1 / 40

IS6303 Intro to Voice and Data Security

IS6303 Intro to Voice and Data Security. 7:30 – 8:45 PM Robert J. Kaufman (robert.kaufman@utsa.edu) Background Student Background Information Syllabus and Class Schedule. Student Background Information (email to me). Name Phone # (opt) and reliable email address IS/CS background

step
Download Presentation

IS6303 Intro to Voice and Data Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IS6303 Intro to Voice and Data Security • 7:30 – 8:45 PM • Robert J. Kaufman (robert.kaufman@utsa.edu) • Background • Student Background Information • Syllabus and Class Schedule

  2. Student Background Information(email to me) • Name • Phone # (opt) and reliable email address • IS/CS background • Security background • Why you are taking this course • What do you expect out of this course

  3. Syllabus • Assumed Background • It is assumed that students in this class have a basic understanding of Operating Systems and Networks and that they have access to the Internet and a UNIX- or Windows- based PC. • Textbook • Computer Security Handbook, 4ed, Bosworth and Kabay

  4. Syllabus -- grading • Graded Assignments • The grades for this course will be based on a standard 70% = C, 80% = B, 90%=A grading scheme. The final grades will be based on the following graded assignments: • Paper 1 50 points • Lab 1 100 points • Exam 1 100 points • Exam 2 100 points • Lab 2 100 points • Lab 3 100 points • Lab 4 100 points • Lab 5 100 points • Final Exam 250 points • TOTAL 1000 points

  5. NSA’s First Major Policy Address Focused On The Need For More Cyber-Security • "The very technology that makes our economy so dynamic and our military forces so dominating also makes us more vulnerable." • Computer reliance is the “soft underbelly” of American national security • US high technology firms need to join with the US government to fight cyber terrorism National Security Advisor Condoleeza Rice “We are talking about a collaborative partnership between the public and private sectors that is unprecedented in our history”

  6. Kirtland AFB Columbus AFB, MS Lackland AFB February 3: ASIMS detects intrusion at Andrews AFB Solar Sunrise January 1998: tensions between the U.S., the UN, and Iraq are on the rise. Hussein has expelled the UN inspectors. UN discussing renewing military action. February 4: AFCERT detects additional intrusions:

  7. Solar Sunrise - Turned out to be 2 teenagers in California and their mentor in Israel - Involved systems owned by the Air Force, Navy, NASA, DOE, MIT and several others - At least 47 FBI agents were involved in this case as well as individuals from the OSI and members of the Israeli Ministry of Justice - Exploited a known bug in Solaris, sniffed passwords - 500 systems involved, thousands of passwords compromised.

  8. Citibank • Probably the largest and most famous publicly acknowledged theft • Occurred in 1994 • Vladimir Levin, a 30-year old Russian hacker stole more than $10M • All but a few hundred thousand dollars recovered • The actual dollar figure lost was minimal to an organization as large as Citibank, what was more important is how this affected people’s impression of the bank. How many accounts were lost as a result of this public incident?

  9. Worcester Airport • Occurred in early 1997 • 14 year old hacker broke into a NYNEX digital loop carrier system through a dial-in port • The individual, who called himself “jester”, disrupted telephone service for over 600 residents of Rutland, Mass as well as communications at Worcester Airport • Communication to the tower and emergency services was disrupted as well as the main radio transmitter and an electronic system which enables aircraft to send a signal to activate the runway lights

  10. Omega Engineering • Timothy Lloyd was convicted in May 2000 of causing an estimated $12 million in damages to his former employer. • Back in 1996, Lloyd found out he was about to be fired • He planted a logic bomb that systematically erased all of Omega’s contracts and the proprietary software used by the company’s manufacturing tools. • Lloyd’s act of insider cyberterrorism cost Omega its competitive position in the electronics manufacturing market. At Lloyd’s trial, plant manager Jim Ferguson said, “We will never recover.”

  11. And probably the most widely known security problem… • In March 1999, David Smith, a New Jersey resident, released the Melissa virus. The estimated damage it caused: $80 million. • In May 2000, 23-year old Philippine college student, Onel de Guzman, released the “Love Bug” virus which proceeded to cause an estimated $8 Billion in damages worldwide.

  12. Information Intrusion Threat CNN, 8,9,10 Feb 00 “Cyber-attacks batter Web heavyweights” CERT/CC, Carnegie Mellon, Apr 01 “Reported Incidences” 30000 25000 buy.com 20000 15000 5 May 00 10000 “FBI investigates 'ILOVEYOU' virus; millions of computers affected” 5000 0 1988 1990 1992 1994 1996 1998 2000 “Love Bug caused an estimated $8 billion in damage.” WP, 11 May 00 “War inKosovo cost the United States $6.7 billion.” UPI, 2 Feb 00

  13. Attacks on the DoD • In 1999, a total of 22,144 "attacks" were detected on Defense Department networks, up from 5,844 in 1998, Air Force Maj. Gen. John Campbell, then vice director of the Defense Information Systems Agency (DISA), told Congress in March 2000. • In 2000 through August 4, a total of 13,998 such "events" were reported, according to Betsy Flood, a spokeswoman for Arlington, Virginia-based DISA, which provides worldwide communication, network and software support to the Defense Department.

  14. 988 Detected 267 Reported 24,700 Succeed 38,000 Attacks 721 Not Reported 23,712 Undetected 13,300 Blocked DISA VAAP Results P R O TECTION D E T E C T I O N REACTION

  15. ADVISORY 01- 009 Issued 04/26/2001 101001000110010010100100010010001000100101001 101001000110010010100100010010001000100101001 Hack Attack: New Global Way Of War Washington TimesApril 23, 2001, Front Page “China Warns Of Hack Attack” To date, Chinese hackers already have unlawfully defaced a number of U.S. web sites, replacing existing content with pro-Chinese or anti-U.S. rhetoric. In addition, an Internet worm named "Lion" is infecting computers and installing distributed denial of service (DDOS) tools on various systems. Collateral Damage May Soon Have A New Definition

  16. You have to have security, or else… • 1999 Information Security Survey • 745 Information Security Readers • 23% reported unauthorized access from outsiders • 91.6% increase over 1998 results • 52% reported access abuse by employees • 14% reported access abuse by business partners, resellers, or vendors • Total loss for 91 reporting a loss was $23,323,000 • Average loss $256,297

  17. You have to have security, or else… • 2000 Information Security Survey • 1897 “infosecurity professionals” • 37% experienced a denial of service attack • 25% reported breaches due to insecure password • 24% experienced breaches due to buffer overflows • 24% experienced attacks on bugs in web servers • 58% reported employee abuse of access controls • up from 52% in 1999 • 24% reported theft or disclosure of proprietary data • up from 17% in 1999

  18. You have to have security, or else… • 1999 CSI/FBI Computer Crime & Security Survey • 521 security “practitioners” in the U.S. • 30% reported system penetrations from outsiders • an increase for the third year in a row • 55% reported unauthorized access from insiders • also an increase for the third year in a row • Losses due to computer security breaches totaled (for the 163 respondents reporting a loss) $123,779,000 • Average loss $759,380

  19. You have to have security, or else… • 2000 CSI/FBI Computer Crime and Security Survey • 643 security “practitioners” in the U.S. • 90% reported computer security breaches within the previous 12 months • 70% reported unauthorized use • 74% suffered financial losses • Losses due to computer security breaches totaled (for the 273 respondents reporting a loss) $265,589,940 • Average loss $972,857

  20. You have to have security, or else… • 2001 CSI/FBI Computer Crime and Security Survey • 538 security “practitioners” in the U.S. • 91% reported computer security breaches within the previous 12 months • 70% reported their Internet connection as a frequent point of attack (up from 59% in 2000) • 64% suffered financial losses due to breaches, 35% could quantify this loss. • Losses due to computer security breaches totaled (for the 186 respondents reporting a loss) $377,828,700 • Average loss $2,031,337

  21. You have to have security, or else… • 2003 CSI/FBI Computer Crime and Security Survey • 530 security “practitioners” in the U.S. • 30% of those who said they suffered an incident in the previous 12 months reported it to law enforcement • 78% reported their Internet connection as a frequent point of attack (up from 70% in 2001) • 75% suffered financial losses due to breaches, 47% could quantify this loss. • Losses due to computer security breaches totaled (for the 251 respondents reporting a loss) $201,797,340

  22. A Sampling of Malicious Activity • March 1999 - EBay gets hacked • March 1999 - Melissa virus hits Internet • April 1999 - Chernobyl Virus hits • May 1999 - Hackers shut down web sites of FBI, Senate, and DOE • June 1999 - Worm.Explore.Zip virus hits • July 1999 - Cult of the Dead Cow (CDC) releases Back Orifice • Sept 1999 - Hacker pleads guilty to attacking NATO and Gore web sites • Oct 1999 - Teenage hacker admits to breaking into AOL

  23. A Sampling of Malicious Activity • Nov 1999 - BubbleBoy virus hits • Dec 1999 - Babylonia virus spreads • Feb 2000 - Several sites experience DOS attacks • Feb 2000 - Alaska Airlines site hacked • May 2000 - Love Bug virus ravages net • July 2001 – Code Red Runs Rampant • Sept 2001 – Nimda Explodes

  24. A Sampling of Malicious Activity • Jan 2003 – Sapphire/Slammer Worm • Aug 2003 – Blaster (LoveSan) Worm • Jan 2004 – MyDoom • Mar 2004 – Witty Worm • May 2004 – Sasser Worm • Dec 2006 – TJX Credit/Debit Card Theft • Jan 2007 – Storm Worm • Mar 2009 - Conficker • June 2010 - Stuxnet http://en.wikipedia.org/wiki/Timeline_of_notable_computer_viruses_and_worms

  25. Biggest Security Concerns Among Security Professionals Source: Information Security, September 2000

  26. Biggest security concerns among security professionals 2002 Info Security Magazine survey

  27. What are our goals in Security? • The “CIA” of security • Confidentiality • Integrity • Availability • (authentication) • (nonrepudiation)

  28. Real Security Issues • Skills Gap • Budget • Network Crunch • Liability / Due Care

  29. Security Skills Gap Skill basemust be leveraged! Rate of Technology Development Skills Gap • Skill Level Rate of Technology Assimilation • Time

  30. Information Security Budget $ I T Security Corp

  31. U.S. Computer Security Spending Forecast ** Values in 1000’s of $ Source: Forrester Research, Oct 2000, see The Industry Standard, 11 Dec 2000

  32. Internet Security Software Market 2002 - $7.4 Billion est. 1999 - $4.2 Billion 1998 - $3.1 Billion 1997 - $2 Billion ’97 & ’98 figures based on a study released by market research firm International Data Corp. in Framingham, Mass. ’99 & ’02 figures from IDC study based on a survey of 300 companies with more than $100 million in annual revenues

  33. eCommerce & eDefense Dynamics Market Size Today 2005 $12B? $2B USG $28B? Forrester Group US Commercial $2B A trillion dollars of electronic financial transactions occur each day US experienced 40% increase in cyber crime over last year By mid decade a third of our GDP will be eCommerce America Cannot Have Trillions Of Dollars Of Economic Exposure On The Wire Without The Enabling Technology Of Information Security

  34. Crunchy on the Outside……Chewy on the Inside. Network Crunch

  35. Access Controls Encryption Firewalls Intrusion Detection Incident Handling Computer Security Operational Model Protection = Prevention + (Detection + Response) Textbook uses Prevention, Detection and Remediation

  36. Evaluate Secure Improve Monitor Security Operational Process • Vulnerability Assessment Services • Vulnerability Scanners • Intrusion detection • Firewalls • Encryption • Authentication • Security Design Review • Security Integration Services METRICS • 24 Hr Monitoring Services • Remote Firewall Monitoring

  37. Legal Liability • Failure to Protect Against Loss • Failure to Protect Against Disclosure • Failure to Protect Against Harassment • HIPAA

  38. Some Definitions • Hacker (from the Hacker Jargon File) • “A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.” • “One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.” • “[deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence ‘password hacker’, ‘network hacker’. The correct term for this sense is ‘cracker’.” • Cracker • “One who breaks security on a system. Coined c. 1985 by hackers in defense against journalistic misuse of hacker.” • Phreaker • “The art and science of cracking the phone network (so as, for example, to make free long-distance calls).

  39. Is an ROI from Security Possible? • Security as an ROI • Improved Security ROI • Security that provides savings in the budget • Security that provides additional revenue

  40. Summary • What is the Importance and Significance of this material? • How does this topic fit into the subject of “Voice and Data Security”?

More Related