02 fundamental aspects of security

50
Network Security Fundamental Aspects Msc. Vuong Thi Nhung Faculty of Information Technology Hanoi University Aug 23, 2015

Upload: gemy-chan

Post on 23-Feb-2017

208 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: 02 fundamental aspects of security

Network SecurityFundamental Aspects

Msc. Vuong Thi NhungFaculty of Information TechnologyHanoi UniversityAug 23, 2015

Page 2: 02 fundamental aspects of security

Contents

History of Information Security Information Security Definition and Concept AAA & CIA models Threats and Risks Some security guidelines

Page 3: 02 fundamental aspects of security

The story of the Internet worm On November 2, 1988, Robert Morris, Jr., a

graduate student in Computer Science at Cornell, wrote an experimental, self-replicating, self-propagating program called a worm and injected it into the Internet.

He chose to release it from MIT, to disguise the fact that the worm came from Cornell.

Morris soon discovered that the program was replicating and reinfecting machines at a much faster rate than he had anticipated.

Ultimately, many machines at locations around the country either crashed or became “unreponsive”.

Page 4: 02 fundamental aspects of security

When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution. Eventually, they sent an anonymous message from Harvard over the network, instructing programmers how to kill the worm and prevent reinfection.

However, because the network route was blocked, this message did not get through until it was too late.

Computers were affected at many sites, including universities, military sites, and medical research facilities. The estimated cost of dealing with the worm at each installation ranged from $200 to more than $53,000.

Page 5: 02 fundamental aspects of security

The program took advantage of a hole in the debug mode of the Unix sendmail program, which runs on a system and waits for other systems to connect to it and give it email.

People at the University of California and MIT had copies of the program and were actively disassembling it (returning the program back into its source form) to try to figure out how it worked.

Teams of programmers worked non-stop to come up with at least a temporary fix, to prevent the continued spread of the worm.

The information didn't get out as quickly as it could have, however, since so many sites had completely disconnected themselves from the network.

Page 6: 02 fundamental aspects of security

After a few days, things slowly began to return to normalcy and everyone wanted to know who had done it all. Morris was later named in The New York Times as the author of incidents.

Robert T. Morris was convicted of violating the computer Fraud and Abuse Act (Title 18), and sentenced to three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision. His appeal, filed in December, 1990, was rejected the following March.

http://www-swiss.ai.mit.edu/6805/articles/morris-worm.html

Page 7: 02 fundamental aspects of security

After the incident, Morris was suspended from Cornell for acting irresponsibly according to a university board of inquiry. Later, Morris would obtain his Ph.D. from Harvard University for his work on modeling and controlling networks with large numbers of competing connections.

Robert Morris is currently an assistant professor at MIT (apparently they forgave him for launching his worm from their network) and a member of their Laboratory of Computer Science in the Parallel and Distributed Operating Systems group. He teaches a course on Operating System Engineering and has published numerous papers on advanced concepts.

Page 8: 02 fundamental aspects of security

What is Security

Security: “The quality or state of being secure—to be free from danger”

Security is The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information

Necessary tools: policy, awareness, training, education, technology

Page 9: 02 fundamental aspects of security

Layers of security

A successful organization should have multiple layers of security in place: Physical security - To protect the physical items, objects, or

areas of an organization from unauthorized access and misuse.

Personal security - To protect the individual or group of individuals who are authorized to access the organization and its operations.

Operations security - To protect the details of a particular operation or series of activities

Page 10: 02 fundamental aspects of security

Communications security - To protect an organization’s communications media, technology, and content.

Network security - To protect networking components, connections.

Information security- To protect the confidentiality, integrity and availability of information assets, whether in storage, processing or transmission.

It is achieved via the application of policy, education, training and awareness, and technology.

Page 11: 02 fundamental aspects of security

Building elements of Information Security Authentication

Access ControlAuditing

Page 12: 02 fundamental aspects of security

Authentication

Sender, receiver want to confirm identity of each other

Who am I talking to?

Page 13: 02 fundamental aspects of security

Example: FIT E-learning

ISP A

ISP D

ISP C

ISP B

Student V

FIT E-learning

Page 14: 02 fundamental aspects of security

Authentication: Who am I talking to?

ISP A

ISP D

ISP C

ISP BHello, I’m V FIT E-learning

Student V

Is that student

V?

Is that FIT ?

Page 15: 02 fundamental aspects of security

Authentication

Protection Mechanisms Password

Manual One-Time Password

Key Sharing Public-private keys Wifi

Challenge-Response Multi-factor Authentication

Page 16: 02 fundamental aspects of security

Access Control

Access control can be defined as a policy, software component, or hardware component that is used to grant or deny access to a resource.

Example of hardware components: A smart card, a biometric device, or network access hardware

Page 17: 02 fundamental aspects of security

Access Control

Services must be accessible to appropriate users

Do you have adequate privileges to access this information?

Page 18: 02 fundamental aspects of security

Access control

ISP A

ISP D

ISP C

ISP BMr. Anonymous FIT E-learning

Student V

Are Mr. T allowed to

view course contents?

Page 19: 02 fundamental aspects of security

Access Control

Protection mechanisms Access control list Firewall VPN Smart card Rules

Page 20: 02 fundamental aspects of security

Auditing

Auditing is the process of tracking and reviewing events, errors, access, and authentication attempts on a system.

Protection mechanism: logging system, history.

Page 21: 02 fundamental aspects of security

Auditing

Develop a path and trail system in the logging of the monitored events that allows to track usage and access, either authorized or unauthorized.

It improves security and allows for better audit policies and rules

Page 22: 02 fundamental aspects of security

Example: Enable auditing for logon eventsGo to Administrative Tools | Local Security PolicyNavigate to Local Policies | Audit Policy

Page 23: 02 fundamental aspects of security

Enable auditing for logon events

Go to Event Viewer to see logs.

Page 24: 02 fundamental aspects of security

24

Integrity

Confidentiality Availability

Security Goal

Page 25: 02 fundamental aspects of security

ISO 27002:2005 defines Information Security as the preservation of:

– ConfidentialityEnsuring that information is accessible only to those authorized to have access

– Integrity

Safeguarding the accuracy and completeness of information and processing methods

– Availability

Ensuring that authorized users have access to information and associated assets when required

INFORMATIONATTRIBUT

ES

05/01/2023 25Mohan Kamat

Page 26: 02 fundamental aspects of security

Confidentiality

Only sender, intended receiver should “understand” message contents

Is my data hidden?

Page 27: 02 fundamental aspects of security

Confidentiality

Protection Mechanisms Data encryption

Symmetric Asymmetric (public-private keys)

Page 28: 02 fundamental aspects of security

Confidentiality: Is my data hidden?

ISP A

ISP D

ISP C

ISP BMr. T FIT E-learning

Student V Can Mr. T see my homework?

Page 29: 02 fundamental aspects of security

Integrity

Sender, receiver want to ensure message not altered (in transit, or afterwards) without detection

Has my data been modified?

Page 30: 02 fundamental aspects of security

Integrity: Has my data been modified?

ISP A

ISP D

ISP C

ISP BMr. T FIT E-learning

Student V

Can Mr. T modify student V’s homework?

Page 31: 02 fundamental aspects of security

Integrity

Protection mechanisms Digital signature

Page 32: 02 fundamental aspects of security

Availability

Services must be available to users

Can I reach the destination?

Page 33: 02 fundamental aspects of security

Availability: Can I reach the destination?

ISP A

ISP D

ISP C

ISP B FIT E-learning

Student V

Can I access

FIT during

midterm?

Page 34: 02 fundamental aspects of security

Availability

Protection mechanisms Backup and recovery Firewall Vulnerability scanning and patching Intrusion detection and response Virus scanning

Page 35: 02 fundamental aspects of security

WHAT IS RISK

What is Risk?Risk: A possibility that a threat exploits a vulnerability

in an asset and causes damage or loss to the asset.

Threat: Something/Someone that can potentially cause damage to the organisation, IT Systems or network.

Vulnerability: A weakness in the organization, IT Systems, or network that can be exploited by a threat.

35

Page 36: 02 fundamental aspects of security

• Information Security is “Organizational Problem” rather than “IT Problem”• More than 70% of Threats are Internal• More than 60% culprits are First Time fraudsters• Biggest Risk : People• Biggest Asset : People • Social Engineering is major threat• More than 2/3rd express their inability to determine “Whether my systems are currently compromised?”

INFO SECURITY SURVEY

05/01/2023 36Mohan Kamat

Page 37: 02 fundamental aspects of security

High User Knowledge of IT

Systems

Theft, Sabotage,

MisuseVirus Attacks

Systems & Network Failure

Lack Of Documentation

Lapse in Physical Security

Natural Calamities &

Fire

RISKS &THR

EATS

05/01/2023 37Mohan Kamat

Potential Threats

Page 38: 02 fundamental aspects of security

SO HOW DO WE OVERCOME THESE PROBLEMS?

05/01/2023 38Mohan Kamat

Page 39: 02 fundamental aspects of security

USERRESPONSIBILIT

IES

Information Security Policy

IS Policy is approved by Top Management

Policy is released on Intranet at http://xx.xx.xx.xx/ISMS/index.htm

05/01/2023 39Mohan Kamat

Page 40: 02 fundamental aspects of security

USERRESPONSIBILIT

IES

Access Control - Physical• Follow Security Procedures• Wear Identity Cards and Badges• Ask unauthorized visitor his credentials• Attend visitors in Reception and Conference Room only

• Bring visitors in operations area without prior permission

• Bring hazardous and combustible material in secure area

• Practice “Piggybacking”• Bring and use pen drives, zip drives, ipods, other

storage devices unless and otherwise authorized to do so

05/01/2023 40Mohan Kamat

Page 41: 02 fundamental aspects of security

USERRESPONSIBILIT

IES

Password Guidelines Always use at least 8 character password with combination of

alphabets, numbers and special characters (*, %, @, #, $, ^) Use passwords that can be easily remembered by you Change password regularly as per policy Use password that is significantly different from earlier passwords

Use passwords which reveals your personal information or words found in dictionary

Write down or Store passwordsShare passwords over phone or EmailUse passwords which do not match above complexity

criteria

05/01/2023 41Mohan Kamat

Page 42: 02 fundamental aspects of security

USERRESPONSIBILIT

IES

Technology Department is continuously monitoring Internet Usage. Any illegal use of internet and other assets shall call for Disciplinary Action.

Do not use internet for viewing, storing or transmitting obscene or pornographic material

Do not use internet for accessing auction sites Do not use internet for hacking other computer systems Do not use internet to download / upload commercial

software / copyrighted material

Use internet services for business purposes only

Internet Usage

05/01/2023 42Mohan Kamat

Page 43: 02 fundamental aspects of security

USERRESPONSIBILIT

IES

E-mail Usage

Do not use official ID for any personal subscription purpose Do not send unsolicited mails of any type like chain letters or

E-mail Hoax Do not send mails to client unless you are authorized to do so Do not post non-business related information to large number

of users Do not open the mail or attachment which is suspected to be

virus or received from an unidentified sender

Use official mail for business purposes only Follow the mail storage guidelines to avoid blocking of E-mails If you come across any junk / spam mail, do the following

a) Remove the mail.b) Inform the security help deskc) Inform the same to server administratord) Inform the sender that such mails are undesired

05/01/2023 43Mohan Kamat

Page 44: 02 fundamental aspects of security

USERRESPONSIBILIT

IES

Security IncidentsReport Security Incidents (IT and Non-IT) to

Helpdesk through• E-mail to [email protected]• Telephone : xxxx-xxxx-xxxx• Anonymous Reporting through Drop boxes

e.g.: IT Incidents: Mail Spamming, Virus attack, Hacking, etc. Non-IT Incidents: Unsupervised visitor movement, Information leakage, Bringing unauthorized Media

• Do not discuss security incidents with any one outside organisation• Do not attempt to interfere with, obstruct or prevent anyone from reporting incidents

05/01/2023 44Mohan Kamat

Page 45: 02 fundamental aspects of security

USERRESPONSIBILIT

IES Ensure your Desktops are having latest antivirus updates Ensure your system is locked when you are away Always store laptops/ media in a lockable place Be alert while working on laptops during travel Ensure sensitive business information is under lock and key

when unattended Ensure back-up of sensitive and critical information assets Understand Compliance Issues such as

Cyber Law IPR, Copyrights, NDAContractual Obligations with customer

Verify credentials, if the message is received from unknown sender

Always switch off your computer before leaving for the day Keep your self updated on information security aspects

05/01/2023 45Mohan Kamat

Page 46: 02 fundamental aspects of security

Disable Non-essential services, protocols, processes, programs Protocols, systems, and processes that rob

systems of resources and allow potential attacks to occur that could damage your systems.

If they are not being actively used, it is an unnecessary security risk.

The solution is simply to disable or inactivate the service, protocol, system, or process which is not needed

Page 47: 02 fundamental aspects of security

But… Be Careful!

You need to understand what it is and what you are doing!

Page 48: 02 fundamental aspects of security

Example: FIT E-learning

ISP A

ISP D

ISP C

ISP B

Student V

Mr. T FIT E-learning

Page 49: 02 fundamental aspects of security

Example: FIT-E-learning

ISP A

ISP D

ISP C

ISP BHello, I’m V FIT E-learning

Page 50: 02 fundamental aspects of security

Tutorial

Using wireshark to sniff the network traffic.

Let’s see if you can get some passwords?