1.33k likes | 1.8k Views
Computer Network Security. Identify the challenges for computer and network security. Ten-fifteen years ago Firewalls , IDS, anti-virus software , OS update were rare Now Virus attacks : every day E-mail : scanned for suspicious attachments Network admins : work overtime to
E N D
Identify the challenges for computer and network security • Ten-fifteen years ago • Firewalls, IDS, anti-virus software, OS update were rare • Now • Virus attacks : every day • E-mail : scanned for suspicious attachments • Network admins : work overtime to • Build the latest security defenses • Keep the defenses up-to-date • Computer attacks via the Internet • Making computer security one of the prime concerns
Identify the challenges for computer and network security • Why security is becoming increasingly difficult • Speed of attacks • Widely available of modern tools • Used to scan systems • To find weaknesses • Launch attacks • Most tools are automated • Easy to attack target systems
Identify the challenges for computer and network security Speed of attacks: (examples) In 2003 : the Slammer worm infected 75,000 computers in the first 11 minutes after it was released and infected double every 8.5 seconds. As its peak, Slammer was scanning 55 million computers per second looking for a computer to infect. Later that year, Blaster worm infected 138,000 computers in its first four hours and eventually infected over 1.4 million computers.** ** From M. Ciampa, Security + Guide to Network Security Fundamentals, 2nd edition, Thompson, 2005
Identify the challenges for computer and network security (cont.) • Why security is becoming increasingly difficult • Sophistication of attacks • Security attacks are becoming more complex • Difficult to detect • Faster detection of weaknesses • Newly discovered system vulnerabilities double annually • More difficult for software developers to update their products
Identify the challenges for computer and network security (cont.) • Why security is becoming increasingly difficult • Distributed attacks • Multiple systems can be used to attack against a single computer or network • (many against one) approach • Impossible to stop an attack by identifying and blocking the source • Difficulties in patching • So, users do not apply patches
Identify the challenges for computer and network security (cont.)
Vulnerabilities and Exploits • Vulnerabilities • Security weaknesses that open a program to attack • An exploit takes advantage of a vulnerability • Vendors develop fixes • Zero-day exploits: exploits that occur before fixes are released • Exploits often follow the vendor release of fixes within days or even hours • Companies must apply fixes quickly
Vulnerabilities and Exploits • Compromise • The successful exploitation of a target by an attacker • Fixes • Work-arounds • Manual actions to be taken • Labor-intensive so expensive and error-prone • Patches: • Small programs that fix vulnerabilities • Usually easy to download and install • Service packs (groups of fixes in Windows) • Version upgrades
Applying Patching • Problems with Patching • Must find operating system patches • Windows Server does this automatically • LINUX versions often use rpm • … • Companies get overwhelmed by number of patches • Use many programs; vendors release many patches per product • Especially a problem for a firm’s many application programs
Applying Patching • Problems with Patching • Cost of patch installation • Each patch takes some time and labor costs • Usually lack the resources to apply all • Prioritization • Prioritize patches by criticality • May not apply all patches, if risk analysis does not justify them
Applying Patching • Problems with Patching • Risks of patch installation • Reduced functionality • Freeze machines, do other damage—sometimes with no uninstall possible • Should test on a test system before deployment on servers
Threats • Threat • An adversary (devil/satan) who is capable and motivated to exploit a vulnerability • (exploit = utilize, especially for profit) • Aperson, thing, event • whichposessomedangertoanassetintermsofthatasset’sconfidentiality, integrity, availability • Accidentthreats • Delibratethreats : PassiveandActive
Threats • Examples of threat • Hacker/cracker • Script kiddies • Spies and Malware • Denial-of-service (DoS) attack • Zombies • Insecure/poorly designed applications • Virus • Worms
Script kiddies • Script kiddies • Want to break into computers like crackers, but • unskilled users • download software from web sites, use to break into computers
Spies • Spies • A person who • Has been hired to break into a computer and steal information • Do not randomly search for unsecured computers to attack • Malware • A group of destructive programs such as viruses, worms, Trojan horse, logic bombs, and spyware
Virus • Virus : a computer programthat • cancopyitselfandinfect a computerwithoutpermissionorknowledgeoftheuser • spreads from one computer to another when its host (such as an infected file) is taken to that computer • viruses always infect or corrupt files on a targeted computer
Worm • Worm : a computer program that • is a self-replicatingcode • Resides in active memory (the program is executed) • Propagates itself • uses a networktosendcopiesofitselftoothernode • can spread itself to other computers without needing to be transferred as part of an infected file • always harm the network
Trojan horse • Trojan horse : a program that • installs malicious software while under the guise of doing something else • differs from a virus in that • a Trojan horse does not insert its code into other computer files • appears harmless until executed
Logic Bomb • Logic Bomb : a program that • inactive until it is triggered by a specific event, e.g. • a certain date being reached • once triggered, the program can perform many malicious activities • is difficult to defend against
Spyware • Spyware: a computer programthat • installedsurreptitiouslyon a personal computer • tointerceptortakepartialcontrolovertheuser's interactionwiththecomputer, withouttheuser's awareness • installingadditionalsoftware • redirectingweb browser activity • secretlymonitorstheuser's behavior • collectsvarioustypesofpersonal information,
Mobile Code • Mobile Code (more spyware) • Executable code on a webpage • Code is executed automatically when the webpage is downloaded • Javascript, Microsoft Active-X controls, etc. • Can do damage if computer has vulnerability
Social Engineering in Malware • Social Engineering in Malware • Social engineering is attempting to trick users into doing something that goes against security policies • Several types of malware use social engineering • Spam • Phishing • Spear phishing (aimed at individuals or specific groups) • Hoaxes
Denial-of-service (DoS) attack • Denial-of-service (DoS) attack : a threat that • Prevents legitimate traffic from being able to access the protected resource • Common DoS • Crashes a targeted service or server • Normally done by • Exploiting program buffer overflow problem • Sending too many packets to a host causing the host to crash
Zombies • Zombies : systems that • Have been infected with software (e.g. Trojan or back doors) • Under control of attackers • Be used to launch an attack against other targets • Insecure/poorly designed applications • One of the most difficult threats to be detected
Cyberterrorists • Cyberterrorists • Terrorists that attack the network and computer infrastructure to • Deface electronic information (such as web sites) • Deny service to legitimate computer users • Commit unauthorised intrusions into systems and networks that result in infrastructure outages and corruption of vital data
Security Terminology • Security attack • Any action that compromises security information, or • The use or exploitation of a vulnerability. • Security mechanism • A mechanism that designed to detect, prevent, or recover from a security attack • Security service • A service that enhances the security of data processing systems and information transfers. • Makes use of one or more security mechanisms
Risk • Risk • A qualitative assessment describing the likelihood of an attacker/threat using an exploit to • successfully bypass a defender • Attack a vulnerability • Compromise a system • Riskanalysis: • Providesaquantitativemeansofdeterminingwhetheranexpenditureonsafeguardsiswarranted
Definitionofcomputerandnetworksecurity • Security • In a general-use environment, the system will not be openly vulnerable to • Attacks, • Data loss, • Privacy loss • Security is about the protection of assets* • Protective measures • Prevention • Detection • Reaction/Response *From:GollmannD.,ComputerSecurity,JohnWiley&Sons,1999
Definitionofcomputerandnetworksecurity • Information security • The tasks of guarding digital information • Information : • Typically processed by a computer • Stored on a some devices • Transmitted over a network • Ensures that protective measures are properly implemented • A protection method
Definitionofcomputerandnetworksecurity • Computer Security • Computer security deals with the prevention and detection of unauthorized actions by users of computer system* • The goal is to protect data and resources • Only an issue on shared systems • Like a network or a time-sharing OS • No “global” solution *From:GollmannD.,ComputerSecurity,JohnWiley&Sons,1999
Definitionofcomputerandnetworksecurity • Computer security • No absolute “secure” system • Security mechanisms protect against specific classes of attacks
Definitionofcomputerandnetworksecurity • Network security • Security of data in transit • Over network link • Over store-and-forward node • Security of data at the end point • Files • Email • Hardcopies
Network security differences from computer security Attacks can come from anywhere, anytime Highly automated (script) Physical security measures are inadequate Wide variety of applications, services, protocols Complexity Different constraints, assumptions, goals No single “authority”/administrators Definition of computer and networksecurity
Protective measures • Prevention • Take measures that prevent assets from being damaged • Addresses the steps to deter an attack or lessen a system compromise • The measures, e.g. • Physical network architecture • Firewall elements • Antivirus systems • System hardening • User education
Protective measures • Detection • Take measures that be able to detect when an asset has been damaged • Knowing when a system is under attack • Provides an important step toward responding to threats • Examples of measures • Intrusion Detection System (IDS) • SNORT
Protective measures • Reaction/Response • Take measures that be able to recover from a damage • Common mitigation (lessen) options • Intrusion Prevention System (IPS) • (an IDS that remove access control) • Backup devices • Response procedure
Protective measures • Example of response procedure (POLICIES) • Turn off the compromised systems : may be desirable to • Power off and individual workstation • Shutting off a server • (could cause a significant impact for many mission-critical environment) • Inform law enforcement • Which organization?
Protective measures • Example of response procedure (POLICIES) • Reset the system, investigate the cause • Some attacks • Restore the system should be sufficient • Complicated attacks • Blindly resetting a system may not lessen the problem • Should analyze the attack methods • Reset the environment to a state that led to the initial compromise !! • For sensitive information • How much information was compromised> • How long was the attacker accessing the system? • Knowing this • Directly leads to damage control
Protective measures • Example of response procedure (POLICIES) • An individual/team in charge of leading the response • Have one can save valuable time
Threat Models : Internal versus External • Internal attacker motivation • Corporate spies • Disgruntled employees • Personal issues, e.g. • Disagreement with boss or coworker • General frustration • Unfair disadvantage • Greed • May see value in selling insider access to an interested external party • Curiosity • Ignorance • May not be aware that specific information should be confidential
Threat Models : Internal versus External • External attacker motivation • Political • Status demonstrate his/her skill • Power show his/her technical superiority
Internal v.s External Attacker/ing Probe and Exploit Attack Packets
Internal v.s External Attacker/ing Source IP Address Spoofing
Internal v.s External Attacker/ing Chain of Attack Computers For probes whose replies must be received, attacker sends probes through a chain of attack computers. Victim only knows the identity of the last compromised host (123.125.33.101) Not that of the attacker
Internal v.s External Attacker/ing • Traditional External Attackers: Hackers • Social Engineering • Social engineering is often used in hacking • Call and ask for passwords and other confidential information • E-mail attack messages with attractive subjects • Piggybacking • Shoulder surfing • Pretexting • Etc. • Often successful because it focuses on human weaknesses instead of technological weaknesses
Security Goals • Confidentiality • Authenticaion • Authorizatoin • Integrity • Repudiation • Availability (most common : CIA confidentiality, integrity, availability)