18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Chapter 26] 26.2 Criminal Prosecution<br />

you might check with your agent to see if it covers damages resulting from law-enforcement agents<br />

during an investigation. Business interruption insurance provisions should also be checked if your<br />

business depends on your computer.<br />

26.2.6 Other Tips<br />

Here is a summary of additional observations about the application of criminal law to deter possible<br />

abuse of your computer. Note that most of these are simply good policy whether or not you anticipate<br />

break-ins.<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

Replace any welcome message from your login program and /etc/motd file with warnings to<br />

unauthorized users stating that they are not welcome. We know of no legal precedent where a<br />

welcome message has been used as a successful defense for a break-in; however, some legal<br />

authorities have counselled against anything that might suggest a welcome for unwanted visitors.<br />

Put copyright and/or proprietary ownership notices in your source code and data files. Do so at the<br />

top of each and every file. If you express a copyright, consider filing for the registered copyright -<br />

this version can enhance your chances of prosecution and recovery of damages.<br />

Be certain that your users are notified about what they can and cannot do.<br />

If it is consistent with your policy, put all users of your system on notice about what you may<br />

monitor. This includes email, keystrokes, and files. Without such notice, monitoring an intruder or<br />

a user overstepping bounds could itself be a violation of wiretap or privacy laws!<br />

Keep good backups in a safe location. If comparisons against backups are necessary as evidence,<br />

you need to be able to testify as to who had access to the media involved. Having tapes in a public<br />

area probably will prevent them from being used as evidence.<br />

If something happens that you view as suspicious or that may lead to involvement of<br />

law-enforcement personnel, start a diary. Note your observations and actions, and note the times.<br />

Run paper copies of log files or traces and include those in your diary. A written record of events<br />

such as these may prove valuable during the investigation and prosecution. Note the time and<br />

context of each and every contact with law-enforcement agents, too.<br />

Try to define, in writing, the authorization of each employee and user of your system. Include in<br />

the description the items to which each person has legitimate access (and the items that each<br />

person cannot access). Have a mechanism in place so that each person is apprised of this<br />

description and can understand their limits.<br />

Tell your employees explicitly that they must return all materials, including manuals and source<br />

code, when requested or when their employment terminates.<br />

If something has happened that you believe requires law-enforcement investigation, do not allow<br />

your personnel to conduct their own investigation. Doing too much on your own may prevent<br />

some evidence from being used, or may otherwise cloud the investigation. You may also aggravate<br />

law-enforcement personnel with what they might perceive to be outside interference in their<br />

investigation.<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch26_02.htm (7 of 8) [2002-04-12 10:45:05]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!