Computer Security Introduction Central Principles and Concepts Why

  • Slides: 28
Download presentation
Computer Security Introduction, Central Principles and Concepts

Computer Security Introduction, Central Principles and Concepts

Why Study Computer Security? Increasingly important issue for: n n n Computer system and

Why Study Computer Security? Increasingly important issue for: n n n Computer system and network administrators Application programmers Anyone working with internet applications Security issues follow technology n Desktop systems, wireless networks, handheld devices, cell phones, wireless sensors Security issues affect software, laws, profits and businesses

Current Incidents Malicious i. Phone package, 1/07/2008 n http: //www. symantec. com/enterprise/security_ response/weblog/2008/01/first_sightings_of_ malicious_i.

Current Incidents Malicious i. Phone package, 1/07/2008 n http: //www. symantec. com/enterprise/security_ response/weblog/2008/01/first_sightings_of_ malicious_i. html Data thefts soar, 1/16/2008 n http: //www. chron. com/disp/story. mpl/tech/new s/5460085. html Attacks on utilities, 1/18/2008 n http: //www. washingtonpost. com/wpdyn/content/article/2008/01/18/AR 200801180 3277. html

Security Quiz – Question 1 Currently most attackers of computer systems are: n n

Security Quiz – Question 1 Currently most attackers of computer systems are: n n A) Mobsters B) Script kiddies C) Disgruntled employees D) University students

Security Quiz – Question 2 The primary motive for security intrusions is currently: n

Security Quiz – Question 2 The primary motive for security intrusions is currently: n n A) Fame / Notoriety B) Terrorism C) Money D) Political change

Security Quiz – Question 3 The computer system area that is currently most subject

Security Quiz – Question 3 The computer system area that is currently most subject to attack is: n n A) the operating system B) applications C) the network D) firmware

Security Quiz – Question 4 Computer security/information assurance is primarily a _______ problem n

Security Quiz – Question 4 Computer security/information assurance is primarily a _______ problem n n n A) hardware B) people C) software D) technology in general E) <all of the above> F) <none of the above>

Computer Security Definition – ensuring the security of resources in a computing environment n

Computer Security Definition – ensuring the security of resources in a computing environment n n “ensuring” – work to make it so – a process “resources” – data, network, hardware, applications, … “computing environment” – mix of hardware, software and people “security” - ?

Information Assurance Definition – ensuring the security, quality and availability of resources in an

Information Assurance Definition – ensuring the security, quality and availability of resources in an information environment n Somewhat broader than computer security, including: Confidentiality Integrity Availability Accountability Dependability

Core Concepts Vulnerability, Exploit, Agent, Threat n n Vulnerability – a weakness in some

Core Concepts Vulnerability, Exploit, Agent, Threat n n Vulnerability – a weakness in some aspect of a system Exploit – a known method for taking advantage of a vulnerability Agent – person(s) making attack using exploit Threat – possible harm resulting from some agent using an exploit to compromise security Note: not all threats are equally likely, depends on: n n n Target being attacked Agent attacking the target (skill, persistence, resources) Probability of success with exploit

Vulnerabilities Examples n n n FTP Server code does not check size of input

Vulnerabilities Examples n n n FTP Server code does not check size of input placed into array; possibility of a buffer overflow Misconfiguration of web server allows outside user to write files to server disk and run them, potentially gaining privileged user access on system Telnet application passes username and password as plain text

Exploits Examples n n n FTP server buffer overflow: attacker generates data packet that

Exploits Examples n n n FTP server buffer overflow: attacker generates data packet that overwrites buffer, may open shell on server Misconfigured web server: attacker finds way to drop fake system programs into /bin directory as part of rootkit that will take over system and hide evidence of this Weak application: attacker uses packet sniffer to identify username/password pairs, logs into system

Agents Who is bigger threat? n n n Insiders – those within an organization

Agents Who is bigger threat? n n n Insiders – those within an organization Outsiders – those outside an organization Not always clear (e. g. , consultants) Depends on situation

Threats What is largest threat to a: n Bank ? Insider or outsider stealing

Threats What is largest threat to a: n Bank ? Insider or outsider stealing money or account information electronically n Trucking Logistics company ? Client (insider) gaining information on other clients n University ? Variety of attackers, variety of exploits, want systems for further probing, storage of illegal digital copies, etc.

Risk Analysis in Security n n Identifying vulnerabilities, exploits, possible agents of attack, threats

Risk Analysis in Security n n Identifying vulnerabilities, exploits, possible agents of attack, threats Calculating likelihood of security violations Calculating degree to which we can control relevant activity Deciding how to reduce risk Avoiding risk Transferring risk Assuming risk

Important Security Lists Cryptogram Newsletter, Bruce Schneier n http: //www. counterpane. com Newsletter /

Important Security Lists Cryptogram Newsletter, Bruce Schneier n http: //www. counterpane. com Newsletter / Cryptogram US/CERT Advisory List (Dept. of Homeland Security) n http: //www. us-cert. gov ; Sign Up / Mailing Lists & Feeds Bugtraq List n http: //seclists. org , Bugtraq and other lists

Principles To Consider Security is a very difficult area to work in No silver

Principles To Consider Security is a very difficult area to work in No silver bullets However, consideration of major principles will help develop a good set of security processes and policies

1 st Principle “Security is a process, not a product” – attributed to Bruce

1 st Principle “Security is a process, not a product” – attributed to Bruce Schneier of Counterpane Security Systems, others n n n Not something you purchase Rather, a set of processes (approved set of steps) and policies (rules for behavior) you create and enforce in your environment Must be dealt with continually

2 nd Principle Computer Security is not just about computer systems n Three major

2 nd Principle Computer Security is not just about computer systems n Three major aspects to computer security Technology n n Hardware (systems, networks, any connected equipment) Software (programming, configuration) People, in many different roles n n n Legitimate users, disgruntled users, hackers Insiders vs. outsiders – fuzzy line! Social engineering is a large concern Physical environment n Surroundings, access, proximity

3 rd Principle Security and convenience are inversely proportional n n Lack of security

3 rd Principle Security and convenience are inversely proportional n n Lack of security generally makes it easier to get work done Addition of security may interfere with the ease of getting a job done Cannot just shut off all access; no functionality remains Goal: find the balance point that supports both

4 th Principle Security succeeds or fails based on the weakest link n n

4 th Principle Security succeeds or fails based on the weakest link n n All aspects (technology, people, environment) must be attended to equally Must remain current with each aspect E. g. , software patches should be applied as they come out, not when you “get around to it” Corollary: “People are the weakest link” – Kevin Mitnick (coined “Social Engineering”)

5 th Principle Attackers are generally technologists (as opposed to programmers) n n Smaller

5 th Principle Attackers are generally technologists (as opposed to programmers) n n Smaller group of hackers program exploits, viruses More attackers apply technology already available, sometimes in creative ways Mis-configuration of systems is a major security problem Corollary – good programming skills aren’t sufficient to make a good security professional Add understanding of networks & technology, attention to detail, creativity, …

6 th Principle Utilize Multiple Layers of Defense n E. g. Network hardware Router

6 th Principle Utilize Multiple Layers of Defense n E. g. Network hardware Router – initial line of defense Bastion host(s) – system(s) visible/available to outside world (e. g. , web server) Firewall – second line of defense Secure intranet – internally available systems Secure host systems n n Can anyone bypass one or more layers? Layers shouldn’t be a straight hierarchy Every resource in organization should have one or more layers protecting it

7 th Principle Focus your security resources toward dealing with the most likely threats

7 th Principle Focus your security resources toward dealing with the most likely threats n Consider what is most relevant to your environment Which vulnerabilities do you have? Which of these have known exploits? What users are likely to cause problems? What is the likelihood of a given threat?

8 th Principle One aspect of security is obscurity n n Don’t set yourself

8 th Principle One aspect of security is obscurity n n Don’t set yourself up as a target Maintain a low network profile for your business, computer system, etc. Problem: contradicts marketing principles if you’re a business n Examples Windows is attacked more than Mac. OS/OS X Those who claim their systems can’t be hacked will have lots of people trying… However, security that relies on obscurity is bound to fail

9 th Principle Best to be conservative when evaluating security and risk n Assume

9 th Principle Best to be conservative when evaluating security and risk n Assume best conditions for the attacker

10 th Principle Plan for unknown attackers n n New attackers (and types of

10 th Principle Plan for unknown attackers n n New attackers (and types of attacks) are becoming part of the problem all the time Very difficult to predict characteristics of attackers and attacks in advance

Putting It Together Computer Security involves balancing a number of interrelated tasks n n

Putting It Together Computer Security involves balancing a number of interrelated tasks n n n n Considering Security Goals Developing Layered Protection (Vertically, Horizontally) Utilizing Available Resources Developing and Enforcing Policies and Processes Minimizing Interference With Functionality Weighing of Risks Maintaining Constant Vigilance