Professional Documents
Culture Documents
$45 million Quebec Drug arrest Hacking scam Poland, Brazil, Manitoba, and the United States Age 17 to 26 Computer network
Cuckoo's Egg
Drug arrest Canada: police have broken up a major international computer-hacking network Target: unprotected personal computers around the world Police arrested 16 people age between 17 and 26 Online to attack and gain control of as many as one million computers worldwide
Csilla Farkas
Associate Professor
Dept. of Computer Science and Engineering University of South Carolina farkas@cse.sc.edu http://www.cse.sc.edu/~farkas
Financial Loss
Dollar Amount Losses by Type
Security Protection
Percentage of IT Budget Spent on Security Percentage of Organizations Using ROI, NPV, or IRR Metrics
10
11
12
13
RISK
Vulnerabilities
Consequences
14
Security Objectives
Prevent/detect/deter improper Disclosure of information Prevent/detect/deter Improper modification of information
Secrecy
Integrity Availability
Prevent/detect/deter improper Denial of access to services
15
Security Tradeoffs
Security
COST
Functionality
Ease of Use
Computer Science and Engineering
16
Achieving Security
Policy What to protect? Mechanism How to protect? Assurance How good is the protection?
17
Policy
Organizational policy
18
Security by Obscurity
Hide inner working of the system Bad idea! Vendor independent open standard Widespread computer knowledge
19
Security by Legislation
Instruct users how to behave Not good enough! Important Only enhance security Targets only some of the security problems
20
Security Mechanism
Prevention Detection Tolerance and Recovery
21
Identification Authentication
22
Authentication
Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose identity is verified reveals knowledge of some secret S to the verifier Strong authentication: the entity reveals knowledge of S to the verifier without revealing S to the verifier
23
User Authentication
What the user knows Password, personal information What the user possesses Physical key, ticket, passport, token, smart card What the user is (biometrics) Fingerprints, voiceprint, signature dynamics
24
Access Control
25
Access Control
Protection objects: system resources for which protection is desirable Memory, file, directory, hardware resource, software resources, etc. Subjects: active entities requesting accesses to resources User, owner, program, etc. Access mode: type of access Read, write, execute
26
Access Control
Access control components: Access control policy: specifies the authorized accesses of a system Access control mechanism: implements and enforces the policy Separation of components allows to: Define access requirements independently from implementation Compare different policies Implement mechanisms that can enforce a wide range of policies
27
Open System
(maximum privilege) Access requ.
Exists Rule?
Allowed accesses
Exists Rule?
Disallowed accesses
yes
Access permitted
no
Access denied
no
Access permitted
yes
Access denied
28
Firewalls
29
Private Network
Firewall
External Network
Computer Science and Engineering
30
Firewall Objectives
Keep intruders, malicious code and unwanted traffic or information out
Private Network
Proprietary data
External attacks
External Network
Computer Science and Engineering
31
Cryptography
- Secret-Key Encryption - Public-Key Encryption - Cryptographic Protocols
32
Insecure communications
Snooper
Confidential
33
Plaintext
Encryption
Ciphertext
Decryption
Plaintext
34
Plaintext Encryption
Ciphertext Decryption
Plaintext
Sender
Recipient
C=E(K,M) M=D(K,C)
Computer Science and Engineering
K
K needs secure channel
35
Ciphertext
Sender
Recipient
C=E(Kpub,M) M=D(Kpriv,C)
Computer Science and Engineering
36
Kpub needs
reliable channel
Cryptographic Protocols
Messages should be transmitted to destination Only the recipient should see it Only the recipient should get it Proof of the senders identity Message shouldnt be corrupted in transit Message should be sent/received once only
37
Detection/Response
38
Misuse Prevention
Prevention techniques: first line of defense Secure local and network resources Techniques: cryptography, identification, authentication, authorization, access control, security filters, etc.
39
Intrusion Management
Intrusion Prevention: protect system resources Intrusion Detection: (second line of defense) discriminate intrusion attempts from normal system usage
40
41
42
Response/Tolerance
43
Incident Response
Federal Communications Commission: Computer
Security Incident Response Guide, 2001, http://csrc.nist.gov/fasp/FASPDocs/incidentresponse/Incident-Response-Guide.pdf Incident Response Team, R. Nellis, http://www.rochissa.org/downloads/presentations/Inci dence%20Response%20Teams.ppt NIST special publications, http://csrc.nist.gov/publications/nistpubs/index.html
Computer Science and Engineering
44
Intrusion Recovery
Actions to avoid further loss from intrusion Terminate intrusion and protect against reoccurrence Law enforcement Enhance defensive security Reconstructive methods based on: Time period of intrusion Changes made by legitimate users during the effected period Regular backups, audit trail based detection of effected components, semantic based recovery, minimal rollback for recovery
45
What is Survivability?
To decide whether a computer system is survivable, you must first decide what survivable means.
46
Cascading effects
47
How to Respond?
49
How to Respond?
50
How to Respond?
51
52
53
54
Gather evidences
55
56
57
58
Follow Up Procedures
Incident evaluation: Quality of incident (preparation, time to response, tools used, evaluation of response, etc.) Cost of incident (monetary cost, disruption, lost data, hardware damage, etc.) Preparing report Revise policies and procedures
59
Questions?
60