430 likes | 906 Views
Library Security Issues. Marshall Breeding Director for Innovative Technologies and Research Vanderbilt University http://staffweb.library.vanderbilt.edu/breeding. Alaska Library Association Annual Conference. February 24, 2006. The Threat.
E N D
Library Security Issues Marshall BreedingDirector for Innovative Technologies and Research Vanderbilt University http://staffweb.library.vanderbilt.edu/breeding Alaska Library Association Annual Conference February 24, 2006
The Threat • Hacking: unauthorized access to servers and workstations on your network • DoS: Denial of service: impedes legitimate access to your services • Worms: self-perpetuating attacks that spread among vulnerable systems • Viruses: Unauthorized program attached to a legitimate program (typically e-mail)
Security threats • Volume of attacks increasing • Sophistication of attacks increasing • Maliciousness of attacks have been far less than what might be possible in the future. • Commercial motivations: find ways to distribute SPAM and deliver hits to Web sites • Tools for creating attacks are becoming easier to use—”script kiddies” abound, but: • Fewer script kids, more professional code jockeys. • More 0-day scenarios: exploits available before security patches are available.
Consequences • Lost data • Interruption services • Reveal personal data about library users • General loss of productivity • Staff time for system administrators in recovery • Institutional embarrassment
Library Security Issues • Same concerns as commercial businesses and other organizations—no less of an issue • Protect the privacy of your library users • Protect your library’s services and data • Don’t let library systems become a jumping-off point for hackers to other networks or computers • Libraries are perceived as “an easy mark”
Targets • Servers • Operating System • Network services – Web, email, DNS, NFS, etc • Applications: ILS, Other database applications • Workstations – Less of a distinction today between servers and workstations
Security domains • Server / Workstation • Departmental • Enterprise Level
Develop Multiple Tiers of Security • Server / Workstation: Each individual computer must be well secured • Enterprise – protect the network as a whole • Departmental – enforce additional security measures appropriate to departmental needs
Server & Workstation Security Protecting systems individually
Server / Workstation • Protect the individual computer • Even if other layers of security protection fail, each computer on the network is well protected.
Operating System Security • Maintain an up-to-date operating system • Take advantage of automatic notification and updating services • Proactively monitor vulnerability reports • Install security-related patches expeditiously • Use personal firewalls • Part of Windows XP
Operating System Security • Use only what you need • Every network service and application requires attention to security • Install selectively • Check / Verify services and subsystems • Uninstall non-essential services
Application Security • Make sure that your core business applications (ie: ILS) run securely and enforce strong protection of all data elements. • Keep the application as current as possible • Work with vendors to insure tight security.
Buffer overflows • Both OS and Applications are subject to attacks through buffer overflows • Causes applications to abort, leaving the user at an unknown state. • Often the unknown state is root-level, or can get it.
Account Management • Review all delivered accounts – disable, rename, remove as appropriate • Pay special attention to accounts associated with network services and anonymous access • What account is associated with your Web server? And what are its privileges?
Password Management • Require the use of strong passwords • Long passwords of pass phrases • Do not use words in any dictionary, including foreign-languages • Do not use proper nouns • Do not use keyboard patterns • Enforce frequent password changes • Be prepared for staff grumbling
Password vulnerabilities • Never send a password over the network in the clear. • Ensure that all applications use encryption in its login sequence. • Secure passwords must never be exposed to insecure login systems • Require separate passwords for systems that don’t meet this requirement
Root-level accounts • Must be treated with extraordinary care • At a minimum enforce password requirements used for standard accounts • Do not let system administrators use root/Administrator level accounts for routine activities. • Login as Root only when making system changes that require superuser rights
Server / Workstation Firewalls • Personal Firewalls • Monitor incoming and outgoing network traffic • Enforces rules for allowed and non-allowed patterns • Port by port security • Application-specific rules
Personal Firewall examples • Zone Alarm (http://www.zonelabs.com) • Windows servers • Windows Firewall from Microsoft • TCP Wrappers • Unix
Workstation-level virus protection • Scans incoming mail and files for signatures revealing known viruses and worms • Must be active continuously and updated routinely to be effective • Generally considered to be a secondary layer of protection in organizations that implement enterprise-level scanning.
Server considerations • Do not run mail clients on network servers • Avoid introducing security problems on a server through a Web client • Web browser needed for installation of server software • Browse only to sites you consider reliable and safe.
Enterprise-Level Security Protect the network as a whole
Network Firewall • Intelligent router that passes traffic based on pre-established rules • Can block traffic on any given ports • Can block traffic to specific computers within the organization • Packet-by-packet analysis
Denial of Service protection • Most firewalls protect from DoS • Port scanning – outsiders building a network map • Aggressive attacks can flood firewall, effectively creating a DoS • Logging of attacks is helpful, but often needs to stop during an aggressive attack to avoid flooding.
Enterprise Network Security Architecture • Trend toward managing security on the enterprise level • Divides the network into security zones • Enforced through VLANs • Internal firewalls
Limit / Eliminate Network Sniffing • Ethernet allows for promiscuous mode for packet viewing • Shared media Ethernet exposes entire segment • Switched Ethernet limits what a packet sniffer can view. • Organizations moving toward switched Ethernet
Firewall Placement • Perimeter control established through primary Internet router • Many internal zones are just as threatening as Internet • Internal firewalls often established to protect highly sensitive computing systems from general purpose network
Virtual Private Networks • Offer end-to-end encryption across insecure security zones • Often works in conjunction with firewalls. • VPN client: communicates with VPN application on a firewall or server to establish a secure channel of communications.
Enterprise Virus protection • Eliminate viruses and other malicious attacks at the perimeter of the network • Move toward centralized mail services • Scanning performed before messages enter the mail delivery system • Example Trend Micro • Trend toward security appliances that perform spam filtering, virus protection, bandwidth shaping and other security-related features.
Enterprise Virus protection • Much more effective than workstation-level utilities • Uses sophisticated detection systems that can be updated very frequently. • Less reliant on human intervention • Virtually eliminates the possibility of a virus making its way to the workstation • Not fool-proof
Departmental Security • Each department or unit within an organizational should assess the security needs appropriate to its role or mission. • Libraries may need zones that offer more open access than the enterprise • May have other specialized concerns with security implications: Public access computing, internet filtering, etc.
Departmental services • What services should be provided department and what services should be provided by the enterprise • Most organizations moving more toward supplying network services at the enterprise level • Mail, file services, DNS, etc. • Only specialized applications run by departments • ILS • Many organizations moving away from all departmental computing in favor of the enterprise • The network is as secure as its weakest links
Library Security • Libraries need to operate within the security standards of their higher level IT support organizations • Libraries have some security requirements often not well understood by IT • Public-access computing challenging from a security perspective
Public workstation security • Many products and techniques for “securing” public workstations • Deal more with inhibiting tampering than with ensuring networking security • Don’t trust what happens on workstations with anonymous unauthenticated access regardless of the level of anti-tampering control • Segregate public computing from staff computing
Library Network With Public / Staff Separation Router / Firewall Router Ethernet Switch Ethernet Switch Ethernet Switch Library Staff Workstations Access Point Public Access Workstations
Final thoughts • Good security is expensive and time-consuming • Requires constant attention • Necessary overhead for organizations like libraries that provide network-based services • Shouldn’t stymie the organization
Questions / Discussion Marshall Breeding Marshall.breeding@vanderbilt.edu http://staffweb.library.vanderbilt.edu/breeding