* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Computer & Network Security
Survey
Document related concepts
Transcript
Computer & Network Security [email protected] Outlines Definition of computer and network security Security Terminology Weaknesses and Vulnerabilities Identification and Authentications Authentication Mechanism Computer System and Network Intrusions Internet Etiquette Security Management Definition of computer and network security • Definitions Security • Security is about the protection of assets * Protective measures • • • Prevention – Take measures that prevent assets from being damaged Detection – Take measures that be able to detect when an asset has been damaged Reaction – Take measures that be able to recover from a damage * From : Gollmann D., Computer Security, John Wiley &Sons, 1999 Definition of computer and network security • Information security The tasks of guarding digital information • Information : – Typically processed by a computer – Stored on a some devices – Transmitted over a network Ensures that protective measures are properly implemented • A protection method Definition of computer and network security • Computer security No absolute “secure” system Security mechanisms protect against specific classes of attacks Definition of computer and network security • Network security Security of data in transit • Over network link • Over store-and-forward node Security of data at the end point • Files • Email • Hardcopies Definition of computer and network security • Network security differences from computer security : Attacks can come from anywhere, anytime Highly automated (script) Physical security measures are inadequate Wide variety of applications, services, protocols • • Complexity Different constraints, assumptions, goals No single “authority”/administrators Security Terminology • Security attack • Security mechanism • Security service • Risk • Risk Analysis • Spies • Cyberterrorists Security Terminology • Security attack • Any action that compromises security information • Security mechanism • A mechanism that designed to detect, prevent, or recover from a security attack • Security service • A service that enhances the security of data processing systems and information transfers. • Makes use of one or more security mechanisms Security Terminology • Risk A measure of the cost of a realised vulnerability that incorporates the probability of a successful attack • Risk analysis : Provides a quantitative means of determining whether an expenditure on safeguards is warranted Security Terminology • Spies A person who • • Has been hired to break into a computer and steal information Do not randomly search for unsecured computers to attack • Cyberterrorists Terrorists that attack the network and computer infrastructure to • • • Deface electronic information (such as web sites) Deny service to legitimate computer users Commit unauthorised intrusions into systems and networks that result in infrastructure outages and corruption of vital data Weaknesses, Vulnerabilities and Threats Weaknesses and Vulnerabilities Vulnerability A weakness in a system allowing an attacker to violate the confidentiality, integrity, availability May result from Software bugs Software of system design flaws Weaknesses and Vulnerabilities Vulnerability Examples of vulnerabilities Buffer overflows Race conditions Unencrypted protocols Bad/insufficient sanity checks Backdoors Unqualified trust Some of these vulnerabilities are described later Threats Threat means A person, thing, event which poses some danger to an asset in terms of that asset’s confidentiality, integrity, availability Accident threats Delibrate threats : Passive and Active Examples of threat Hacker/cracker Script kiddies Spies and Malware Denial-of-service (DoS) attack Zombies Insecure/poorly designed applications Threats Hacker/cracker** Hacker : a person who uses his/her advanced computer skills to attack computers, but not with a malicious intent, hackers use their skills to expose security flaws. Cracker : a person who violates system security with malicious intent. Crackers destroy data, deny legitimate users of services, cause serious problems on computers and networks. ** from : M. Ciampa, Security+guide to network security fundamentals, Thomson course technology, 2005 Threats Script kiddies Want to break into computers like crackers, but unskilled users download software from web sites, use to break into computers Spies A person who Has been hired to break into a computer and steal information Do not randomly search for unsecured computers to attack Malware A group of destructive programs such as viruses, worms, Trojan horse, logic bombs, and spyware Threats Virus : a computer program that can copy itself and infect a computer without permission or knowledge of the user spreads from one computer to another when its host (such as an infected file) is taken to that computer viruses always infect or corrupt files on a targeted computer Worm : a computer program that is a self-replicating code Resides in active memory (the program is executed) Propagates itself uses a network to send copies of itself to other node can spread itself to other computers without needing to be transferred as part of an infected file always harm the network Threats Trojan horse : a program that installs malicious software while under the guise of doing something else differs from a virus in that a Trojan horse does not insert its code into other computer files appears harmless until executed Logic Bomb : a program that inactive until it is triggered by a specific event, e.g. a certain date being reached once triggered, the program can perform many malicious activities is difficult to defend against Threats Spyware : a computer program that installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's awareness • installing additional software • redirecting web browser activity secretly monitors the user's behavior • collects various types of personal information, Threats Denial-of-service (DoS) attack : a threat that Prevents legitimate traffic from being able to access the protected resource Common DoS Crashes a targeted service or server Normally done by • • Exploiting program buffer overflow problem Sending too many packets to a host causing the host to crash Threats Zombies : systems that Have been infected with software (e.g. Trojan or back doors) Under control of attackers Be used to launch an attack against other targets Insecure/poorly designed applications One of the most difficult threats to be detected Identification and Authentications • Authentication Basics • Passwords • Biometrics • Multiple methods Authentication Basics • Authentication A process of verifying a user’s identity • Two reasons for authenticating a user The user identity is a parameter in access control decision (for a system) The user identity is recorded when logging security-relevant events in an audit trail Authentication Basics • Authentication Binding of an identity to a principal (subject) An identity must provide information to enable the system to confirm its identity Information (one or more) • What the identity knows (such as password or secret information) • What the identity has (such as a badge or card) • What the identity is (such as fingerprints) • Where the identity is (such as in front of a particular terminal) Authentication Basics • Authentication process Obtaining information from the identity Analysing the data Determining if it is associated with that identity • Thus : authentication process is The process of verifying a claimed identity Authentication Basics • Username and Password Very common and simple identities Used to enter into a system Username • Announce who a user is • This step is called identification Password • To prove that the user is who claims to be • This step is called authentication Authentication Mechanism • Password • Password Aging • One-Time Password Passwords • Passwords Based on what people know User supplies password Computer validates it If the password is associate with the user, then the user’s identity is authenticated Passwords • Choosing passwords Password guessing attack is very simple and always works !! • Because users are not aware of protecting their passwords Password choice is a critical security issue • Choose passwords that cannot be easily guessed • Password defenses • • • Set a password to every account Change default passwords Password length – A minimum password length should be prescribed Passwords • Password defences Password format • Mix upper and lower case symbols • Include numerical and other nonalphabetical symbols Avoid obvious passwords Passwords • How to improve password security? Password checker tool • Password generation • • Check passwords against some dictionary of weak password A utility in some system Producing random password for users Password aging • • A requirement that password be changed after some period of time Required mechanism – – – Forcing users to change to a different password Providing notice of need to change A user-friendly method to change password Passwords • How to improve password security? One-Time Password • Limit login attempts • A password is valid for only one use A system monitors unsuccessful login attempts – Reacts by locking the user account if logging in process failed Inform user • After successful login a system display – The last login time – The number of failed login attempts Attacking a Password System • Password guessing Exhaustive search (brute force) • Try all possible combination of valid symbols Dictionary attack Random selection of passwords Pronounceable and other computer-generated passwords User selection passwords • Passwords based on – Account names – User names – Computer names, etc. Biometrics • The automated measurement of biological or behavioral features that identifies a person • Method: A set of measurement of a user is taken (recorded) when a user is given an account When a user access the system • The biometric authentication mechanism identify the identity Biometrics • Fingerprints • Voices • Eyes • Faces • Keystrokes Keystroke intervals Keystroke pressure Keystroke duration • Combinations Computer System and Network Intrusions Intrusion Profiles Exploiting passwords Exploiting known vulnerabilities Exploiting protocol flaws Examining source files for new security flaws Denial-of-service attacks Abusing anonymous FTP Installing sniffer programs IP source address spoofing Typical Network Intrusions Locate a system to attack New systems Network sweeps Gain entry to a user’s account No password or easy-to-guess password Sniffed password Exploiting system configuration weakness or software vulnerability to obtain access to a privileged account Typical Network Intrusion Once inside, and intruder may: Remove traces from auditing records Install back door for future use Install Trojan Horse programs to capture system and account information Jump to other hosts on your network Use your system to launch attacks against other sites Modify, destroy, or inappropriately disclose information Why Should You Care Protect your own operational environment Protect your user’s data Provide service to your users What Should You Do? Stay current with security issues Internet Etiquette-1 Do: Understand and respect security policies Take responsible for your own security Respect other Internet neighbours Cooperate to provide security Internet Etiquette-2 Avoid: Unauthorised access to other accounts and systems Cracking password file from other systems Sharing accounts Unauthorised access to unprotected files Reading the e-mail of other users Disrupting service Security Management 45 Understanding Security Writing a security policy Monitoring the network Auditing the network Preparing for an attack Handling an attack Forensics Log analysis Damage control Understanding Security :Security Objectives** Confidentiality Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. Integrity In information security, integrity means that data cannot be modified undetectably. Availability For any information system to serve its purpose, the information must be available when it is needed. (CIA) ** http://en.wikipedia.org/wiki/Information_security Understanding Security What are we protecting Asses value Protecting cost Thinking like a defender List of problems might happen in various situations The organisation we are protecting Business types different levels of security Understanding Security The process of security1 Expands Endless Learn loop of Security everything about the threats The Internet is full of information How to protect a system How to break in to a system System vulnerabilities, etc. Well on this endless loop design every thing before implement !! Analysis must come before synthesis !! Understanding Security The process of security2 Endless loop of Security Think “pathologically” about the design (or “think evil thought”) Implement it the way it is designed Never let any components be altered from the design Continuously recheck it to make sure that it has not changed, such as Configuration change in routers/computers Practice running it to make sure that you understand it and can operate it correctly Understanding Security The process of security3 Endless loop of Security Make it simple for others to do when you want them to do Make it hard for people to do when you do not want them to do Make it easy for you to detect problems Make it difficult to hide what you do not want to be hidden Test everything you can test Practice everything you can practice Improve anything you can improve Repeat this process endlessly, at all levels of detail Security Management 51 Understanding Security Writing a security policy Monitoring the network Auditing the network Preparing for an attack Handling an attack Forensics Log analysis Damage control Writing a Security Policy Security Policy : Definitions : (1) Information security policy ** Objective : To provide management direction and support for information security in accordance with Business requirements, Relevant laws and regulations ** ISO/IEC 17799:2005(E) Writing a Security Policy Security Policy : Definition (2) [Ciampa] : “The backbone of any infrastructureis its security policy. Without a policy that clearly outlines what needs to be protected, how it should be protected, and what users can – and cannot – do in support of the policy, there is no effective security.” Writing a Security Policy Security Policy A document or sets of documents that Clearly defines the defense mechanisms an organisatoin will employ to keep information secure Outlines how the organisation will respond to attacks Outlines the duties and responsibilities of its employee for information security Writing a Security Policy Security Policy : Definition: (3) [Northcutt] : A security policy establishes what you must do to protect information stored on computers A well-written policy contains sufficient definition of “what” to do so you can identify and measure, or evaluate “how” Writing a Security Policy Purpose of Security Policy Describes of what being protected and why Sets priorities about what must be protected first and at what cost Allows an explicit agreement to be made with various parts of the organisation regarding the value of security Provides the security department with a valid reasons to say “no” when that is needed Provides the security department to back up the “no” Prevents the security department from acting illegally Writing a Security Policy Security Policy Trade A of suggested by Wadlow good policy today is better that a great policy next year A weak-policy that is well distributed is better than a strong policy no one has read A simple policy that is easily understood is better than a complicated and confusing policy that no one ever bother to read A policy whose details are slightly wrong is better than a policy with no details at all A living-policy that is constantly updated is better than one that grow obsolete over time Writing a Security Policy An amateur (simple) policy State a coup A formal policy Follow some guidelines/standards Writing a Security Policy 59 Suggestion A suggestion to get a decent policy for an organisation (which currently no security policy) 1. Write a security policy for your organisation Say nothing specific State generalities Should cover no more than 5 pages Should not take more than 2 days to write Don’t ask for help, do it yourself Don’t try to make it perfect, just try to get some key issues written down It doesn’t have to be complete It doesn’t have to be crystal clear (From : T. A. Wadlow, The process of network security) Writing a Security Policy 60 Suggestion (cont.) 1. find 3 people who are willing to become “security committee” : their job is • To make ruling and amendment to the policy • To be judges, not enforcers 2. create an internal web site • with • policy page • Committee contact information • Amendments • Approved and added to the web site as quick as possible Writing a Security Policy 61 Suggestion (cont.) 3. treat the policy as if it were absolute rule of the law • Do not violate the policy • Allow no violation to occur 4. if someone has a problem with the policy • Have the person propose an amendment • The policy committee members need to agree • Make an amendment Writing a Security Policy 62 Suggestion (cont.) 5. schedule a regula meeting to consolidate policy and amendments • Once a year, for example • Involve • You and the security committee • Current security policy and the amendments • Make a new policy statements 6. repeat the processes 3-6 Writing a Security Policy 63 Contents • What are we protecting? Describe in detail The types of security levels expected to have in an organisation Characterise the machines on the network (for example) Writing a Security Policy 64 Contents (cont.) Red : contains extremely confidential information or provide missioncritical service Yellow : contains sensitive information or provides important service Green : able to access red or yellow machines but does not directly store sensitive information or perform crucial function White : unable to access red, yellow, or green systems but not externally accessible. No sensitive information or function Black : externally accessible. Unable to access red, yellow, green or white systems Writing a Security Policy 65 Contents (cont.) • Methods of protection • Describe Levels for protection Priorities for protection For example Writing a Security Policy 66 Contents (cont.) Organisation priorities : 1. 2. 3. 4. 5. Height Priority health and human safety compliant with applicable local, state, and federal laws Preservation of the interests of the organisation Preservation of the interests of partners of the organisation Free and open dissemination of nonsensitive information Low Priority Describe general policies for access to each category of system 67 Category Network Access Qualification Cycle* Red red networks only Red-cleared employees only Monthly Yellow Yellow and red network Employees only Quarterly Green Yellow, red, and green network Employees and cleared contractors Yearly White White networks only Employees and contractors Yearly Black Black networks only Employees, contractors, monthly and public (through cleared access means) Writing a Security Policy 68 Contents (cont.) • Responsibility Describes the responsibilities, privileges that are accorded each class of system user : e.g. General Knowledge of this policy All actions in accordance with this policy Report any known violations of this policy to security Report any suspected problems with this policy to security Sysadmin/operations All user information to be treated as confidential No authorised access to confidential information Indemnified for any action consistent with systems administrator code of conduct Writing a Security Policy 69 Contents (cont.) Security Administrator • Highest level of ethical conduct Indemnified for any action consistent with security officer code of conduct Contractor • • • Access to specifically authorised machine in specifically authorised fashion Request advance authorisation in writing for any actions which might be interpreted as security issue Guest • No access to any computing facilities except with written advance notice to security Writing a Security Policy 70 Contents (cont.) Appropriate Use Describe the ways in which employees should not use the network General Minimal personal use during normal business hours No use of network for outside business activity Access to Internet resource consistent with HR policies Sysadmin Responsible access to sensitive or personal information on the network All special access justifiable for business operations Writing a Security Policy 71 Contents (cont.) Security Personal • Responsible access to sensitive information on the network • All special access justifiable for business operations • Use of security tools for legitimate business purpose only Contractor • No personal access any time • Minimal use of the network and only for specific reasons relating to specific contracts Guest • No use of the network at any time Writing a Security Policy 72 Contents (cont.) • Consequence Describe the way in which the magnitude of a policy violation is determined and the categories of consequences. Examples: Security review board Penalties Critical Serious limited Writing a Formal policy 73 Known as “risk-based security management”. Risk Risk analysis Combination of the probability of an event and its consequence Systematic use of information to identify sources and to estimate the risk Risk evaluation Process of comparing the estimated risk against given risk criteria to determine the significance of the risk Writing a Formal Policy 74 Risk (Cont.) Risk assessment Overall process of risk analysis and risk evaluation Risk management Coordinated activities to direct and control an organization with regard to risk Writing a Formal Policy 75 Some guidelines ISO/IEC 17799:2005(E) SANS guidelines www.sans.org/security-resources/policies ﮸ NIST guidelines http://csrc.nist.gov/index.html etc. ISO/IEC 17799:2005(E) Security Policy 76 Should contain Definitions of information security Overall objectives and scope Importance of security A statement of management intent A framework for setting control objectives and controls Including the structure of risk assessment and risk management ISO/IEC 17799:2005(E) Security Policy 77 A brief explanation of the security policies, principles, standards, and compliance requirements of particular importance to the organization, including Compliance with legislative, regulatory, and contractual requirements; Security education, training, and awareness requirements; Business continuity management; Consequence of information security policy violations; ISO/IEC 17799:2005(E) Security Policy 78 A definition of general and specific responsibilities for information security management, including Reporting information security incidents; References to documentation which may support the policy, e.g. More detailed security policies and procedures for specific systems or security rules should comply with. ISO/IEC 17799:2005(E) Security Policy 79 Review of the information security policy The information security policy should be reviewed At a planned intervals, or If significant changes occur To ensure its continuing suitability, adequacy, and effectiveness Example of Security Policy Format 80 1. 2. 3. 4. 5. Purpose/Overview Scope Policy Enforcement Revision history Example of Policies (suggested by SANS*) 81 Organization Policy Audit policy Computer security policy Desktop security policy Email security policy Internet security policy Mobile security policy Network security policy Physical security policy Server security policy Wireless security policy * www.sans.org/security-resources/policies Monitoring Your Network 82 The Shape of Logging System What to Log Logging Mechanisms Time Sensor Log Management Monitoring Your Network 83 Goals of a monitoring system Reduce the likelihood of an attack going unlogged Increase the likelihood that the events logged for an attack will be recognized as an attack The Shape of Logging System 84 Problem of logging system What events to be logged? if every event is logged the log file will be very large if only selected events are logged some crucial events might not be logged !! Log file can be tampered by attackers To delete attack traces Attackers If can tamper the log file the logs are accessible to them The Shape of Logging System 85 Log should not be accessible to an attacker Mechanisms can deny access to logs The logs are kept on a separate machine The logs are encrypted The logs are stored in a write-only media The logs are stored in multiple places The Shape of Logging System 86 Log should not be tampered with Tampering efforts should be easily detected Achieved by Cryptographically signing each log entry to detect invalid entries Monitoring the log entries to look for a sudden decrease in log size Indicates Assigning that the log entries have been deleted a sequence number to each log entry and verifying that the sequence is unbroken What to Log 87 The network should log any events necessary to detect known attack patterns The network should log any events necessary to detect unusual patterns of access Logging Mechanisms 88 Syslog The most common network logging mechanism Runs on Unix systems Components Syslog daemon Syslog ruleset Syslog-enabled programs Syslog 89 Syslog daemon A program that runs in a background on all machines using syslog Serves several purposes Collects messages from syslog-enabled programs on the machine hosting it Collects certain messages from the system that are not syslog enabled (such as kernel messages regarding startingup and some device problems) Listens on the syslog port (port 514/UDP) for messages Save all of the above messages in a file Syslog Ruleset 90 Usually in /etc/syslog.conf Contains directives to the syslog daemon Determine where various types of messages should be logged Choices of logging Put a message into a file Log a message to another machine via UDP Write a message to the system console Write a message to all log-in users Syslog-enabled Program 91 Syslog is a standard facility in Unix many Unix programs have calls to syslog built into them Enable these programs to log various events To the local syslog daemon Pro (of syslog) 92 Universally available Standard implementation Available from nonprogrammable devices A read-only logging mechanism Con (syslog) 93 Unauthenticated protocol Can Unencrypted transmission Can be spoofed be eavesdropped by attackers Unreliable UDP transmission Not all syslog messages reach their intended destination Time 94 An important issue in log gathering and analysis Jun 4 22:33:21 machine1.ycom.com login: user smt login ok Jun 4 22:34:29 machine3.ycom.com login: user smt login ok Time is used in analysis process It should be accurate and synchronised with other systems A logging system should synchronise its time with a time server machine (NTP server) Sensors 95 A mechanism that can be used to aid device-based logging Provides a means for gathering information and integrating it into the logging system Sensors 96 Examples Some sensors can detect several variations on attacks Some sensors can detect problems with the network being monitored Sensors 97 Some sensors are built to detect conditions on the logging system Are If the logs increasing monotonically? not a log file might be tampered Is the logging system receiving all the logs that are being sent? Some devices transmit a sequence number with each log entry if a particular number is missing something goes wrong Sensors 98 Has any machine stopped logging? A machine that has stopped logging Might indicate a network problem OR an attack Log Management 99 A process of making sure that logging system Stable Useful References 1. 2. 3. 4. 5. Wadlow T. A., The process of network security: Designing and managing a safe network, AddisonWesley, 2000 Ciampa M., Security + guide to network security fundamentals, Thomson course technology, 2005 Northcutt S., et.al., Inside network perimeter security, Sam publishing, 2005 ISO/IEC 27001:2005(E) ISO/IEC 17799 Security Contest Topics Network Security Concept Network Security Architecture Network Security Assessment & Penetration Test Method Network Security Monitoring ISO27001 and series Computer Laws ประกาศเลื่อนการสมัครและสอบ security contest วันที่ปิดรับสมัคร จากวันที่ 14 ตุลาคม เลื่อนเป็ นวันที่ 31 ตุลาคม วันที่สอบคัดเลือกรอบแรก จากวันที่ 28 ตุลาคม เลื่อนเป็ นวันที่ 18 พฤศจิกายน วันที่รอบชิงชนะเลิศพร้อมประกาศรางวัล จากวันที่ 25 พฤศจิกายน เลื่อนเป็ นวันที่ 19 ธันวาคม CS subject 344-422 Computer and Network Security วิชาเลือก ประจาภาคการศึกษา 1 ของทุกปี