Storage Decisions 2003
Download
Report
Transcript Storage Decisions 2003
Thin Ice in the Cyber World
Presented by
Dr. Bill Hancock, CISSP, CISM
Vice President, Security &
Chief Security Officer
[email protected]
972-740-7347
WHY Security?
Security transcends
S
E
IT disciplines:
systems, networks,
C
storage, databases,
U
Physical, Logical and
applications, support
R
Electronic boundaries
I
Departmental silos
T
Supply Chain
Y
Countries and jurisdictions
The Classic Reasons
Protect assets
PR fears
Management edict
Corporate policies
Fear of attacks
Customer info
Legal reasons
Was breached…
The Past
The Present
Source: http://cm.bell-labs.com/who/ches/map/gallery/index.html
Software Is Too Complex
50
Sources of Complexity:
IP stacks in cell phones,
PDAs, gaming consoles,
refrigerators,
thermostats
10
3
4
0
WINDOWS XP (2001)
Always-on connections
16.5
WINDOWS 2000 (2000)
Complex Web sites
15
WINDOWS 98 (1998)
•
•
•
New Internet services
XML, SOAP, VoIP
18
20
WINDOWS NT 4.0 (1996)
•
30
WINDOWS 95 (1995)
Data mixed
with programs
35
WINDOWS NT (1992)
•
40
WINDOWS 3.1 (1992)
Applications and
operating systems
MILLIONS
•
45
Reported Security Incidents to CERT 1998-2003
140000
120000
100000
80000
60000
40000
20000
0
1998
1999
2000
2001
2002
2003
As Systems Get Complex, Attackers are Less Mentally
Sophisticated…
CERT/CC
Attacker Diversity
Script kiddies
Social misfits
Internal attackers
Hacking “gangs”
Organized crime
Nation-state sponsored entities
Terrorist entities
What do customers really want ?
TOTAL
COST
OPTIMAL LEVEL OF
SECURITY AT
MINIMUM COST
COST
($)
COST OF
SECURITY
COUNTERMEASURES
0%
COST OF
SECURITY
BREACHES
SECURITY LEVEL
100%
Security must make business sense to be adopted !
Security Biz Case Drivers
The PAL Method
PAL – PR, assets/IP, law
Public Relations Issues
•
Costs for bad PR almost always exceed good security
implementation
Asset Protection and Intellectual Property
•
•
•
•
Intellectual property
Customers
Employees
Data stores
The Law
•
Each country has compulsory compliance laws about
security that most companies violate and don’t realize
it
Purpose of the following section
Goal here is not to hit
everything, just items
that are either very
timely or a bit outside
the normal reporting of
security events we see
everyday
Classic Current IT Security
Risks
DNS attacks
DDoS, DoS, etc.
Virii, worms, etc.
Spoofs and redirects
Social engineering
Router table attacks
OS holes, bugs
Application code problems
Insider attacks
Others…
Upcoming Security Threats
Geographic location
China is major concern
• Legislation in other countries
New hacker methods and tools
VoIP
IP-VPN (MPLS)
ASN.1 and derivatives
Hacker “gangs”
Complexity of application
solutions make it easier to disrupt
them (Active Directory, VoIP, etc.)
Industrial espionage from
competition
Covert sampling
Covert interception
Threats - Infrastructure
Core (critical)
• Routing infrastructure
• DNS
• Cryptographic key mgt.
• PBX and voice methods
• E-mail
• Siebel database
Threats – Infrastructure, II
Essential
• Financial systems
• Customer console management systems
• Access management to Exodus critical
resources
• Intellectual property protection methods
• Privacy control methods
• Internal firewalls and related management
• HR systems
Routing Infrastructure
No router-to-router
authentication
• Router table poisoning
• Vector dissolution
• Hop count disruption
• Path inaccuracies
• Immediate effect
• Redundancy has no
effect on
repair/recovery
Edge routers/switches
do not use strong
access authentication
methods
Routing Infrastructure, II
No CW-wide internal network IDS/monitoring
No internal network security monitoring for
anomalies or stress methods
No effective flooding defense or monitoring
DNS Security Assessment
Grossly inadequate security
methods against attacks
No distributed method for attack
segmentation recovery
No IDS or active alarms on DNS to
even see if they are up or down
Geographic distribution inadequate
and easy to kill due to replication
Zone replication allows poisoning of
DNS dbms
DNS servers around the company
do not implement solid security
architecture
Mobile Technology Security
Most corporate mobile
technology when removed from
the internal network or premises
is WIDE OPEN to data theft,
intrusion, AML, etc.
• Laptops (no FW, IDS, VPN,
virus killers, email crypto, file
crypto, theft
prevention/management,
cyber tracking, remote data
destruct, remote logging,
AML cleaning, etc., etc., etc.
• Palm Pilots, etc, - no security
• 3G and data cells – no
security
• No operational security over
wireless methods
Cyberterrorism
It’s real
It’s a major problem
Most sites have no clue on how to deal with
it or what all is involved
Many sites have already been used for
temporary storage of terrorist operational
data (micro web sites, FTP buffer sites,
steganography transfer, etc.)
If not on your radar, put it there now
Autonomous Malicious Logic
Worms, which increase with complexity and
capabilities with each iteration
Increasing body of hostile code
Scans large blocks if IP addresses for
vulnerabilities
•
•
Target agnostic
Large or small, powerful or not
No specific attack rationale means that
anyone is vulnerable
Sharp increase in number seen in last year
and growing
Buffer Overflows
Concept is not new, but there are a lot of new ones appearing
daily
Due to underlying problems with core protocol language issues,
such as ASN.1, the same buffer overflow attack packet type for
a specific protocol can affect many different entities in different
ways:
• SNMP OID buffer overflow in February 2002 affected
practically every instantiation of SNMP that used ASN.1 as
the base definitional metalanguage
• What it did to one vendor was radically different than what it
did to a second vendor for the same type of packet attack
Password Crackers
Sharp rise in availability of password cracking
programs
Bulk of them use brute force methods or known
dictionary attack methods
Some are taking advantage of exploits of a
known password hashing method
Commercial products starting to appear in the
industry
Default Passwords
Still a popular exploit method:
•
•
•
•
•
•
Wireless access point admin
Operating systems
Broadband cable modems
Routers out-of-the-box
Databases out-of-the-box
Simple exploits
Laser printer passwords
SCADA components
Embedded systems
Vendor Distributed Malware
Due to lack of care in preparing distribution kits,
many vendors are starting to distribute their
products with malware in it
•
Recent gaming company distributed NIMDA with a CD
distribution
•
Others have shipped virii and other malicious code
infestations
Perimeter malware checking is not enough
anymore
Insiders
Still a major threat
Responsible for over 90% of actual financial losses to
companies
Most sites do not have enforceable internal security controls or
capabilities
•
•
•
Legacy system
Hyperhrowth of systems/networks
Lack of care and planning in security as the growth has
happened
Cryptographic Key Management
None
What is available is all
manual
Changing keys on some
technologies takes
MONTHS (e.g. TACACS+)
Keys are weak in some
areas and easily broken
No “jamming” defenses
for key exchange methods
Little internal knowledge
on key mgt and
cryptographic methods
PBX and Voice Methods
No assessment of toll
fraud and PBX misuse
Cell phones used
continually for sensitive
conversations
No conference call
monitoring for illicit
connections or listening
No videoconferencing
security methods
PBX and Voice Methods, II
No voicemail protection or auditing efforts
trans company
Easy to social engineer PBX access and redirection
Redundancy of main switching systems
questionable (e.g. May 2002 CWA OC-12
disruption)
E-Mail Security Issues
Employees in trusted positions
reading e-mail
E-mail security methods take a
long time to implement
Lack of use of encryption methods
for confidential e-mail
Lack of keyserver for
cryptographic methods (this is
due to power)
Newly devised security methods
not implemented yet
Use of active directory and LDAP
in future a major concern
E-Mail Security Issues, II
Wireless e-mail a concern
No filters for SPAM
No keyword filter searching methods for
potential IP “leakage”
Ex employees retain access information
for their and other accounts
Hyperpatching
The need to quickly patch vulnerabilities is
becoming a major security pain point
Protocol exploits such as SNMP will accelerate
and require additional patching and fixes
Customers should stop with “old think” change
control and start considering using
hyperpatching and mass roll-out systems (push
technology) to start solving hyperpatching
problems
Employee Extortion
At least 5 different extortion
methodologies have appeared that
affect employee web surfers
Latest one involves persons who surf
known child pornography web sites or
hit on chat rooms on the subject
•
A link is e-mailed to the person and they threatened
with being turned over to officials and employers
unless they pay to keep the information about their
surfing habits secret
This is a growing business…
Old Code Liabilities
Software vendors are trying to
figure out how to decommission
older versions and older code
quickly due to patch/fix and
general liability issues
Old code does not have security
controls that are compatible with
today’s problems and security
systems
Wireless
Continues to be a problem
Mostly due to lack of implementation of controls
War driving is easy to do for most sites and to get
on most networks
Illegal connection to a wireless network violates
FCC regs
Need intrusion detection for wireless to detect
who is associated to the LAN and doesn’t belong
Best short-term solution are peer-to-peer VPNs
(desktop, site-to-site, etc.)
New threats with upcoming 3G products
Data Retention
BIG push for data retention in many parts of
the world
With retention comes liabilities for retained
information
U.S. has no specific retention laws except in
specific financial and healthcare areas
EU and Asian countries recently enacted serious
retention laws
M&A and Partnership Security
We often know nothing about the
security of a non-corporate solution
After examination, most are very bad
We need procedures for evaluation of
partners and M&A for security issues
and corrective action
We also need to have as part of the
diligence process proper security
oversight on acquisitions
• We often do not know about an
M&A target until the press
announcement
Blended Attacks
Biological and Cyber
•
Smallpox infection and DDoS against infrastructure
Multiphasic Cyber Attack
•
DDoS against routers, DNS poisoning attacks and defacement
attacks at the same time
Sympathetic hacking group attacks
Upstream infrastructure attack
•
•
•
•
IXC disruption
Power grid disruption
Peering point disruption
Supply-chain vendor disruption
Questions?
Dr. Bill Hancock, CISSP, CISM
Vice President, Security
& Chief Security Officer
Email: [email protected]
Phone: 972-740-7347