* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download AISE PoIS4E_PP_ch02_57
Airport security wikipedia , lookup
Unix security wikipedia , lookup
Cyberwarfare wikipedia , lookup
Information privacy law wikipedia , lookup
Medical privacy wikipedia , lookup
Security-focused operating system wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Mobile security wikipedia , lookup
Cyberattack wikipedia , lookup
Information security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Computer security wikipedia , lookup
Principles of Information Security, Fourth Edition39 Chapter 2 Why Security is Needed Learning Objectives • Upon completion of this material, you should be able to: – Demonstrate that organizations have a business need for information security – Explain why a successful information security program is the responsibility of both an organization’s general management and IT management Principles of Information Security, Fourth Edition 2 Learning Objectives (cont’d.) – Identify the threats posed to information security and the more common attacks associated with those threats, and differentiate threats to the information within systems from attacks against the information within systems – Describe the issues facing software developers, as well as the most common errors made by developers, and explain how software development programs can create software that is more secure and reliable Principles of Information Security, Fourth Edition 3 Introduction • Primary mission of information security is to ensure systems and contents stay the same • If no threats existed, resources could be focused on improving systems, resulting in vast improvements in ease of use and usefulness • Attacks on information systems are a daily occurrence Principles of Information Security, Fourth Edition 4 Business Needs First • Information security performs four important functions for an organization – Protects ability to function – Enables safe operation of applications implemented on its IT systems – Protects data the organization collects and uses – Safeguards technology assets in use Principles of Information Security, Fourth Edition 5 Protecting the Functionality of an Organization • Management (general and IT) responsible for implementation to protect the ability of the organization to function. • Information security is both management issue and people issue not isolating security as a technical problem. • Organization should address information security in terms of business impact and cost Principles of Information Security, Fourth Edition 6 Enabling the Safe Operation of Applications • Today’s organizations are under immense هائل pressure to create and operate integrated, efficient, and capable applications. Thus: – Organization needs environments that safeguard applications using IT systems.. – Management must continue to oversee infrastructure once in place—not relegate to IT department Principles of Information Security, Fourth Edition 7 Protecting Data that Organizations Collect and Use • Organization, without data, loses its record of transactions and/or ability to deliver value to customers. • Therefore, they must able to protect data in motion and data at rest ; since they are both critical aspects of information security. • An effective information security program is essential to the protection of the integrity and value of the organization’s data. Principles of Information Security, Fourth Edition 8 Safeguarding Technology Assets in Organizations • To perform effectively, organizations must employ secure infrastructure services appropriate to the size and scope of the enterprise. • Additional security services may be needed as organization grows. • More robust solutions may be needed to replace security programs the organization has outgrown. Principles of Information Security, Fourth Edition 9 Safeguarding Technology Assets in Organizations • For instance, a small business may start by using an e-mail service provided by an ISP and augmented with a personal encryption tool. When an organization grows , it must develop additional security services. For example, – organizational growth could lead to the need for: • • • • public key infrastructure (PKI), an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure. Principles of Information Security, Fourth Edition 10 Safeguarding Technology Assets in Organizations • An example of a robust solution is a firewall, a mechanism that keeps certain kinds of network traffic out of a private network. • Another example is caching network appliances, which are devices that store local copies of Internet content, such as Web pages that are frequently accessed by employees. The appliance displays the cached pages to users, rather than accessing the pages from the server each time. Principles of Information Security, Fourth Edition 11 Threats • To protect your organization’s information, you must: – (1) know yourself; that is, be familiar with the information to be protected and the systems that store, transport, and process it; – and (2) know the threats you face. • To make sound decisions about information security: – create policies, and enforce them, – management must be informed of the various kinds of threats facing the organization, its applications, data and information systems. Principles of Information Security, Fourth Edition 12 Threats • Threat: an object, person, or other entity that represents a constant danger to an asset.. • Management must be informed of the different threats facing the organization (by whom?) • Overall security is improving according to surveys. Principles of Information Security, Fourth Edition 13 Threats • To investigate the wide range of threats that pervade تتخللthe interconnected world, researchers have interviewed practicing information security personnel and examined information security literature. • To better understand the numerous threats facing the organization, a categorization scheme has been developed allowing us to group threats by their respective activities. • The 2009 Computer Security Institute/Federal Bureau of Investigation (CSI/FBI) survey on Computer Crime and Security Survey found: • 64 percent of organizations had malware infections اصابة البرامج الضارة • 14 percent indicated system penetration by an outsider Principles of Information Security, Fourth Edition 14 Table 2-1 Threats to Information Security4 Principles of Information Security, Fourth Edition 15 Figure 2-1 World Internet usage3 Principles of Information Security, Fourth Edition 16 Compromises to Intellectual Property • Many organizations create or support the development of intellectual property as part of their business operations. • Intellectual property (IP): “ownership of ideas and control over the tangible ملموسor virtual representation of those ideas” • Intellectual property for an organization includes trade secrets, copyrights, trademarks, and patents براءات االختراع. Principles of Information Security, Fourth Edition 17 Compromises to Intellectual Property • Once intellectual property (IP) has been defined and properly identified, breaches خرقto IP constitute a threat to the security of this information. • Most common IP breaches can involve the unlawful use or duplication of software-based intellectual property, known as software piracy. Principles of Information Security, Fourth Edition 18 Compromises to Intellectual Property • In addition to the laws surrounding software piracy, two watchdog organizations investigate software abuse: – Software & Information Industry Association (SIIA) – Business Software Alliance( تحالفBSA) • Enforcement of copyright law has been attempted with a number of technical security mechanisms, including digital watermarks, embedded codes. Principles of Information Security, Fourth Edition 19 Deliberate Software Attacks • Malicious software (malware) ( ضارة )خبيثهdesigned to damage, destroy, or deny service to target systems; common instances of malicious code are: – – – – – – – Viruses Worms Trojan horses Logic bombs Back door or trap door Polymorphic threats Virus and worm hoaxes Principles of Information Security, Fourth Edition 20 Deliberate Software Attacks • Computer viruses are segments of code that perform malicious actions. • This code behaves very much like a virus pathogen attacking animals and plants, using the cell’s own replication machinery اليto propagate and attack. • The code attaches itself to the existing program and takes control of that program’s access to the targeted computer. Principles of Information Security, Fourth Edition 21 Deliberate Software Attacks • The macro virus is embedded in the automatically executing macro code, common in office product software like word processors, spread sheets, and database applications. • The boot virus infects the key operating systems files located in a computer’s boot sector. Principles of Information Security, Fourth Edition 22 Deliberate Software Attacks • Worms - Malicious programs that replicate themselves constantly without requiring another program to provide a safe environment for replication. • Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth. Principles of Information Security, Fourth Edition 23 Deliberate Software Attacks • Trojan horses - Software programs that hide their true nature and reveal their designed behavior only when activated. • Trojan horses are frequently disguised يتنكرas helpful, interesting, or necessary pieces of software, such as readme.exe files often included with shareware or freeware packages. • Can monitor your activities in the system by transmit information to the hacker. Principles of Information Security, Fourth Edition 24 Deliberate Software Attacks • Back door or Trap door – same as a virus or worm can have a payload حمولةthat installs a back door or trap door component in a system. • This allows the attacker to access the system with special privileges. Principles of Information Security, Fourth Edition 25 Deliberate Software Attacks • Polymorphism - A threat that changes its apparent shape over time to antivirus software programs, representing a new threat not detectable by techniques that are looking for a preconfigured signature. • These threats actually evolve, changing their size and appearance to elude يراوغdetection by antivirus software programs, making detection more of a challenge. • The emergence of polymorphic threats is one of the biggest challenges to fighting viruses and worms. Principles of Information Security, Fourth Edition 26 Deliberate Software Attacks • Virus and Worm Hoaxes – this type is frustrating as viruses and worms. • Perhaps more time and money is spent on resolving virus hoaxes. خدعة وليس حقيقة. • why? – People can disrupt the harmony التناغم في المنظمةand flow of an organization when they send group e-mails warning of supposedly dangerous viruses that don’t exist. – users forward the warning message to everyone they know, post the message on bulletin boards, and try to update their antivirus protection software. Principles of Information Security, Fourth Edition 27 Deliberate Software Attacks • Virus and Worm Hoaxes – A number of Internet resources enable individuals to research viruses to determine if they are fact or fiction. – For the latest information on real, threatening viruses and hoaxes, along with other relevant and current security information, visit the CERT Coordination Centre at www.cert.org – For the latest virus, worm, and hoax information, visit the Hoax-Slayer Web site at www.hoax-slayer.com Principles of Information Security, Fourth Edition 28 Figure 2-4 Trojan Horse Attack Principles of Information Security, Fourth Edition 29 Deviations in Quality of Service • This category represents situations where products or services are not delivered as expected • Organization’s information system depends on the successful operation of many interdependent support systems including: – power grids, telecom networks, parts suppliers, service vendors, and even the janitorial staff and garbage haulers. موظفي النظافة ومتعهدي جمع النفايات – Internet service, communications, and power irregularities dramatically affect availability of information and systems Principles of Information Security, Fourth Edition 30 Deviations in Quality of Service (cont’d.) • Internet service issues – For organizations that rely heavily on the Internet and the Web to support continued operations, the threat of the potential loss of Internet service can lead to considerable loss in the availability of information. – Thus Internet service provider (ISP) failures can considerably undermine يقوضavailability of information. – When an organization places its Web servers in the care of a Web hosting provider, that outsourcer assumes responsibility for all Internet services as well as for the hardware and operating system software used to operate the Web site. Principles of Information Security, Fourth Edition 31 Deviations in Quality of Service (cont’d.) • Communications and other service provider issues – Other utility services affect organizations: • telephone, water, wastewater, trash pickup, etc. – The threat of loss of these services can lead to the inability of an organization to function properly. Principles of Information Security, Fourth Edition 32 Deviations in Quality of Service (cont’d.) • The threat of irregularities from power utilities is common and can lead to fluctuations تقلباتsuch as power excesses, power shortages, and power losses. – Organizations with inadequately conditioned power are susceptible حساس وسريع التأثير – Controls can be applied to manage power quality Principles of Information Security, Fourth Edition 33 Deviations in Quality of Service (cont’d.) • Fluctuations ( تقلبات التيار الطويلة والقصيرةshort or prolonged) – When voltage levels spike (experience a momentary increase), or surge (experience a prolonged increase), the extra voltage can severely damage or destroy equipment. – Sag (a momentary low voltage) or a brownout (a more prolonged drop in voltage) can cause systems to shut down or reset, or otherwise disrupt availability. – Complete loss of power for a moment is known as a fault, and a more lengthy loss as a blackout. Principles of Information Security, Fourth Edition 34 Deviations in Quality of Service (cont’d.) • Thus we said: Since sensitive electronic equipment, especially networking equipment, computers, and computer-based systems are susceptible عرضةto fluctuations, controls can be applied to manage power quality. Principles of Information Security, Fourth Edition 35 Espionage تجسسor Trespass تعدي على الغير • Access of protected information by unauthorized individuals • When an unauthorized individual gains access to the information an organization is trying to protect, that act is categorized as a deliberate act of espionage or trespass. • When information gatherers employ techniques that cross يتجاوزthe threshold حدودof what is legal and/or ethical, they enter the world of industrial espionage. Principles of Information Security, Fourth Edition 36 Espionage تجسسor Trespass تعدي على الغير • Instances of shoulder surfing * *مصطلح تجسسيoccur at computer terminals, desks, ATM machines, public phones, or other places where a person is accessing confidential information. • The threat of trespass can lead to unauthorized real or virtual actions that enable information gatherers to enter premises مبنىor systems they have not been authorized to enter. • Thus: controls are sometimes implemented to mark the boundaries of an organization’s virtual territory. • These boundaries give notice to trespassers that they are encroaching تخطى- دخول غير مصرحon the organization’s cyberspace. Principles of Information Security, Fourth Edition 37 Espionage تجسسor Trespass تعدي على الغير • The classic perpetrator مرتكبof deliberate acts of espionage or trespass is the hacker. • Competitive intelligence (legal) vs. industrial espionage (illegal) • Hackers use skill, guile مكر, or fraud to bypass controls protecting others’ information Principles of Information Security, Fourth Edition 38 Figure 2-5 Shoulder Surfing Principles of Information Security, Fourth Edition 39 Figure 2-6 Hacker Profiles Principles of Information Security, Fourth Edition 40 Espionage or Trespass (cont’d.) Generally two skill levels among hackers: • Expert hacker – Develops software scripts and program exploits used by the unskilled hacker – Usually a master of several programming languages, networking protocols, and operating systems – Will often create attack software and share with others • Unskilled hacker – Many more unskilled hackers than expert hackers – Use expertly written software to exploit a system – Do not usually fully understand the systems they hack Principles of Information Security, Fourth Edition 41 Espionage or Trespass (cont’d.) • Other terms for system rule breakers: – Cracker: “cracks” or removes software protection designed to prevent unauthorized duplication – Phreaker: hacks the public telephone network Principles of Information Security, Fourth Edition 42 Forces of Nature • Events of nature, can cause the most dangerous threats, because they are unexpected and can occur with very little warning. • These threats disrupt not only individual lives, but also storage, transmission, and use of information • Organizations must implement controls to limit damage and prepare contingency plans for continued operations Principles of Information Security, Fourth Edition 43 Forces of Nature • These include fire, flood, earthquake, lightning, landslide or mudslide, tornado or severe windstorm, hurricane or typhoon, tsunami, electrostatic discharge, and dust contamination. • Since it is not possible to avoid many of these threats, management must implement controls to limit damage and also prepare contingency plans for continued operations. Principles of Information Security, Fourth Edition 44 Human Error or Failure • This category includes the possibility of acts performed without intent or malicious purpose غرض سيء أو تخريبيby an individual who is an employee of an organization. This can happen when: – Inexperience – Improper training – Incorrect assumptions • Employees constitute one of the greatest threats to information security, as the individuals closest to the organizational data. Principles of Information Security, Fourth Edition 45 Human Error or Failure (cont’d.) • Employee mistakes can easily lead to: – Revelation of classified data – Entry of erroneous data – Accidental data deletion or modification – Data storage in unprotected areas – Failure to protect information • Many threats can be prevented with controls, ranging from: – Simple procedures, such as requiring the user to type a critical command twice, – To more complex procedures, such as the verification of commands by a second party. Principles of Information Security, Fourth Edition 46 Figure 2-8 Acts of Human Error or Failure Principles of Information Security, Fourth Edition 47 Information Extortion ابتزاز • Attacker steals information from computer system and demands compensation for its return or for an agreement to not disclose the information. • Extortion ابتزازis common in credit card number theft. Principles of Information Security, Fourth Edition 48 Missing, Inadequate, or Incomplete Organizational Policy or Planning • In policy or planning, can make organizations vulnerable to loss, damage, or disclosure of information assets. • With missing, inadequate, or incomplete controls, can make an organization more likely to suffer losses when other threats lead to attacks. • Information security is, at its core, a management function. Principles of Information Security, Fourth Edition 49 Missing, Inadequate, or Incomplete Organizational Policy or Planning • The organization’s executive leadership is responsible for strategic planning for security as well as for IT and business functions—a task known as governance. • Thus; missing, inadequate, or incomplete controls for security safeguards and information asset protection controls that are: – missing, misconfigured, antiquated مهمل- قديم- , or poorly designed or managed make an organization more likely to suffer losses when other threats lead to attacks. Principles of Information Security, Fourth Edition 50 Sabotage اعمال تخريبيةor Vandalism تخريب • Equally popular today is the assault اعتداءon the electronic face الوجه التقنيof an organization, its Web site. • This category of threat involves the deliberate sabotage of: – a computer system or business, or acts of vandalism to either destroy an asset or damage the image صورة أو سمعة المنظمةof an organization. • These threats can range from petty vandalism by employees to organized sabotage against an organization. Principles of Information Security, Fourth Edition 51 Sabotage اعمال تخريبيةor Vandalism تخريب • Organizations frequently rely on image to support the generation of revenue ايرادات, so if an organization’s Web site is defaced can lead to: – a drop in consumer confidence is probable, reducing the organization’s sales and net worth. • Compared to Web site defacement, vandalism within a network is more malicious in intent and less public. Principles of Information Security, Fourth Edition 52 Sabotage اعمال تخريبيةor Vandalism تخريب • Today, security experts are noticing a rise in another form of online vandalism in what are described as hacktivist or cyberactivist operations; which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. • A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause Principles of Information Security, Fourth Edition 53 Sabotage اعمال تخريبيةor Vandalism تخريب • A more extreme version is referred to as cyberterrorism. • Cyberterrorism: much more sinister شريرform of hacking. • Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. • First noticeable occurrence of this attack in Oct. 21, 2002, when a distributed denial-of-service (DDOS) attack struck the 13 root servers that provide the primary road-map for all Internet communications. Principles of Information Security, Fourth Edition 54 Sabotage اعمال تخريبيةor Vandalism تخريب • Nine servers out of these thirteen were jammed. • The problem was taken care of in a short period of time. • While this attack was significant, the results were not noticeable to most users of the Internet. • A news report shortly after the attack noted that “the attack, at its peak, only caused 6 percent of domain name service requests to go unanswered. Principles of Information Security, Fourth Edition 55 Figure 2-9 Cyber Activists Wanted Principles of Information Security, Fourth Edition 56 Theft • Theft is illegal taking of another’s physical, electronic, or intellectual property. • Within an organization, that property can be physical, electronic, or intellectual. • The value of information suffers when it is copied and taken away without the owner’s knowledge. • Physical theft is controlled relatively easily. • A wide variety of measures can be used from simple locked doors to trained security personnel and the installation of alarm systems. Principles of Information Security, Fourth Edition 57 Theft • Electronic theft is more complex problem to manage and control. • Evidence of crime not readily apparent. • Organizations may not even know it has occurred. Principles of Information Security, Fourth Edition 58 Technical Hardware Failures or Errors • Large quantities of computer code are written, debugged, published, and sold before all their bugs are detected and resolved. • Technical hardware failures or errors occur when a manufacturer distributes equipment containing a known or unknown flaw عيبto users. • These defects عيوب مصنعيةcan cause the system to perform outside of expected parameters, resulting in unreliable service or lack of availability. Principles of Information Security, Fourth Edition 59 Technical Software Failures or Errors • This category of threats comes from purchasing software with unknown, hidden faults. • Sometimes, unique combinations of certain software and hardware reveal new bugs. • Sometimes, these items aren’t errors but are purposeful shortcuts left by programmers for honest or dishonest reasons. • Some errors are terminal— that is, they result in the unrecoverable loss of the equipment. اليمكن اصالح القطعة أو الجهاز • Some errors are intermittent, in that they only periodically manifest themselves, resulting in faults that are not easily repeated, and thus, equipment can sometimes stop working, or work in unexpected ways. Principles of Information Security, Fourth Edition 60 Technological Obsolescence تقادم تقني • When the infrastructure becomes antiquated مهملor outdated, it leads to unreliable and untrustworthy systems. • Management must recognize that when technology becomes outdated, there is a risk of loss of data integrity to threats and attacks. • Ideally, proper planning by management should prevent the risks from technology obsolesce قديم, but when obsolescence is identified, management must take immediate action. • IT plays large role. Principles of Information Security, Fourth Edition 61 Attacks • Attacks – Acts or actions that exploits vulnerability (i.e., an identified weakness) in controlled system – Accomplished by threat agent that damages or steals organization’s information or physical asset. – An exploit is a technique to compromise a system. – Vulnerability is an identified weakness of a controlled system whose controls are not present or are no longer effective. Principles of Information Security, Fourth Edition 62 Attacks • Types of attacks – (1) Malicious code: • Includes execution of viruses, worms, Trojan horses, and active Web scripts with intent to destroy or steal information • The state of the art in attacking systems in 2002 is the multivector worm. • These attack programs use up to six known attack vectors to exploit a variety of vulnerabilities in commonly found information system devices. Principles of Information Security, Fourth Edition 63 Attacks • Types of attacks – (2) Hoaxes: • A more devious مراوغattack on computer systems is the transmission of a virus hoax with a real virus attached. • When the attack is masked in a seemingly legitimate message, unsuspecting users more readily distribute it. • Even though these users are trying to do the right thing to avoid infection, they end up sending the attack on to their coworkers and friends and infecting many users along the way. Principles of Information Security, Fourth Edition 64 New Table Table 2-2 Attack Replication Vectors Principles of Information Security, Fourth Edition 65 Attacks (cont’d.) • Types of attacks (cont’d.) – Back door: gaining access to system or network using known or previously unknown/newly discovered access mechanism – Password crack: attempting to reverse calculate a password – Brute force: the application of computing and network resources to try every possible combination of options of a password. – Dictionary: narrows the field by selecting specific accounts to attack and uses a list of commonly used passwords (the dictionary) to guess with. Principles of Information Security, Fourth Edition 66 Attacks (cont’d.) • Types of attacks (cont’d.) – Denial-of-service (DoS): attacker sends large number of connection or information requests to a target • Target system cannot handle successfully along with other, legitimate service requests • May result in system crash or inability to perform ordinary functions – Distributed denial-of-service (DDoS): an attack in which a coordinated stream of requests is launched against target from many locations simultaneously Principles of Information Security, Fourth Edition 67 Figure 2-11 Denial-of-Service Attacks Principles of Information Security, Fourth Edition 68 Attacks (cont’d.) • Types of attacks (cont’d.) – Spoofing انتحال محاكاة: A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. – Man-in-the-middle: or TCP hijacking attack, an attacker sniffs packets from the network, modifies them, and inserts them back into the network. Principles of Information Security, Fourth Edition 69 Attacks (cont’d.) • Types of attacks (cont’d.) – Spam: unsolicited غير مدعو أو مرحب فيهcommercial email; more a nuisance مزعجthan an attack, though is emerging as a vector for some attacks – Mail bombing: another form of e-mail attack that is also a DoS, in which an attacker routes large quantities of e-mail to the target. Principles of Information Security, Fourth Edition 70 Figure 2-12 IP Spoofing Principles of Information Security, Fourth Edition 71 Figure 2-13 Man-in-the-Middle Attack Principles of Information Security, Fourth Edition 72 Attacks (cont’d.) • Types of attacks (cont’d.) – Sniffers: program or device that monitors data traveling over network. Sniffers can be used both for legitimate network management functions and for stealing information from a network. – Phishing تصيد احتيالي: an attempt to gain personal/ financial information from individual, usually by posing as legitimate entity. – Pharming : redirection of legitimate Web traffic (e.g., browser requests) to illegitimate site for the purpose of obtaining private information. Principles of Information Security, Fourth Edition 73 Figure 2-14 Example of a Nigerian 4-1-9 Fraud Principles of Information Security, Fourth Edition 74 Attacks (cont’d.) • Types of attacks (cont’d.) – Social engineering: using social skills مهارات اجتماعية ""أو ذكاء اجتماعيto convince people to reveal access credentials شهادة او اثباتor other valuable information to attacker. “People are the weakest link. You can have the best technology; firewalls, intrusion-detection systems, biometric devices ... and somebody can call an unsuspecting employee to get everything! Principles of Information Security, Fourth Edition 75 Attacks (cont’d.) • Types of attacks (cont’d.) – Timing attack: relatively new; A timing attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system. • The cookie can allow the designer to collect information on how to access password-protected sites. • Cookie is a small quantity of data stored by the Web browser on the local system, at the direction of the Web server. • Another attack by the same name involves the interception of cryptographic elements to determine keys and encryption algorithms. Principles of Information Security, Fourth Edition 76 Secure Software Development • Many information security issues discussed here are caused by software elements of system • Development of software and systems is often accomplished using methodology such as Systems Development Life Cycle (SDLC) • Many organizations recognize need for security objectives in SDLC and have included procedures to create more secure software • This software development approach known as Software Assurance (SA) Principles of Information Security, Fourth Edition 77 Software Assurance and the SA Common Body of Knowledge • National effort underway to create common body of knowledge focused on secure software development • US Department of Defense and Department of Homeland Security supported Software Assurance Initiative, which resulted in publication of Secure Software Assurance (SwA) Common Body of Knowledge (CBK) • SwA CBK serves as a strongly recommended guide to developing more secure applications Principles of Information Security, Fourth Edition 78 Software Design Principles • Good software development results in secure products that meet all design specifications • Some commonplace security principles: – Economy of mechanism: Keep the design as simple and small as possible. – Fail-safe defaults: Base access decisions on permission rather than exclusion. – Complete mediation: Every access to every object must be checked for authority. – Open design: The design should not be secret, but rather depend on the possession of keys or passwords. Principles of Information Security, Fourth Edition 79 Software Design Principles (cont’d.) • Some commonplace security principles (cont’d.): – Separation of privilege: Where feasible, a protection mechanism should require two keys to unlock, rather than one. – Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job. – Least common mechanism: Minimize mechanisms (or shared variables) common to more than one user and depended on by all users. – Psychological acceptability: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly. Principles of Information Security, Fourth Edition 80 Software Development Security Problems • Problem areas in software development: 1. Buffer overruns • Buffers are used to manage mismatches in the processing rates between two entities involved in a communication process. • A buffer overrun (or buffer overflow) is an application error that occurs when more data is sent to a program buffer than it is designed to handle. During a buffer overrun, an attacker can make the target system execute instructions, or the attacker can take advantage of some other unintended consequence of the failure. Principles of Information Security, Fourth Edition 81 Software Development Security Problems 2. Command injection • Command injection problems occur when user input is passed directly to a compiler or interpreter. The underlying issue is the developer’s failure to ensure that command input is validated before it is used in the program. 3. Cross-site scripting (or XSS) • Occurs when an application running on a Web server gathers data from a user in order to steal it. An attacker can use weaknesses in the Web server environment to insert commands into a user’s browser session, so that users ostensibly ظاهرياconnected to a friendly Web server are, in fact, sending information to a hostile server. • Often an attacker encodes a malicious link and places it in the target server, making it look less suspicious. 82 Principles of Information Security, Fourth Edition Software Development Security Problems 4. Failure to handle errors • What happens when a system or application encounters an scenario that it is not prepared to handle? • Does it attempt to complete the operation (reading or writing data or performing calculations)? • Does it issue a cryptic message that only a programmer could understand? • Or does it simply stop functioning? • Failure to handle errors can cause a variety of unexpected system behaviors. • Programmers are expected to anticipate problems and prepare their application code to handle them. Principles of Information Security, Fourth Edition 83 Software Development Security Problems 5. Failure to protect network traffic • With the growing popularity of wireless networking comes a corresponding increase in the risk that wirelessly transmitted data will be intercepted. Most wireless networks are installed and operated with little or no protection for the information that is broadcast between the client and the network wireless access point. “Public networks like coffee shops, bookstores, and hotels.” • Traffic on a wired network is also vulnerable to interception. On networks using hubs instead of switches, any user can install a packet sniffer and collect communications to and from users. Thus, periodic scans for unauthorized packet sniffers, unauthorized connections to the network, and general awareness of the threat can mitigate this problem. Principles of Information Security, Fourth Edition 84 Software Development Security Problems 6. Failure to store and protect data securely • Programmers are responsible for integrating access controls into, and keeping secret information out of, programs. • Access controls, the subject of later chapters, regulate who, what, when, where, and how individuals and systems interact with data. • Failure to properly implement sufficiently strong access controls makes the data vulnerable. • Overly strict access controls hinder business users in the performance of their duties, and as a result the controls may be administratively removed or bypassed. Principles of Information Security, Fourth Edition 85 Software Development Security Problems 7. Failure to use cryptographically strong random numbers • Most modern cryptosystems, like many other computer systems, use random number generators. 8. Format string problems • Computer languages often are equipped with built-in capabilities to reformat data while they’re outputting it (see notes below) 9. Neglecting change control • Developers use a process known as change control to ensure that the working system delivered to users represents the intent of the developers. • Once the system is in production, change control processes ensure that only authorized changes are introduced and that all changes are adequately tested before being released. Principles of Information Security, Fourth Edition 86 Software Development Security Problems (cont’d.) 10. Improper file access • If an attacker changes the expected location of a file by intercepting and modifying a program code call, the attacker can force a program to use files other than the ones the program is supposed to use. 11. Improper use of SSL 12. Information leakage 13. Integer bugs (overflows/underflows) 14. Race conditions 15. SQL injection Principles of Information Security, Fourth Edition 87 Software Development Security Problems (cont’d.) 16. Trusting network address resolution 17. Unauthenticated key exchange 18. Use of magic URLs and hidden forms 19. Use of weak password-based systems Principles of Information Security, Fourth Edition 88 Use of Weak Password-Based Systems • Principals of Information Security, Fourth Edition 89 Use of Weak Password-Based Systems Principals of Information Security, Fourth Edition 90 Summary • Unlike any other aspect of IT, information security’s primary mission to ensure things stay the way they are • Information security performs four important functions: – Protects organization’s ability to function – Enables safe operation of applications implemented on organization’s IT systems – Protects data the organization collects and uses – Safeguards the technology assets in use at the organization Principles of Information Security, Fourth Edition 91 Summary (cont’d.) • Threat: object, person, or other entity representing a constant danger to an asset • Management effectively protects its information through policy, education, training, and technology controls • Attack: a deliberate act that exploits vulnerability • Secure systems require secure software Principles of Information Security, Fourth Edition 92