Computer & Network Security
Download
Report
Transcript Computer & Network Security
Computer & Network Security
[email protected]
Outlines
Definition of computer and network security
Security Terminology
Weaknesses and Vulnerabilities
Identification and Authentications
Authentication Mechanism
Computer System and Network Intrusions
Internet Etiquette
Security Management
Definition of computer and network security
• Definitions
Security
•
Security is about the protection of assets
*
Protective measures
•
•
•
Prevention
– Take measures that prevent assets from being damaged
Detection
– Take measures that be able to detect when an asset has
been damaged
Reaction
– Take measures that be able to recover from a damage
* From : Gollmann D., Computer Security, John Wiley &Sons, 1999
Definition of computer and network security
• Information security
The tasks of guarding digital information
• Information :
– Typically processed by a computer
– Stored on a some devices
– Transmitted over a network
Ensures that protective measures are properly
implemented
• A protection method
Definition of computer and network security
• Computer security
No absolute “secure” system
Security mechanisms protect against specific
classes of attacks
Definition of computer and network security
• Network security
Security of data in transit
• Over network link
• Over store-and-forward node
Security of data at the end point
• Files
• Email
• Hardcopies
Definition of computer and network security
• Network security differences from computer
security :
Attacks can come from anywhere, anytime
Highly automated (script)
Physical security measures are inadequate
Wide variety of applications, services, protocols
•
•
Complexity
Different constraints, assumptions, goals
No single “authority”/administrators
Security Terminology
• Security attack
• Security mechanism
• Security service
• Risk
• Risk Analysis
• Spies
• Cyberterrorists
Security Terminology
• Security attack
• Any action that compromises security information
• Security mechanism
• A mechanism that designed to detect, prevent, or
recover from a security attack
• Security service
• A service that enhances the security of data
processing systems and information transfers.
• Makes use of one or more security mechanisms
Security Terminology
• Risk
A measure of the cost of a realised vulnerability
that incorporates the probability of a successful
attack
• Risk analysis :
Provides a quantitative means of determining
whether an expenditure on safeguards is
warranted
Security Terminology
• Spies
A person who
•
•
Has been hired to break into a computer and steal information
Do not randomly search for unsecured computers to attack
• Cyberterrorists
Terrorists that attack the network and computer
infrastructure to
•
•
•
Deface electronic information (such as web sites)
Deny service to legitimate computer users
Commit unauthorised intrusions into systems and networks
that result in infrastructure outages and corruption of vital data
Weaknesses, Vulnerabilities
and Threats
Weaknesses and Vulnerabilities
Vulnerability
A
weakness in a system allowing an attacker to
violate the confidentiality, integrity, availability
May
result from
Software bugs
Software of system design flaws
Weaknesses and Vulnerabilities
Vulnerability
Examples
of vulnerabilities
Buffer overflows
Race conditions
Unencrypted protocols
Bad/insufficient sanity checks
Backdoors
Unqualified trust
Some of these vulnerabilities are described later
Threats
Threat means
A person, thing, event
which poses some danger to an asset in terms of that asset’s
confidentiality, integrity, availability
Accident threats
Delibrate threats : Passive and Active
Examples of threat
Hacker/cracker
Script kiddies
Spies and Malware
Denial-of-service (DoS) attack
Zombies
Insecure/poorly designed applications
Threats
Hacker/cracker**
Hacker :
a person who uses his/her advanced computer skills to
attack computers, but not with a malicious intent,
hackers use their skills to expose security flaws.
Cracker :
a person who violates system security with malicious
intent. Crackers destroy data, deny legitimate users of
services, cause serious problems on computers and
networks.
** from : M. Ciampa, Security+guide to network security fundamentals, Thomson
course technology, 2005
Threats
Script kiddies
Want to break into computers like crackers, but
unskilled users
download software from web sites, use to break into computers
Spies
A person who
Has been hired to break into a computer and steal information
Do not randomly search for unsecured computers to attack
Malware
A group of destructive programs such as viruses, worms,
Trojan horse, logic bombs, and spyware
Threats
Virus : a computer program that
can copy itself and infect a computer without permission or
knowledge of the user
spreads from one computer to another when its host (such as
an infected file) is taken to that computer
viruses always infect or corrupt files on a targeted computer
Worm : a computer program that
is a self-replicating code
Resides in active memory (the program is executed)
Propagates itself
uses a network to send copies of itself to other node
can spread itself to other computers without needing to be
transferred as part of an infected file
always harm the network
Threats
Trojan horse : a program that
installs malicious software while under the guise of doing
something else
differs from a virus in that
a Trojan horse does not insert its code into other computer files
appears harmless until executed
Logic Bomb : a program that
inactive until it is triggered by a specific event, e.g.
a certain date being reached
once triggered, the program can perform many malicious
activities
is difficult to defend against
Threats
Spyware : a computer program that
installed surreptitiously on a personal computer
to intercept or take partial control over the user's
interaction with the computer, without the user's
awareness
•
installing additional software
•
redirecting web browser activity
secretly monitors the user's behavior
•
collects various types of personal information,
Threats
Denial-of-service (DoS) attack : a threat that
Prevents legitimate traffic from being able to access the
protected resource
Common DoS
Crashes a targeted service or server
Normally done by
•
•
Exploiting program buffer overflow problem
Sending too many packets to a host
causing the host to crash
Threats
Zombies : systems that
Have been infected with software (e.g. Trojan or back
doors)
Under control of attackers
Be used to launch an attack against other targets
Insecure/poorly designed applications
One of the most difficult threats to be detected
Identification and Authentications
• Authentication Basics
• Passwords
• Biometrics
• Multiple methods
Authentication Basics
• Authentication
A process of verifying a user’s identity
• Two reasons for authenticating a user
The user identity is a parameter in access
control decision (for a system)
The user identity is recorded when logging
security-relevant events in an audit trail
Authentication Basics
• Authentication
Binding of an identity to a principal (subject)
An identity must provide information to enable the
system to confirm its identity
Information (one or more)
• What the identity knows (such as password or secret
information)
• What the identity has (such as a badge or card)
• What the identity is (such as fingerprints)
• Where the identity is (such as in front of a particular
terminal)
Authentication Basics
• Authentication process
Obtaining information from the identity
Analysing the data
Determining if it is associated with that identity
• Thus : authentication process is
The process of verifying a claimed identity
Authentication Basics
• Username and Password
Very common and simple identities
Used to enter into a system
Username
• Announce who a user is
• This step is called identification
Password
• To prove that the user is who claims to be
• This step is called authentication
Authentication Mechanism
• Password
• Password Aging
• One-Time Password
Passwords
• Passwords
Based on what people know
User supplies password
Computer validates it
If the password is associate with the user, then
the user’s identity is authenticated
Passwords
• Choosing passwords
Password guessing attack is very simple and always works !!
•
Because users are not aware of protecting their passwords
Password choice is a critical security issue
•
Choose passwords that cannot be easily guessed
• Password defenses
•
•
•
Set a password to every account
Change default passwords
Password length
– A minimum password length should be prescribed
Passwords
• Password defences
Password format
• Mix upper and lower case symbols
• Include numerical and other nonalphabetical symbols
Avoid obvious passwords
Passwords
• How to improve password security?
Password checker tool
•
Password generation
•
•
Check passwords against some dictionary of weak password
A utility in some system
Producing random password for users
Password aging
•
•
A requirement that password be changed after some period of
time
Required mechanism
–
–
–
Forcing users to change to a different password
Providing notice of need to change
A user-friendly method to change password
Passwords
• How to improve password security?
One-Time Password
•
Limit login attempts
•
A password is valid for only one use
A system monitors unsuccessful login attempts
– Reacts by locking the user account if logging in process
failed
Inform user
•
After successful login a system display
– The last login time
– The number of failed login attempts
Attacking a Password System
• Password guessing
Exhaustive search (brute force)
• Try all possible combination of valid symbols
Dictionary attack
Random selection of passwords
Pronounceable and other computer-generated
passwords
User selection passwords
• Passwords based on
– Account names
– User names
– Computer names, etc.
Biometrics
• The automated measurement of biological or
behavioral features that identifies a person
• Method:
A set of measurement of a user is taken (recorded) when
a user is given an account
When a user access the system
• The biometric authentication mechanism identify the
identity
Biometrics
• Fingerprints
• Voices
• Eyes
• Faces
• Keystrokes
Keystroke intervals
Keystroke pressure
Keystroke duration
• Combinations
Computer System and
Network Intrusions
Intrusion Profiles
Exploiting passwords
Exploiting known vulnerabilities
Exploiting protocol flaws
Examining source files for new security flaws
Denial-of-service attacks
Abusing anonymous FTP
Installing sniffer programs
IP source address spoofing
Typical Network Intrusions
Locate a system to attack
New systems
Network sweeps
Gain entry to a user’s account
No password or easy-to-guess password
Sniffed password
Exploiting system configuration weakness or
software vulnerability to obtain access to a
privileged account
Typical Network Intrusion
Once inside, and intruder may:
Remove traces from auditing records
Install back door for future use
Install Trojan Horse programs to capture system and
account information
Jump to other hosts on your network
Use your system to launch attacks against other sites
Modify, destroy, or inappropriately disclose information
Why Should You Care
Protect your own operational environment
Protect your user’s data
Provide service to your users
What Should You Do?
Stay current with security issues
Internet Etiquette-1
Do:
Understand
and respect security policies
Take responsible for your own security
Respect other Internet neighbours
Cooperate to provide security
Internet Etiquette-2
Avoid:
Unauthorised
access to other accounts and
systems
Cracking password file from other systems
Sharing accounts
Unauthorised access to unprotected files
Reading the e-mail of other users
Disrupting service
Security Management
45
Understanding Security
Writing a security policy
Monitoring the network
Auditing the network
Preparing for an attack
Handling an attack
Forensics
Log analysis
Damage control
Understanding Security :Security Objectives**
Confidentiality
Confidentiality is the term used to prevent the disclosure of
information to unauthorized individuals or systems.
Integrity
In information security, integrity means that data cannot be
modified undetectably.
Availability
For any information system to serve its purpose, the
information must be available when it is needed.
(CIA)
** http://en.wikipedia.org/wiki/Information_security
Understanding Security
What are we protecting
Asses
value
Protecting cost
Thinking like a defender
List
of problems might happen in various situations
The organisation we are protecting
Business
types different levels of security
Understanding Security
The process of security1
Expands
Endless
Learn
loop of Security
everything about the threats
The Internet is full of information
How to protect a system
How to break in to a system
System vulnerabilities, etc.
Well
on this endless loop
design every thing before implement !!
Analysis must come before synthesis !!
Understanding Security
The process of security2
Endless loop of Security
Think
“pathologically” about the design (or “think evil thought”)
Implement it the way it is designed
Never let any components be altered from the design
Continuously
recheck it to make sure that it has not changed,
such as
Configuration change in routers/computers
Practice
running it to make sure that you understand it and can
operate it correctly
Understanding Security
The process of security3
Endless loop of Security
Make it simple for others to do when you want them to do
Make it hard for people to do when you do not want them to do
Make it easy for you to detect problems
Make it difficult to hide what you do not want to be hidden
Test everything you can test
Practice everything you can practice
Improve anything you can improve
Repeat this process endlessly, at all levels of detail
Security Management
51
Understanding Security
Writing a security policy
Monitoring the network
Auditing the network
Preparing for an attack
Handling an attack
Forensics
Log analysis
Damage control
Writing a Security Policy
Security Policy : Definitions :
(1) Information security policy **
Objective
: To provide management direction
and support for information security in
accordance with
Business requirements,
Relevant laws and regulations
** ISO/IEC 17799:2005(E)
Writing a Security Policy
Security Policy : Definition
(2)
[Ciampa] : “The backbone of any infrastructureis
its security policy. Without a policy that clearly
outlines what needs to be protected, how it should
be protected, and what users can – and cannot – do
in support of the policy, there is no effective
security.”
Writing a Security Policy
Security Policy
A
document or sets of documents that
Clearly
defines the defense mechanisms an organisatoin
will employ to keep information secure
Outlines how the organisation will respond to attacks
Outlines the duties and responsibilities of its employee
for information security
Writing a Security Policy
Security Policy : Definition:
(3) [Northcutt] : A security policy establishes what
you must do to protect information stored on
computers
A well-written policy contains sufficient definition of “what”
to do so you can
identify and measure, or
evaluate “how”
Writing a Security Policy
Purpose of Security Policy
Describes of what being protected and why
Sets priorities about what must be protected first and at
what cost
Allows an explicit agreement to be made with various
parts of the organisation regarding the value of security
Provides the security department with a valid reasons to
say “no” when that is needed
Provides the security department to back up the “no”
Prevents the security department from acting illegally
Writing a Security Policy
Security Policy
Trade
A
of suggested by Wadlow
good policy today is better that a great policy next year
A weak-policy that is well distributed is better than a
strong policy no one has read
A simple policy that is easily understood is better than a
complicated and confusing policy that no one ever
bother to read
A policy whose details are slightly wrong is better than a
policy with no details at all
A living-policy that is constantly updated is better than
one that grow obsolete over time
Writing a Security Policy
An amateur (simple) policy
State a coup
A formal policy
Follow some guidelines/standards
Writing a Security Policy
59
Suggestion
A suggestion to get a decent policy for an organisation (which
currently no security policy)
1. Write a security policy for your organisation
Say nothing specific
State generalities
Should cover no more than 5 pages
Should not take more than 2 days to write
Don’t ask for help, do it yourself
Don’t try to make it perfect, just try to get some key issues written
down
It doesn’t have to be complete
It doesn’t have to be crystal clear
(From : T. A. Wadlow, The process of network security)
Writing a Security Policy
60
Suggestion (cont.)
1. find 3 people who are willing to become “security
committee” : their job is
• To make ruling and amendment to the policy
• To be judges, not enforcers
2. create an internal web site
• with
• policy page
• Committee contact information
• Amendments
• Approved and added to the web site as quick
as possible
Writing a Security Policy
61
Suggestion (cont.)
3. treat the policy as if it were absolute rule of the law
• Do not violate the policy
• Allow no violation to occur
4. if someone has a problem with the policy
• Have the person propose an amendment
• The policy committee members need to agree
• Make an amendment
Writing a Security Policy
62
Suggestion (cont.)
5. schedule a regula meeting to consolidate policy and
amendments
• Once a year, for example
• Involve
• You and the security committee
• Current security policy and the
amendments
• Make a new policy statements
6. repeat the processes 3-6
Writing a Security Policy
63
Contents
•
What are we protecting?
Describe in detail
The types of security levels expected to have in an
organisation
Characterise the machines on the network (for example)
Writing a Security Policy
64
Contents (cont.)
Red : contains extremely confidential information or provide missioncritical service
Yellow : contains sensitive information or provides important service
Green : able to access red or yellow machines but does not directly
store sensitive information or perform crucial function
White : unable to access red, yellow, or green systems but not
externally accessible. No sensitive information or function
Black : externally accessible. Unable to access red, yellow, green or
white systems
Writing a Security Policy
65
Contents (cont.)
•
Methods of protection
•
Describe
Levels for protection
Priorities for protection
For example
Writing a Security Policy
66
Contents (cont.)
Organisation priorities :
1.
2.
3.
4.
5.
Height Priority
health and human safety
compliant with applicable local, state, and federal laws
Preservation of the interests of the organisation
Preservation of the interests of partners of the
organisation
Free and open dissemination of nonsensitive information
Low Priority
Describe general policies for access to
each category of system
67
Category
Network
Access
Qualification
Cycle*
Red
red networks only
Red-cleared employees
only
Monthly
Yellow
Yellow and red network Employees only
Quarterly
Green
Yellow, red, and green
network
Employees and cleared
contractors
Yearly
White
White networks only
Employees and
contractors
Yearly
Black
Black networks only
Employees, contractors, monthly
and public (through
cleared access means)
Writing a Security Policy
68
Contents (cont.)
•
Responsibility
Describes the responsibilities, privileges that are accorded
each class of system user : e.g.
General
Knowledge of this policy
All actions in accordance with this policy
Report any known violations of this policy to security
Report any suspected problems with this policy to security
Sysadmin/operations
All user information to be treated as confidential
No authorised access to confidential information
Indemnified for any action consistent with systems administrator
code of conduct
Writing a Security Policy
69
Contents (cont.)
Security Administrator
•
Highest level of ethical conduct
Indemnified for any action consistent with security officer code of
conduct
Contractor
•
•
•
Access to specifically authorised machine in specifically
authorised fashion
Request advance authorisation in writing for any actions which
might be interpreted as security issue
Guest
•
No access to any computing facilities except with written
advance notice to security
Writing a Security Policy
70
Contents (cont.)
Appropriate Use
Describe the ways in which employees should not use the
network
General
Minimal personal use during normal business hours
No use of network for outside business activity
Access to Internet resource consistent with HR policies
Sysadmin
Responsible access to sensitive or personal information on the
network
All special access justifiable for business operations
Writing a Security Policy
71
Contents (cont.)
Security Personal
• Responsible access to sensitive information on the network
• All special access justifiable for business operations
• Use of security tools for legitimate business purpose only
Contractor
• No personal access any time
• Minimal use of the network and only for specific reasons
relating to specific contracts
Guest
• No use of the network at any time
Writing a Security Policy
72
Contents (cont.)
•
Consequence
Describe the way in which the magnitude of a
policy violation is determined and the categories
of consequences. Examples:
Security review board
Penalties
Critical
Serious
limited
Writing a Formal policy
73
Known as “risk-based security management”.
Risk
Risk analysis
Combination of the probability of an event and its
consequence
Systematic use of information to identify sources and to
estimate the risk
Risk evaluation
Process of comparing the estimated risk against given
risk criteria to determine the significance of the risk
Writing a Formal Policy
74
Risk (Cont.)
Risk assessment
Overall process of risk analysis and risk evaluation
Risk management
Coordinated activities to direct and control an
organization with regard to risk
Writing a Formal Policy
75
Some guidelines
ISO/IEC 17799:2005(E)
SANS guidelines
www.sans.org/security-resources/policies
﮸
NIST guidelines
http://csrc.nist.gov/index.html
etc.
ISO/IEC 17799:2005(E) Security Policy
76
Should contain
Definitions of information security
Overall objectives and scope
Importance of security
A statement of management intent
A framework for setting control objectives and controls
Including the structure of risk assessment and risk
management
ISO/IEC 17799:2005(E) Security Policy
77
A brief explanation of the security policies,
principles, standards, and compliance requirements
of particular importance to the organization,
including
Compliance with legislative, regulatory, and contractual
requirements;
Security education, training, and awareness
requirements;
Business continuity management;
Consequence of information security policy violations;
ISO/IEC 17799:2005(E) Security Policy
78
A definition of general and specific
responsibilities for information security
management, including
Reporting information security incidents;
References to documentation which may support
the policy, e.g.
More detailed security policies and procedures for
specific systems or security rules should comply
with.
ISO/IEC 17799:2005(E) Security Policy
79
Review of the information security policy
The information security policy should be reviewed
At a planned intervals, or
If significant changes occur
To ensure its continuing suitability, adequacy, and
effectiveness
Example of Security Policy Format
80
1.
2.
3.
4.
5.
Purpose/Overview
Scope
Policy
Enforcement
Revision history
Example of Policies
(suggested by SANS*)
81
Organization Policy
Audit policy
Computer security policy
Desktop security policy
Email security policy
Internet security policy
Mobile security policy
Network security policy
Physical security policy
Server security policy
Wireless security policy
* www.sans.org/security-resources/policies
Monitoring Your Network
82
The Shape of Logging System
What to Log
Logging Mechanisms
Time
Sensor
Log Management
Monitoring Your Network
83
Goals of a monitoring system
Reduce
the likelihood of an attack going unlogged
Increase the likelihood that the events logged for an
attack will be recognized as an attack
The Shape of Logging System
84
Problem of logging system
What
events to be logged?
if every event is logged the log file will be very large
if only selected events are logged some crucial events
might not be logged !!
Log
file can be tampered by attackers
To
delete attack traces
Attackers
If
can tamper the log file
the logs are accessible to them
The Shape of Logging System
85
Log should not be accessible to an attacker
Mechanisms can deny access to logs
The
logs are kept on a separate machine
The logs are encrypted
The logs are stored in a write-only media
The logs are stored in multiple places
The Shape of Logging System
86
Log should not be tampered with
Tampering
efforts should be easily detected
Achieved by
Cryptographically
signing each log entry to detect
invalid entries
Monitoring the log entries to look for a sudden
decrease in log size
Indicates
Assigning
that the log entries have been deleted
a sequence number to each log entry and
verifying that the sequence is unbroken
What to Log
87
The network should log any events necessary to
detect known attack patterns
The network should log any events necessary to
detect unusual patterns of access
Logging Mechanisms
88
Syslog
The
most common network logging mechanism
Runs on Unix systems
Components
Syslog
daemon
Syslog ruleset
Syslog-enabled programs
Syslog
89
Syslog daemon
A
program that runs in a background on all machines
using syslog
Serves several purposes
Collects
messages from syslog-enabled programs on the
machine hosting it
Collects certain messages from the system that are not
syslog enabled (such as kernel messages regarding startingup and some device problems)
Listens on the syslog port (port 514/UDP) for messages
Save all of the above messages in a file
Syslog Ruleset
90
Usually in /etc/syslog.conf
Contains directives to the syslog daemon
Determine
where various types of messages should be
logged
Choices of logging
Put
a message into a file
Log a message to another machine via UDP
Write a message to the system console
Write a message to all log-in users
Syslog-enabled Program
91
Syslog is a standard facility in Unix
many
Unix programs have calls to syslog built into them
Enable these programs to log various events
To
the local syslog daemon
Pro (of syslog)
92
Universally available
Standard implementation
Available from nonprogrammable devices
A read-only logging mechanism
Con (syslog)
93
Unauthenticated protocol
Can
Unencrypted transmission
Can
be spoofed
be eavesdropped by attackers
Unreliable UDP transmission
Not
all syslog messages reach their intended
destination
Time
94
An important issue in log gathering and analysis
Jun 4 22:33:21 machine1.ycom.com login: user smt login ok
Jun 4 22:34:29 machine3.ycom.com login: user smt login ok
Time is used in analysis process
It should be accurate and synchronised with other
systems
A logging system should synchronise its time with a
time server machine (NTP server)
Sensors
95
A mechanism that can be used to aid device-based
logging
Provides a means for gathering information and
integrating it into the logging system
Sensors
96
Examples
Some
sensors can detect several variations on attacks
Some sensors can detect problems with the network
being monitored
Sensors
97
Some sensors are built to detect conditions on the
logging system
Are
If
the logs increasing monotonically?
not a log file might be tampered
Is
the logging system receiving all the logs that are
being sent?
Some
devices transmit a sequence number with each log
entry
if a particular number is missing something goes
wrong
Sensors
98
Has
any machine stopped logging?
A
machine that has stopped logging
Might
indicate a network problem OR an attack
Log Management
99
A process of making sure that logging system
Stable
Useful
References
1.
2.
3.
4.
5.
Wadlow T. A., The process of network security:
Designing and managing a safe network, AddisonWesley, 2000
Ciampa M., Security + guide to network security
fundamentals, Thomson course technology, 2005
Northcutt S., et.al., Inside network perimeter
security, Sam publishing, 2005
ISO/IEC 27001:2005(E)
ISO/IEC 17799
Security Contest Topics
Network Security Concept
Network Security Architecture
Network Security Assessment & Penetration Test
Method
Network Security Monitoring
ISO27001 and series
Computer Laws
ประกาศเลื่อนการสมัครและสอบ security contest
วันที่ปิดรับสมัคร
จากวันที่ 14
ตุลาคม เลื่อนเป็ นวันที่ 31 ตุลาคม
วันที่สอบคัดเลือกรอบแรก
จากวันที่ 28 ตุลาคม เลื่อนเป็ นวันที่ 18 พฤศจิกายน
วันที่รอบชิงชนะเลิศพร้อมประกาศรางวัล
จากวันที่ 25 พฤศจิกายน เลื่อนเป็ นวันที่ 19 ธันวาคม
CS subject
344-422 Computer and Network Security
วิชาเลือก ประจาภาคการศึกษา 1 ของทุกปี