Network Security

Download Report

Transcript Network Security

Network Security
Trivia 1
• How many percent of the restaurants
opened today will be in business next
year?
a. 90 percent
b. 50 percent
c. 20 percent
d. 10 percent
Trivia 2
• How many percent of the restaurants
opened today will be hacked next year?
a. 90 percent
b. 50 percent
c. 20 percent
d. 10 percent
Introduction
• Technology became inseparable from
hospitality operations.
• Technology becomes a part of the DNA of
the company
• Information security is getting more
important.
And we are all under compliance
Assurance is key
Introduction
• Every day thousands of major security
breaches occur in the public and private
sector, resulting in serious financial and
property losses (Flink, 2002).
• 75% of email is spam (EWeek, 2004)
• In 2004, every single computer was
attacked by a virus at least one time.
Computer viruses are most
commonly spread by…
a) Reading jokes on
the Internet
b) Opening e-mail
attachments
c) Downloading
pictures from the
web
d) Poorly chosen
computer
passwords
• To limited extent, malicious
code can be picked up
from downloading files
from the Internet
• Most viruses are spread
through attachments being
sent in e-mail.
• According to a recent
study by SANS, nearly
40% of all e-mail
attachments are infected
by a virus.
Does your organization use
perimeter protection?
• We do not have a firewall.
• We have a firewall, and
block only what we are
scared of.
• We have a firewall with a
default deny all policy,
and allow traffic through
by exception.
• We practice defense in
depth, we have a
corporate firewall and
host based firewalls
wherever possible.
• If you don’t have a firewall,
you are just asking for
trouble. You even need
firewalls at each of your
restaurants that connect to
the Internet.
• And even if you do have a
firewall, you have to set your
policy by default to reject all
traffic, and from there, only
allow traffic through that you
want.
• And oh yeah, you better
have firewalls on your POS
systems as well.
True or false?
• Working away from
the office gives you
more freedom from
the company’s
security policies.
• False.
• The company’s
security standards
and policies are even
more important when
you are working away
from the office.
Does your organization use
intrusion detection systems?
• We do not have IDSs.
• We have IDSs, but do
not review system
logs.
• We have IDSs, and
review all system
logs.
• We have IDSs
throughout our
network and perform
event correlation.
• If you do not have intrusion
detection systems (IDSes)
throughout your
organization—extending to
your restaurants and any
other location that feeds info
directly to your
headquarters—you could be
attacked without knowing it.
• And to make sense of it all,
you need to perform event
correlation to determine if
you are being hit by a
blended attack.
True or false?
• Off-site tapes and
anti-virus updates
automatically protect
you from virus
infections.
• False
• 90% of all
organizations that do
not have a very tight
security policy only
update their virus
definitions after they
have found new
viruses.
• Any virus that existed
during the backup
process is now
successfully backed
Do you have a written set of
security policies that have been
tested in the last year?
• No, we do not have
written security
policies.
• We have some
policies, but only for
critical elements or
they are out of date.
• We have a robust set
of policies and
employees are
required to review
them.
• If you answered no,
you are in a world of
hurt.
• If you haven’t tested
your security blanket
from the outside of
your organization and
from the inside of
your organization, you
are in a world of hurt.
Threats aren’t limited to viruses, worms, or
denial of service attacks anymore
• Nimda had four propagation methods attached
to it.
– It embedded itself into .html files on the hotel’s
“secure” sign-in page, compromising the users’
computers that signed in without “live” virus
protection.
– It then harvested e-mail addresses from the mail box,
sending out its own e-mails through its own SMTP
sender application.
– If the user had a “shared folder” on the computer, it
proceeded to try and infect those files.
– It then used the host computer to look for any
computers running personal web servers, trying to
use the Unicode Web Traversal exploit to gain control
of the target.
If you had brought the virus
back with you
• Your own computer would have
– Begun attacking other systems from within
your network, bypassing your firewall
– Continued to send out infected e-mails using
your own mailbox addresses for a
combination of sender and receiver
– Probably confounded your net admins if they
didn’t have an internal intrusion detection
system
What you can lose…
What can
go awry
Docu
ments
Confidentia
lity
Apps
OSes
4
Storage
Hardwa
re
Network Power Building
4
4
4
4
Integrity
4
4
4
4
4
4
4
4
Availability
4
4
4
4
4
4
4
4
A Hotel Computer System
TRAVEL
AGENTS
GLOBAL
RESERVATION
SYSTEM
FORECASTING
&
SCHEDULING
TIME &
ATTENDANCE
CORPORATE
GUEST
HISTORY
CORPORATE
RESERVATION
SYSTEM
PMS
CORPORATE
ACCOUNTING
SYSTEM
PURCHASING
&
INVENTORY
SYSTEMS OFF PREMISE
ELECTRONIC
LOCK &
SECURITY
SYSTEM
BOH FOH
CALL
ACCOUNTING
SYSTEM
(CAS)
MINI
BAR
ELECTRONIC
BAR
DISPENSER
SYSTEMS INHOUSE
SALES &
CATERING
SYSTEM
YIELD
MANAGEMENT
FOOD &
BEVERAGE
INVENTORY
SYSTEM
INTERFACE WITH
DIRECTION OF
DATA FLOW
PAY PER
VIEW /
CHECK OUT
MAID
DIAL-IN
, MIS, EIS
RESTAURANT
MANAGEMENT
SYSTEM
(POS)
REMOTE
SALES
MARKETING
CREDIT CARD
AUTHORIZATION
& EFT
Long
Distance
INROOM
ENERGY
CONTROL
PBX
(SWITCH
MAINTENANCE
ENERGY
FIRE &
LIFE SAFETY
VOICEMAIL
MESSAGE
HANDLING
WAKE-UP
SYSTEM
TRAVEL
AGENTS
GLOBAL
RESERVATION
SYSTEM
FORECASTING
&
SCHEDULING
TIME &
ATTENDANCE
CORPORATE
GUEST
HISTORY
CORPORATE
RESERVATION
SYSTEM
PMS
CORPORATE
ACCOUNTING
SYSTEM
PURCHASING
&
INVENTORY
SYSTEMS OFF PREMISE
ELECTRONIC
LOCK &
SECURITY
SYSTEM
BOH FOH
CALL
ACCOUNTING
SYSTEM
(CAS)
MINI
BAR
ELECTRONIC
BAR
DISPENSER
SYSTEMS INHOUSE
SALES &
CATERING
SYSTEM
YIELD
MANAGEMENT
FOOD &
BEVERAGE
INVENTORY
SYSTEM
INTERFACE WITH
DIRECTION OF
DATA FLOW
PAY PER
VIEW /
CHECK OUT
MAID
DIAL-IN
MIS, EIS
RESTAURANT
MANAGEMENT
SYSTEM
(POS)
REMOTE
SALES
MARKETING
CREDIT CARD
AUTHORIZATION
& EFT
Long
Distance
INROOM
ENERGY
CONTROL
PBX
(SWITCH
MAINTENANCE
ENERGY
FIRE &
LIFE SAFETY
VOICEMAIL
MESSAGE
HANDLING
WAKE-UP
SYSTEM
Purpose of the Study
• to analyze security practices of
electronic information, network
threats and prevention techniques
in hotels.
Objective of the Study
• to help information technology
directors or chief information officers
with policy development for security
of electronic information in hotels
Problem Statement
• In every level of hotel management,
networks are involved. (Cobanoglu &
Cougias, 2003).
• In the property level, there are local area
networks where reservation, front office,
restaurant management, payroll,
accounting, human resources, and other
systems reside
• In addition, hotels may offer high speed
Internet access (wireless or wired) to their
guests in their hotel room or other areas in
the hotel.
Review of Literature
• The total volume of information is
increasing at the rate of some 12 percent
a year (Daler et. al. 1989).
• The Internet now goes into over 120
nations around the world and has
approximately 605 million users (NUA
Internet, 2004)
Security procedures protect
hotel’s DNA
Refunds
Supply Chain
AR/AP
Reporting Unstructured
PMS
Back Office
Billing
Sales
Ops
CRS
Inventory
CRM
POS
E-Mail
Documents
Processes
Datasets
Computer Crimes
• Hacking (also known as Cracking): Knowingly accessing a
computer without authorization or exceeding authorization of
a government computer or intentionally accessing a computer
without authorization or exceeding authorization to acquire
financial information of a bank, business or consumer.
• Theft of Technology: Knowingly accessing a computer with
the intent to access or acquire technological information or
secrets
• Fraud: Knowingly, and with intent to defraud, accessing a
federal interest computer without authorization or exceeding
authorization to further a fraud or obtain anything of value.
Source: (The Breaulier Law Office, 2003)
Phishing
• fishing for information
• phreaking
• false email in order to gain
username/password
Security Scenarios
• While doing a security audit, we took one
of the main servers out of the building with
a fake work-order.
• I had access to the network of Hospitality
School in Thailand without any problem
• Try driving with your wireless enabled
laptop in streets.
Hacking: An art or crime?
• Whois (server address)
• Keylogger (tracks keyboard strikes)
• Netcraft (make and model of the server)
• Packet Internet Groper (PING)
• Name scan (find out computers in your
network)
• Port scan (Advanced LAN Scanner)—finds
open doors
• Attack (CGI, Unshielded directories, Trojan
horses, etc.)
Hacking
•
•
•
•
•
DNS Lookup
Finger
Name Lookup
Port Scan
Trace Route
• http://www.stayinvisible.com/index.pl/n
etwork_tools
Anonmyous IP
http://www.stayinvisible.com/index.pl/test_your_ip_nocache
Trace Email
• http://www.stayinvisible.com/index.pl/test_
your_email?action=showheaders&key=34
9002755807
Netcraft
Methodology
• Population: Hotel managers who is in charge
of information security practices in the U.S.
• Sample: The target sample consisted of 1143
technology managers that were current
subscribers of Hospitality Technology
magazine as of November 2004.
Methodology
• The survey has been adapted and
expanded from 2004 CSI/FBI Computer
Crime and Security Survey (CSI, 2004).
• Self-administered online survey with four
sections
– Security technologies
– Network security threats
– Perception statements
– Demographics and property characteristics
Findings
• Out of 1143 sample members’ emails, 178
emails were returned as “undeliverable”,
reducing the effective sample size to 965.
• 234 filled out the questionnaire, thus
yielding 24.2% response rate.
• The majority of the respondents (74.3%)
were somebody who was directly
responsible for information technology in
their organizations.
Top 5 Network Security Tools and
Techniques Used by Hotels
•
•
•
•
•
•
Technique
Anti-virus Software
Physical Security
Hardware Firewall
Software Firewall
Access Control
%
84.4%
82.7%
79.7%
77.6%
75.3%
Top 5 Network Security Tools and
Techniques Not Used by Hotels
•
•
•
•
•
•
Technique
Biometrics
Digital IDs
Image Servers
Vulnerability Assessment Scan
Intrusion Detection Systems
%
69.4%
68.1%
63.0%
42.5%
35.5%
Network Attacks
• Twenty percent of the respondents had a
computer network attack within the last 12
months.
• The size of the hotel seems to be
positively correlated with the number of
attacks observed within the last 12 months
(r=.72; p=.001)
Network Attack Types
• Virus Attack (15.4%) was reported most
frequently, followed by
• Denial of Service (7.7%),
• Sabotage of data networks (7.7%),
• System penetration by an outsider (7.7%),
and spoofing (5.1%).
Who is responsible (%)?
Disgruntled
employees,
23
Foreign
Corporation
s, 15.3
Other, 7.9
Independent
Hackers,
53.8
Other Findings
• The average financial loss created by these
attacks was $10,375 per year.
• About 20% of the respondents hired reformed
hackers or ethical hackers as consultants.
• Only 2.6% of the respondents reported computer
network attacks to law enforcements.
• The mostly used prevention tool was patching
(79.5%) the holes as they were released by
manufacturers of hardware and software.
Other Findings
• Only 40% has enough resources for
security
• 56.4% has enough expertise
• 23.1% do not have a method of getting rid
of old user accounts
• 20% are a member of IT security
organization
• 38.5% never conduct IT security audit
Conclusions
• This study is one of the first attempts to
analyze computer network attacks and
prevention techniques in the hotel
industry.
• The results showed that computer
network attacks create serious threats
to hotels.
• Although, hotel companies use some
prevention techniques, we observed a
distributed solutions mix.
Conclusions
• Some hoteliers prefer to outsource their network
and information security systems. This may have
two-fold impacts on hotels:
• 1) If the outsourcing company is a network and
information security expert, then, the hotel
network systems may be protected better;
• 2) The dependency on a different company in
such an important issue may create some
problems such as data privacy and ownership
Recommendations
• A significant number of hotels do not use and
plan to use in the future some important
network and information security tools and
techniques
• Some of these tools are so vital to network
security that not using them is an open
invitation to internal and external hackers.
• Hotel managers would do well by reviewing
this list and comparing the tools used by
them and implement and use multiple tools
Recommendations- 4 step guide
1. Prevention through firewalls, anti-virus
measures, ongoing anti-hacking analysis
2. Implement an intrusion detection system
3. Design a quick reaction team when you
get hit with a virus or hack attack. Be
ready to quarantine
4. Design an after-attack routine
Scan your network
• Use several methods
– From outside
– From inside
• Some tools:
– Symantec’s NetRecon
– Open-source Nessus (attacker and tester)
– Security Analyzer from NetIQ
– Shields Up! For Internet Ports
– MacAnalysis (performs 1300 attacks)
Protection: Set up an Intrusion
Detection System
• You want to know who is hitting and how
they are hitting you.
• You do not want to back up a system that
has been hacked.
• Some tools
– Snort (open-source)
– NetIQ’s Security Manager
• Know what is where (LANSurveyor)
Enter the Rule of Three
1st Rule of Three
• Only blended protection can stop blended
threats
– Firewalls
– Intrusion Detection Systems
– Anti-Virus measures
• You have to use all three security methods
together to ensure that you are really
protected
Best practices in securing your
data
Corporate
Store
Notebook
Corporate Defense
Store Defense
Notebook defense
The only truly secure system is
one that is
• powered off,
• cast in a block of concrete
• and sealed in a lead-lined room with
armed guards
• and even then I have my doubts.
High
Availability
Point in Time
recovery
Point in Time
versioning
Archived
retrieval
Sites
• Business Groups
• Business Functions
Systems
• Servers
• Desktops
• Notebooks
Volumes
• Server
• OS/Apps
• Data Storage
Data sets
• File system
• Applications
• Database(s)
(WORM formats)
Data
• Files
• Tables
• Records
Time to restore & length of data life
The second rule of three
Data Protection
The third rule of three
Reporting
Who can help?
• Vendors
– VERITAS is working
on it. Look for
information in the
news from them in
November.
– Symantec has recently
purchased
PowerQuest and is
building a unified
security-backup
offering
– NetIQ is directly
• Education
– The University of Delaware
is creating an HRIM
security specific e-learning
course.