* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download CIT 016 Review for Final
Information security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
One-time pad wikipedia , lookup
Next-Generation Secure Computing Base wikipedia , lookup
Authentication wikipedia , lookup
Network tap wikipedia , lookup
Deep packet inspection wikipedia , lookup
Web of trust wikipedia , lookup
Certificate authority wikipedia , lookup
Security and safety features new to Windows Vista wikipedia , lookup
Cryptanalysis wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Security-focused operating system wikipedia , lookup
Cryptography wikipedia , lookup
Unix security wikipedia , lookup
Computer security wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Wireless security wikipedia , lookup
History of cryptography wikipedia , lookup
Mobile security wikipedia , lookup
CIT 016 Review for Final Security+ Guide to Network Security Fundamentals Second Edition Defining Information Security Three characteristics of information must be protected by information security: Confidentiality Integrity Availability Information security achieved through a combination of three entities Importance of Information Security Information security is important to businesses: Prevents data theft Avoids legal consequences of not securing information Maintains productivity Foils cyberterrorism Thwarts identity theft Preventing Data Theft Theft of data is single largest cause of financial loss due to a security breach One of the most important objectives of information security is to protect important business and personal data from theft Developing Attacker Profiles Six categories: Hackers Crackers Script kiddies Spies Employees Cyberterrorists Developing Attacker Profiles Hackers Person who uses advanced computer skills to attack computers, but not with a malicious intent Use their skills to expose security flaws Know that breaking in to a system is illegal but do not intend on committing a crime “Hacker code of ethics” Target should have had better security Crackers Person who violates system security with malicious intent Have advanced knowledge of computers and networks and the skills to exploit them Destroy data, deny legitimate users of service, or otherwise cause serious problems on computers and networks Script Kiddies Break into computers to create damage Not as skilled as Crackers Download automated hacking software from Web sites and use it to break into computers Tend to be young computer users with large amounts of leisure time, which they can use to attack systems Spies Person hired to break into a computer and steal information Do not randomly search for unsecured computers to attack Hired to attack a specific computer that contains sensitive information Possess excellent computer skills Could also use social engineering to gain access to a system Financially motivated Employees One of the largest information security threats to business Employees break into their company’s computer for these reasons: To show the company a weakness in their security Being overlooked, revenge For money Inside of network is often vulnerable because security focus is at the perimeter Unskilled user could inadvertently launch virus, worm or spyware Cyberterrorists Experts fear terrorists will attack the network and computer infrastructure to cause panic Cyberterrorists’ motivation may be defined as ideology, or attacking for the sake of their principles or beliefs Targets that are high on the cyberterrorists list are: Infrastructure outages Internet itself Cyberterrorists (continued) Three goals of a cyberattack: Deface electronic information to spread disinformation and propaganda Deny service to legitimate computer users Commit unauthorized intrusions into systems and networks that result in critical infrastructure outages and corruption of vital data Understanding Security Principles Ways information can be attacked: Crackers can launch distributed denial-ofservice (DDoS) attacks through the Internet Spies can use social engineering Employees can guess other user’s passwords Hackers can create back doors Protecting against the wide range of attacks calls for a wide range of defense mechanisms Layering Layered security approach has the advantage of creating a barrier of multiple defenses that can be coordinated to thwart a variety of attacks Information security likewise must be created in layers All the security layers must be properly coordinated to be effective Layering (continued) Limiting Limiting access to information reduces the threat against it Only those who must use data should have access to it Access must be limited for a subject (a person or a computer program running on a system) to interact with an object (a computer or a database stored on a server) The amount of access granted to someone should be limited to what that person needs to know or do Limiting (continued) Diversity Diversity is closely related to layering You should protect data with diverse layers of security, so if attackers penetrate one layer, they cannot use the same techniques to break through all other layers Using diverse layers of defense means that breaching one security layer does not compromise the whole system Not just perimeter security Possibly using different vendors Increased administrative overhead Diversity (continued) You can set a firewall to filter a specific type of traffic, such as all inbound traffic, and a second firewall on the same system to filter another traffic type, such as outbound traffic Use application layer filtering by a Linux box before traffic hits the firewall Use one device as the firewall and different device as the spam filter Using firewalls produced by different vendors creates even greater diversity This could add some complexity Obscurity Obscuring what goes on inside a system or organization and avoiding clear patterns of behavior make attacks from the outside difficult Network Address Translation Port Address Translation Internal ports different from external External port 80 Internal port 8080 Simplicity Complex security systems can be difficult to understand, troubleshoot, and feel secure about The challenge is to make the system simple from the inside but complex from the outside Using Effective Authentication Methods Information security rests on three key pillars: Authentication Access control (Authorization) Auditing (Accounting) Also Known as AAA Effective Authentication Methods Authentication: Process of providing identity Can be classified into three main categories: what you know, what you have, what you are Most common method: providing a user with a unique username and a secret password Username and Password ID management: User’s single authenticated ID is shared across multiple networks or online businesses Attempts to address the problem of users having individual usernames and passwords for each account (thus, resorting to simple passwords that are easy to remember) Can be for users and for computers that share data Disabling Nonessential Systems First step in establishing a defense against computer attacks is to turn off all nonessential services Disabling services that are not necessary restricts attackers can use Reducing the attack surface Disabling Nonessential Systems A service can be set to one of the following modes: Automatic Manual Disabled Besides preventing attackers from attaching malicious code to services, disabling nonessential services blocks entries into the system Hardening Operating Systems Hardening: process of reducing vulnerabilities A hardened system is configured and updated to protect against attacks Three broad categories of items should be hardened: Operating systems Applications that the operating system runs Networks Hardening Operating Systems You can harden the operating system that runs on the local client or the network operating system (NOS) that manages and controls the network, such as Windows Server 2003 or Novell NetWare Applying Updates Operating systems are intended to be dynamic As users’ needs change, new hardware is introduced, and more sophisticated attacks are unleashed, operating systems must be updated on a regular basis However, vendors release a new version of an operating system every two to four years Vendors use certain terms to refer to the different types of updates. Applying Updates (continued) A service pack (a cumulative set of updates including fixes for problems that have not been made available through updates) provides the broadest and most complete update A hotfix does not typically address security issues; instead, it corrects a specific software problem Applying Updates (continued) Applying Updates (continued) A patch or a software update fixes a security flaw or other problem May be released on a regular or irregular basis, depending on the vendor or support team A good patch management system: Design patches to update groups of computers Include reporting system Download patches from the Internet Distribute patches to other computers Securing the File System Another means of hardening an operating system is to restrict user access Generally, users can be assigned permissions to access folders (also called directories in DOS and UNIX/Linux) and the files contained within them Firmware Updates RAM is volatile―interrupting the power source causes RAM to lose its entire contents Read-only memory (ROM) is different from RAM in two ways: Contents of ROM are fixed ROM is nonvolatile―disabling the power source does not erase its contents Firmware Updates (continued) ROM, Erasable Programmable ReadOnly Memory (EPROM), and Electrically Erasable Programmable Read-Only Memory (EEPROM) are firmware (flash) To erase an EPROM chip, hold the chip under ultraviolet light so the light passes through its crystal window The contents of EEPROM chips can also be erased using electrical signals applied to specific pins Firmware Updates (continued) To update a network device we copy over a new version of the OS software to the flash memory of the device. This can be done via a tftp server or a compact flash reader/writer Router# copy tftp flash: Having the firmware updated ensures the device is not vulnerable to bugs in the OS that can be exploited Network Configuration You must properly configure network equipment to resist attacks The primary method of resisting attacks is to filter data packets as they arrive at the perimeter of the network In addition to making sure the perimeter is secure, make sure the device itself is secure by using strong passwords and encrypted connections SSH instead of Telnet and console, vty passwords Configuring Packet Filtering The User Datagram Protocol (UDP) provides for a connectionless TCP/IP transfer TCP and UDP are based on port numbers Socket: combination of an IP address and a port number The IP address is separated from the port number by a colon, as in 198.146.118.20:80 Network Configuration Rule base or access control list (ACL): rules a network device uses to permit or deny a packet (not to be confused with ACLs used in securing a file system) Rules are composed of several settings (listed on pages 122 and 123 of the text) Observe the basic guidelines on page 124 of the text when creating rules Network Cable Plant Cable plant: physical infrastructure of a network (wire, connectors, and cables) used to carry data communication signals between equipment Three types of transmission media: Coaxial cables Twisted-pair cables Fiber-optic cables Twisted-Pair Cables Standard for copper cabling used in computer networks today, replacing thin coaxial cable Composed of two insulated copper wires twisted around each other and bundled together with other pairs in a jacket Twisted-Pair Cables (continued) Shielded twisted-pair (STP) cables have a foil shielding on the inside of the jacket to reduce interference Unshielded twisted-pair (UTP) cables do not have any shielding Twisted-pair cables have RJ-45 connectors Fiber-Optic Cables Coaxial and twisted-pair cables have copper wire at the center that conducts an electrical signal Fiber-optic cable uses a very thin cylinder of glass (core) at its center instead of copper that transmit light impulses A glass tube (cladding) surrounds the core The core and cladding are protected by a jacket Hardening Standard Network Devices A standard network device is a typical piece of equipment that is found on almost every network, such as a workstation, server, switch, or router This equipment has basic security features that you can use to harden the devices Switches and Routers Switch Most commonly used in Ethernet LANs Receives a packet from one network device and sends it to the destination device only Limits the collision domain (part of network on which multiple devices may attempt to send packets simultaneously) A switch is used within a single network Routers connect two or more single networks to form a larger network Hardening Network Security Devices The final category of network devices includes those designed and used strictly to protect the network Include: Firewalls Intrusion-detection systems Network monitoring and diagnostic devices Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its computers (sometimes called a packet filter) Typically located outside the network security perimeter as first line of defense Can be software or hardware configurations Firewalls (continued) Software firewall runs as a program on a local computer (sometimes known as a personal firewall) Enterprise firewalls are software firewalls designed to run on a dedicated device and protect a network instead of only one computer One disadvantage is that it is only as strong as the operating system of the computer Firewalls (continued) Filter packets in one of two ways: Stateless packet filtering: permits or denies each packet based strictly on the rule base Stateful packet filtering: records state of a connection between an internal computer and an external server; makes decisions based on connection and rule base Can perform content filtering to block access to undesirable Web sites Designing Network Topologies Topology: physical layout of the network devices, how they are interconnected, and how they communicate Essential to establishing its security Although network topologies can be modified for security reasons, the network still must reflect the needs of the organization and users Security Zones One of the keys to mapping the topology of a network is to separate secure users from outsiders through: Demilitarized Zones (DMZs) Intranets Extranets Demilitarized Zones (DMZs) Separate networks that sit outside the secure network perimeter Outside users can access the DMZ, but cannot enter the secure network For extra security, some networks use a DMZ with two firewalls The types of servers that should be located in the DMZ include: Web servers Remote access servers – E-mail servers – FTP servers Network Address Translation (NAT) “You cannot attack what you do not see” is the philosophy behind Network Address Translation (NAT) systems Hides the IP addresses of network devices from attackers Computers are assigned special IP addresses (known as private addresses) Network Address Translation (NAT) These IP addresses are not assigned to any specific user or organization; anyone can use them on their own private internal network Port address translation (PAT) is a variation of NAT Each packet is given the same IP address, but a different TCP port number Virtual LANs (VLANs) Segment a network with switches to divide the network into a hierarchy Core switches reside at the top of the hierarchy and carry traffic between switches Workgroup switches are connected directly to the devices on the network Core switches must work faster than workgroup switches because core switches must handle the traffic of several workgroup switches Virtual LANs (VLANs) Virtual LANs (VLANs) Segment a network by grouping similar users together Instead of segmenting by user, you can segment a network by separating devices into logical groups (known as creating a VLAN) Secure/MIME (S/MIME) Protocol that adds digital signatures and encryption to Multipurpose Internet Mail Extension (MIME) messages Provides these features: Digital signatures – Interoperability Message privacy – Seamless integration Tamper detection Pretty Good Privacy (PGP) Functions much like S/MIME by encrypting messages using digital signatures A user can sign an e-mail message without encrypting it, verifying the sender but not preventing anyone from seeing the contents First compresses the message Reduces patterns and enhances resistance to cryptanalysis Creates a session key (a one-time-only secret key) This key is a number generated from random movements of the mouse and keystrokes typed Pretty Good Privacy (PGP) Uses a passphrase to encrypt the private key on the local computer Passphrase: A longer and more secure version of a password Typically composed of multiple words More secure against dictionary attacks Pretty Good Privacy (PGP) Securing Web Communications Most common secure connection uses the Secure Sockets Layer/Transport Layer Security protocol One implementation is the Hypertext Transport Protocol over Secure Sockets Layer Secure Sockets Layer (SSL)/ Transport Layer Security (TLS) SSL protocol developed by Netscape to securely transmit documents over the Internet Uses private key to encrypt data transferred over the SSL connection Version 20 is most widely supported version Personal Communications Technology (PCT), developed by Microsoft, is similar to SSL Secure Sockets Layer (SSL)/ Transport Layer Security (TLS) TLS protocol guarantees privacy and data integrity between applications communicating over the Internet An extension of SSL; they are often referred to as SSL/TLS SSL/TLS protocol is made up of two layers Secure Sockets Layer (SSL)/ Transport Layer Security (TLS) TLS Handshake Protocol allows authentication between server and client and negotiation of an encryption algorithm and cryptographic keys before any data is transmitted FORTEZZA is a US government security standard that satisfies the Defense Messaging System security architecture Has cryptographic mechanism that provides message confidentiality, integrity, authentication, and access control to messages, components, and even systems Secure Hypertext Transport Protocol (HTTPS) One common use of SSL is to secure Web HTTP communication between a browser and a Web server This version is “plain” HTTP sent over SSL/TLS and named Hypertext Transport Protocol over SSL Sometimes designated HTTPS, which is the extension to the HTTP protocol that supports it Whereas SSL/TLS creates a secure connection between a client and a server over which any amount of data can be sent security, HTTPS is designed to transmit individual messages securely Tunneling Protocols Tunneling: technique of encapsulating one packet of data within another type to create a secure link of transportation IEEE 8021x Based on a standard established by the Institute for Electrical and Electronic Engineers (IEEE) Gaining wide-spread popularity Provides an authentication framework for 802-based LANs (Ethernet, Token Ring, wireless LANs) Uses port-based authentication mechanisms Switch denies access to anyone other than an authorized user attempting to connect to the network through that port IEEE 8021x (continued) Network supporting the 8021x protocol consists of three elements: Supplicant: client device, such as a desktop computer or personal digital assistant (PDA), which requires secure network access Authenticator: serves as an intermediary device between supplicant and authentication server Authentication server: receives request from supplicant through authenticator 802.1x 802.1x is a standardized framework defined by the IEEE that is designed to provide port-based network access. The 802.1x framework defines three roles in the authentication process: 1. 2. 3. Supplicant = endpoint that needs network access Authenticator = switch or access point Authentication Server = RADIUS, TACACS+, LDAP The authentication process consists of exchanges of Extensible Authentication Protocol (EAP) messages between the supplicant and the authentication server. 802.1x Roles Supplicant Authenticator Authentication Server Microsoft Windows XP includes 802.1x supplicant support Remote Authentication Dial-In User Service (RADIUS) Originally defined to enable centralized authentication and access control and PPP sessions Requests are forwarded to a single RADIUS server Supports authentication, authorization, and auditing functions After connection is made, RADIUS server adds an accounting record to its log and acknowledges the request Allows company to maintain user profiles in a central database that all remote servers can share Terminal Access Control Access Control System (TACACS+) Industry standard protocol specification that forwards username and password information to a centralized server (TACACS) Whereas communication between a NAS and a TACACS+ server is encrypted, communication between a client and a NAS is not TACACS+ utilizes TCP port 49. It is a Cisco proprietary enhancement to original TACACS protocol. IP Security (IPSec) (continued) IPSec is a set of protocols developed to support the secure exchange of packets Considered to be a transparent security protocol Transparent to applications, users, and software Provides three areas of protection that correspond to three IPSec protocols: Authentication Confidentiality Key management IP Security (IPSec) (continued) IP Security (IPSec) (continued) Supports two encryption modes: Transport mode encrypts only the data portion (payload) of each packet, yet leaves the header encrypted Tunnel mode encrypts both the header and the data portion IPSec accomplishes transport and tunnel modes by adding new headers to the IP packet The entire original packet is then treated as the data portion of the new packet IP Security (IPSec) (continued) IP Security (IPSec) (continued) Both Authentication Header (AH) and Encapsulating Security Payload (ESP) can be used with Transport or Tunnel mode, creating four possible transport mechanisms: AH in transport mode AH in tunnel mode ESP in transport mode ESP in tunnel mode Virtual Private Networks (VPNs) Takes advantage of using the public Internet as if it were a private network Allow the public Internet to be used privately Prior to VPNs, organizations were forced to lease expensive data connections from private carriers so employees could remotely connect to the organization’s network Virtual Private Networks (VPNs) Two common types of VPNs include: Remote-access VPN or virtual private dialup network (VPDN): user-to-LAN connection used by remote users Site-to-site VPN: multiple sites can connect to other sites over the Internet VPN transmissions achieved through communicating with endpoints An endpoint can be software on a local computer, a dedicated hardware device such as a VPN concentrator, or even a firewall Basic WLAN Security Two areas: Basic WLAN security Enterprise WLAN security Basic WLAN security uses two new wireless tools and one tool from the wired world: Service Set Identifier (SSID) beaconing MAC address filtering Wired Equivalent Privacy (WEP) Service Set Identifier (SSID) Beaconing A service set is a technical term used to describe a WLAN network Three types of service sets: Independent Basic Service Set (IBSS) Basic Service Set (BSS) Extended Service Set (ESS) Each WLAN is given a unique SSID MAC Address Filtering Another way to harden a WLAN is to filter MAC addresses The MAC address of approved wireless devices is entered on the AP A MAC address can be spoofed When wireless device and AP first exchange packets, the MAC address of the wireless device is sent in plaintext, allowing an attacker with a sniffer to see the MAC address of an approved device Wired Equivalent Privacy (WEP) Optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents Uses shared keys―the same key for encryption and decryption must be installed on the AP, as well as each wireless device A serious vulnerability in WEP is that the IV is not properly implemented Every time a packet is encrypted it should be given a unique IV Other Wireless Authentication Protocols Wi-Fi Protected Access WPA WPA2 The TKIP encryption algorithm was developed for WPA to provide improvements to WEP WiFi Alliance branded version of the final 802.11i standard WPA2 support EAP authentication methods using RADIUS servers and preshared key (PSK) based security 802.1X LEAP PEAP TKIP Untrusted Network The basic WLAN security of SSID beaconing, MAC address filtering, and WEP encryption is not secure enough for an organization to use One approach to securing a WLAN is to treat it as an untrusted and unsecure network Requires that the WLAN be placed outside the secure perimeter of the trusted network Untrusted Network (continued) Trusted Network (continued) WPA encryption addresses the weaknesses of WEP by using the Temporal Key Integrity Protocol (TKIP) TKIP mixes keys on a per-packet basis to improve security Although WPA provides enhanced security, the IEEE 80211i solution is even more secure 80211i is expected to be released sometime in 2004 Cryptography Terminology Cryptography: science of transforming information so it is secure while being transmitted or stored Steganography: attempts to hide existence of data Encryption: changing the original text to a secret message using cryptography Cryptography Terminology Decryption: reverse process of encryption Algorithm: process of encrypting and decrypting information based on a mathematical procedure Key: value used by an algorithm to encrypt or decrypt a message Cryptography Terminology Weak key: mathematical key that creates a detectable pattern or structure Plaintext: original unencrypted information (also known as clear text) Cipher: encryption or decryption algorithm tool used to create encrypted or decrypted text Ciphertext: data that has been encrypted by an encryption algorithm Cryptography Terminology (continued) Defining Hashing Hashing, also called a one-way hash, creates a ciphertext from plaintext Cryptographic hashing follows this same basic approach Hash algorithms verify the accuracy of a value without transmitting the value itself and subjecting it to attacks A practical use of a hash algorithm is with automatic teller machine (ATM) cards Defining Hashing (continued) Hashing is typically used in two ways: To determine whether a password a user enters is correct without transmitting the password itself To determine the integrity of a message or contents of a file Hash algorithms are considered very secure if the hash that is produced has the characteristics listed on pages 276 and 277 of the text Message Digest (MD) Message digest 2 (MD2) takes plaintext of any length and creates a hash 128 bits long MD2 divides the message into 128-bit sections If the message is less than 128 bits, data known as padding is added Message digest 4 (MD4) was developed in 1990 for computers that processed 32 bits at a time Takes plaintext and creates a hash of 128 bits The plaintext message itself is padded to a length of 512 bits Message Digest (MD) Message digest 5 (MD5) is a revision of MD4 designed to address its weaknesses The length of a message is padded to 512 bits The hash algorithm then uses four variables of 32 bits each in a round-robin fashion to create a value that is compressed to generate the hash Secure Hash Algorithm (SHA) Patterned after MD4 but creates a hash that is 160 bits in length instead of 128 bits The longer hash makes it more resistant to attacks SHA pads messages less than 512 bits with zeros and an integer that describes the original length of the message Protecting with Symmetric Encryption Algorithms A block cipher manipulates an entire block of plaintext at one time The plaintext message is divided into separate blocks of 8 to 16 bytes and then each block is encrypted independently The blocks can be randomized for additional security Data Encryption Standard (DES) One of the most popular symmetric cryptography algorithms DES is a block cipher and encrypts data in 64-bit blocks The 8-bit parity bit is ignored so the effective key length is only 56 bits DES encrypts 64-bit plaintext by executing the algorithm 16 times The four modes of DES encryption are summarized on pages 282 and 283 Triple Data Encryption Standard (3DES) Uses three rounds of encryption instead of just one The ciphertext of one round becomes the entire input for the second iteration Employs a total of 48 iterations in its encryption (3 iterations times 16 rounds) The most secure versions of 3DES use different keys for each round Advanced Encryption Standard (AES) Approved by the NIST in late 2000 as a replacement for DES Process began with the NIST publishing requirements for a new symmetric algorithm and requesting proposals Requirements stated that the new algorithm had to be fast and function on older computers with 8-bit, 32-bit, and 64-bit processors Advanced Encryption Standard (AES) Performs three steps on every block (128 bits) of plaintext Within step 2, multiple rounds are performed depending upon the key size: 128-bit key performs 9 rounds 192-bit key performs 11 rounds 256-bit key uses 13 rounds Hardening with Asymmetric Encryption Algorithms The primary weakness of symmetric encryption algorithm is keeping the single key secure This weakness, known as key management, poses a number of significant challenges Asymmetric encryption (or public key cryptography) uses two keys instead of one The private key typically is used to encrypt the message The public key decrypts the message Hardening with Asymmetric Encryption Algorithms Rivest Shamir Adleman (RSA) Asymmetric algorithm published in 1977 and patented by MIT in 1983 Most common asymmetric encryption and authentication algorithm Included as part of the Web browsers from Microsoft and Netscape as well as other commercial products Multiplies two large prime numbers Diffie-Hellman Unlike RSA, the Diffie-Hellman algorithm does not encrypt and decrypt text Strength of Diffie-Hellman is that it allows two users to share a secret key securely over a public network Once the key has been shared, both parties can use it to encrypt and decrypt messages using symmetric cryptography Elliptic Curve Cryptography First proposed in the mid-1980s Instead of using prime numbers, uses elliptic curves An elliptic curve is a function drawn on an X-Y axis as a gently curved line By adding the values of two points on the curve, you can arrive at a third point on the curve Understanding How to Use Cryptography Cryptography can provide a major defense against attackers If an e-mail message or data stored on a file server is encrypted, even a successful attempt to steal that information will be of no benefit if the attacker cannot read it Understanding Cryptography Strengths and Vulnerabilities Cryptography is science of “scrambling” data so it cannot be viewed by unauthorized users, making it secure while being transmitted or stored When the recipient receives encrypted text or another user wants to access stored information, it must be decrypted with the cipher and key to produce the original plaintext Symmetric Cryptography Strengths and Weaknesses Identical keys are used to both encrypt and decrypt the message Popular symmetric cipher algorithms include Data Encryption Standard, Triple Data Encryption Standard, Advanced Encryption Standard, Rivest Cipher, International Data Encryption Algorithm, and Blowfish Disadvantages of symmetric encryption relate to the difficulties of managing the private key Asymmetric Cryptography Strengths and Vulnerabilities With asymmetric encryption, two keys are used instead of one The private key encrypts the message The public key decrypts the message Digital Signatures Asymmetric encryption allows you to use either the public or private key to encrypt a message; the receiver uses the other key to decrypt the message A digital signature helps to prove that: The person sending the message with a public key is who they claim to be The message was not altered It cannot be denied the message was sent Digital Certificates Digital documents that associate an individual with its specific public key Data structure containing a public key, details about the key owner, and other optional information that is all digitally signed by a trusted third party Certification Authority (CA) The owner of the public key listed in the digital certificate can be identified to the CA in different ways By their e-mail address By additional information that describes the digital certificate and limits the scope of its use Revoked digital certificates are listed in a Certificate Revocation List (CRL), which can be accessed to check the certificate status of other users Certification Authority (CA) The CA must publish the certificates and CRLs to a directory immediately after a certificate is issued or revoked so users can refer to this directory to see changes Can provide the information in a publicly accessible directory, called a Certificate Repository (CR) Some organizations set up a Registration Authority (RA) to handle some CA, tasks such as processing certificate requests and authenticating users Understanding Public Key Infrastructure (PKI) Weaknesses associated with asymmetric cryptography led to the development of PKI A CA is an important trusted party who can sign and issue certificates for users Some of its tasks can also be performed by a subordinate function, the RA Updated certificates and CRLs are kept in a CR for users to refer to The Need for PKI Description of PKI Manages keys and identity information required for asymmetric cryptography, integrating digital certificates, public key cryptography, and CAs For a typical enterprise: Provides end-user enrollment software Integrates corporate certificate directories Manages, renews, and revokes certificates Provides related network services and security Typically consists of one or more CA servers and digital certificates that automate several tasks PKI Standards and Protocols A number of standards have been proposed for PKI Public Key Cryptography Standards (PKCS) X509 certificate standards Public Key Cryptography Standards (PKCS) Numbered set of standards that have been defined by the RSA Corporation since 1991 Composed of 15 standards detailed on pages 318 and 319 of the text X509 Digital Certificates X509 is an international standard defined by the International Telecommunication Union (ITU) that defines the format for the digital certificate Most widely used certificate format for PKI X509 is used by Secure Socket Layers (SSL)/Transport Layer Security (TLS), IP Security (IPSec), and Secure/Multipurpose Internet Mail Extensions (S/MIME) X509 Digital Certificates Trust Models Refers to the type of relationship that can exist between people or organizations In the direct trust, a personal relationship exists between two individuals Third-party trust refers to a situation in which two individuals trust each other only because each individually trusts a third party The three different PKI trust models are based on direct and third-party trust Hardening Physical Security with Access Controls Adequate physical security is one of the first lines of defense against attacks Protects equipment and the infrastructure itself Has one primary goal: to prevent unauthorized users from reaching equipment to use, steal, or vandalize Hardening Physical Security with Access Controls Configure an operating system to enforce access controls through an access control list (ACL), a table that defines the access rights each subject has to a folder or file ACLs are also configured on network devices to permit or deny packets to the network. Access control also refers to restricting physical access to computers or network devices Controlling Access with Physical Barriers Most servers are rack-mounted servers A rack-mounted server is 175 inches (445 cm) tall and can be stacked with up to 50 other servers in a closely confined area Rack-mounted units are typically connected to a KVM (keyboard, video, mouse) switch, which in turn is connected to a single monitor, mouse, and keyboard Controlling Access with Physical Barriers In addition to securing a device itself, you should also secure the room containing the device Two basic types of door locks require a key: A preset lock (key-in-knob lock) requires only a key for unlocking the door from the outside A deadbolt lock extends a solid metal bar into the door frame for extra security To achieve the most security when using door locks, observe the good practices listed on pages 345 and 346 of the text Controlling Access with Physical Barriers Cipher locks are combination locks that use buttons you push in the proper sequence to open the door Can be programmed to allow only the code of certain people to be valid on specific dates and times Basic models can cost several hundred dollars each while advanced models can run much higher Users must be careful to conceal which buttons they push to avoid someone seeing the combination (shoulder surfing) Limiting Wireless Signal Range Use the following techniques to limit the wireless signal range: Relocate the access point Add directional antenna Reduce power Cover the device Modify the building Reducing the Risk of Fires Systems can be classified as: Water sprinkler systems that spray the room with pressurized water Dry chemical systems that disperse a fine, dry powder over the fire Clean agent systems that do not harm people, documents, or electrical equipment in the room Types of Security Policies Types of Security Policies Acceptable Use Policy (AUP) Defines what actions users of a system may perform while using computing and networking equipment Should have an overview regarding what is covered by this policy Unacceptable use should also be outlined Understanding Identity Management (continued) Four key elements: Single sign-on (SSO) Password synchronization Password resets Access management Understanding Identity Management (continued) SSO allows user to log on one time to a network or system and access multiple applications and systems based on that single password Password synchronization also permits a user to use a single password to log on to multiple servers Instead of keeping a repository of user credentials, password synchronization ensures the password is the same for every application to which a user logs on Understanding Identity Management (continued) Password resets reduce costs associated with password-related help desk calls Identity management systems let users reset their own passwords and unlock their accounts without relying on the help desk Access management software controls who can access the network while managing the content and business that users can perform while online Auditing Privileges You should regularly audit the privileges that have been assigned Without auditing, it is impossible to know if users have been given too many unnecessary privileges and are creating security vulnerabilities Usage Audit Process of reviewing activities a user has performed on the system or network Provides a detailed history of every action, the date and time, the name of the user, and other information Usage Audits (continued) Privilege Audit Reviews privileges that have been assigned to a specific user, group, or role Begins by developing a list of the expected privileges of a user Escalation Audits Reviews of usage audits to determine if privileges have unexpectedly escalated Privilege escalation attack: attacker attempts to escalate her privileges without permission Certain programs on Mac OS X use a special area in memory called an environment variable to determine where to write certain information