to store data for the shopping cart. Using cookies, the Web site may also recommend a compact disc of Elvis’s songs or movies by Elvis. Almira may see advertisements about other popular 70’s record albums on sale or travel tours featuring a trip to an Elvis museum or Web sites selling Elvis memorabilia. These are all based on the cookies’ perception of Almira’s interest in Elvis as shown by her search for a book about Elvis. Lastly, if Almira chooses to postpone her purchase, the cookie will store data so that when she comes back to continue her shopping, the books or other items she had left in her virtual shopping cart will still be there.
Cookies gather information to help make things convenient for a user. But when information is directly identifiable to a particular person and is used for purposes other than a user’s convenience, there could be a privacy breach.
Going back to the analogy of cookies acting like a patient’s card, if the doctor began to divulge information about the patient to a third party (e.g., to health insurance or pharmaceutical companies), the person’s privacy would be compromised. In Almira’s case, her privacy is breached when information gathered by the online bookstore is sold to other vendors.
There is a privacy breach when a Web site does not inform the user about the kind of information stored in a cookie and how this information is used.
According to a study by Forrester Research, Inc., 90% of Web sites fail to comply with basic privacy principles.  Also, the vast majority of such policies use vague terms and legal jargon that serve to protect companies and not individuals. The study showed that only about 10% of the companies studied adequately addressed the basic privacy of users.
How should governments handle online privacy problems?
There are four general approaches to privacy problems: laissez-faire, self-regulation, technology, and legislation/government.
For example, the World Wide Web Consortium (W3C; www.w3c.org) has developed a privacy standard called Platform for Privacy Preferences Project (P3P). The W3C was created to help realize the Web’s full potential by developing common protocols that promote its evolution and ensure its interoperability. Simply stated, P3P lets a user declare a set of customized privacy rules. These rules will be used to determine whether or not a Web site has acceptable privacy policies. Software based on P3P will help a user determine the actions to be taken when a Web site’s privacy policies do not match the user’s privacy rules.
Technology is a solution that can be taken up by private individuals, enterprises and interest groups. Many of the technology solutions involve working with browsers which inform a user of the privacy levels upheld by the Web site being visited.
- Box 3. Examples of P3P Tools
Privacy Bird by AT&T http://privacybird.com
P3P Demonstration site http://p3p.jrc.it/modelsite/index.php
P3P Toolbox http://www.p3ptoolbox.org/
Technology and industry standards have become complimentary solutions to privacy issues. For example, there are tools developed based on P3P standards that automatically look up the privacy statement of the Web site. If the Web site’s privacy policies are within the specified standards of the user, navigation of the site is continued. Otherwise, the user is informed of the level of privacy protection afforded by the Web site. This is all done automatically, with minimal intervention of the user, by embedding machine-readable codes that are read by P3P tools. Tools are being developed by companies independent of W3C, which encourages private companies to develop software that will enable the use of P3P.
Governments sometimes play an active role in protecting privacy on the Internet. Korea, for example, has been vigilant in protecting citizen privacy, promulgating the “Information Infrastructure Protection Act” and “The Act on Promotion of Utilization of Information and Communication Network and Data Protection” in 2001. 
What kinds of privacy legislation have been passed?Edit
A study of the privacy laws of 15 jurisdictions  reveals the following:
- Eleven jurisdictions impose restrictions on the transfer of data across borders. Only Brazil, Russia and the United States do not. Chinese law does not address cross-border data transfers.
- Twelve jurisdictions have existing or proposed laws that address both traditional privacy and data protection. The privacy laws in Japan and Sweden are focused primarily on data protection.
- Most of the jurisdictions require notice to the data-subject that data is being collected and its use, some form of consent by the subject for the data to be collected and used, protection of the subject’s right to access the data, and maintenance of data security by the data controller.
- In all but three jurisdictions-Australia, Hong Kong and Japan-a data-subject may go to court to enforce privacy laws.
- In 13 jurisdictions in the survey, violations of privacy law can be criminal.
- Box 4. Fair Information Practices of the United States and the OECD
The United States and the Organisation for Economic Cooperation and Development (OECD) have their own versions of fair information practices.
In the US, the Federal Trade Commission has summarized the main elements of fair information practices into five categories: notice, choice, access, security, and contact.
- Notice - Informs an individual exactly what information is being collected, how it is collected, how the information will be used, and with whom it will be shared.
- Choice - Allows consumers to exercise control over the use of their data (for example, whether to join or to be excluded from electronic newsletters or marketing campaigns).
- Access - Allows individuals to review the information that has been collected about them. It also gives individuals the ability to correct or delete inaccurate information.
- Security - Requires data collectors to protect the information they have gathered, both during transmission and storage.
- Contact - Requires collectors of information to provide individuals with reliable contact information.
The OECD expanded on these principles, adopting a set of eight fair information practices. The additional three principles are purpose specification, use limitation and individual participation.
- Purpose specification - The purposes for which personal data are collected should be specified no later than at the time of data collection.
- Use limitation - Data collectors are required to keep confidential any personal information, unless disclosure is with the consent of the individual or by authority of law.
- Individual Participation - An individual has the right to get confirmation of the existence of data, request access, challenge data, and have data erased, rectified, completed or amended.
Sources: Jared Straus and Ken Rogerson, “Policies for Online Privacy in the United States and the European Union,” Regulating the Internet: EU & US Perspectives [home page online]; available from http://jsis.artsci.washington.edu/ programs/europe/Netconference/Strauss-RogersonPaper.htm; accessed 4 September 2002.
James S. Huggins, “OECD Privacy-D-Personal Data Privacy Goes International,” James S. Huggins’ Refrigerator Door [home page online]; available from http://www.jamesshuggins.com/h/bas1/oecd_privacy_d.htm; accessed 4 September 2002.
What are the security issues on the Internet?Edit
The CERT Coordination Center (CERT/CC; http://www.cert.org), a center for Internet security expertise, has suggested that the increasing speed and sophistication of attack tools, faster discovery of vulnerabilities, and increasing permeability of firewalls are important trends related to Internet security. 
Notably, there is an increasing threat from infrastructure attacks. There are four types of infrastructure attacks. The first type is Denial of Service (DoS) where excessive network traffic caused by malicious attacks crowd out legitimate users from using the network. The second type of attack is through worms, which are self-propagating malicious code such as “Code Red”, “Nimda” and “Klez”. The Code Red worm infected more than 250,000 systems in just nine hours. Third, attacks on the Internet domain name systems (DNS) can render Web sites inaccessible, vandalize legitimate Web sites or re-direct Web site traffic to the attacker’s Web site. Government and military Web sites are common targets of this kind of attacks. The fourth type consists of attacks against or using routers. Attacks on routers can result in interception of information or a slowing down of information delivery.
What measures can be taken to prevent computer cracking and other security breaches?Edit
There are three countermeasures to threats of cracking: technology, people and policy.
Advances in technology continue to improve the security of computer systems. Software and hardware are being developed to guard against computer break-ins. Among the countermeasures that can be implemented are a secure DSL connection, installation of a personal firewall, installation of anti-virus software, safe email practices, and regular backups.
But technology is effective only until the next cracker discovers another security hole. Thus, it is important for people (security experts, programmers, administrators) to be able to effectively monitor a system. Especially when computers, networks or servers contain sensitive information, it is imperative that experts can protect the security of the system.
Lastly, policies for punishing crackers are important. Recently, new laws in cybercrime have been put to the test. Legislators are learning whether or not the laws effectively address cybercrimes. Read more about this in the primer on cyberlaw.
- Hacker - slang term for a computer enthusiast, i.e., a person who enjoys learning programming languages and computer systems and who can often be considered an expert on the subject(s).
- Cracker - individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data.
The terms hacker and cracker have erroneously been used interchangeably. But hackers maintain that they have a strict code of conduct which limits them to acts which DO NOT do harm and are NOT malicious in intent.
- Box 5. Korea Information Security Agency
The Korea Information Security Agency (KISA) was established in 1996 to respond effectively to a variety of electronic infringement and intrusion acts and thereby create a safe, reliable information distribution climate. KISA has devoted itself to enhancing the security and reliability of electronic transactions by developing and supplying cryptographic algorithms, including SEED and KCDSA. In addition, KISA has led the development of information security in Korea through the IT security system evaluation, information security education and public awareness campaign, and information security policy and legislative framework research.
With the coming into effect of the Information Infrastructure Protection Act and The Act on the Promotion of Utilization of Information and Communication Network and Data Protection in July 2001, KISA acquired additional duties, such as analysis and evaluation of the vulnerability of the critical information infrastructure, IT security system certification, and operation of the Secretariat of Personal Information Mediation Committee.
Korea Information Security Agency, “About Korea Information Security Agency,” KISA [home page online]; available from http://www.kisa.or.kr/english/about_kisa_01.html; accessed 18 September 2002.
Is there a conflict between national security and privacy of the citizen in the online world?Edit
The challenge is to protect the privacy of citizens online without impairing the State’s right to examine documents and transmissions that threaten national security. The September 11 terrorist attacks in the USA introduced a new perspective into the Security of the State vs. Privacy of the Citizen debate. On the one hand, there is a continued campaign for the protection of personal privacy. On the other hand, governments (particularly the US government) have turned to information technology as a tool to combat terrorism.
In the years prior to the September 11 attack, financial institutions developed systems for securing direct mail, credit card offers and other kinds of targeted marketing.  Other systems specifically targeted the detection of money-laundering activities. This involved the collection of millions of transactions from various financial institutions and identifying trends that appear suspicious. This sharing of information between financial institutions was dropped as it was considered by many as an encroachment of privacy. After September 11, however, “some specialists believe the scrutiny of consumers on the government’s behalf is going even deeper”.