IT Security (September 2000)

Download Report

Transcript IT Security (September 2000)

IT Security
Tony Brett
IT Systems Manager
Corpus Christi College
OxCERT
[email protected]
New ITSS Induction
Tony Brett, 14 September 2000
Overview
•
•
•
•
Excuses
Policy
E-mail
Machine Security
• OxCERT
–
–
–
–
– Physical Security
– File Security
• Viruses (inc. Email+Hoax)
• Public machines
– OS Security
• Network Security
–
–
–
–
Student connections
Excuses
Sniffing
Firewalls - University
New ITSS Induction
Who
What
What it does
What it doesn’t do
• What to take away
• Resources
• Questions?
Tony Brett, 14 September 2000
Excuses – FAQs
• Users
– “Why would anybody be interested
in my account - I only use it for
email”
– “Security is the admins problem
not mine”
– “I let my friend in Spain use my
account because they have been
having problems with their
network”
– “Why has my account been
disabled on sable”
New ITSS Induction
Tony Brett, 14 September 2000
Policy
•
•
•
•
•
Enforce good passwords
DON’T store password in E-mail clients etc.
Disable dormant accounts
Age passwords
Have a policy on the use of accounts – encourage
deletion unused accounts. Tell OUCS User Reg!
• Have a policy on Virus Hoaxes
• Make sure everyone knows about it
• Enforce it
New ITSS Induction
Tony Brett, 14 September 2000
E-Mail
• E-mail is NOT SECURE!
• Faking E-mail is very easy
• PGP is your friend
– Use for digital signatures
– Use for encrypting E-mail
• http://www.oucs.ox.ac.uk/email/pgp.html
• E-mail virus hoaxes – policy.
• E-mail viruses – ILOVEYOU, Melissa
New ITSS Induction
Tony Brett, 14 September 2000
Securing Computers
• Physical Security
• File Security
• “Use” Security
New ITSS Induction
Tony Brett, 14 September 2000
Securing Computers
• Physical Security
• File Security
• “Use” Security
New ITSS Induction
Tony Brett, 14 September 2000
Physical Security
Physical Security of machine is
the limiting factor in security
– Where are machines located?
– Who has keys or can get keys?
– How is access to rooms controlled
and monitored?
– Are machines in cages or wired?
– Are building exits monitored?
– Keyboard sniffers
New ITSS Induction
Tony Brett, 14 September 2000
Securing Computers
• Physical Security
• File Security
• “Use” Security
Viruses
Password protect
Encrypt
New ITSS Induction
Tony Brett, 14 September 2000
Viruses & Trojans
– Destructive Power - BIOS Erase
– Types of Virus
•
•
•
•
Boot Sector
Executable infectors, Trojans
Macro or “Document”
E-mail worms – Outlook!, ILOVEYOU, MELISSA etc.
– Anti-Virus Products
•
•
•
•
F-Prot
Sophos - http://www.uk.sophos.com
Dr. Solomon’s
Norton -LiveUpdate
– Lynne Munro at OUCS
New ITSS Induction
Tony Brett, 14 September 2000
Public Machines
• Libraries
• Machines need to run Win95/98 to run
OxLIP properly
• Inherent security risk with so many different
applications
• OWL - http://web.lib.ox.ac.uk/software
– Password from [email protected]
• Disk imaging software e.g. Ghost
New ITSS Induction
Tony Brett, 14 September 2000
Securing Computers
• Physical Security
• File Security
• “Use” Security
Password protect
accounts
Restrict access
Physical “locks”
New ITSS Induction
Tony Brett, 14 September 2000
Securing your OS
•
•
•
•
•
•
Ensure sufficient logging
Examine logs
Take note of and understand error messages
Keep up-to-date with patches
Don’t run unnecessary network services
Web servers are notorious, especially
Microsoft IIS
New ITSS Induction
Tony Brett, 14 September 2000
Securing UNIX
• Linux a good, free OS but is the most often
compromised
– Dynamic OS. Fixes released regularly
• Solaris, SunOS, HP-UX, Digital, SGI (IRIX).
• New compromises almost daily – Bugtraq.
• Beware of Students running any UNIX.
Encourage students to be aware. Sniffers!
• Only Run services that are needed. Turn off
everything else. Telnetd, IMAPd, POPd, NFSd
etc.
• Use SSH, SCP etc. Putty on Windows
New ITSS Induction
Tony Brett, 14 September 2000
Securing Macintoshes
• Mac OS Not designed for security
• Appletalk over Ethernet
– OUCS routing between departments
• Appleshare
– Guest account
– Owner sees whole Hard Disk
• TCP/IP
– DoS Attacks
New ITSS Induction
Tony Brett, 14 September 2000
PCs - DOS, Win16, Win32
• “Standard” operating systems
– DOS, Win95, WinNT (workstation)
• None designed to be servers
– Some security holes - DoS vulnerabilities
Default shares on 95 and NT boxes
C$, D$, etc.
• Password caching
(.pwl files)
New ITSS Induction
Tony Brett, 14 September 2000
NT Server, Netware Server
• Network O/S - running on PCs
– NT can run on other platforms
– File/Print services
– TCP/IP services (FTP, Web etc).
•
•
•
•
Network packet signing
Physical access to server
Password regimes
Backup & disaster plan essential!
– Use OUCS HFS for backup
• Keep service packs up-to-date
• Compromises are rare
• See http://www.securityfocus.com/frames/?content=/vdb/stats.html
New ITSS Induction
Tony Brett, 14 September 2000
Network Security
–
–
–
–
–
–
–
–
–
10BaseT vs. 10Base2 (coax)
Manageable Hubs
Physical access to hubs
MAC address restriction
Hub management passwords
DHCP - dynamic vs. static, logs
Switches vs. repeaters
Sniffers
Operating system policy – running services.
New ITSS Induction
Tony Brett, 14 September 2000
Student Connections
•
•
•
•
Connection Policy is essential
Students must sign agreement
Log DHCP assignments so abuses can be traced
Get student to assign College the right to examine
their machine
• Control use of server-type OS.
New ITSS Induction
Tony Brett, 14 September 2000
Securing the Network
•
•
•
•
•
Outsiders looking in
Insiders looking about
Insiders looking out
Access through valid means
Misuse of “features”
– inadvertent doors
• Insecurity by design
New ITSS Induction
Tony Brett, 14 September 2000
Common Excuses
• “I was just looking”
• “It wasn’t secured so I thought it was OK”
• “I accidentally downloaded it and just
thought I would see what happens when I ran
it”
• “Hey man, the internet is an anarchy, I can
do what I want”
• “Oh yeah, what are you going to do about it”
New ITSS Induction
Tony Brett, 14 September 2000
Network Sniffing
• Almost impossible to detect
• Impact depends on topology of network
• Switching reduces possibilities
New ITSS Induction
Tony Brett, 14 September 2000
Network Sniffing - What is it?
• Much network traffic in
clear text
A
• Passwords and
Usernames
B
• Compromised
machines running
sniffers
New ITSS Induction
Tony Brett, 14 September 2000
Q
Host Q listens
without A & B
knowing
Network Topolgy
University
Backbone
SWITCH
HUB
New ITSS Induction
HUB
Tony Brett, 14 September 2000
How to reduce the risk
• Encryption
– SSH, Disposable passwords, SCP
• Switch sensitive parts of network
• Use port scrambling on hubs
• Keep student and staff segments on separate
switched ports
New ITSS Induction
Tony Brett, 14 September 2000
Firewalls
• Isolate the network
• Bandwidth bottleneck
• Rule based access
Badlands
– IP addresses, blocks, or ports
• Extensive logging
• False sense of security
• OUCS
Happyville
– Started fully open – ports or addresses closed as
vulnerabilites are identified
– Balance between security and utility
New ITSS Induction
Tony Brett, 14 September 2000
Firewall
Who/What is OxCERT
•
•
•
•
•
University IT Security Team
[email protected]
(2)82222
Member of FIRST
9am-5pm, and best-attempt cover
outside this
• [email protected]
New ITSS Induction
Tony Brett, 14 September 2000
Who/What is OxCERT
• C. 10 Committee, termly meeting.
• 4 front-line
–
–
–
–
Pete Biggs, Physical & Theoretical Chemistry
Patrick Green, OUCS
Neil Clifford, Astrophysics
Neil Long, OUCS
• Emergency Repsonse service, not a free
machine set-up service
• http://info.ox.ac.uk/compsecurity/oxcert/
New ITSS Induction
Tony Brett, 14 September 2000
What OxCERT can do
– Advise IT staff and individuals on matters of
IT security
– Advise on methods of improving security
– Liason with other CERTs
– Checking security of machines within
Oxford University
– Assistance in disaster recovery
– Assistance in planning new networks and/or
machines
New ITSS Induction
Tony Brett, 14 September 2000
What OxCERT can do
– Direct contact with all parts of OUCS
– Intervention when machines are found to be
compromised
– Disable IP addresses or networks (both within and
without Oxford) if security is being compromised
– Investigation of DoS (Denial of Service) type attacks
– What it can! Only 1.5 posts is funded by the
University, others are volunteers.
New ITSS Induction
Tony Brett, 14 September 2000
What OxCERT can’t do
– Get involved with policy decisions that don’t
affect security
– Deal with SPAM or abusive E-mail
([email protected])
– Deal with non-security computing issues
(electronic harrassment etc.)
– Act as a substitute for OUCS advisory
– Miracles! Security is YOUR responsibility,
OxCERT can only advise
New ITSS Induction
Tony Brett, 14 September 2000
What to take away
•
•
•
•
•
Be aware of security
Make users aware of the need for security
Have, and enforce an IT Security Policy
Maintain OS security
Know what services you are providing and
only provide those you know about
New ITSS Induction
Tony Brett, 14 September 2000
•
Resources
This presentation:
– http://users.ox.ac.uk/~aesb/itsec.ppt
• OxCERT
– http://www.ox.ac.uk/it/compsecurity/oxcert/
• Secure E-mail
– http://www.oucs.ox.ac.uk/email/secure.html
• Public Machines:
– http://users.ox.ac.uk/~aesb/itsec.ppt
• Virus Hoaxes:
– http://www.uk.sophos.com/virusinfo/scares/
• University and other IT rules
– http://www.ox.ac.uk/it/rules/
• The OUCS Hierarchical File Server
– http://hfs.ox.ac.uk/local/
New ITSS Induction
Tony Brett, 14 September 2000
Fin
• Questions?
New ITSS Induction
Tony Brett, 14 September 2000