Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
文档下载 免费文档下载 http://www.51wendang.com/ 本文档下载自文档下载网,内容可能不完整,您可以点击以下网址继续阅读或下载: http://www.51wendang.com/doc/a88d861180e68ca5a0d13873 CISSP 第四版最新上课培训笔记(详细版) CISSP 考试资料 Domain 1 -Information Systems Security and Risk Management CIA -DAD Confidentiality – Prevent Unauthorized Disclosure Attacked by Hackers, Malware, Human Error, Social Engineering, Shoulder Surfing Prevented by Identification, Authentication, Authorization Integrity – Prevent Unauthorized Modification or Alteration of Data Attacked by Message Modifications, Disabling Alerts on IDS’, Modifying Config Files Prevented by Least Privilege, Separation of Duties, Rotation of Duties Availability – Prevent disruption or Destruction of Service and Productivity Attacked by Disasters, System Failure, DOS, Hardware Failure, Terrorist Attacks Prevented by ISO/IEC – 17799 British recommendations on Security Mgmt in an Organization (How to secure assets) 27XXX is the new numbering convention, starting with 27001, and defines how to implement. 文档下载 免费文档下载 http://www.51wendang.com/ Due Care – take steps (countermeasures) to protect assets like A-V orhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 IDS Due Diligence – Understanding and investigating the current threats and risks, determines Liability and Responsibility Planning Horizon – period of time with which long term goals should be completed. Operational – Day to Day Tactical – Mid-Term goals and Infrastructure to accomplish Strategic Goals Strategic – Long Term Risk Management Program Identify Risks to AssetsManage Risks Analyze and Prioritize – Qualitative and QuantitativeResponse Planning Monitoring and Control – Execute, Evaluate, and Document Cost-Benefit Analysis – Annualized cost of safeguards to protect against threats is compared with the expected cost of potential loss. Security Definitions Vulnerabilities – Weakness Loss – Real or Perceived devaluationThreat – Potential Danger to an asset Risk – Likelihood of threat agent using a vulnerabilityExposure – Being ophttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873en to compromise 文档下载 免费文档下载 http://www.51wendang.com/ Event/Exploit – Instance of the loss being experienced Control/Measure – Safeguard put in place to mitigate potential lossesNational Institute of Standards and Technology – Special Publications NIST SP 800-30 Risk Assessment 1. System Characterization 2. Threat ID 3. Vulnerability ID 4. Control Analysis 5. Likelihood Determination 6. Impact Analysis 7. Risk Determination 1 8. Control Recommendations 9. Results Documentation Commercial Classifications Confidential, Private, Sensitive, Public Military Classifications Top Secret, Secret, Confidential, Sensitive but Unclassified, Unclassified Data Classification Procedure (by the owner) Identify Data Custodian Develop Classification CriteriaControls Per ClassDocument Exceptions 文档下载 免费文档下载 http://www.51wendang.com/ Process for transfer of Custody of DataDeclassification ProceduresSecuhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873rity Awareness Delphi Method – People may express their ideas anonymously Single Loss Expectancy (SLE) Asset Value (AV) x Exposure Factor (EF)= SLE Annualized Loss Expectancy (ALE) SLE x Annualized Rate of Occurrence (ARO) = ALE ARO is 0 -1 as based on 0 = never happen, 1 = Always Happen Total Risk is the level before a countermeasure is put into place Threats Vulnerability Asset Value = Total Risk Residual Risk is the level after a control is in place Total Risk – Control Gap = Residual Risk 4 Ways to Deal with Risk (Risk Management Options) Enable Countermeasures to Reduce the Risk Transfer Risk to an Insurance Company Accept the Risk by living with it Ignore it and Reject the Risk NIST SP 800-30 Control Implementation 1. Prioritize Actions 2. Evaluate Options 3. Cost-Benefit Analysis 4. Select the Controls 5. Assign Responsibility Devehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873lop the 6. Safeguard 7. 文档下载 免费文档下载 http://www.51wendang.com/ Implement the Controls Laws, Regulations, and Best Practices are the drivers for creating a Security Policy. NIST SP 800-12 Types of Policies 1. Program Policies – IT Mission Statement 2. Regulatory – driven by laws and regulations 3. Advisory – You should follow these recommendations in your job 4. Informative – States position on how things are done, don’t negotiate with Terrorists 5. Program - 2 6. Issue-Specific Policies – Email, Privacy, defines Role and Responsibilities 7. System-Specific Policy – Base security objectives for PC’s, more Computer related Supporting Policies Standard – Compulsory rules on hardware and softwareBaseline – Minimum level of security required Procedures – Step-by-Step actions to be taken to complete a taskGuidelines – Recommended actions Data Owner – Member of Senior responsiblehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 Mgmt for the protection and use of certain information. Data Custodian – responsible for the 文档下载 免费文档下载 http://www.51wendang.com/ maintenance and protection of the data. (Usually IT) ISSO – Info Sys Security Officer User – Primarily responsible, CXO Ultimately responsible Auditor -NIST SP 800-50 Knowledge Transfer (Security Awareness) 1. Awareness 2. Training 3. Education Domain 2 – Access Control 3 Control Layers Administrative Controls – Policies and Standards, People Mgmt, Employee Behavior, Security Awareness training, Incident Response TechnicalControls – passwords and authentication, AV Software, IDS, Firewalls, Encryption, Load Balancing Physical Controls – Protecting systems and buildings, locks and alarms, Backup Data Offsite Storage, removing floppy drives Access Control Types Preventative – Policies and Procedures, Guards, Man-Traps, Biometrics Detective – IDS, Audit Logs, Cameras Cohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873rrective -Patch Deterrent – Cameras visable Recovery – Restore Backup Compensation – Random Screening of Candidates Authentication Types Type 1 – Something you know (Password)Type 2 – Something you have (Token)Type 3 – Something you are (Biometrics) 文档下载 免费文档下载 http://www.51wendang.com/ 2 Factor is dominant process 3 Factor has all three – Password, SecureID, FingerprintBiometrics Type 1 -False Rejection Rate (FRR = Negative) Type 2 -False Acceptance Rate (FAR = Positive) Crossover Error Rate – The point at which Type 1 FRR errors, and Type 2 FAR errors are equal, and represents the best way of measuring biometrics effectiveness. Signature Dynamics – the unique physical motion of signing your name. Mutual Authentication (Subjects and Objects) – PKI based, certificates to verify both identities with a standard 3rd party. 3 Password Attacks Dictionary – Program with http://www.51wendang.com/doc/a88d861180e68ca5a0d13873a list of passwords Brute Force – character combinations Countermeasures – Encrypt transport of passwords, rotate passwords, Set Lockout Thresholds Cognitive Passwords use Maiden Names, Pet’s Name, Favorite Color Threshold (clipping level) of acceptable number of failed logins. A digital signature uses a private key by encrypting a hash value. The act of encrypting this hash value with a private key is called digitally signing a message. SSO – 文档下载 免费文档下载 http://www.51wendang.com/ Scripts -process access to a resource to run the commands the user would have to run. Bad – Hard to Maintain, Credentials in Script LDAP Directory – Kerberos – Authentication protocol using Symmetric DES and Tickets Passwords can be used, but designed for Keys. Some require KDC authentication before starting the Authentication process. Kerberos uses Symmetric Encryption, 2 session keys exchanged between TGS, AS, Resource, ahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873nd Client. All Encrypted. SSO -SESAME – Asymmetric, Secure European System for Apps in a Multi-Vendor Environment Extends Kerberos, adding PKI, Role Based Access Controls, delegation, and extensive auditing. 2 Tickets, 1 for authenticating the subject, another containing access rights Uses Privilege Attribute Certificates (PAC) which contains the subjects identity, access period, and lifetime of PAC. Access Control Model TCSEC – Trusted Computer Systems Evaluation Criteria Discretionary Access Control – DAC – Data owner determines access to resources, mostly ACL’s, low level of security. Identity based control. Mandatory Access Control – MAC – Security Clearance, access determined by system, 文档下载 免费文档下载 http://www.51wendang.com/ subject cannot grant someone access, Military. Each object would have a security label, very inflexible. NIST – Role-Based Access Control – RBAC (Non-Discretionary Access Control) – Groups of http://www.51wendang.com/doc/a88d861180e68ca5a0d13873users assigned access rights to the role, not user. The security can be managed at the company’s level, each user may be assigned more than 1 role or privilege. Lattice Based Access Control – Govt systems, strict access, Subject has Secret Access, Upper Bound is Secret, Lower Bound is Unclassified. Compares roles, permissions, and clearance levels to create upper and lower bounds of access Restricted access, sometimes Read-Only Rule Based (MAC) controls can be seen in a Firewall. Restricted Interfaces – Menus and Shells – Limited Commands – Menu Windows Database Views – Rights based information availability Physically Constrained Interfaces – ATM’s and Numbers only Access Control Matrix – Used to create the Access Control Lists for users, and requires removal of ACL’s when employee leaves. Capability Table – row in the matrix, a list of the objects that a subject is able to accesshttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873. Bound to a SUBJECT. Access Control List – is a column in the matrix, defines the rules of access, and is bound to the OBJECT. 4 文档下载 免费文档下载 http://www.51wendang.com/ Content Based Access control defines the access based on the sensitivity of the data Centralized Access Control Systems RADIUS – Remote Access Dial-In User Service -Auth Server and Dynamic Password (Uses UDP to communicate) PPP and SLIP connections and can only authenticate PAP, CHAP, and EAP. TACACS – Terminal Access Controller, Access Control System -Static Password TACACS -Token Authentication, Cisco Proprietary Diameter – Authenticates many different devices over many connections, particularly new mobile access clients. Enables use of IPSec if Network Layer security is required. Decentralized – For Peer networks, regional managers control better Triple AAA Services AuthenticationAuthorizationAccounting Access Attacks Degahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ussing generates a coercive magnetic force that reduces the magnetic density of the storage to zero, meaning it really erases the data through magnetic means. Keyboard Monitoring would either send signals from the wire connected to the Keyboard, software that collects keystrokes etc. Rouge Infrastructure – WAP’s 文档下载 免费文档下载 http://www.51wendang.com/ Emanation Security (EMSEC) -TEMPEST (gov’t program name) controls against electrical signals from being replayed. White noice, and Control Zones (building materials that kill signals). Faraday cage = heavy metal casing protection. (Number ONCE) An arbitrary number that is generated for security purposes such as an initialization vector. A nonce is used only one time in any security session. Although random and pseudo-random numbers theoretically produce unique numbers, there is the possibility that the same number can be generated more than once. However, if a very large, true random used,http://www.51wendang.com/doc/a88d861180e68ca5a0d13873 number the is chances are extremely small. A perfect nonce is the time of day; for example, 12.5 seconds past 5:13pm on 1/18/2012 can only occur once. Domain 3 – Security Architecture and Design Instruction Execution Cycle Fetch – CPU presents address of the instruction to memory Execute – Instruction is decoded and executed CPU States of Operation Supervisor State Kernal Mode Ring Zero Program can access entire system Both privilege and non-privilege instructions Problem State User Mode Ring Three 文档下载 免费文档下载 http://www.51wendang.com/ Only non-privileged instructions are executed Intended for Application use Ring 0 = HardwareRing 1 = KernalRing 2 = Shell 5 Ring 3 = Applications Modern OS’s use Ring 0 for OS kernel data, code, and device drivers. Ring 3 is for applications. Primary Storage is memory directly addressable by the CPU (MEMORY) Secondahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ry Storage is hard disk, tape, thumb drives Volatile Memory = RAM Non-Volatile Memory = ROM/EPROM Cache Storage = Part of RAM, optimizes commands and pre-loads Virtual Storage = Pagefile Sequential Storage = Magnetic Tape, must be read through to find specific data. Memory Mapping – only trusted processes can access RAM directly, everything else requires mapping. Software does not use physical addresses, it uses virtual or logical memory. System Self Protection – Memory Segmentation Process IsolationSecurity DomainsVirtual MachinesProcess (Applications run as Processes) – has its own virtual memory space, can contain many threads of code, each thread has a kernel and user mode stack. Threads are the smallest sets of code 文档下载 免费文档下载 http://www.51wendang.com/ that can be scheduled by the CPU. Process Isolation – Preserves objects integrity and subjects adherence to access controls, prevents the actions of one object imhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873pacting another. Encapsulation of Objects, Time multiplexing, Naming distinctions, and Virtual Mapping Multi-Threading – can process code and tasks with the same program at the same timeMulti-Tasking – 2 or more programs running at a time Multi-Programming – Interleaved execution of 2 or more programsMulti-Processing – more than 1 CPUTrusted Computing Base (TCB) – total combination of protection mechanisms within a computer system. TCB includes hardware, software, and firmware, and not all have to be trusted. The Security Perimeter separates the TCM and non-TCB objects, and ensures that interfaces do not leak information. Reference Monitor controls all access from Subjects to Objects The Security Kernel is made up of components in the system that enforce the rules of the Reference Monitor. Security Kernel must provide isolation for the processes carrying out the refence monitor cohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ncept, and it must be tamperproof. The Reference Monitor must be invoked for every access attempt, and must be small 文档下载 免费文档下载 http://www.51wendang.com/ enough to be able to be tested and verified Single State Machine – All users have full access. (System High mode of Operation) Multi-State Machine – processes data at two or more security levels, without risk to each other. Data can be classified, and doesn’trequire full access to all users. (Multi-level mode of Operation) Security Models State Machine – for each possible initial state, there is an execution sequence for each possible state transformation. No matter what state it is flowing through, it will be secure. Information Flow – Restricts information from flowing in ways that would go against the security policy Bell-LaPadula – outlines how to keep a secure state in every transaction by only allowing subjects’ certain accehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ss rights. Clearance and classification scheme uses a lattice structure with upper and lower access rights. “Any executed activity will always result in a secure state”. B-L is a Confidentiality model, and does not secure integrity or availability. Simple Security Property – if you have Read access, you can read at your level and 文档下载 免费文档下载 http://www.51wendang.com/ below, but not above. Star Property – if you have Write access, you can write at your level, you can write to a higher level without compromise, but cannot write lower. 6 Strong Star Property – if you have Read and Write, you can do both at your level, but you cannot hop levels either way. No Read Up and No Write Down , RU and WD Biba – Integrity Model, no subject can depend on a less trusted object, based on a lattice of integrity levels No Write Up, No Read Down, WU, RD Simple Integrity – says that if you Read access,http://www.51wendang.com/doc/a88d861180e68ca5a0d13873 you can read data at your level of accuracy, and higher levels, but lower levels will reduce accuracy. Integrity Star – if you have Write, you can Write at your level and you can write to a lower level, but not above or you would contaminate it. 文档下载 免费文档下载 http://www.51wendang.com/ Integrity defined by 3 goals Data protected from change by unauthorized users Data protected from unauthorized change by authorized users Data is internally and externally consistent Clark-Wilson – Access Triple – Prevents Auth users from mistakes, Un-Auth from entering Data, and maintain internal and external consistency All 3 goals of Data Integrity through software engineering controls, well-formed transactions constrain user to ensure consistency. Objects are broken into Programs and Data, main features of Separation of Duties, access through programs, and strict auditing. Subjects use programs, and ohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873bjects programs are ensure accessed correctly. Programmatic controls. Constrained Data Item (CDI) – data item whose integrity is to be preserved Integrity Verification Procedure (IVP) – confirms that CDI’s have integrity Transformation Procedure (TP) – transforms a CDI from one integrity state to another. Non-Interference – State Machine approach where actions are controlled based on what users are in what domain. Actions of Group A are not seen by Group B. Access Control Matrix – PROFILE BASED, data on subjects in rows, objects in columns. OS’s use this in ACL’s, and give subject access based on its relationship to the object Brewer and Nash – Chinese Wall, this model protects users from accessing data that could be seen as a conflict of interest (like competitor data). Dynamically changes 文档下载 免费文档下载 http://www.51wendang.com/ with previous access, and what should not be known. TCSEC – Trusted Computer System Evaluation Criteria – Orange Boohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873k, based on Bell-LaPadula model and Confidentiality A: Verified Protection A1 B: Mandatory Protection (Security Labels) B3 – Trusted Recovery, security controls are always active, and monitor and notify security administrator (role defined) B2 – Structured Protection, device labels, separation of operator and admin functionsB1 – Process isolation, design specs are verified, Device Labeling C: Discretionary Protection C2 – Object Reuse, must have protected audit trail, minimum level of host for a FirewallC1 – Separation of Users and Data, cooperative users at same sensitivity D: Minimal Security ITSEC – Information Technology Security Evaluation Criteria – covers C-I-A completely F1-10 for functionality 文档下载 免费文档下载 http://www.51wendang.com/ E0-6 for assurance and is a measurement of correctness and effectiveness Common Criteria – ISO -Combines TCSEC, ITSEC, Canadian CTCPEC, http://www.51wendang.com/doc/a88d861180e68ca5a0d13873and Federal Criteria Protection Profile (PP) – defines security requirements and protections needed Target of Evaluation (TOE) – Product proposed to provide a needed security solution. 7 Security Target (ST) – Vendor writes details of security functions and assurance mechanisms that meet the needed solution. (This is how we deal with security) Certification is the technical evaluation of the security components of a product Accreditation is the formal acceptance of the products overall security by a Designated Approving Authority (DAA). Threats to Systems Covert Channels – Sending info in an unauthorized way Covert Timing Channel – process relays info to another by modulating its use of systems resources Covert Storage Channel – process writes data to a storage location, and another lower process reads it. Back Door – previously called http://www.51wendang.com/doc/a88d861180e68ca5a0d13873Maintenance Hook, or Trap 文档下载 免费文档下载 http://www.51wendang.com/ Door, usually intentional, can be inserted via a Trojan Horse via a Rootkit Asynchronous Attacks – Use time between events in a sequence to gain access TOC/TOU -Time of Check/Time of Use – Attack takes place after the systems check the file, but before it is in use (I.E. autoexec.bat processes line by line commands) Race Conditions – 2 processes race to carry out conflicting actions at the same time, giving access before the system can enable its protections Application based attacks Code Injection – place SQL code into input buffers Buffer Overflow – if application does not check the amount of information being inputted, the data could overwrite other memory segments. Insufficient parameter checking. Domain 4 (8) -Application and Systems Development Application Security 1. Use Devices such as Firewalls, Routers, ACLs, http://www.51wendang.com/doc/a88d861180e68ca5a0d13873IDS, and Bastion Hosts -Feel like it is secure 2. Design and develop software with security in mind Software Development Methods Waterfall 文档下载 免费文档下载 http://www.51wendang.com/ Each phase is documented and completed before the next tasks Not good scalability, longer term, not designed for short turn around Prototyping 4 PhasesConcept Design and Implement initial prototypeRefine until acceptable Complete and release final version Spiral Combo of Waterfall and Prototyping Initial version is Prototype Versioning later is similar to Waterfall Evaluate at each milestone, each phase includes a risk assessment review Clean Room Focus on Defect Prevention rather than removalDesign time longer, less time for testingSavings over long term Extreme Small teams of devs, with changing requirements Systematic and regular testing, non-requested 文档下载 免费文档下载 http://www.51wendang.com/ functionahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873lities not created Verification – does it meet the specifications Validation – does it meet real world requirements 8 Change Control Procedure Request for change with Change Control BoardAnalyze request Record change requestSubmit change for approvalDevelop the change Re-code segments of the product Link these changes in the code to the formal change control requestSubmit software for testing and quality approvalMake version changesReport changes to mgmt Capability Maturity Model (CMM) Level 1 – Initiating – few processes defined Level 2 – Repeatable – basic project management and repeatable developmentLevel 3 – Defined – Procedures defined and standardized Level 4 – Managed – Monitor and control own processes, quantitatively understoodLevel 5 – Optimizing – Continuous process improvement, with quantitative feedback Object Oriehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873nted Programming 文档下载 免费文档下载 http://www.51wendang.com/ Faster, highly modular The data structure of an object includes both data and functions, and can inherit properties of other objects Objects are members of classes that define attributes and characteristics of the objects within them Objects can inherit attributes from the class type Abstraction – ability to suppress unnecessary detail so that properties can be examined and reviewedPolymorphism – different objects respond to the same command, input, or message, in different ways. Polyinstantiation – defer inference, basically, when a lower level security entity requests secure information, wrong information isput in its place to prevent understanding of the real purpose or information. Cohesive Module can perform a single task with little or no help from other modules. (Highly Cohesive, low coupling = good) Coupling is a measure of interconnection among modules inhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 an application. The lower the coupling, the better the software designbecause it promotes modules being independent. Relational DB – tables with columns and rows (attributes and tuples) Components –Data Definition Language (DDL) – defines the schema Data Manipulation Language (DML) – manipulates the data within the DBData Control Language (DCL) – defines the internal organization of the DBAd-Hoc Query Language 文档下载 免费文档下载 http://www.51wendang.com/ (QL) – for users to access the dataHierarchical DB – Logical Tree Structure, branches and leaves for data fields Distributed DB – Stored across systems in different places and are logically connected File – collection of records of the same type, like a table Base Relation – Table stored in the DB View – Virtual relation between subjects and objects Primary Key – field that links all the data within a record to a corresponding value Foreign Key – an attribute of one table thttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873hat is the primary key of another table Data Dictionary – 52 tables, index info, users and permissions Schema – each relationship within the DB is described by the schemaMeta-Data – Data used to describe the DB and the data within it.DBMS – management software for making changes to the DBDB ACID Test – Protects DB Integrity 9 Atomicity – all changes take effect or none do Consistency -transaction is allowed only if it follows integrity constraints. Isolation – results of the transaction are not visible until the transaction is completeDurability – Results of transaction are permanent Online Transaction Processor (OLTP) Everything must be committed before the transaction will complete. 文档下载 免费文档下载 http://www.51wendang.com/ Concurrency – Double Update occurs when 2 programs access the same element at the same time. DEAD LOCK can occur, with both waiting for the other to release resources, causing Deniahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873l of Service, or loss of data integrity Rollback – changes are cancelled Commit – completed transaction executes all changes successfully Checkpoint/Savepoint – periodically saving data Adding to DB Security, you can add a Trusted Front End Aggregation – the combined information has new info that is greater than the individual parts Inference -act of combining information from separate sources to deduce other info Counter -Cell Suppression to hide specific data Partitioning the DB into parts, that makes it more difficult to find info Noise and Perturbation is used hoping to confuse and frustrate an attackerDB Access Control Content-Dependent – Control Access based on content Context-Dependent – Access based on time of day, what application requested etc. Entity Integrity – Primary Key must be a unique value, cannot be null Referential Integrity – Relationship bethttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ween 2 entities requires that they both exist DB Normalization is achieved when redundancies and inconsistencies are removed 文档下载 免费文档下载 http://www.51wendang.com/ Data Warehouse – Mulitple DB’s combined with the purpose of a fuller extent of information retrieval and analysis. Related information is selected and summarized before presented to the user. Needs greater security with so much in one place. Usually for strategic long-term use. Data Mart – smaller and more focused data for a specific group, usually a tactical and immediate business need. Data Mining – process of analyzing a DB using tools that look for trends or anomalies. Creates Meta-Data that can identify patterns and relationship between data sets. Can test for inference vulnerabilities. Used for Intrusion Detection Fraud Detection Auditing Artificial Intelligence Program containing a KB and set of algorithms and rules, used to infer new facts. Data is chttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ollected from human experts and used for problem solving Expert Systems emulates human knowledge and will try to formulate an answer, even without all the necessary information. Inference Engines and “if-then” Rule-based programs are used by Expert Systems to resolve problems with human logic 文档下载 免费文档下载 http://www.51wendang.com/ Will use the Rule-Based program to find patterns, then uses human logic to determine answers, often referred to as Fuzzy Logic (like a spell-check application) Artificial Neural Networks 10 Ability to remember and learn from new experiences Ability to generalize They try to replicate the functions of neurons to solve problems in a new way Limited by the experiences they can have Distributed Computing Environment (DCE uses Universal Unique Identifiers UUID’s) Object Management Architecture (OMA) provides a high-level overview of a complete distributhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ed environment. Data processingtakes places on different systems. ORB -Object Request Broker manages all communication between components, and allows them to interact. ORB worksindependently from the Objects, allowing greater interoperability. ORB’s are locators and middleware in the environment.Distributed Communication Standards, COM, DCOM, and Enterprise Java Beans CORBA – Common Object Request Broker Architecture is a standard developed by the Object Management Group (OMG)allowing different Apps written in different languages Standard APIs for systems to use to communicate to different ORBsCOM – Architecture allows for simple inter-process communication between objects, only on a single system. DCOM – Distributed, works as middleware for distributed processing. Has a library 文档下载 免费文档下载 http://www.51wendang.com/ that handles sessions, synchronization, buffering, fault ID, handling, and data format translation. Linking throhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ugh COM – Object Linking and Embedding (OLE) – allows objects to be embedded in documents. It uses Globally Unique Identifiers (GUIDs) to keep track of different objects. Mobile Code and Active Content Java Applets, Javascript, ActiveX controls, macros, and email attachments ActiveX is an extension of Object Linking and Embedding, Relies on Digital Certs and Trusting Cert Authorities using Authenticode. User decides trust level based on where it is from. Java creates the virtual Sandbox to operate in, and locks out functions in the user’s computer. Java Bytecode usually used for Internal Apps and has full machine control Java VM runs a virtual machine and talks to the OS Detecting Malicious Code File size increase Many disk accesses Updated or modified timestamps Decrease in disk space Calculations of checksums on system files Strange App activity ://www.51wendang.com/doc/a88d861180e68ca5a0d13873rWorms – reproduce on their own without file replication to migrate Logic Bomb will trigger code execution after 文档下载 免费文档下载 http://www.51wendang.com/ period of time or an action Trojan Horse is disguised as another program and contains hidden code to create zombie’s and other access Smurf – ICMP ECHO broadcast sent to network with a spoofed address, all systems respond. (DOS) Fraggle – uses UDP instead of ICMP Teardrop Attack sends runt packets through different networks, and reconnects packets in a way that they cannot be re-assembled and systems will lockup (DOS) DDOS – Distributed Denial of Service using Masters and Zombies, and Handler systems. Also known as Tribal, trin00, and TFN. Counters – Drop all ICMP from Internet, Drop broadcasts Ingress Filtering doesn’t allow Internal Source addresses from outside Egress Filtering doesn’t allow packets to leave with External Source Addresses Timing Ahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ttacks Kick legitimate user off a line and take over session NAK/ACK -remove FIN command and continue session Domain 5 – Cryptography Cryptography Goals 11 Confidentiality – Unauthorized parties cannot accessAuthenticity – Validation of 文档下载 免费文档下载 http://www.51wendang.com/ the sourceIntegrity – not modified Non-Repudiation – sender cannot deny sending the message Cryptography Definitions Cryptography – science of hiding meanings in communication Cryptanalysis – studying and breaking the secrecy of encryption algorithms Cryptosystem – mechanism that carries out the encryption process Work Factor – amount of time and resources put forth to decode an encrypted message Block Cipher – Breaks the plaintext into blocks and encrypts each with the same algorithm Cipher – Cryptographic transformation operates on the characters or bites Ciphertext or Cryptogram – unintelligible message Clustehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ring – plaintext message generates identical ciphertext using the same algorithm but different keys Codes – A cryptographic transformation that operates at the word or phrase level Cryptographic Algorithm – Step-by-step procedure used to encipher plaintext and decipher ciphertext Cryptology – encompasses cryptography and cryptanalysis Cryptosystem – set of transformations from message space to ciphertext space Decipher -to undo cipherment process Encipher – to make a message unintelligible to all except the recipient End-to-end encryption – Encrypted information that is sent from sender to receiver History of Cryptography Symmetric Ciphers 文档下载 免费文档下载 http://www.51wendang.com/ Hieroglyphics 2000 B.C. and first known. Use of non-standard hieroglyphs Hebrews flipped the alphabet, and call this method ATBASH Scytale Was used by the Spartans in 400 B.C. – wrap message around wooden dowehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873l Diameter and length are the keys to the cipher. Caesar cipher Monoalphabetic substitution – only used one alphabetSpecifically -Involved shifting the alphabet three lettersKnown as C3 (Caesar shift 3 places)Vigenere Cipher A polyalphbetic substitution using 2 or more cipher alphabets Keyword text added to create a different letter CISSP with Keyword of Intense C I= K,I N= V Exclusive Or Boolean OperationIndicated by XOR Indicated by symbol ? Easily implemented in hardware0 0=0, 0 1=1, 1 1=0, 1 1=0 文档下载 免费文档下载 http://www.51wendang.com/ Input A Input B Output T 0 0 0 0 1 1 1 0 1 12 1 1 0 XOR operated on the bit level XOR the plain text (byte level) with the keystream sourceCan be reversed by simple XOR of output plus keystream. Vernam Cipher -One time pad, random set of non-repeating characters from a Book or Running Key Cipher Using text from a bhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ook as the key and performing modulo26 addition on it. Would use specific line and page number Running Key Cipher – Book Number, page number, line number, word number Concealment Cipher – Every x number of letters is the message Steganography – hide a text message in another format like images Key Components Keys are Just a string of bits, values at 2^n power Encryption and Decryption Bit-wise operations 文档下载 免费文档下载 http://www.51wendang.com/ XOR, shift left/right, substitutions/permutations Modern arithmetic values Add, divide, etc. Algorithm is the set of mathematical rules that determine how enciphering and deciphering text. Keyspace is the range of values that can be used to construct a new key, the longer the key space, the hardware to find.Pseudo-Randomized Generation of bits (PRG) Encryption Attacks Brute Force – the hardest and longest, but will alwhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ays find a way Frequency Analysis – common pattern of message, sentences and words are used to help break the code. “Hi, the, and, thanks” Cipher Types Tranposition – permutation is used, meaning letter and bits are scrambled Symmetric Block – message is divided into (64 bit) blocks, and put through an “S” box function (substitution box) S-Boxes each do something different to the data, bits are substituted and transposed. 文档下载 免费文档下载 http://www.51wendang.com/ Operate on fixed size of blocks Usually implemented in software Some block algorithms emulate a stream cipher DES is the best known Block Cipher and uses 16 rounds of mathematical calculations to maximize randomness by applying the aligorithm. Has a key length of 56 bit parity bits that are added at a rate of 7 bits of data, 8 1 parity bit. Symmetric Stream – treats message as a stream of bits and performs functions on indihttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873vidual bits or bytes. Uses RC4 DES – Data Encryption Standard -Derived in 1972 as derivation of Lucifer algorithm developed by Horst Fiestel at IBM Patented in 1974 -Block Cipher Cryptographic System Commercial and non-classified systems DES describes the Data Encryption Algorithm DEA Federal Information Processing Standard FIPS adopted DES in 1977 Re-certified in 1993 by National Institute of Standards and Technology but will be replaced by AES Advanced Encryption Standard by Rijndael. DES uses 64 bit block size and 56 bit key, begins with 64 bit key and strips 8 parity bits DEA is 16 round cryptosystem designed for implementation in hardware 13 文档下载 免费文档下载 http://www.51wendang.com/ 56 bit key = 256 or 70 quadrillion possible keys 8 Substitution-Boxes Triple DES – three encryptions using DEA are now being used until AES is adopted DES uses confusion and diffusion as suggested by Clhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873aude Shannon Confusion conceals statistical connection Accomplished through s-boxes Diffusion spread the influence of plaintext character over many ciphertext characters Accomplished through p-boxes DES Operates in four modes Block Modes Electronic Code Book (ECB) Native encryption mode Same ciphertext from same plaintext always, provides the recipe of substitutions and permutations that will be performed Data within a file does not have to be encrypted in a certain order. 文档下载 免费文档下载 http://www.51wendang.com/ Used for small amounts of data, like challenge-response, key management tasks. Also used to encrypt PINs in ATM machines. Cipher Block Chaining (CBC) – Will propagate errors if caused at the beginning due to the reuse of materials for new randomness Each block of text, the key, and the value based on the previous block is processed http://www.51wendang.com/doc/a88d861180e68ca5a0d13873in the algorithm and applied to the next block of text. Streamed Block Modes Cipher Feedback (CFB) – Will propagate errors if caused at the beginning due to the reuse of materials for new randomness The previously generated ciphertext from the last encrypted block of data is inputted into the algorithm to generate random values. These random values are processed with the current block of plaintext to create ciphertext. This mode is used when encrypting individual characters is required. Output Feedback (OFB) Functioning like a stream cipher by generating a stream of random binary bits to be 文档下载 免费文档下载 http://www.51wendang.com/ combined with the plaintext to create ciphertext. The ciphertext is fed back to the algorithm to form a portion of the next input to encrypt the next stream of bits. Triple DES Double encryption is subject to man in the middle attachttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873k Can be done several different ways: DES – EDE3 (encrypt key 1, decrypt with key 2, encrypt key 1) DES – EEE2 (encrypt key 1, encrypt output with key 2, encrypt output with key 1 again) DES – EEE3 (encrypt with key 1, encrypt output with key 2, encrypt output with key 3) -most secure Advanced Encryption Standard (AES) Block Cipher that will replace DES Anticipated that Triple DES will remain approved for Government Use AES announced by NIST in January 1997 to find replacement for DES IDEA Cipher -International Data Encryption Algorithm 64 bit block, 8 rounds, and 128 bit keysUsed in PGP 文档下载 免费文档下载 http://www.51wendang.com/ 14 Much more difficult than DES RC4 – Only Symmetric Stream Cipher most commonly used, and on test. Public Key Cryptography/Asymmetric Employee private and public key Public made available to anyone wanting to encrypt a message Private key is uhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873sed to decrypt Public Key cannot decrypt the message it encrypted Ideally private key cannot be derived from the public key The other can decrypt a message encrypted by one of the keys Private key is kept private Possible through the application of one-way functions. Easy to compute in one direction but difficult to compute the other way In order to be useful should have a trap door, a secret mechanism that enables you to accomplish the reverse function in a one way function 1,000 to 10,000 times slower than secret key encryption Hybrids use public key to 文档下载 免费文档下载 http://www.51wendang.com/ encrypt the symmetric key Diffie-Hellman First asymmetric algorithm No data encryption or digital signatures Lack of autnetication, but can be countered with digital signaturesExchange secret keys over insecure medium without exposing keysWithout additional session keyKey Exchhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ange Session Keys – Hybrid with Private Key Symmetric Secret Symmetric Key used to encrypt messagesOnly good for 1 sessionRSA Rivest, Shamir and Addleman, often used in SSL Mathematical function that is easier to compute in one direction than the other (broken glass example) Trapdoor is a secret mechanism that enables the decryptor to reverse the function with a small piece of information provided. Based on difficulty of factoring a number which is the product of two large prime numbers, may be 200 digits each. Can be used for Encryption, key exchange, and digital signatures El Gamal Extended Diffie-Hellman randomization errors to include signatures and encryptionSlow and has 文档下载 免费文档下载 http://www.51wendang.com/ Elliptic Curve Cryptography Elliptic curve discrete logarithm are hard to compute than general discrete logarithm, uses points on an Ellipse. Smaller key size same level of security http://www.51wendang.com/doc/a88d861180e68ca5a0d13873Elliptic curve key of 160 bits = RSA of 1024 bits Suited to smart cards and wireless devices (less memory and processing and very efficient). Used in devices with limited processing power. Logical maximum number of users is up to 1,000, used in smaller networks.Digital signatures, encryption and key management Knapsack -Merkle-Hellman Early Asymmetric algorithm, broken quickly in 1970’s 15 Having set of items with fixed weights Determining which items can be added in order to obtain a given total weight Illustrated using Super increasing weights (all weights greater than sum of previous) Asymmetric Key 512 bits 1792 bits 2304 bits MD5 文档下载 免费文档下载 http://www.51wendang.com/ Symmetric Key 64 bits 112 bits 128 bits Developed by Ronald Rivest in 1991 Produces 128 bit message digest RFC 1321 (All MD algorithms create a 128-bit message digest value)://www.51wendang.com/doc/a88d861180e68ca5a0d13873 Message Authentication Code (MAC same as HMAC – “HashedMAC”) Message Digest combines the hash function with a shared secret keyWeakest form of authentication MAC can be based on DES-CBC mode Symmetric key is required to compute MACDoes not provide Non-Repudiation Purpose of Digital Signatures -To detect unauthorized modifications and to authenticate identity and non-repudiation. Generates block of data smaller than the original data One way hash functions One way hash produces fixed size output (message digest) No two messages will have same digest Since it is one way, there is no getting original file from hash, comparable to a CRC check Message digest should be calculated using all of original files data After message digest is calculated it is encrypted with sender’s private key 文档下载 免费文档下载 http://www.51wendang.com/ Receiver decrypts using senders public key, if it opens then it is http://www.51wendang.com/doc/a88d861180e68ca5a0d13873from the sender. Then receiver computes message digest of sent file, if hash is the same it has not been modified Digital Signature Standard (DSS) Provides Integrity, Authentication, and Non-Repudiation Message can be encrypted, providing ConfidentialityMessage can be hashed, for Integrity Message can be digitally signed, for Authentication, Integrity, and Non-RepudiationMessage can be encrypted and digitally signed, for ALL. SHA is used for the message digest then processed by DSA to verify the signature (Authentication and Non-Repudiation). Message digest is used instead of the longer message because faster. Private Key is used for signing, public key for signature verification Enables use of RSA digital signature algorithm or DSA –Digital Signature Algorithm (based on El Gamal) or can use RSA, or ECDSA for the digital signature SHA-1http://www.51wendang.com/doc/a88d861180e68ca5a0d13873 -Secure Hash Algorithm produces 160 bit digest if message is less than 2^64 bits. (NIST) (Revision of SHA) 文档下载 免费文档下载 http://www.51wendang.com/ It is computationally infeasible to find message from message digest It is computationally infeasible to find two different messages with same message digestPadding bits are added to message to make it a multiple of 512 Message -> SHA Algorithm -> 160-bit Hash -> DSA Algorithm -> Digitally Signed Message SHA-2 = 256, SHA-3 = 384, SHA-4 = 448Birthday Attack You in a room with better than 50/50 chance of another person having your birthday? Need 253 people You in a room with better than 50/50 chance of two people having the same birthday? Need 23 people 16 Key Management – Need an automated way of distributing keys Key control Key storage Key retirement/destruction Key Change Key Generation Key theft Frequency of key use Limit lifethttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ime, and don’t have multiple backups of keys which weakens its ability to prevent compromise Split functions with different Keys Keep Keys apart from each other Key Recovery Copy of private/public key pair encrypted with public keySecurely kept and decrypted when needed 文档下载 免费文档下载 http://www.51wendang.com/ Private Key broken down into pieces, and split between different people Public Key Infrastructure -(PKI) -Integration of digital signatures and certificates. Digital Certificates and signatures are based on X.509 Version 3 Standard Include Cert Version, Serial Number, Signature Algorithm, Issuer, Validity, Public Key Version, CRL Distribution Points Certificate Authorities (CA) Issues Digital Certs, keeps Public Keys in Directory, and signs them with its Private Key, and includes the Digital Cert of the CA Public CA’s operate on the Internet Private CA’s are andhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 internal based on internal Directory Services Registrations Authorities (RA)– Takes load off CA to handle registration, accepts and authorizes requests for certification revocation Policies and procedures 文档下载 免费文档下载 http://www.51wendang.com/ Certificate Revocation and CRL (lists) – All the public keys that are no longer valid Non-repudiation support Timestamping Lightweight Directory Access Protocol Security Enabled Applications Cross Certification Public Key Certification Systems A source could post a public key under the name of another individual Digital certificates counter this attack, a certificate can bind individuals to their keyA Certificate Authority (CA) acts as a notary to bind the key to the personCA must be cross-certified by another CAReceiving and confirming a Cert 1. Sender signs message digest (MD) and sends cert containing the Public Key 2. Receiver runs cert through hash algorithm 3. Rechttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873eiver decrypts has in cert to confirm Trusted CA signed it 4. Receiver compares results to confirm no modification 5. Public Key extracted 6. Receiver runs message through hashing algorithm to calculate a new hash 7. Receiver decrypts original hash (in digital signature format) with Public Key in Cert. 8. Receiver compares MD’s to confirm Integrity is not compromised PKI Authentication Steps 17 1. 2. 3. 4. Sender asks Directory for Receiver’s Public Key 文档下载 免费文档下载 http://www.51wendang.com/ Sender generates Session key, encrypts it with Receiver’s Public Key Receiver requests and validates Sender’s Public Key from the Directory They have exchanged, and verified their Public Keys Encryption Layers Link Encryption – Payload, headers, and trailers are encrypted. Usually provided as a service, each hop has to decrypt,making each hop vulnerable. End-To-End Encryption – Headers, addresses, trahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873iler routing, info are and not encrypted. Payload only encrypted. (IPSECTunnel Mode)E-mail Security Non-repudiation Confidentiality of messagesAuthentication of SourceVerification of delivery Labeling of sensitive materialControl Access Privacy Enhanced Mail (PEM) Compliant with Public Key Cryptography Standards (PKCS)Developed by consortium of Microsoft, Sun, and NovellTriple DES-EDE – Symmetric EncryptionMD2 and MD5 Message Digest RSA Public Key – signatures and key distributionX.509 Certificates and formal CA Message Security Protocol (MSP) Developed by NSA to provide Secure email exchangeMilitary’s PEM they based on another frameworkPretty Good Privacy -PGP 文档下载 免费文档下载 http://www.51wendang.com/ Free email security by Phil ZimmermanSymmetric Cipher using IDEA RSA is used for signatures and key distributionNo CA, uses “web of trust”Users can certify each otherKeys are kept in a key-ring file Shttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ecure Multipurpose Internet Mail Extensions (S/MIME) Adds secure services to messages in MIME formatProvides authentication through digital signaturesFollows Public Key Cryptography Standards (PKCS)Uses X.509 Signatures Application Layer Protocol, standard used for attachmentsIntegrity, Confidentiality, and AuthenticationSteps Include Sender Calculates hash on message Encrypts message with Session KeyEncrypts hash with Private Key Encrypts Session Key with receiver’s Public Key Receiver Decrypts Session Key with Private Key 18 文档下载 免费文档下载 http://www.51wendang.com/ Decrypts hash value with sender’s Public KeyDecrypts Message Calculates hash value and compare for validity Secure Hypertext Transport Protocol (S-HTTP) Protects each message, not the communication channel Hypertext Transport Protocol plus SSL (HTTPS) – Protects entire communication chanhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873nel Secure Sockets Layer (SSL) Originally developed by Netscape Uses PKI Server Authenticates to Client with Certificate, which can be checked by the Client to see if signing CA is on the trusted list, optionally the Client can authenticate to Server Client computes hash of cert, and compares MD of cert by decrypting using the CA’s Public Key Creates a Session Key (Symmetric) Client Encrypts Session Key with Server’s Public Key and returns it Server Decrypts with Private Key Works at the Transport Layer SSL and Transport Layer Security (TLS) 1. Client Initiates 2. Server responds with Cert 文档下载 免费文档下载 http://www.51wendang.com/ 3. Client verifies, and may send its own cert 4. Client sends the server a random Master Key encrypted with the Server’s Public Key 5. Client and Server use the sharerd Master Key to create a session key to encrypt/decrypt the data over the secure chahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873nnel. Domain Name Service Security (DNSSEC) DNS Server distributes Keys Secure Distributed Name Services Secure Shell (SSH) Tunnels terminal access functions between 2 computers. (Telnet, RMON)Client to Server AuthenticationComprised of Transport Layer ProtocolUser Authentication ProtocolConnection Protocol SET – Secure Electronic Transaction Visa and Mastercard developed in 1997 to replace SSLEncrypts the payment information and cardholder’s dataDES – Symmetric Encryption RSA Public Key – signatures and key distributionComponents Merchant, Acquirer (Financial Institution), Payment Gateway (Can be acquirer) IPSec 文档下载 免费文档下载 http://www.51wendang.com/ Provides encryption, access control, and non-repudiation over IP.Two Main Protocols are Authentication Header (AH) – integrity, authentication and non-repudiation (MAC) Computes an Integrity Check Value (ICV) – over thhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873e entire IP packet except the header. MD5 and SHA-1 used with Symmetric Keys Encapsulating Security Payload (ESP) – adds encryption and therefore confidentiality to the AH baseline 19 Encryption Algorithms include DES, 3DES, RC5, IDEA, CAST, Blowfish Security Association is required between two parties – one way connection -Comprised of Security Parameter Index – (SPI) – 32 bit identifier Bi-directional communication requires two Security Associations In VPN implementation IPSec can operate in transport or tunnel mode Tunnel mode – data and original IP header encrypted, new header is added Transport mode – data encrypted, header not New header has address of VPN gateway MD5 and SHA are used for integrity Security Associations (SA) defines parameters for one active connection Security Parameter Index (SPI) points to the correct SA 文档下载 免费文档下载 http://www.51wendang.com/ SPI holds SA inhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873formation and it is put into the header so that both sides know what parameters to use for communication IKE – Internet Key Exchange is the default used for key management with IPSEC IKE is set of three protocols: Oakley – modes of operation needed to establish secure connection, negotiates key information using Diffie-Hellman algorithm Internet Security and Key Management Protocol (ISAKMP) –phases for establishing relationship, which algorithms Secure Key Exchange Mechanism – (SKEME) – secure exchange mechanism Cryptographic Attacks Brute Force Attack -try every possible combination Known Plain Text – attacker has copy of plain text and the associated ciphertext of several messages Chosen Plain Text – chosen plain text is encrypted. The attacker has the plaintext and ciphertext and can choose the plaintext that gets encrypted. Adaptivehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 Chosen Plain Text – selection of plain text is altered based on previous results 文档下载 免费文档下载 http://www.51wendang.com/ Ciphertext Only – only ciphertext is known. The attacker has the ciphertext of several messages. Each of the messages has been encrypted using the same encryption algorithm. Chosen Ciphertext – Portions of the cipher text are selected for trial decryption while having access to plain text. The attacker can choose the ciphertext to be decrypted and has access to the resulting decrypted plaintext. Adaptive Chosen Ciphertext -Chosen cipher text are selected for trial decryption where selection is based on previous results Replay Attack – Attacker obtains a set of credentials and sends them to an authentication service. (Counter -Timestamps and Sequence Numbers) Birthday Attack – the probability of two different messages having same message digest or finding two different messages that have the same message digeshttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873t Meet in the Middle – For attacking double encryption from each end and comparing in the middle Man in the Middle – intercepting messages and forwarding on modified versions Differential Cryptanalysis – Private key cryptography looking at text pairs after encryption looking for differences Linear Cryptanalysis – using plain text and cipher text to generate a linear approximation of a portion of the key Differential Linear Cryptanalysis – using both linear and differential approaches Factoring – using mathematics to determine the prime factors of large numbers Statistical – exploiting the lack of randomness in key generation AES – 128bit key WEP uses RC4 X-Or X.509 X.500 X.400 X.25 文档下载 免费文档下载 http://www.51wendang.com/ Digital Certificates Directory Access Protocol Electronic Messaging Frame Relay Communications Protocol 20 Domain 6 (8) – Business Continuity and Disaster Recovery Planning Making the http://www.51wendang.com/doc/a88d861180e68ca5a0d13873plans for recovery and putting them into action to recover with as little impact on the business as possible. Business Continuity ensures the business can continue in an emergency and Disaster Recovery address the procedures to be followed to recover as quickly as possible during and after the loss. Business Continuity Planning Process includes: Scope and Plan Initiation Business Impact Analysis (BIA) Business Continuity Plan developmentDisaster Recovery Planning Process includes: DRP planning processTesting the DRP Disaster Recovery Procedures Roles and Responsibilities BCP is enterprise wide, requires involvement from many personnel enterprise wide 文档下载 免费文档下载 http://www.51wendang.com/ Senior Management’s Role Has ultimate responsibility for all phases of the planSenior Management support is criticalSet the business continuity functionsAllocate planPrioritize critical resources personnhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873elApprove business and the BCPReview test results Ensure Maintenance of the current planDrive all phases of the planManage the Budget BCP Committee – Responsible to create, implement and test the plan Execute the BIA Coordinate with department representatives Made up of Senior Management Business Units Information Systems Security Administrator Liability Executives can be held liable to ensure that BCP AND DRP are developed and put into place, subject to civil lawsuit 65% of companies would go out of business if closed for one week Securities and Exchange Act of 1934 – All public companies are required to keep records and safeguard systems. $10,000 fine and 5 years in prison for failure. Seven Step Process (NIST SP 800-34) – Major Elements of BCP include 文档下载 免费文档下载 http://www.51wendang.com/ Scope Plan Initiation BIA – Quantitative and Qualitative impact information BCP Development Conthttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ingency Plan Structure -3 Phases Following a Disruption Notification and Activation of recovery personnel Recovery – Operations of personnel to restore IT operations Reconstitution – outline of actions to get back to normal Quantitative Loss Criteria Incurring financial loss from loss of revenue or capital expenditure 21 Unemployment compensation Additional operational expenses incurred due to disruptive event Training of new employees Incurring financial loss from resolution of violated contract Failing to meet contractual obligations, delivery of product etc. Incurring financial loss from regulatory compliance Qualitative Loss Criteria Loss of competitive edge 文档下载 免费文档下载 http://www.51wendang.com/ Patented process destroyed Loss of public confidence Increased advertising to re-build customer base Incurring public embarrassmentBhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873usiness Impact Analysis -Four Steps Gathering assessment materialPerform the assessment Analyze the compiled informationDocument the results Disaster Recovery Planning Comprehensive statement of actions to be taken before, during, and after, a disruptive event causes loss of Information Systems. Primary objective is to provide an alternate site and return to primary site in a minimal time frame Goals and Objectives of DRP (DRP assumes BIA has been done, now focusing on the steps needed to protect the business.) Provide an organized way to make decisions if a disruptive event occurs Reduce confusion and enhance the ability to deal with crisis Planning and development must occur before the disaster 文档下载 免费文档下载 http://www.51wendang.com/ Objectives: Protect the company from major computer services failureMinimize the risk from delays in providing services Guarantee reliability of standbhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873y systems through testing Minimize decision making required by personnel during a disasterShould Include: People, Facilities, Utilities, Hardware, Vendor assistance, Software, Supplies, Recovery and Emergency Procedures, Critical Documentation/Backups Roles for each accomplishment should be assigned. Alternate Facilities and Restoration Subscription Service Third party commercial services provide alternate backup and processing facilitiesMost common of the implementations.Three Basic Forms: Hot Site Fully configured facility with electrical power, Heating Ventilation and Air Conditioning (HVAC) File and print servers and workstations Applications are installed on the servers Workstations are kept up to date 文档下载 免费文档下载 http://www.51wendang.com/ Allows walk in with a data restoration and begin full operations in short time Remote journaling – mirroring transaction processing over highttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873h-speed connections may eliminate back up time. Advantages: 22 24/7 availability Exclusivity of use Immediately available Supports short and long term outages Disadvantages: Most expensive Requires constant maintenance of hardware, software, data and applications Adds administrative overhead and can be a strain on resources Service provider may oversell processing capabilities Security of hot site, primary site security must be duplicated Warm Site Cross between hot and cold sites 文档下载 免费文档下载 http://www.51wendang.com/ Facility with electrical power, Heating Ventilation and Air Conditioning (HVAC) File and print servers may not have workstations, software may not be installed External communications should be installed Advantages: Cost – much less than hot Location – since less control required sites can be more flexible Resourceshttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 – resource drain is much lower than hot site Disadvantages: Difference in time required to be up and running Cold Site Least ready of all three, but most common Facility with electrical power, Heating Ventilation and Air Conditioning (HVAC) Ready for equipment but no computer hardware on site. Communications links may or may not be ready Not considered adequate because of length of time for recovery Advantages: Cost 文档下载 免费文档下载 http://www.51wendang.com/ Disadvantages: False sense of security Multiple Centers Processing spread over multiple centers, creating distributed redundancy. Can be in-house or through reciprocalagreement. Cost is contained, but same issues as Mutual Aid Agreements (reciprocal agreement) Service Bureaus Contract with service bureau to provide all alternate backup processing.Advantage – quick response Disadvhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873antage – cost, resource contention during disaster In-house or external supply of hardware replacements Vendors resupply hardware or internal stockpiling of critical components.Subscription service with vendor for overnight shippingMay be OK for Warm site but not Hot site Transaction Redundancy Implementations -Fault tolerance and redundancy in Transaction processing Electronic Vaulting – transfer of backup date to off-site location. Batch process 文档下载 免费文档下载 http://www.51wendang.com/ through communication lines Remote Journaling – parallel processing of transactions at remote site. Live data is posted as it occurs Database Shadowing – live processing of remote journaling but creates more redundancy by duplicating the database sets The Five Disaster Recovery Plan Types (Types of Drills) Checklist -Preliminary step to real test, distribute plan for review by business unit managers Structured walk throhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ugh -Business Unit Managers walk through the test plan. Each step is walked through and marked as performed. 23 Simulation -All personnel with DR responsibilities will meet and go through a practice session, and enact recovery procedures but no alternate processing Parallel -Full test of recovery plan using all personnel. Primary processing does not stop. Ensures processing will run at alternate site. Most common type of recovery plan testing. Full-Interruption -Disaster is replicated to the point of ceasing normal operations. Plan is implemented as if it were a 文档下载 免费文档下载 http://www.51wendang.com/ disaster. Can cause its own disaster, but it is the best way to test completely Domain 7 -Telecommunications and Network Security OSI – Open Systems Interconnect Model Security: Confidentiality, Responsible for all application-to-authentication, data integrity, non-application communicathttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ions. User repudiation information maintained at this layer is user data. Layer 7 Application Technology: Gateways, Browser, File Transfers Protocols: FTP, SMB, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SNMP, NDS, AFP, SAP, NCP, SET Security: Confidentiality, Responsible for the formatting of the Authentication, Encryption data so that it is suitable for presentation. Responsible for character Technology: Gateway, File Encryption conversion (ASCII/EBCDIC), and compression, Formatting and Encryption/Decryption, Compression, and Virtual Terminal Emulation. User Layer 6 Presentation 文档下载 免费文档下载 http://www.51wendang.com/ Encoding information maintained at this layer is Protocols: ASCII, EBCDIC, POSTSCRIPT, called messages. JPEG, MPEG, GIF File Transfers, Email, Gateways, Browser Security: None Responsible for the setup of the links, http://www.51wendang.com/doc/a88d861180e68ca5a0d13873the maintaining link, and the of link tear-Technology: Gateways, Duplexing, down between applications. Layer 5 Session recovery services Protocols: Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP, NFS Security: Confidentiality, Responsible for the guaranteed delivery authentication, integrity of user information. It is also responsible for error detection, correction, and flow Layer 4 Transport 文档下载 免费文档下载 http://www.51wendang.com/ Technology: Gateways, Packet control. User information at this layer is Sequencing, Ports used to called datagrams. communicate with higher levels, Protocols that “carry” the data to the destination 24 Segmenting and reassembling data Protocols: TCP, UDP, SSL, SSH-2, SPX, NetBios, ATP Security: Confidentiality authentication, data integrity Technology: Virtual circuits (ATM), Routers and Routing process, Fragmentation of dissimhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ilar frame types. Protocols: IP, IPX, ICMP, OSPF, IGRP, EIGRP, RIP, BOOTP, DHCP, ISIS, ZIP, DDP, X.25 Layer 3 Network Responsible for the routing of user data from one node to another through the network including the path selection. Logical addresses are used at this layer. User information maintained at this layer is called packets. Security: Confidentiality, Technology: Bridges, Switches Layer 2 文档下载 免费文档下载 http://www.51wendang.com/ Data Link Protocols: L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI Responsible for the physical addressing of the network via MAC addresses. There are two sublevels to the Data-Link layer. MAC and LLC. The Data-Link layer has error detection, frame ordering, and flow control. User information maintained at this layer is called frhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ames. Security: Confidentiality Technology: ISDN, Hubs, Repeaters, Cables Layer 1 Physical Protocols: 10BaseT, 100BaseT, 1000BaseT, 10Base2, 10Base5, OC-3, OC-12, DS1, DS3, E1, E3, ATM, BRI, PRI, X.23 Responsible for the physical transmission of the binary digits through the physical medium. This layer includes 文档下载 免费文档下载 http://www.51wendang.com/ things such as the physical cables, interfaces, and data rate specifications. User information maintained at this layer is called bits (the 1s and 0s). Data encapsulation is the process in which information from one packet is wrapped around or attached to the data of another packet. In the OSI model, each layer encapsulates the layer immediately above it. OSI Security -6 Security Services -A security service is a collection of security mechanisms, files, and procedures that help protect the network. Authentication Accesshttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 control Data confidentiality Data integrity Non-repudiation Logging and monitoring 25 OSI Security -8 Security Mechanisms -A security mechanism is a control that is implemented in order to provide the 6 basic security services. Encryption/Encipherment -CIA Digital signature – Integrity, Authentication, and non-repudiation Access Control – Security Labels, ACLs, capability and tables Data Integrity – Hashing and Integrity Check Values (ICV) Authentication – Passwords and cryptographic methods 文档下载 免费文档下载 http://www.51wendang.com/ Traffic Padding – Adding bogus data to traffic to hide traffic patterns Routing Control – Choosing a route so that only secure links are used Notarization – Non-Repudiation, date, and time of activity, in the digital world, the 3rd party signs the message’s hash with its Private key Attacks and Functions by Layer Layer3-IP Teardrop – IP packets fragmenthttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ed, are creating a negative fragment length when reconstructed. This could crash the IP stack. Overlapping Fragment – Designed to pass by Packet Filters that only inspect the first fragment of a packet, thereby letting the traffic through the filter. IP Address Spoofing – takes advantage of the 3-way handshake allowing a spoofed address to request an IP connection to a bogus host, which will cause it to wait for the ACK to complete the connection, and leaves open the request, allowing for DOS attacks. Source Routing – Allows the source to determine the route, thereby passing from 1 connection to the other in a multi-homed (bastion) computer. Smurf attack – Uses ICMP to send an echo request to a source address on the network, using a broadcast, allowing for overrun of the buffer when all hosts reply to a single source. Fraggle attack – uses UDP to overwhelm the source address, like the Smurf. Phttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ing of Death – uses a packet 文档下载 免费文档下载 http://www.51wendang.com/ limit size beyond 65,536 to disrupt IP. ICMP Redirect – allows an attacker to redirect the route, and send all traffic to his machine before sending outbound, thereby hiding his “man-in-the-middle” attack. Ping Scanning – Find nodes that respond by beaming out pings Traceroute Exploit – Can be used to map a network Virtual Router Redundancy Protocol (VRRP) – creates a second router as the forwarder in case of an outage. Layer 4 – Transport Port Scanning – Find TCP or UDP service advertisements FIN Scanning – Sends FIN hoping to find a response and list of services, usually only works on UNIX. NULL Scanning no flags are set on the TCP packet, and XMAS Scanning all flags are lit. Syn Scanning – just a portion of the handshake is started to find out the response TCP Sequence Number Attacks – Sequence numbers can be predicted and insertedhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 into the data stream, helping to hijack the session. Session Hijacking – Use of sequence numbers to insert data into the stream, and possibly change it as in a man-in-the-middle attack. SYN Flooding – DoS used to overload the target’s connections with too many random 文档下载 免费文档下载 http://www.51wendang.com/ IP addresses. Layer 5 – Session Remote Procedure Calls – executing objects across hosts, the core service of which is a port mapper Common Object Request Broker Architecture (CORBA) and Distributed Component Object Model (DCOM) DNS is used at this level, and has weak authentication mechanisms LDAP – based on X.500, back ends to LDAP are Network Information Service (NIS), and Exchange Mail Services. NIS is a Network directory service created by Sun, usually used in Unix environments. NIS is a more secure implementation. AD uses LDAP as well, but can protect authentication with Kerberos. CIFS/SMB – Common Inthttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ernet File System/ Server Message Block is a file-sharing protocol in Windows. This is also the basis for Samba, and is used as a file sharing systems with Challenge/Response Authentication. 26 NFS – Network File Systems is a Client/Server file sharing system, and is used by Unix and Windows and has beenrevised. It’s traffic is not encrypted by default. Secure NFS – uses DES encrypted Time Stamps as authentication tokens.Layer 6 – Presentation SET – Secure Electronic Transaction 文档下载 免费文档下载 http://www.51wendang.com/ Originated by Visa and MasterCardBeing overtaken by SSL SHTTP -Secure HTTP Early standard for encrypting HTTP documentsAlso being overtaken by SSL XXXXXXXXX Layer 7 -Application XXXXXXXXX TCP/IP – Suite of Protocols OSI TCP/IP Protocols Description Application Consists of the applications and Presentation Application Layer processes thhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873at use the network. Session Transport Host to Host TCP and Provides end-to-end data delivery UDP service to the Application Layer. Defines the IP datagram and handles the Network Internet Layer IP, ARP, routing of data across networks. 文档下载 免费文档下载 http://www.51wendang.com/ RARP, ICMP Data link Consists of routines for accessing physical networks and the electrical Network Access connection. Physical New Ports are registered with Internet Corporation for Assigned of Names and Numbers (ICANN) Host-to-Host Transport Layer Protocols TCP – Transmission Control Protocol Connection Oriented Sequenced Packets Acknowledgment is sent back for received packets If no acknowledgement then packet is resent Packets are re-sequenced Manageable data flow is maintained 27 UDP -Best effort Doesn’t care about orderConnectionless://www.51wendang.com/doc/a88d861180e68ca5a0d13873r Less overhead and faster than TCP sequence 文档下载 免费文档下载 http://www.51wendang.com/ Internet Layer Protocols IP – Internet Protocol All hosts on a network have an IP address Each data packet is assigned the IP address of the sender and receiverIt provides an ‘unreliable datagram service’.Provides: No guarantees that the packet will be delivered No guarantee that the packet will be delivered only once No guarantee that it will be delivered in the order which it was sent ARP – Address Resolution Protocol Use the IP Address to get the MAC Address MAC address is 48 bitIP address is 32 bit Only broadcast to network first time, otherwise stores IP and MAC info in table MAC Addresses can only be Alphanumberic to the value of “F” RARP – Reverse Address Resolution Protocol Use the MAC Address to get the IP Address and broadcasts to find it RARP Server tells diskless machines IP Address://www.51wendang.com/doc/a88d861180e68ca5a0d13873ar BOOTP was created after RARP and contains more info such as IP, Gateway, and DNS IP ICMP – Internet Control Message Protocol Management Protocol and messaging service provider for IP. 文档下载 免费文档下载 http://www.51wendang.com/ Sends messages between network devices regarding the health of the network.Ping is ICMP packet Ping checks if a host is up and operational TCP/IP Does not define Physical Standards it uses existing ones Other TCP/IP Protocols Telnet – Terminal Emulation (No File Transfer) FTP – File Transfer Protocol – (Cannot execute files) TFTP – Trivial FTP – no directory browsing capabilities, no authentication (it is unsecure), can only send and receive files. Some sites choose not to implement TFTP due to the inherent security risks. TFTP is an UDP-based file transfer program that provides no security. NFS – Network File SharingSMTP – Delivers emails LDP – Lihttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ne Printer Daemon –LPR enables print spoolingX-Windows – for writing graphical interface applicationsSNMP – Simple Network Management Protocol Provides for the collection of network information by polling the devices on the network from a management station. Sends SNMP traps (notifications) to a MIB Management Information Base 文档下载 免费文档下载 http://www.51wendang.com/ Bootstrap (BootP) protocol – Diskless boot up. BootP server hears the request and looks up the client’s MAC address in its BootP file. It’s an Internet layer protocol. 28 LAN Cabling Types: Twisted Pair Cable Relatively slow speed Two insulated wires can be shielded (STP) or unshielded (UTP) UTP is a four-pair medium comes in several categories UTP can be easily tapped by eavesdroppers than the other cable types. Category based on how tightly wound the wires are, tighter the wind the higher the rating and resistance to inthttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873erference. Cat 1 UTP– was used for telephone lines not good for data. Cat 2 UTP –upto 4MBps Cat 3 UTP – Used for 10BaseT networks up to 10 MBps Cat 4 UTP – Used in Token Ring Networks up to 16 MBps Cat 5 UTP -Current UTP standard for new installations up to 100 MBps Cat 6 UTP –upto 155MBps Cat 7 UTP –upto 1GBps Coaxial Cable Hollow outer conductor surrounds inner wire conductor. Currently two types in LANs 文档下载 免费文档下载 http://www.51wendang.com/ 50-ohm Cable for digital signaling 75-ohm Cable for analog signaling and high speed digital signaling Coax is more expensive but is more resistant to Electromagnetic Interference (EMI). Used rarely except in Broadband communications Comes in two types: Thinnet – (RG58) Thicknet – (RG8 or RG11) Two common types of coaxial transmission methods: Baseband – The cable carries a single channel Broadband – cable carries several chanhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873nels such as data, voice, audio, and video Fiber Optic Cable Conducts modulated light transmission Light waves are faster and travel greater distancesDifficult to tapResistant to EMI Usually connects backbones in larger networks Can be used to connect workstations to the network.Expensive to install and to terminate. LAN Transmission Protocols: 文档下载 免费文档下载 http://www.51wendang.com/ Rules for communication between computers on a LAN Formatting of the data frame, the timing and sequencing of packet delivery, and resolution of error states.Carrier Sense Multiple Access (CSMA) Foundation of Ethernet Protocol. Workstation continuously monitors the line waiting until it thinks it is free. If the workstation doesn’t receive an acknowledgement from the destination to which it sent the packet, it assumes a collision has occurred and it resends the packet. Persistent Carrier -Uhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873nless Sense receives acknowledgement it will resend. Nonpersistent Carrier Sense – waits random amount of time and resends. CSMA/CA -Carrier Sense Multiple Access Collision Avoidance – Workstations connected to two coax cables, one to send and one to receive data. 29 CSMA/CD -Carrier Sense Multiple Access Collision Detection – Ethernet. If the host detects another signal while transmitting it will send a jam signal causing all nodes to stop sending data. Nodes wait to resend. Designed to avoid collisions. Polling – a primary workstation polls another at a predetermined time to determine 文档下载 免费文档下载 http://www.51wendang.com/ if it has data to transmit. Primary must give permission to others to transmit. Usually IBM Mainframes for SDLC and HDLC Token passing Token Ring, FDDI and ARCnet Cannot transmit without the token, and token is a 24bit control frame.Each station can hold token for maximum predehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873termined amount of time LAN Transmission Methods -refer to the way packets are sent on the network Unicast – from single source to single destination Multicast -source copied and sent to multiple destinations Broadcast -source copied and sent to all nodes on the network Five common LAN Topologies -defines the manner in which the network devices are organized to facilitate communications. Bus All transmissions travel full length of the cable and received by all other stations.Single point of failure in the cable. If one of the links between any of the computers is broken, the network is down.Primarily Ethernet. 文档下载 免费文档下载 http://www.51wendang.com/ These networks were originally designed to work with more sporadic traffic. Ring Unidirectional transmission links form closed loop.Token Ring and FDDI. Similar to the Star topology, however there’s a device called a Multistation http://www.51wendang.com/doc/a88d861180e68ca5a0d13873Access Unit (MAU).MAU works the same as a hub, but with Token Ring networks instead of Ethernet networks.These networks were originally designed to serve large, bandwidth-consuming applications. Star Nodes connected to a central LAN or a junction box called a hub or a concentrator at the center of the network.Ads: reliability Ring and Bus often use Star as physical connection. Tree – branches can have multiple nodes. Mesh – all nodes connected to every other node.LAN Media Access Methods (Physical and Data Link Layers) -control the use of a network. ARCnet Early LAN technologies Uses token passing in a Star topology on coax cable. Ethernet – 802.3 文档下载 免费文档下载 http://www.51wendang.com/ Ethernet – uses CSMA/CD – Designed for sporadic traffic Ethernet defines a bus topology with three different cabling standards Thinnet – 10Base2 – coax with segments up to 185 meters.http://www.51wendang.com/doc/a88d861180e68ca5a0d13873 Thicknet – 10BaseS – coax with segments up to 500 meters. UTP – Unshielded Twisted Pair – all devices connected to a hub or switch 10BaseT 10 Mbps, 100BaseT 100 Mbps and 1000BaseT 1 GBps Token Ring – 802.5 Second to Ethernet All end stations connected to a Multistation Access Unit (MSAU)One station is designated as the Active Monitor If a transmitting station fails, the Active monitor will remove the token and generate a new one. Fiber Distributed Data Interface – FDDI Dual token ring LAN at 100 MBps on Fiber 30 Dual counter rotating rings only one active at a time Operates over long distances with minimal interference Predictable delays, deterministic 文档下载 免费文档下载 http://www.51wendang.com/ Permits several tokens to be present at a time Expensive and requires expertise Copper Distributed Data Interface (CDDI) – can be used with UTP cable but subject to interference and lenghttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873th issues associated with Copper. LAN Devices Repeaters – amplify signal, no added intelligence, no filtering – Physical Layer (1) Hubs – used to connect multiple LAN devices, no added intelligence – Physical Layer (1) Bridges – Amplify signal, add some intelligence. A bridge forwards the data to all other network segments if the Media Access Control (MAC) or hardware address of the destination computer is not on the local network segment. Automatically forwards all broadcast traffic. Does not use IP address because IP is contained in the Network Layer (3) – Data Link Layer (2) Switches – Will only send data to the port where the destination MAC address is, not to all ports. Primarily operate at theData Link Layer (2), although extremely fast layer 3 devices combining switching and routing are being used. Routers – router opens packet and looks at either the MAC or IP address onlyhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 forwards to the network that it is destined.Operates at Network Layer (3) Gateways – primarily software, can be multi-protocol, can examine entire packet. 文档下载 免费文档下载 http://www.51wendang.com/ Asynchronous Transfer Mode (ATM) Switches – Used in WANs and CANs. Use cell relay technology. LAN Extenders – remote access multi layer switch connected to host router, filters based on MAC address or Network Layerprotocol, not capable of firewalling.Firewalls Packet Filtering Firewall -First Generation Screening Router Operates at Network and Transport levelExamines Source and Destination IP AddressCan deny based on ACLsCan specify Port Application Level Firewall -Second Generation Proxy Server also called an Application Layer Gateway Copies each packet from one network to the otherMasks the origin of the data Operates at layer 7 (Application Layer) Reduces Network performance sincehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 it has to analyze each packet and decide what to do with it.Stateful Inspection Firewalls – Third Generation Packets Analyzed at all OSI layersQueued at the network level Faster than Application level Gateway 文档下载 免费文档下载 http://www.51wendang.com/ Dynamic Packet Filtering Firewalls – Fourth Generation Network Layer Allows modification of security rules Mostly used for UDP Remembers all of the UDP packets that have crossed the network’s perimeter, and decides whether to enable packets to pass through the firewall. Circuit-Level Firewall/Proxy Network Layer functions SOCKS Server 31 Circuit level proxy server Network Layer Doesn’t look as deeply into the packet as an application-level proxy Make decisions based on address, port, and protocol Requires SOCKS client on all machines Used to manage outbound Internet access Overhead intensive Kernel Firewall – Fifth Generation ://www.51wendang.com/doc/a88d861180e68ca5a0d13873parFunction integrated into the OS, Linux and FreeBSD are the most common types Firewall Architectures and Placement Packet Filtering Routers Sits between trusted and untrusted networks Uses ACLs 文档下载 免费文档下载 http://www.51wendang.com/ ACLs can be manually intensive to maintain Lacks strong user authentication ACLs can degrade performance Minimal Auditing Screened Host Firewall Employs packet filtering and Bastion Host Provides network layer (packet filtering) and application layer (proxy) services Penetration requires getting by external routers (packet filtering) and Bastion Host (proxy). Dual Homed Host Firewall Contains two NICs One connected to the local “trusted” network Blocks or filters traffic between the two.IP forwarding is disabled Untrusted Trusted Untrusted Multihomed Trusted Untrusted network Trusted network 32 Screened Subnet Firewall One ohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873f the most secure Two packet filtering routers and a Bastion Host Provides network layer (packet filtering) and application layer (proxy) services Provides DMZ Complex configuration Untrusted network 文档下载 免费文档下载 http://www.51wendang.com/ Remote Access Types – Many common with WAN protocols Asynchronous Dial up Access How most people access Internet Use existing public switched phone network to access ISP Trusted network ISDN -Integrated Services Digital Network Carries voice and data over telephone networks Two Interface Types BRI – Basic Rate Interface composed of two B channels and one D Channel PRI – Primary Rate Interface composed of a single 64 KBps D channel plus 23(T1) or 30 (E1) channels xDSL -Digital Subscriber Line -Uses existing twisted pair telephone lines. Cable Modems High speed access from the cable company Users share the Coax connhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ection Throughput varies depending on number of users Considered insecure because local segment is not filtered or firewalled, (but then, why wouldn’t you have a Host based Firewall?) Secure Remote Access Methods 文档下载 免费文档下载 http://www.51wendang.com/ Restricted Address Filtering by source IP address Node authentication not user authentication Caller ID Caller ID checks incoming number against approved listVery commonly used, hard to defeatHard to administer for traveling usersCall Back Caller supplies password or identifier and hangs upSystem dials back number listed for the userHard to administer for traveling usersRemote Identification and Authentication Verify who is remotely communication.Identification -Who Authentication – Verify and Trust 33 Connectivity Protocols -Several protocols assume access from outside the LAN, this connectivity uses modems and dial-uhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873p devices. SLIP -Serial Line Internet Protocol, replaced by PPP, it is asynchronous serial connections. Unlike PPP it doesn’t have header and data compression, error correction, support different authentication methods, encapsulate other protocol other than IP, and support other types of connections other than asynchronous. 文档下载 免费文档下载 http://www.51wendang.com/ PPP -it encapsulates over a serial line for dial-up connectivity. Authenticated using PAP, CHAP, EAP. Authentication Protocols PAP -Password Authentication Protocol used by remote users, authenticates after PPP is established, credentials are sent in clear text, vulnerable to sniffing, man-in-the-middle and attacks. CHAP -Authentication protocol that sends a challenge response, credential have encrypted values, periodically sends a challenge to protect man-in-the-middle attacks, password is not sent over the wire. EAP -Extensive Authentication Protocols: enables pohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ssibilities more to get different types of identifications and authorization information from users. EAP Tunneling Protocols VPN -provide remote access to an organization's network via the Internet. VPNs sends data over the Internet through secure (encrypted) "tunnels." It is encrypted using PPTP, IPsec and L2TP. Each frame is wrapped and encapsulated within a second frame. L2TP: (layer 2) Layer Two Tunneling Protocol -A secure protocol used for connecting Virtual Private Networks over public lines (Internet). PPTP -(layer 2) point-to-point tunneling protocol. IPsec -(layer 3) Internet Protocol Security. IPSec uses encryption technology to provide data confidentiality, integrity, and authenticity between participating peers in a private network. IPSec provides two choices of security services 文档下载 免费文档下载 http://www.51wendang.com/ Authentication Header (AH), which essentially allows authentication of the sender of data Encahttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873psulating Security Payload (ESP), which supports both authentication of the sender and encryption of data. S/WAN -Secure Wide Area Network, a project involving RSA Data Security. The goal is to ensure interoperability between all their IPSEC implementations to let all the customers communicate with each other securely. Firewall to firewall, uses IKE. Remote Access Methods and Technology Remote access covers several technologies to give access to a LAN. Most of the time an ISP is the gateway to the network. Remote access, in many organizations, offers work from home opportunities. Remote access is usually done through a Network Access Server (NAS/client side). The NAS (authenticate and authorize) will then use PPTP or L2TP to establish the link. Remote Network Access The RAS (Remote Access Server/server side) can be configured to call back or accept call from ID-caller number. Here is intricacy to chttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873onfigure a RAS modem/server installed in a central point protected by firewall separating to internal network; revised access right and users yearly; remote access policy enforced; use VPN (it’s encrypted) avoid war-dialer using over three or four rings before answering phone. NAT Options Static NAT – Each internal system has a corresponding external routable IP address 文档下载 免费文档下载 http://www.51wendang.com/ Hiding NAT – All systems share the same external routable IP Fiber Distributed Data Interface (FDDI) Dual rings fault tolerance (if first ring fails, the secondary ring begins working)Sometimes uses second ring for improved performanceCDDI – Copper implementation Synchronous Optical Network (SONET) -High-speed fiber-optic network constructed in rings so data can be re-routed in the event of a fiber cut. Backbone Carrier Network – Defines transmission rates, signal formats and optical interfaces. Defines how Telco’s transmithttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 digital voice and data over Optical Networks 34 Layer 1 Technology – Frame Relay, ATM, and SMDS can run over SONETMany channels multiplexed together Channel Service Unit (CSU)/Data Service Unit (DSU) – used to terminate the physical interface on a DTE device such as a terminal. Required for digital equipment to be connected to a Telco network. WAN Technologies Rules for communicating between computers on a WANCommunications between large disparate networks.Private Circuit Technologies 文档下载 免费文档下载 http://www.51wendang.com/ Evolved before packet switching networks. Dedicated analog or digital point-to-point connection. Serial Line Internet Protocol (SLIP), Point-to Point protocol (PPP), ISDN, xDSL. Dedicated Line – indefinitely and continuously reserve for transmissions.Leased Line – Type of dedicated line leased from carrier. Types and Speeds of Leased Lines Digital Signal http://www.51wendang.com/doc/a88d861180e68ca5a0d13873Level 0 – DS-0 – single channel at 64KBps on a T1 Digital Signal Level 1 – DS-1 – 1.544 MBps in US on a T1 and 2.108 MBps in Europe on a E1 Digital Signal Level 3 – DS-3 – 44.736 MBps on a T3 T1 – Transmits DS-1 data at 1.544 MBps on telephone switching network T3 – Transmits DS-3 data at 44.736 MBps on telephone switching network E1 – predominately used in Europe carries data at 2.108 MBps E3 -predominately used in Europe carries data at 34.368 MBps Circuit Switching – Usually Voice or Video, works well as a stream Virtual Connection that acts like a dedicated linkFixed Delays – IE ISDN, POTS Packet Switching – Data Applications, will not setup a dedicated link, but can use many Packets can take many pathsSupports bursty trafficVariable Delays 文档下载 免费文档下载 http://www.51wendang.com/ X.25 (Data Link Layer) st 1Packet-Switch Protocol, slower than Frame Relay due to error detection levels requirhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ed. LAPB for error correction. Frame Relay (Data Link Layer) Faster WAN Packet Switching, simple framing, no error correction Permanent Virtual Circuit (PVC) – Built for dedicated circuit and bandwidth Switched Virtual Circuit (SVC) – Dynamically built when needed Committed Information Rate (CIR) – Customer pays monthly for a specific level of bandwith, minimum was CIR. 2 Types of equipment – Data Terminal Equipment (DTE) and Data Circuit Terminating Equipment (DCE) Switched Multimegabit Data Service (SMDS) High speed access, connectionless, and can provide Bandwidth on demand. Cell Switching 文档下载 免费文档下载 http://www.51wendang.com/ Asynchronous Transfer Mode (ATM) High bandwidth, low delay Uses switching and multiplexing Uses 53 byte fixed size cells instead of framesCan allocate bandwidth on demand Taking place of FDDI in Campus Backbone://www.51wendang.com/doc/a88d861180e68ca5a0d13873ar Voice Over IP (VOIP) Combines media types (voice, video, data, audio) into one IP packetProvides benefits in cost, performance and interoperabilityVery new but far reaching potential Packet Switched rather that Circuit, so there can be latencyQoS, 911 response time, and Privacy question 35 Equipment Call Server offers the functionality of call control and call signaling, known as a IP PBX Gateway can connect to the IP network to a “non-IP” carrier network (ISDN or PSTN) Security Issues Attack the OS 文档下载 免费文档下载 http://www.51wendang.com/ Attack the TCP and UDP ports Attack the Infrastructure supporting it DoS, Call Hijacking, Resource Exhaustion Wireless Security WAP – Wireless Application Protocol Designed for mobile devices (PDA, Phones) Set of protocols covering layers 7 to 3 of the OSI modelLess overhead than TCP/IP Suite of Prhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873otocols for specific use Wireless Markup language (WML) Wireless Application Environment (WAE)Wireless Session Protocol (WSP) Wireless Transport Security Protocol (WTLS)Wireless Datagram Protocol (WDP) For security WAP uses Wireless Transport Security Protocol (WTLS) – On the Internet, WTLS needed to be SSL enabled Three classes of security Class 1 – Anonymous AuthenticationClass 2-Sever Authentication 文档下载 免费文档下载 http://www.51wendang.com/ Class 3 – Two way client and server authenticationSecurity vulnerability of WAP Version 1 WAP GAP – where WTLS is decrypted and re-encrypted to SSL at the WAP gateway IEEE – 802.11 Standards Interface between clients and base station 802.11 Layers The physical layer PHY can use: DSSS -Direct Sequence Spread SpectrumFH – Frequency Hoping Spread SpectrumIR – Infrared pulse modulation MAC Layer – Medium Access Control ://www.51wendang.com/doc/a88d861180e68ca5a0d13873arSpecifies CSMA/CA Carrier Sense Multiple Access Collision Avoidance Provides Data Transfer Association Re-association Authentication -WEP Privacy -WEP Power Management Wired Equivalency Protocol (WEP) – 64 or 128-bit WEP and has been cracked SSID -Service Set ID is required when wireless devices need to authenticate to AP. The SSID provides authentication but can be shifted. There are two wireless methods 文档下载 免费文档下载 http://www.51wendang.com/ of authentication. Open System Authentication (OSA) -OSA is not encrypted and data transmission is in clear, no WEP key required Shared Key Authentication (SKA) -SKA encrypts only the payload not the headers/trailer using WEP, which use symmetric algorithm RC4 40bit or 104bit keys. WEP Key required, and has a Challenge Response function. The payload is encrypted. RC4 is a Stream Cipher – Initialization Vector portion of password is sent with clear text. ://www.51wendang.com/doc/a88d861180e68ca5a0d13873par36 Suggested to go to WPA – Temporary solution, it changes the key value. Countermeasures Enable WEP at 128bits Change Default SSID Disable Broadcast SSID Implement another layer of security, RADIUS or Kerberos Put AP in the middle of building, or in the DMZ Implement VPNs Assign Static IPs and disable DHCP Cell Phone Cloning Electronic Serial Number (ESN) – identifies the phone Mobile Information Number (MIN) – is the phone number Voice encryption often uses RSA or ECC Phone Cloning and Call selling is illegal in the US 文档下载 免费文档下载 http://www.51wendang.com/ Periodic pings identify where a user is located, thereby could find a fraudulent caller Domain 8 – Law, Investigations, and Ethics Covers computer crimes, preserving evidence and conducting basic investigations. Many computer crimes go unreported – difficult to estimate. CISSPs Shall… 1. 2. 3. 4. 5. 6. 7.://www.51wendang.com/doc/a88d861180e68ca5a0d13873par Conduct themselves with the highest standards of ethical, moral and legal behavior Not commit any unlawful or unethical act that may impact the reputation of the profession Appropriately report unlawful behavior Support efforts to promote prudent information security measures Provide competent service to their employers and clients; avoid conflicts of interest Execute responsibilities with the highest standards Not misuse information in which they come into contact with during their duties Internet Activities Board (IAB) -“Internet Activity Should be treated as a privilege” Unacceptable actions Seek to gain unauthorized access to resources of the InternetDisrupt intended use of the internetWaste resources Compromise privacy of others 文档下载 免费文档下载 http://www.51wendang.com/ Involve negligence in conduct of Internet Experiments Generally Accepted Systems Security (GAhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873SSP)-Not Principles laws but accepted principles of the OECD Computer security supports the business mission Computer security is integral to sound management Computer security should be cost effective System Owners have responsibility outside of their organization Computer security requires a comprehensive integrated approach Computer security should be periodically reassessed Computer security is constrained by societal factors Why Crimes are Committed -M.O.M Motive – Who commits these crimes and why, what do they get? Opportunity – Where do opportunities exist, when would someone act on them? Means – What has the capacity 37 Criminal Profiles Hackers and CrackersCompetitorsFriendly Allies Political opponents Lack of Basic Protection 文档下载 免费文档下载 http://www.51wendang.com/ Lack of AwarenessInadequate SafeguardsInsufficient Staff Lack of Incident Response Capability Companies http://www.51wendang.com/doc/a88d861180e68ca5a0d13873don’t press charges or show they were penetratedProblems Prosecuting Cross-Jurisdictional ProblemsLack of understandingNew Types of CrimesIntangible Evidence Not viewed as a “serious” crimeAttack Types Grudge Disgruntled EmployeePolitical Reasons Terrorist Using technology to communicate and coordinate attacksCausing harm against another Country (Patriot Act) International WarfareFinancial E-commerce and Banking Loss of funds or financial information Fun – Just to say you could do it Salami – Skimming Data Diddling – altering data just before an online order is processed Password 文档下载 免费文档下载 http://www.51wendang.com/ Sniffing Privilege Escalation – Setuid programs with bugs are ideal target, UNIX allows root privileges. SU – substitute user command and assign root permissions Phone Phreakers Red box -Simulates the sound of coins being dropped into a payphohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873ne. Blue box -A device that simulates a tone that tricks the telephone company’s system into thinking the user is authorized for long distance service, which enables him to make the call. Black box -Manipulates the line voltage to receive a toll-free call. Downstream liabilities -When companies come together to work in an integrated manner, special care must be taken to ensure that each party promises to provide the necessary level of protection, liability and responsibility needed which should be clearly defined in the contracts that each party signs. Due Care -Steps that are taken to show that a company has taken responsibility for the activities that take place within thecorporation and have taken the necessary steps to help protect the company, its resources and employees. Due Diligence -Continual activities that make sure the protection mechanisms are continually maintained and operational.Pruhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873dent man rule -To perform duties that prudent people would exercise in similar circumstances.Common Law System Categories – not to be confused with common law from court decisions Criminal Law – Violates government laws for the protection of the people. Financial penalties and imprisonment Civil Law (Tort Law) – wrong inflicted upon an individual or organization results in damage or loss, no prison 文档下载 免费文档下载 http://www.51wendang.com/ 38 Administrative Law – standards of performance and conduct, financial penalties and imprisonment Intellectual Property Law Patent – Provides owner legally enforceable right to exclude others for specified time (U.S. 17 years) Copyright – Protects original works of authorship, can be used for software and databases Trade Secret – Secures confidentiality of proprietary technical and business related information Company must meet requirements: Invested resources devehttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873lop to the information Valuable to the business Valuable to competitor Non-obvious information Trademark – establishes word, name, symbol, color or sounds used to identify and distinguish goods Incident Handling should address What constitutes an incident How should an incident be reported To who should an incident be reported When should management be informed of an incident What action should be taken if an incident occurs Who should handle the response to the incident How much damage was 文档下载 免费文档下载 http://www.51wendang.com/ caused by the incident What data was damaged by the incident Are recovery procedures required What type of follow up or review is required Should additional safeguards be implemented Establish a Computer Incident Response Team (CIRT) or Computer Emergency Response Team (CERT) Incident Response, Collecting Evidence Must be careful in gathering the evidence of crime. Photohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873graph the area before going in to the scene or systemsDump and preserve memory contents Power down and record the collection process and the chain of custodyGet HR involved (disgruntled employees) Send items to forensics -During the forensics portion an image of the disk must be made (not copying files, topreserves all bits), Look for hidden files, viruses, slack spaces, fat table. Before the evidence can be presented in court it must be competent, relevant and material. Evidence can be obtained through “Exigent Circumstances” and must demonstrate probable cause, and shouldshow criminal activity.Investigation 文档下载 免费文档下载 http://www.51wendang.com/ Also known as computer forensics – collecting information from and about computer systems that is admissible in a court of law Computer Forensic Issues Compressed timeframe for investigation Information is intangible Investigation may withhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 interfere normal business operations May find difficulty in gathering evidence Co-mingling of live production data and evidence Experts are required Locations may be geographically in different jurisdictions Differences in law and attitude Many jurisdictions have expanded definitions of property to include electronic information Evidence Gathering, control and preservation are critical 39 Subject to easy modification without a trace, must be carefully handled though its life cycle.Chain of Custody -must be followed Chain of Custody components: 文档下载 免费文档下载 http://www.51wendang.com/ Location of evidence Time evidence obtained Identification of individual who discovered evidence Identification of individual who obtained evidence Identification of individual who controlled/maintained possession of evidence Evidence Life Cycle Discovery and recognitionProtectiohttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873nRecord ingCollection Collect all relevant storage media Make image of hard disk before removing powerPrint out screen Avoid degaussing equipment Identification (tagging and marking) Preservation Protect from magnetic erasureStore in proper environment Transportation Presentation in courtReturn to evidence owner Evidence Admissibility -Evidence must meet stringent requirements. 文档下载 免费文档下载 http://www.51wendang.com/ Must be relevant, legally permissible, reliable, properly identified and preserved Relevant – must be related to the crime, shows crime has been committedLegally Permissible – obtained in lawful mannerReliable – not been tampered or modified Properly Identified – identified without changing or damaging evidencePreservation – not subject to damage or destruction Make backups, write protect, take digital signatures of files or disk sectors Types ofhttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873 Evidence Best Evidence – Original or primary evidence rather than a copy Secondary evidence – a copy of evidence, or description of contents Direct Evidence – proves or disproves a specific act based on witness testimony using five senses Conclusive Evidence – incontrovertible, overrides all evidence, cannot be disproved Opinions Two Types: Expert – may offer opinion based on expertise and facts Nonexpert – may testify only to the facts Circumstantial – inference on other information Hearsay – not based on first-hand knowledge, not admissible in court, and often computer generated reports fall under this rule. (No printouts) Exceptions to Hearsay Rule -Made during the regular conduct of business with witnessesMade by a person with knowledge of recordsMade by person with knowledge Made at or near time of occurrence of actIn the custody of the witness on regular 文档下载 免费文档下载 http://www.51wendang.com/ basis If phttp://www.51wendang.com/doc/a88d861180e68ca5a0d13873rinted in the normal process of business activity, it could be used. Enticement vs. Entrapment Enticement occurs after individual has gained unlawful access to a system, then lured to an attractive area “honey pot” in order to provide time to identify the individual Entrapment encourages the commitment of a crime that the individual had no intention of committing 40 文档下载网是专业的免费文档搜索与下载网站,提供行业资料,考试资料,教 学课件,学术论文,技术资料,研究报告,工作范文,资格考试,word 文档, 专业文献,应用文书,行业论文等文档搜索与文档下载,是您文档写作和查找 参考资料的必备网站。 文档下载 http://www.51wendang.com/ 亿万文档资料,等你来发现