400 likes | 600 Views
Ch. 11: IS Security. Gerhard Steinke BUS 3620. According to Internetworldstats.com , there are 2,095,006,005 internet users worldwide. It is now unsafe to turn on your computer. Slammed on All Sides. Viruses. Employee Error. Rogue Insiders. Software Bugs. Corporate Spies.
E N D
Ch. 11: IS Security Gerhard Steinke BUS 3620 According to Internetworldstats.com, there are 2,095,006,005 internet users worldwide Steinke
Slammed on All Sides Viruses Employee Error Rogue Insiders Software Bugs Corporate Spies Script Kiddies Web Defacements Password Crackers Network vulnerabilities Denial of Service War Drivers “SneakerNet” Backdoors Worms Trojans Buffer Overflows “Blended Threats” Steinke
Definition: Information Security • Confidentiality • Protecting information from unauthorized disclosure • Integrity • Protecting information from unauthorized alternation/destruction • Availability • Ensuring the availability and access to the information Availability Integrity Confidentiality
The Threat: Who Are They? • Internal (authorized users (intentional & unintentional), contract worker, etc.) • Hackers (‘script kiddies’ to experts) • Industrial Espionage (legal? acceptable in some countries and sometimes government funded) • Foreign Espionage • Criminal (financial or criminal motivation) • Other (terrorists, political activists) Steinke
The Cyber Security Threat • The threat is global • The attack sophistication is increasing • The skill level required to become a threat is decreasing • We live in a “Target Rich” environment • Exposure time and response time are critical Steinke
What Are They Doing? • Corrupting Information • Viruses, worms • File deletion • Data tampering (medical & financial), Web page hacks • Disclosing Information • Public release of private data • Selling of private or financial data (e.g., stolen charge card numbers) • Stealing Service • Using site as intermediary for attacks • Denial of Service (preventing the use of IT resources) • Network flooding • Crashing systems or services Steinke
Security Awareness - Posters Steinke
Technical Security Measures: Firewalls • A system which examines network packets entering/leaving an organization and determines whether the packets are allowed to travel ‘through’ the firewall Organization Steinke
Firewalls - DMZ Steinke
Match Alarm Intrusion Detection System (IDS)Intrusion Prevention System (IPS) • attempts to detect/prevent someone breaking into your system • running in background and notifies you when… Steinke
Decryption Exercise Can you decrypt these? • mfuttubsu • cepninotry Steinke
Why Encryption? • Disguising message in order to hide its substance • Based in logic and mathematics • Confidentiality • Message wasn’t changed • Authentication • who really sent message? • Integrity • was message altered? • Non-repudiation • so sender cannot deny they sent message Steinke
Encryption • Substitution Cipher (13) ABCDEFGHIJKLMNOPQRSTUVWXYZ NOPQRSTUVWXYZABCDEFGHIJKLM • Transposition Cipher • Rearranging all characters in the plaintext • Attack: frequency of letters • Concealment – hide in text • Break Encryption by brute force - try all possible keys • key length • Steal, bribe, replace encryption software, flaws in system Steinke
Steganography • Hiding information • http://www.jjtc.com/Steganography/ • http://www-users.aston.ac.uk/~papania1/stegano.html • S-tools demo Steinke
Symmetric / Secret Key • same key for encryption and decryption • confidentiality • secure key distribution required • otherwise could impersonate sender as well • scalability - n users require n*(n-1)/2 keys Steinke
Asymmetric or Public/Private Key Encryption • Two keys – one encrypts, the other decrypts • Public and Private keys generated as a pair • Private key for user • Public key for distribution • Each key decrypts what the other encrypts • Confidentiality, integrity, authentication and non-repudiation • Intensive computations, slow
Hash / Message Digest Function • Create hash value / digital fingerprint • Provides integrity checking • Shorter than original message • Variable length message to fixed length hash value • One way function, can’t go back • Appended to message • Examples: • MD5 - 128 bit hash • SHA - 160 bit, by NIST, NSA in DSS (Digital Signature Standard)
Digital Signatures • Create a hash value • Encrypt hash value with your private key • Attach to message to be sent • Encrypt with recipients public key • Send
What does Digital Signature do? • Integrity – Message not changed • Authentication - Verify sender identity and message origin • Creates non-repudiation • Applications: • Used to authenticate software, data, images • Used with electronic contracts, purchase orders • Protect software against viruses
Security Basics • Security policy • document security principles • Educate users - what and why of security • Physical Security • Monitor network • Passwords Steinke
PC Security • gateway to network • access to information on PC • power on password, screen saver password • encryption • password protect files, disk drive • erase information when deleting a file Steinke
Software Control • control program change requests • require multiple authorizations • require full documentation • independent testing of changes • check with operations before acceptance • procedure to handle emergency situations Steinke
Operational Controls • investigate error messages, reports, alarms • monitor communication lines for failures, problems • monitor network status for operational, out-of-service stations • monitor traffic queues for congestion • control tapes, disks and other system materials to ensure proper labeling and retention Steinke
maintain backup for programs, tapes and other material • examine system printouts, program dumps, recovery printouts • monitor vendor and maintenance personnel • control testing during operational hours • ensure that changes to hardware and software are necessary Steinke
Biometrics • Identify people by measuring some aspect of individual anatomy or physiology, some deeply ingrained skill, or other behavioral characteristic or something that is a combination of the two • Handwritten signatures • Face Recognition • Fingerprints • Iris Codes • Voice • Retina Prints • DNA Identification • Palm Prints • Handwriting Analysis
Errors • All recognition systems are subject to error • ‘Fraud’ / ‘false positive’ • A client is accepted as authenticated when they should have been rejected • ‘Insult’ / ‘false negative’ • A client is rejected as NOT authenticated when in fact they should have been accepted.
Face Recognition • The oldest way • There is widespread acceptance (and requirement!) for photo ID • The issuing of other authentication devices (like passwords, key cards, digital signatures) usually depends on facial recognition by the agents of the issuing authority • Photo-ID is not particularly reliable, but has a very significant deterrent effect
Facial Scan • Strengths: • Database can be built from driver’s license records, visas, etc. • Can be applied covertly (surveillance photos). (Super Bowl 2001) • Few people object to having their photo taken • Weaknesses: • No real scientific validation • Attacks: • Surgery • Facial Hair • Hats • Turning away from the camera • Defenses: • Scanning stations with mandated poses
Fingerprints • Accounts for the majority of sales of biometric equipment • The ridges that cover the fingertips make patterns, that were classified in the 1800’s • These patterns have loops of several distinct types, branches, and endpoints. • Because of the association with criminals, commercial users are very reluctant to impose fingerprinting systems upon their clients • Fingerprint sensors on laptops
Iris Codes • Iris patterns believed to be unique • The patterns are easy enough to detect • They do not wear out • They are protected by the eyelids and cornea • Easier to capture and process than fingerprints • A processing technique is used to generate a 256 byte iris code • Low false acceptance rates
Iris Codes • Practical difficulties: • Capturing the iris image is intrusive • The subject has to be co-operative
Voice Recognition • Strengths: • Most systems have audio hardware • Works over the telephone • Can be done covertly • Lack of negative perception • Weaknesses: • Background noise • No large database of voice samples • Attacks: • Tape recordings • Identical twins / soundalikes
Hand Scan • Typical systems measure 90 different features: • Overall hand and finger width • Distance between joints • Bone structure • Primarily for access control: • Machine rooms • Olympics • Strengths: • No negative connotations – non-intrusive • Reasonably robust systems • Weaknesses: • Accuracy is limited
Other Biometrics • Retina Scan • Very popular in the 1980s military; not used much anymore. • Facial Thermograms • Vein identification • Scent Detection • Gait recognition • Handwriting
A Comprehensive Security Program Policies & Management Sponsorship Procedures Reporting Practices and Procedures Assessment Service Provider Compliance Awareness and Training
Security Principles • impossible to provide complete security • match to value of assets • provide good security but keep system easy to use easy to use, little security <-----> difficult to use, high security Steinke