1 / 45

CSCD 396 Essential Computer Security Fall 2009

CSCD 396 Essential Computer Security Fall 2009. Lecture 2 - Security Overview Reading: Chapter 1. Overview. Learning Objectives Become acquainted with the threats Look at popular statistics reports Understand why computer security is difficult Learn basic security definitions.

zev
Download Presentation

CSCD 396 Essential Computer Security Fall 2009

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSCD 396Essential Computer SecurityFall 2009 Lecture 2 - Security Overview Reading: Chapter 1

  2. Overview • Learning Objectives • Become acquainted with the threats • Look at popular statistics reports • Understand why computer security is difficult • Learn basic security definitions

  3. Motivation for Computer Security • Most people ... have attitude • Why should I care? • So, why should you care?

  4. Motivation for Computer Security • So, why should you care? • Threats are real! • Identity theft, malware, stolen resources for botnets, credit card theft • Privacy ... corporate and government threats • You need to know your right to protect your privacy!!! • Look at a few statistics to motivate the need for computer security

  5. Symantec Report • Symantec Notes 2008/2009 trends • Web based attacks continue to be very popular • Popular, trusted sites with a large number of visitors, can yield thousands of compromises from a single attack • In 2008, huge increase in malware available • Semantec, number signatures for their anti-malware products increased substantially • Summer 2009 • Michael Jackson death, Farah Fawcett too • Spammed out hundreds of fake news links resulted in drivey-by downloads of malware

  6. Symantec Signatures • 1,656,227 signatures is 165% increase over 2007

  7. More Symantec Stats Phishing Incentive is largely financial

  8. More Symantec Stats • Once attackers have obtained financial information or other personal details • Names, addresses,and government identification numbers • Frequently sell data on underground economy • Most popular item for sale ... credit card numbers • Organized groups figured out ways to use those cards to obtain and use those funds

  9. More Symantec Stats • Some groups in underground economy specialize in manufacturing blank plastic cards with magnetic stripes • Can be encoded with stolen credit card and bankcard data. • Requires highly organized level of sophistication, cards often produced in one country, imprinted, and then shipped to countries from where stolen data originated

  10. More Symantec Stats • Popularity of items for sale on underground economy

  11. Trojan Named Gozi • In 2007, SecureWorks Security Research Group discovered new Trojan captured credentials of several Internet banking and e-commerce websites http://www.secureworks.com/research/threats/gozi/ • Trojan, Gozi, forwarded captured credentials to online database - were being sold to the highest bidder • SecureWorks Security Research Group uncovered a cache of stolen information • Over 10,000 account records containing • Online banking user credentials • Patient healthcare information • Employee login information for confidential government and law enforcement applications • Further investigation data offered for sale by Russian hackers for amount totaling over $2 million

  12. Conficker Worm • In 2009, new threat, a new worm! • Also ... Downup, Downandup, Conflicker, and Kido • SRI researcher reported in March 2009, • “Cumulative census of Conficker.A indicates it affected more than 4.7 million IP addresses, while Conficker.B, has affected 6.7 million IP addresses” • Exploit used by Conficker known in September/2008 • Chinese hackers were reportedly first to produce a commercial package to sell this exploit (for $37.80)

  13. Conficker Worm • Exploit causes Windows 2000, XP, 2003 servers, and Vista to execute an arbitrary code segment without authentication • Spreads itself primarily through a buffer overflow vulnerability in the Server Service on Windows computers. • Worm uses a specially crafted RPC request to execute code on the target computer • Affects systems with firewalls enabled, but which operate with print and file sharing enabled • Patch for this exploit was released by Microsoft on October 23 2008

  14. CSI/FBI Cybercrime survey • Annual CSI Study 2009: Cost of Cybercrime is still high, http://www.personal.utulsa.edu/~james-childress/cs5493/CSISurvey/CSISurvey2009.pdf • Interesting in that fewer respondents will answer the losses questions ... data for this past year show a decrease in losses but still up over two years ago • Average annual losses of $234,000 in the past year, up from the $168,000 they reported two years ago • 43% of the overall respondents said that they had suffered a security incident. • 33% said their organizations had supposedly originated phishing attacks • Financial fraud - the source of the greatest financial loss • > $450,000

  15. AVG Security Software Predictions 2008 1.Web exploits and web-based social engineering attacks Viruses will continue to be a threat, also see explosion of exploits through social engineering and Web 2.0 attacks in 20082. Storm Worm on the rise. Orchestrated attacks are expected across multiple platforms.3. Email-propagated viruses. Many novice users remain unaware of email security issues and continue to open attachments from senders they do not know or click on unsafe hyperlinks.4. Web exploits targeting trusted web sites5. With increasing adoption of Microsoft's latest operating system, Vista will become a bigger and thus a more tempting target for the bad guys

  16. Return from the Dead Exploits that come back • Links to exploits that return again and again • Gozi • http://www.trustdefender.com/blog/2010/02/28/gozi-a-perfect-example-of-an-older-trojan-re-inventing-itself/ • Storm Worm • http://community.ca.com/blogs/securityadvisor/archive/2010/04/26/the-come-back-of-storm-worm.aspx • Conficker • http://www.zdnet.com/blog/hardware/making-sense-of-the-latest-conficker-update/4131

  17. Difficulty of Computer Security

  18. General Comments • Online security mirrors offline • Motivation and psychology same for “online and offline” world • “Where there is money, there is crime” • Difference between online and offline is • Harder to track, capture and convict online criminals • Plus, several aspects of online attacks magnify their effects

  19. Computer Security is Difficult • Why do you think this is true?

  20. Computer Security is Difficult • Why is this so? 1. Automation of attacks • Tools enable attackers to access thousands of computers quickly • Slammer worm, 2003, infected 75,000 computers in 11 minutes, continued to scan 55 million computers / sec • Blaster worm, 2003, infected 138,000 in first 4 hours, and over 1.4 million computers

  21. Computer Security is Difficult 2. Sophistication of attacks • Convergence of threats by sophisticated tools • MPack and other Trojans exhibit trait • Once installed, they can be used to view confidential information that can then be used in identity theft or fraud • They can also be used to launch phishing attacks or to host phishing Web sites • Finally, they can be used as spam zombies

  22. Computer Security is Difficult 3. Software vulnerabilities are increasing • Hard for software vendors to keep up with vulnerabilities discovered, less than 6 days from discovery of vulnerability to creation of exploit CMU/CERT Software Vulnerabilities http://www.cert.org/stats/ Vulnerabilities 1995 – 171 2005 – 5990 Years

  23. Computer Security is Difficult 4. Zero Day attacks • A vulnerability discovered by attacker, not the developer. So, zero day grace period. Must scramble to find the vulnerability and patch it • Example: • Hacker released attack code that exploited an unpatched vulnerability in Apple' Quicktime week after company updated media player to plug nine other serious vulnerabilities, September 18, 2008 • Apple updated player five times since beginning 2008, and fixed more than 30 flaws!!

  24. Computer Security is Difficult 5. No Borders, No Boundaries • Attackers can be distant from targets • Instead of worrying about criminals in your home town, worry about all criminals in the world • And, how do you prosecute people across country borders? • Think this is easy?

  25. Computer Security is Difficult 5. No Borders, No Boundaries • Example: In 1995, 29 year old hacker from Russia made $12,000,000 breaking into Citibank computers • Most of the Money was later recovered but expediting hacker from Russia to stand trial was difficult • He was later apprehended in London and extradited to the US to stand trial • Got three years ... see link at end of lecture

  26. Computer Security is Difficult 6. Technique Propagation • Publish attacks so everyone can use them • Damage can grow exponentially • Only need a few skilled people, many use their exploits and this amplifies the damage of attacks • So, search in Google for string, “How to write a virus?” • Comes back with 17,100,000 hits! • Some good advice on writing RFID viruses

  27. Computer Security is Difficult 7. Badly Designed Security Controls, users are required to make security decisions • Most users do not have enough knowledge to make the kind of decisions they are required to make • How many will click Cancel?

  28. Computer Security Defined

  29. Definitions • Information Security • Information security - protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction • Terms information security, computer security and information assurance are frequently used interchangeably http://en.wikipedia.org/wiki/Information_security

  30. Definitions • Three common attributes of computer security • What are they?

  31. Definitions • Three common attributes of computer security • What are they? 1. Confidentiality • Example? • Confidentiality is preventing disclosure of information to unauthorized individuals or systems • Example, credit card transaction on the Internet • System enforces confidentiality by encrypting the card number during transmission or limiting the places where it might appear

  32. Definitions 2. Integrity • Integrity means that data cannot be modified without authorization • Example? • Integrity is violated • When an employee (accidentally or with • malicious intent) deletes important data files, • When a computer virus infects a computer, • When an employee is able to modify his own • salary in a payroll database, • When an unauthorized user vandalizes web • site

  33. Definitions 3. Availability • Information must be available when it is needed. • High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades • Example of violation? • Ensuring availability also involves preventing DoS attacks denial-of-service attacks • See this in following slide ...

  34. DDoS Attack Example • July 21, 2008, Web site for president of Georgia was knocked offline by a distributed denial-of-service (DDOS) attack • Another in a series of cyberattacks against countries experiencing political friction with Russia • Georgia's presidential Web site was down for about a day, starting early Saturday until Sunday • Network experts said the attack was executed by a botnet • Definition of Botnet • http://www.pcmag.com/encyclopedia_term/0,2542,t=botnet&i=38866,00.asp

  35. Another DDoS Attack Example • February 16th, 2007 • Anti-phishing group, CastleCops.com was knocked out by a massive DDoS, • Volunteer-driven site, run by husband and wife team had been coping with on-and-off attacks since February 13 • An intense wave that began around 3:45 PM EST completely crippled the server capacity • CastleCops.com just celebrated its fifth anniversary as a high-profile anti-malware community • Comment: This site ceased operation Dec. 2008

  36. More Definitions • Vulnerability • How would you define it? • A security exposure in an operating system or other system software or application software component • Security firms maintain databases of vulnerabilities based on version number of the software • If exploited, each vulnerability can potentially compromise the system or network • For a database of common vulnerabilities and exposures, visit http://icat.nist.gov/icat.cfm

  37. More Definitions • assets • In business and accounting, assets are everything owned by a person or company that can be converted into cash • Personally, anything that has value • Assets typically need to be protected • Part of the problem is • Information is not considered assets!

  38. More Definitions • exploit • An exploit is piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability • Purpose is to cause unintended or unanticipated behavior to occur on computer software or hardware • Gaining control of a computer system or allowing privilege escalation or a denial of service attack

  39. More Definitions • exploit • Examples of Current Active Exploits • Zues Trojan – Steals your personal data • BackDoor-DTN - Trojan that has rootkit capabilities • Allows attacker to gain Administrator privileges • This backdoor has also password-stealing capabilities and can log keystrokes of the system • Many others ... see viruslist.com link in references

  40. Sum up Definitions • Attackers look for vulnerabilities in systems • Typically in software, but others exist • Once they find a vulnerability, use an exploit of some kind to gain access to the system • Looking for assets that have value • Information assets are things like SSN’s, credit card information or other information that lead to identity theft • Other assets are use of computers to create botnets

  41. References Wiki page on Russian Hacker http://en.wikipedia.org/wiki/Vladimir_Levin Symantec Security Threat Report http://www.symantec.com/business/theme.jsp?themeid=threatreport Law Firm IT Manager Shows Gozi Video to Backdoor Service http://lawfirmit.blogspot.com/2009/04/video-gozi-trojan.html AVG Software Threats 2008 http://www.net-security.org/secworld.php?id=5703 CSI/FBI Annual Computer Security Survey http://www.gocsi.com/forms/csi_survey.jhtml;jsessionid= WAEOHNS1JTLLTQE1GHPSKH4ATMY32JVN

  42. References Continued • Zues trojan – Nasty exploit http://itknowledgeexchange.techtarget.com/security-bytes/zeus-trojan-evades-antivirus-software-trusteer-says/ • BackDoor-DTN – Trojan http://www.esecurityplanet.com/alerts/article.php/3808996/36-BackDoor-DTN-Trojan-Exploits-Microsoft-Flaw-to-Give-Attacker-Admin-Privileges.htm VirusList Site for Listing current infections http://www.viruslist.com/

  43. Questions for Monday • Next Monday, we will have a discussion during second part of class • Want you to look up answers to following questions. • Type or write down some answers including references • You will be turning in this paper! • Be prepared to discuss them in class

  44. Questions for next Monday • Come prepared to discuss 1. What is the most common software vulnerability? 2. Why is this software vulnerability still a problem? 3. Name a known exploit that happened this last year? How extensive was the damage? Who was targeted? 4. Report on a computer security related problem that happened to you or someone else you know Cite your references!!

  45. The End Next Time: Attackers • Monday - Book, Chapters 1, 3, 16 (optional 7)‏ • Wed: There is a Lab this week!!! Read material, preparation for the lab, See Lab1 under Labs

More Related