Download Ch10aProtectionMechanisms

Document related concepts

Authentication wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Information security wikipedia , lookup

Cyberattack wikipedia , lookup

Access control wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Network tap wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Deep packet inspection wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Mobile security wikipedia , lookup

Wireless security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Unix security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Distributed firewall wikipedia , lookup

Transcript
INFORMATION SECURITY
MANAGEMENT
CHAPTER 10: PROTECTION MECHANISMS
You got to be careful if you don’t know where you’re going,
because you might not get there. – Yogi Berra
Windows XP
Zero days turn to "forever days"
http://windows.microsoft.com/enus/windows/end-support-help
Principles of Information Security Management
Include the following characteristics that will be the focus
of the current course (six P’s):
1.
2.
3.
4.
5.
6.
Planning
Policy
Programs
Protection
People
Project Management
http://csrc.nist.gov/publications/PubsTC.html
Planning
• Planning as part of InfoSec management
– An extension of the basic planning model discussed earlier in this
chapter
• Included in the InfoSec planning model
– Activities necessary to support the design, creation, and
implementation of information security strategies
Planning (cont’d.)
• Types of InfoSec plans
–
–
–
–
–
–
–
–
Incident response planning
Business continuity planning
Disaster recovery planning
Policy planning
Personnel planning
Technology rollout planning
Risk management planning
Security program planning
• includes education, training and awareness
Policy
•
The set of organizational guidelines that dictates
certain behavior within the organization
• Three general categories of policy:
– Enterprise information security policy (EISP)
– Issue-specific security policy (ISSP)
– System-specific policies (SysSPs)
UNCW Policies
Programs
• InfoSec operations that are specifically managed as
separate entities
– Example: a security education training and awareness (SETA)
program
• Other types of programs
– Physical security program
• complete with fire, physical access, gates, guards, etc.
Protection
• Executed through risk management activities
– Includes:
– Risk assessment and control
– Protection mechanisms
– Technologies
– Tools
• Each of these mechanisms represents some aspect of the
management of specific controls in the overall
information security plan
People
Managers must recognize the crucial role that people play
in the information security program
This area of InfoSec includes security personnel and the
security of personnel, as well as aspects of a SETA program
The most critical link in the information security program
Project Management
Identifying and controlling the resources applied to the
project
Measuring progress
Adjusting the process as progress is made
Target Incident – Topic Paper Presentation
Software Demo – Mark Grover
Hacking Networks
Phase 1: Reconnaissance
Physical Break-In
Registrant:
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052
US
Dumpster Diving
Domain name: MICROSOFT.COM
Google, Newsgroups, Web
sites
Social Engineering
 Phishing: fake email
 Pharming: fake web pages
WhoIs Database
Domain Name Server
Interrogations
Administrative Contact:
Administrator, Domain [email protected]
One Microsoft Way
Redmond, WA 98052
US
+1.4258828080
Technical Contact:
Hostmaster, MSN [email protected]
One Microsoft Way
Redmond, WA 98052 US
+1.4258828080
Registration Service Provider:
DBMS VeriSign, [email protected]
800-579-2848 x4
Please contact DBMS VeriSign for domain updates,
DNS/Nameserver
changes, and general domain support questions.
Registrar of Record: TUCOWS, INC.
Record last updated on 27-Aug-2006.
Record expires on 03-May-2014.
Record created on 02-May-1991.
Domain servers in listed order:
NS3.MSFT.NET 213.199.144.151
NS1.MSFT.NET 207.68.160.190
NS4.MSFT.NET 207.46.66.126
NS2.MSFT.NET 65.54.240.126
NS5.MSFT.NET 65.55.238.126
Hacking Networks
Phase 2: Scanning
War Driving: Can I find a wireless network?
War Dialing: Can I find a modem to connect to?
Network Mapping: What IP addresses exist, and what ports
are open on them?
Vulnerability-Scanning Tools: What versions of software
are implemented on devices?
Passive Attacks
Eavesdropping: Listen to packets from other parties =
Sniffing
Traffic Analysis: Learn about network from observing
traffic patterns
Footprinting: Test to determine software installed on
system = Network Mapping
Hacking Networks:
Phase 3: Gaining Access
Network Attacks:
Sniffing
(Eavesdropping)
IP Address Spoofing
Session Hijacking
System Attacks:
Buffer Overflow
Password Cracking
SQL Injection
Web Protocol Abuse
Denial of Service
Trap Door
Virus, Worm, Trojan
horse,
Some Active Attacks
Denial of Service: Message did not make it; or service
could not run
Masquerading or Spoofing: The actual sender is not the
claimed sender
Message Modification: The message was modified in
transmission
Packet Replay: A past packet is transmitted again in order
to gain access or otherwise cause damage
Man-in-the-Middle Attack
10.1.1.1
10.1.1.3
(2) Login
(1) Login
(4) Password
(3) Password
10.1.1.2
Hacking Networks:
Phase 4: Exploit/Maintain Access
Control system:
system commands,
log keystrokes, pswd
Backdoor
Trojan Horse
Useful utility actually
creates a backdoor.
Replaces system
User-Level Rootkit executables: e.g.
Login, ls, du
Bots
Slave forwards/performs
commands; spreads,
list email addrs, DOS
attacks
Spyware/Adware
Spyware: Collect info:
keystroke logger,
collect credit card #s,
AdWare: insert ads,
filter search results
Replaces OS kernel:
Kernel-Level e.g. process or file
Rootkit
control to hide
Botnets
Botnets: Bots
Attacker
China
Handler
Hungary
Bots: Host illegal movies,
music, pornography,
criminal web sites, …
Forward Spam for
financial gain
Zombies
Distributed Denial of Service
Zombies
Attacker
Russia
Handler
Victim
Bulgaria
United
States
Can barrage a victim
server with requests,
causing the network
to fail to respond to anyone
Zombies
Introduction
• Threats -> Vulnerabilities -> Risk ->Controls
• Technical controls
– Must be combined with sound policy and education, training,
and awareness efforts
• Examples of technical security mechanisms
Sphere of Protection
Source: Course Technology/Cengage Learning
Access Controls
• The four processes of access control
–
–
–
–
Identification
Authentication
Authorization
Accountability
• A successful access control approach always incorporates
all four of these elements
Access Controls – Password Strength
Table 10-1 Password power
Source: Course Technology/Cengage Learning
Acceptability of Biometrics
• Note: Iris Scanning has experienced rapid growth in popularity and
due to it’s acceptability, low cost, and effective security
Firewalls
• Any device that prevents a specific type of
information from moving between two networks
Types:
• Packet Filtering
• Application Level
• Stateful Inspection Firewalls
Packet filtering firewalls
Simple networking devices that filter packets by examining
every incoming and outgoing packet header
Application-level firewalls
– Consists of dedicated computers kept separate from the first filtering
router (edge router)
– Commonly used in conjunction with a second or internal filtering
router - or proxy server
– Implemented for specific protocols
Stateful inspection firewalls
– Keeps track of each network connection established
between internal and external systems using a state
table
– Can restrict incoming packets by allowing access only
to packets that constitute responses to requests from
internal hosts
Firewall Architectures
• Each firewall generation can be implemented in several
architectural configurations
• Common architectural implementations
–
–
–
–
Packet filtering routers
Screened-host firewalls
Dual-homed host firewalls
Screened-subnet firewalls
Firewall Architectures:
Packet filtering routers
Most organizations with an Internet connection use some
form of router between their internal networks and the
external service provider
Firewall Architectures:
Screened-host firewall systems
• Combine the packet filtering router with a separate,
dedicated firewall such as an application proxy server
Firewall Architectures:
Dual-Homed host firewalls
• The bastion host contains two network interfaces
1.
2.
One is connected to the external network
One is connected to the internal network
Selecting the Right Firewall
•
•
•
•
Firewall Technology
Cost
Maintenance
Future Growth
Managing Firewalls
• Any firewall device must have its own configuration
• Firewall Rules
• Policy regarding firewall use
• Firewall best practices
– All traffic from the trusted network allowed out
– The firewall is never accessible directly from the public network
– Email Policies
Intrusion Detection and Prevention Systems (IDPS)
• The term intrusion detection/prevention system (IDPS)
can be used to describe current anti-intrusion
technologies
• Like firewall systems, IDPSs require complex
configurations to provide the level of detection and
response desired
Intrusion Detection and Prevention Systems (cont’d.)
IDPS technologies can respond to a detected threat by
attempting to prevent it from succeeding
Network or Host Based Protection
IDPS – Host vs. Network
http://www.windowsecurity.com/articles-tutorials/intrusion_detection/Hids_vs_Nids_Part1.html
Signature-Based IDPS
• Examines data traffic for something that matches the
preconfigured, predetermined attack pattern signatures
• Weakness: slow and methodical attacks may slip
undetected through the IDPS, as their actions may not
match a signature that includes factors based on
duration of the events
Statistical Anomaly-Based IDPS
• First collects data from normal traffic and establishes a
baseline
– Then periodically samples network activity, based on statistical
methods, and compares the samples to the baseline
• Advantage: Able to detect new types of attacks, because
it looks for abnormal activity of any type
Managing IDPS
• IDPSs must be configured to differentiate between
routine circumstances and low, moderate, or severe
threats
• A properly configured IDPS can translate a security alert
into different types of notifications
• Most IDPSs monitor systems using agents
• Consolidated enterprise manager
Honeypot & Honeynet
Honeypot: A system with a special software application
which appears easy to break into
Honeynet: A network which appears easy to break into




Purpose: Catch attackers
All traffic going to honeypot/net is suspicious
If successfully penetrated, can launch further attacks
Must be carefully monitored
Firewall
Honey
Pot
External
DNS
IDS
Web
Server
E-Commerce
VPN
Server
Remote Access Protection
• Network connectivity using external connections
– Usually much simpler and less sophisticated than Internet
connections
– Simple user name and password schemes are usually the only
means of authentication
RADIUS and TACACS
• Systems that authenticate the credentials of dial-up
access users
• Typical dial-up systems place the authentication of users
on the system connected to the modems
• Options:
• Remote Authentication Dial-In User Service (RADIUS)
• Terminal Access Controller Access Control(TACACS)
Authentication Protocols
RADIUS
 Over-the-wire protocol from client
to AAA (authentication, authorization, accounting) server
TACACS+
Source: Course Technology/Cengage Learning
Managing Connections
• Organizations that continue to offer remote access must:
–
–
–
–
Determine how many connections the organization has
Control access to authorized modem numbers
Use call-back whenever possible
Use token-based authentication if at all possible
Wi-Fi security
SSID should be a non-default value
SSID broadcast should be disabled
MAC access control
Authentication
• Require ID and password, may use a RADIUS server
 Encryption
• WEP (Wired Equivalent Privacy)
• WPA (Wireless Protected Access)
• WPA2 (superset of WPA, full standard)




Managing Wireless Connections
• Regulate the wireless network footprint
• Select WPA or WPA2 over WEP
• Protect preshared keys
Scanning and Analysis Tools
• Used to find vulnerabilities in systems
• Security administrators may use attacker’s tools to
examine their own defenses and search out areas of
vulnerability
• Scanning tools
• Footprinting
• Fingerprinting
Pen Testing Article
“What is Penetration Testing?”
Port Scanners
• Port scanning utilities (port scanners)
Vulnerability Scanners
• Capable of scanning networks for very detailed
information
• Identify exposed user names and groups, show open
network shares, and expose configuration problems and
other server vulnerabilities
http://www.tenable.com/products/nessus
Packet Sniffers
• A network tool that collects and analyzes packets on a
network
• Connects directly to a local network from an internal
location
http://www.wireshark.org/
Content Filters
• A software program or a hardware/software appliance
that allows administrators to restrict content that comes
into a network
• Common application of a content filter
– Restriction of access to Web sites with non-business-related
material, such as pornography, or restriction of spam e-mail
Examples of Content Filters
Trap and Trace
• Trap
– Describes software designed to entice individuals who are
illegally perusing the internal areas of a network
• Trace
– A process by which the organization attempts to determine the
identity of someone discovered in unauthorized areas of the
network or systems
Managing Scanning and Analysis Tools
• The security manager must be able to see the
organization’s systems and networks from the viewpoint
of potential attackers
• Drawbacks:
– Tools do not have human-level capabilities
– Most tools function by pattern recognition, so they only handle
known issues
– Some governments, agencies, institutions, and universities have
established policies or laws that protect the individual user’s
right to access content
– Tool usage and configuration must comply with an explicitly
articulated policy, and the policy must provide for valid
exceptions
Cryptography
• Encryption
– The process of converting an original message into a form that
cannot be understood by unauthorized individuals
• Cryptology
– The science of encryption
– Composed of two disciplines:
– cryptography
– cryptanalysis
Cryptography (cont’d.)
Cryptosystem
• Algorithm
• Key
• Keyspace
Encipher
Decipher
Cryptography Article
Choosing Key Sizes for Cryptography