430 likes | 581 Views
Computer and Network Security Threats. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the change of his not attacking, but rather on the fact that we have made our position unassailable.??The Art of War. Sun
E N D
1. Data and Computer Communications Ninth Edition
by William Stallings
2. Computer and Network Security Threats The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the change of his not attacking, but rather on the fact that we have made our position unassailable.
—The Art of War.
Sun Tzu
3. Computer Security Key objectives:
confidentiality
integrity
availability
4. Confidentiality term covers two related concepts:
Data
assures that private or confidential information is not made available or disclosed to unauthorized individuals
Privacy
assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed
5. Integrity term covers two related concepts:
Data integrity
assures that information and programs are changed only in a specified and authorized manner
System integrity
assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system
6. Availability
7. Loss of Security FIPS PUB 199 identifies the loss of security in each category:
Confidentiality
unauthorized disclosure of information
Integrity
unauthorized modification or destruction of information
Availability
disruption of access to or use of information or an information system
8. Additional Security Objectives Some information security professionals feel that two more objectives need to be added:
9. Threats and Attacks
10. Computer and Network Assets, with Examples of Threats
11. Scope of System Security
12. Hardware most vulnerable to attack
least susceptible to automated controls
threats
accidental damage
intentional damage
theft
13. Software includes operating system, utilities and application programs
key threats:
14. Data security concerns with respect to data are broad, encompassing:
availability
secrecy
integrity
major concerns with data have to do with:
15. Communication Lines & Networks Network Security attack classification:
16. Active Attacks
17. Classes of Intruders Masquerader – usually outsider
penetrates a real users account by pretending to be them
Misfeasor – usually insider
legitimate user who accesses unauthorized areas
Clandestine User – outsider or insider
user who seizes supervisory control of a system in order to avoid prevention, access and detection controls
18. Behavior Patterns of Intruders:Hackers and Criminals Hackers
usually high level of competence
share their findings
look for targets of opportunity
Criminals
organized groups of hackers are a common modern threat
typically young
usually have specific targets
19. Behavior Patterns of Intruders:Insiders
20. Intrusion Techniques
21. Malicious Software
22. Categories of Malicious Software parasitic
fragments of programs that cannot exist independently of some actual application program, utility, or system program
viruses, logic bombs, backdoors
independent
self-contained programs that can be scheduled and run by the operating system
worms, bots
23. Terminology of Malicious Programs
24. Backdoor trapdoor
is a secret entry point into a program that can allow unauthorized access to the data
backdoors are common among the programming community and are used for a variety of maintenance tasks (maintenance hook)
it is important to not allow backdoors into production environments
25. Logic Bomb predates viruses and worms
code embedded in a legitimate program that will “explode” at a given time or when certain conditions are met
presence or absence of certain files
particular day of the week or date
particular user using the application
26. Trojan Horse program that contains hidden code that, when invoked, causes harm to the system or system infrastructure it was launched from
27. Mobile Code script, macro, or other portable instruction that can be shipped unchanged to a collection of platforms
transmitted from a remote system to a local system and then executed on the local system without the user’s explicit instruction
mechanism for a virus, worm, or Trojan horse
vulnerabilities such as unauthorized data access
28. Multiple Threat Malware multipartite – capable of infecting multiple types of files
blended attack – uses multiple methods of infection or transmission to maximize infection speed
Nimda
erroneously referred to as simply a worm
uses a combination of items like email, web servers, web clients, etc. to propagate and infect
29. Viruses can do anything other programs can do
attaches itself to a program and executes secretly
once running it can perform any function allowed by the current users rights
30. Virus Lifecycle
31. Virus Classification
by target
by concealment strategy
32. Target boot sector infector
infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus
file infector
infects files that the operating system or shell consider to be executable
macro virus
infects files with macro code that is interpreted by an application
33. Concealment Strategy
34. E-Mail Viruses a more recent development in malicious software
Melissa
E-mail virus sends itself to everyone on the mailing list in the user’s e-mail package
virus does local damage on the user’s system
another virus appeared that activates by merely opening the e-mail that contains the virus rather than the attachment
35. Worms self replicating – usually very quickly
usually performs some unwanted function
actively seeks out more machines to infect
36. Worms In the propagation phase the Worm will
Phases
37. Worm Technology Multiplatform – variety of platforms
Multi-Exploit – variety of penetration schemes
Ultrafast Spreading – accelerated distribution
Polymorphic – evades set signatures
Metamorphic – evades anomaly detectors
Transport Vehicles – used to spread other distributed attack tools
Zero Day – exploits a yet unknown vulnerability
38. Worm Propagation
39. Bots AKA – Zombie or Drone
secretly takes over an internet connected computer
launches attacks from that computer that are hard to trace back to the creator
Botnet
collection of Bots that act in a coordinated manner
has 3 characteristics
bot functionality
remote control facility
spreading mechanism
40. Bot Usage Distributed Denial of Service Attack
Spamming
Sniffing Traffic
Keylogging
Spreading of new malware
Installing Ads (Adware and SpyWare)
Attacking IRC Chat networks
Manipulation of online polls / games
41. Remote Control Facility distinguishes a bot from a worm
worm propagates itself, bot is controlled from some central facility (initially)
IRC server
all bots join a specific channel on this server and treat incoming messages as commands
control module activates the bots
42. Constructing the Attack Network first step in a botnet attack is for the attacker to infect a number of machines with bot software that will be used to carry out the attack
essential ingredients
software that can carry out the attack
vulnerability in a large number of systems
strategy for locating and identifying vulnerable machines
scanning / fingerprinting
43. Summary computer security concepts
threats, attacks, and assets
hardware, software, data
intruders
hackers, criminals, insiders
malicious software
Trojan horse, malware
viruses, worms, and bots