1 / 41

Understanding e-mail and web Security

Understanding e-mail and web Security. By Richard Hammer LANL LA-UR-08-2558. In the news!.

zandra
Download Presentation

Understanding e-mail and web Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding e-mail and webSecurity By Richard Hammer LANL LA-UR-08-2558

  2. In the news! The initial entry of malware into the ORNL networks reportedly came via a phishing email that took advantage of a temporary vulnerability in the Internet Explorer (a Microsoft fix came April 12, a day after the lab identified the intrusion). knoxnews.com RSA, the security division of EMC, has revealed the firm's data breach in mid March was the result of a spear phishing attack. The spear phishing attack exploited an Adobe Flash vulnerability that was unpatched at the time. computerweekly.com Sony is warning customers who use the Playstation Network and/or Sony Online Entertainment to be on the alert for possible spearphishing attacks. The company suffered a data breach and says a hacker may have gained access to over 24 million accounts including email addresses, birthdates, phone numbers, passwords, and more-including credit card numbers, which have been spotted for sale in several cybercrime forums. allspammedup.com Epsilon--the largest distributor of permission-based email in the world--revealed that millions of individual email addresses were exposed in an attack on its servers. While no other information was apparently compromised, security experts are warning users to brace for a tidal wave of more precise spear phishing attacks. pcworld.com Among Epsilon’s clients affected are three of the top ten U.S. banks – JP Morgan Chase, Citibank and U.S. Bank — as well as Barclays Bank and Capital One.

  3. Old and New Threats

  4. What attackers need from us! • Need us to execute a program • Need us to NOT securely configure our programs/systems • Need us to NOT pay attention • Need us to NOT patch/update • Need us to be careless, gullible or curious • Need us to NOT understand the technology Computing as a Privileged User makes it real easy! “It’s that easy because we allow it to be that easy” Frank Abagnale

  5. Understanding e-mail • Clear text e-mail is completely unreliable. • How do you recognize bogus e-mail? • What is URL redirection? • How do you protect yourself? • Secure settings? • Stop Phishing! • Outlook?

  6. Why you should not Trust Clear Text e-mail • Do not know who sent it • Do not know who sees it • Do not know where it went • Do not know who read it • Do not know if content changed • Still on server, backups? • Sys Admins have full access

  7. Encrypting e-mail? • Only Intended Recipients can read messages or open files • Data has not been modified • Data is from the expected source • Not readable in transit • Not just SSL/TLS to server • PGP/SMIME/Entrust

  8. How do you recognize bogus e-mail? • Don’t know the sender? • Is the offer “too good to be true?” • Asks for personal information! • Embedded links that point to an address that doesn’t appear right. • Your email address is not listed on the “TO” or “CC”. • The “FROM” & “Return-Path” don’t match. • Unexpected attachments.

  9. Phishing right here in LA! • Guy Lisella “Anytime they ask for personal information, it’s a scam.” • Legitimate businesses will NEVER ASK for personal information to be transmitted over clear text e-mail! • If unsure, call them.

  10. What is wrong?

  11. Understanding URLs/Redirection http://computername.subdomain.domain.name/directoryname/resourcefile.htm Where you thought you were going: http://www.dncu.org/login.aspx?update Computer name – www Domainname – dncu.org IP Address – 206.107.78.175 Resource file – login.aspx Where you are redirected: http://www.dncu.org.hi-position.com/register/login.html Computer name – www Subdomain – dncu.org Domainname – hi-position.com IP Address – No longer registered, but was 202.168.210.1XX Directory – register Resource file – login.html

  12. Look at the e-mail header • Eudora – Blah, Blah, Blah • Outlook – Open Message, Message tab, Options, Internet Headers • Webmail – Click on Full Headers • Thunderbird – Menu Bar, VIEW/HEADER, ALL

  13. http://www.facebook.com.herrazzb.eu/...

  14. http://up-dates.lanl.gov.secure.1-central.net/...

  15. Stop Right There!

  16. E-mail client configuration • Do NOT auto execute anything • Do NOT automatically download HTML graphics or content • Do NOT display graphics in message • Do NOT allow executable html content • Turn OFF Attachment Preview • If NOT sure configure to “WARN ME BEFORE”

  17. Outlook Settings (Tools/Trust Center)

  18. Before and After (Mac Mail)

  19. Outlook, do you see Xs?

  20. What’s Wrong? Unknown sender, not addressed to me, has an attachment I did not expect.

  21. Virus protection caught it three weeks later, don’t be the first to open it!

  22. Web Browser Security • Understand how it works • SSL/TLS • Privacy Settings • Security Settings • “Warn me” is always a good option when not sure • Scripts • Understand Threats • Internet Explorer?

  23. Web Access (SSL/TLS) • SSL Developed by Netscape (1994) • Certificate Exchange • System to System • Certificate Authority • Should only use SSL 3.0 or TLS 1.0 • Is it secure? • Redirection • Man-in-Middle Attack

  24. Keeping Track of State • SessionID https://ucfy.ucop.edu/ucfy/BaseServlet;jsessionid=0000q9ZvjIPe7xWTjxeftFjTqBy:-1 • Cookie • Persistent • Non- Persistent • Hidden Form Element

  25. Redirection and Man-in-Middle

  26. Warning, should I proceed?

  27. Secure ???

  28. Private Browsing (Firefox) <Tools><Start Private Browsing>

  29. InPrivate Browsing (IE) <Tools><InPrivate Browsing>

  30. Security Settings (Firefox) <Tools><Options>

  31. Firefox - Noscript

  32. Firefox – Noscript (2)

  33. Firefox – Noscript, Temporary Allow ALL

  34. Recipe for a Secure Web Transaction • Ensure SSLv3/TLS (one time thing) • Open New Firefox Browser • Start Private Browsing • You initiate the connection • Only go to sites associated with transaction • Use Noscript and only allow needed scripts • Pay attention to error messages • Logout when done THESE ARE NOT THE SAME!!! • Close browser

  35. Redirection, not just networking

  36. Passwords Everywhere?

  37. Client Protection Summary • User vs Admin Privilege • Virus Protection • Spyware/Adaware Protection • Keep Systems & Applications updated • Remove programs you don’t need • Secure Program Settings • Don’t Auto execute

  38. Client Protection Summary • DO NOT open attachments unless you expect them. • Don’t click on embedded links • Pay attention to warning messages • POP-UP blockers • Clear privacy settings • Noscript

  39. Client Protection Summary • If it’s “too good to be TRUE,” it is! • When configuring programs keep personal information to a minimum. • Stay away from shady web sites • Backup your data • One-time Credit Card Numbers • Shutdown when not using system

  40. Client Protection Summary • Encrypt sensitive information • Password Wallet • Application Layer Personal Firewall • Outlook and Internet Explorer: • Consider replacing these programs. • Keep them patched/updated.

  41. Educate Yourself! & Always Initiate the Communication

More Related