mohammed el-affendi introduction to security. what is security? protecting and preserving the...

72
MOHAMMED EL-AFFENDI Introduction to Security

Upload: dylan-austin

Post on 26-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

MOHAMMED EL-AFFENDI

Introduction to Security

Page 2: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

What is Security?

Protecting and Preserving the confidentiality, integrity, availability of information stored on computers or in transit on a network.

+ Protecting the critical elements of a computer or network system (the hardware, the software, communication system …etc.)

Ensure non-repudiationThis requires the implementation of policy,

awareness training, education and technology

Page 3: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Another Definition

Information security can be thought of as the protection of the information system and its resources against accidental or intentional disclosure of confidential data, unlawful modification of data or programs, the destruction of data, software or hardware, and ensuring non-repudiation.

Page 4: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Other Concerns

Information security also includes the prevention of use of one’s computer facilities for criminal activities including computer related fraud and blackmail.

Information security also involves the elimination of weaknesses or vulnerabilities that might be exploited to cause loss or harm.

Page 5: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

The Main Pillars of Security

The CIA Triangle: Confidentiality ensures that computer-related assets are

accessed only by authorized parties. That is, only those who should have access to something will actually get that access. By "access," we mean not only reading but also viewing, printing, or simply knowing that a particular asset exists. Confidentiality is sometimes called secrecy or privacy.

Integrity means that assets can be modified only by authorized parties or only in authorized ways. In this context, modification includes writing, changing, changing status, deleting, and creating.

Availability means that assets are accessible to authorized parties at appropriate times. In other words, if some person or system has legitimate access to a particular set of objects, that access should not be prevented. For this reason, availability is sometimes known by its opposite, denial of service.

Page 6: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

The CIA Traingle

Page 7: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Some People Add Other Properties

Accuracy means information is free from error and has the value the end user expects

Authenticity is quality or state of being genuine or original, rather than reproduced or fabricated; information is authentic when it is what was originally created, placed, stored, or transferred

Utility of information is quality or state of having value for some end purpose; information must be in a format meaningful to end user

Non-Repudiation: means that the sender or generator of information cannot deny that he did send or generate the information

Page 8: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Vulnerabilities, Threats, Attacks and Controls

An interesting definition of security is: “Prevent threats from exploiting vulnerabilities to perform attacks”

So, what do these terms mean?

Page 9: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Vulnerability

A vulnerability is a weakness in the security system, for example, in procedures, design, or implementation, that might be exploited to cause loss or harm.

For instance, a particular system may be vulnerable to unauthorized data manipulation because the system does not verify a user's identity before allowing data access.

Page 10: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Threat

A threat to a computing system is a set of circumstances that has the potential to cause loss or harm.

Page 11: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Control

A control is an action, device, procedure, or technique that removes or reduces a vulnerability.

A threat is blocked by control of a vulnerability.

Page 12: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Types of Threats

To devise controls, we must know as much about threats as possible. We can view any threat as being one of four kinds: interception, interruption, modification, fabrication

Page 13: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Interception

Information disclosure/information leakageAn unauthorized party gains access to an

asset. This is an attack on confidentiality. The unauthorized party could be a person, a

program, or a computer. Examples include:

wiretapping to capture data in a network the illicit copying of files or programs

Page 14: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Interception

Page 15: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Interruption

An asset of the system is destroyed or becomes unavailable or unusable. This is an attack on the availability.

Examples include destruction of a piece of hardware, such as a hard disk, the cutting of a communication link, or the disabling of the file management system.

DOS - Denial of Service Attacks have become very well known.

Page 16: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Interruption

Page 17: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Modification

Modification is integrity violation.An unauthorized party not only gains access

to but tampers with an asset.This is an attack on the integrity.Examples include changing values in a data

file, altering a program so that it performs differently, and modifying the content of a message being transmitted in a network.

Page 18: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Modification

Page 19: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Fabrication

An unauthorized party inserts counterfeit objects into the system. This is an attack on the authenticity.

Examples include the insertion of spurious messages in a network or the addition of records to a file.

Page 20: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Fabrication

Page 21: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Some Threat Categories

Page 22: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Actions to Protect Against a Harm

Harm occurs when a threat is realized against a vulnerability. To protect against harm, then, we can neutralize the threat, close the vulnerability, or both. The possibility for harm to occur is called risk. We can deal with harm in several ways. We can seek to prevent it, by blocking the attack or closing the

vulnerability deter it, by making the attack harder but not impossible deflect it, by making another target more attractive (or this

one less so) detect it, either as it happens or some time after the fact recover from its effects

Page 23: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Attacks

A human who exploits a vulnerability perpetrates an attack on the system.

An attack can also be launched by another system, as when one system sends an overwhelming set of messages to another, virtually shutting down the second system's ability to function.

Page 24: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Slide 24

Slide 24

Attacks: Another Definition

An attack is a deliberate act that exploits vulnerability

Accomplished by threat agent to damage or steal organization’s information or physical asset Exploit is a technique to compromise a system Vulnerability is an identified weakness of a controlled

system whose controls are not present or are no longer effective

Attack is the use of an exploit to achieve the compromise of a controlled system

Page 25: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Eavesdropping

Common packet sniffers: TCPdump, Wireshark

Solution - Encrypt Data

Page 26: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Cryptanalysis

CryptanalysisFind useful information from ciphertext datae.g. analyze statistical structure

Defense methodUse longer keys and stronger encryption algorithm

Page 27: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Password Pilfering

Password Pilfering Password protection is often the first

defense line probably the only defense available in the

system Methods to pilfer user password:

Guessing Social engineering Dictionary attacks Password sniffing

Page 28: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

GuessingEasiest, particularly on short or default passwords

10 most commonly-used passwords (ref. PC Magazine): password 123456 qwerty (which are keys below 123456 on standard

keyboard abc123 letmein monkey myspace1 Password1 Blink182 The user’s own first name

Page 29: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• Social EngineeringMethods of using social skills to pilfer secret information

Physical Impersonation

The attacker pretends to be another person to delude the victim(See example on page 6 from textbook)

PhishingThe most common form of mass social engineering attacks in recent years

Disguised email messages or masquerade web sites

See the next slide for a real phishing example verbatim (note the typos in the phishing email), where the link in the email is a trap

Page 30: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Date: Fri, 5 Oct 2007 16:11:46 -0700From: US Bank [email protected]: US Bank – Internet Online Access is Locked – October 5, 2007 at

12:23:05 PM

Dear US Bank Customer,

We’re sorry, but you reached the maximum number of attempts allowed to login into your US Bank account. For your protection, we have locked your account.

Consequently, we placed a temporary restriction on your account. We did this to protect your account from any fraudulent activity.

Please click below and complete the steps to Remove Limitations. This allows us to confirm your identity and unlock your US Bank online account

http://www4-usbank.com/ If we do no receive the appropriate account verification

within 48 hours, then we will assume this US Bank account is fraudulent and will be suspented. US Bank, Member FDIC. @2007 US Bank Corporation. All Rights Reserved.

Page 31: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

In general, any phishing email would contain a link to a bogus Web site, called a phishing site

Other forms

Collect recycled papers from recycling bins Web browser pop up a window asking for user login

Defense Method – Anti-phishing extensions of web browsers are emerging technology for detecting and blocking phishing sites

Page 32: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• Dictionary AttacksOnly encrypted passwords should be stored in a computer system

in UNIX/Linux: passwords are stored in a file named shadows under directory /etc

in Windows XP: passwords are stored in a file named SAM, which is stored in the system’s registry

Page 33: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

A typical dictionary attack proceeds as follows:

Obtain information of user names and the corresponding encrypted passwords

Run the encryption routine used by the underlying system on all dictionary words, names, and dates

Compare each output obtained from step 2 with the encrypted passwords obtained from step 1. If a match presents, a user password is found

Constructing a Rainbow table helps to reduce the table size and make the computation manageable

Page 34: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

r is a reduction functionh is a cryptographic hash functionw11 is a given password. Apply h and r alternatively to

obtain a chain of passwords that are different pairwise:

where, w1i = r(h(w1,i-1 ), i = 2,3,…,n1 and store (w11, h(w1n1))Select wj1 not occurred in previous chains

Password Hash value

w11

w21

wk1

h(w1 n1)

h(w2 n2)

…h(wk nk)

Repeat this procedure k times generating k rows in the rainbow table

Rainbow Table

Page 35: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Let f: A→B and g: B→A be two functions. Let y∈ B and i ≥ 0.

Define:

Let Q0 be an encrypted value of a password w. That is, Q0 = h(w). If

for some i ≥ 0 and some j with 1 ≤ j ≤ k and i ≤ j, then w is possible to appear in the jth chain of wj1,…wj,nj .

Page 36: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Algorithm to find w in a rainbow table:

1. Set Q1 ← Q0 and t ← 0. Let n = max{n1,…,nk}

2. Check if there is a 1 ≤ j ≤ k such that Q1 = h(wj,nj) and t ≤ n. If yes, goto step 3; otherwise, goto step 4

3. Apply r and h alternatively on wj1 for 0 ≤ i ≤ j times until

wj,ni = (r ○ h)i(wj1) is generated such that h(wj,ni

) = Q0 . If such a wj,ni

is found, return w = wj,ni; otherwise, goto step 4

4. Set Q1 ← h(r(Q1)) and t ← t + 1. If t ≤ n then goto step 2. Otherwise, return “password not found.” (the rainbow table doesn’t contain the password whose hash value equals Q0 )

Page 37: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• Password Sniffing

Password sniffers are software programs, used to capture remote login information such as user names and user passwords

Defense Method – encrypt all message, include login information, using, e.g., SSH and HTTPS

Cain & Abel, a password recovery tool, can capture and crack encrypted password for the Microsoft Operating System

Page 38: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Password ProtectionRules to help protect passwords from pilfering:1. Use long passwords, with a combination of letters, capital

letters, digits, and other characters such as $,#,@. Do not use dictionary words, common names and dates.

2. Do not reveal your passwords to anyone you do not know. Do not submit to anyone who acts as if he has authority. If you have to give out your password, do so face to face.

3. Change passwords periodically and do not reuse old passwords. 4. Do not use the same password for different accounts.5. Do not use remote login software that does not encrypt user

passwords and other important personal information.6. Shred all discarded papers using a good paper shredder.7. Avoid entering any information in any popup window, and avoid

clicking on links in suspicious emails.

Page 39: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• Other User-Authentication Methods

Use biometrics of unique biological features – connect biometric devices to a computer, such as fingerprint readers and retina scanners

Use authenticating items – electronic passes authenticated by the issuer.

Authentication using user passwords is by far

the easiest method

Page 40: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Identity Spoofing

Identity spoofing attacks allow attackers to impersonate a victim without using the victim’s passwords

Man-in-the-middle attacks.

Message replays

Network spoofing attacks

Software exploitation attacks

Page 41: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• Man-in-the-middle Attacks Compromise a network device (or installs one of his own) between two or more users. Using this device to intercept, modify, or fabricate data transmitted between users.

Defense measures – encrypting and authenticating IP packets

Page 42: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• Message Replays The attacker first intercepts a legitimate message, keeps it

intact, and then retransmits it at a later time to the original receiver

For example, an attacker may intercept an authentication pass of a legitimate user, and use it to impersonate this user to get the services from the system

Defense Mechanisms – Attach a random number to the message. This number is referred to as nonce

Attach a time stamp to the message

The best method is to use a nonce and a time stamp together

Page 43: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

IP spoofing is one of the major network spoofing techniques

SYN floodingThe attacker fills the target computer’s TCP buffer

with a large number of crafted SYN packetsPurpose: Make the target computer unable to

establish connection (i.e., to mute the computer)

ARP spoofing, which is also known as ARP poisoning

Network Spoofing

Page 44: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• SYN floodingAttacker fills the target computer’s TCP buffer with a large volume of crafted SYN packets, making the target computer unable to establish connections with other computers

1. Attacker sends to the target computer a large number of crafted SYN packets

2. The victim’s computer is obliged to send an ACK packet to the crafted source IP address contained in the SYN packet

3. Because the crafted source IP address is unreachable, the victim’s computer will never receive the ACK packet it is waiting for, making the crafted SYN packet remain in the TCP buffer

4. The TCP buffer is completely occupied by the crafted SYN packets

Page 45: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• TCP HijackingV is a company computerAlice, an employee of the company, is going to remote logon to VHer TCP connection with V may be hijacked as follows:

1. Alice sends a SYN packet to V for remote login2. The attacker hijacts this packet, and uses SYN flooding to mute V so that

V can’t complete the three-way handshake3. The attacker predicts the correct TCP sequence number for the ACK

supposed to be sent from V to Alice. The attacker then crafts an ACK packet with the sequence number and V’s IP address and sends it to Alice

4. Alice verifies the ACK packet and sends an ACK packet to the attacker to complete this handshake

5. The TCP connection is now established between Alice and the attacker, instead of between Alice and V

Page 46: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• ARP Spoofing

The attacker changes the legitimate MAC address of a networked computer to a different MAC address chosen by the attacker

Defense method – Check MAC address and domain names

Page 47: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Buffer-Overflow Exploitation

Buffer-Overflow Exploitation Buffer overflow, a.k.a. buffer overrun, is a common software

flaw. Buffer overflow occurs if the process writes more data into a buffer area than it is supposed to hold

It is possible to exploit buffer overflows to redirect the victim’s program to execute attackers’ own code located in a different location. Such attacks often exploit function calls in standard memory layout, where the buffer is placed in a heap and the return address of the function call is placed in a stack

Page 48: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

General steps of buffer-overflow attack:

1. Find a program that is prone to buffer overflows (e.g. programs using functions that do not check bounds are good candidates)

2. Figure out the address of the attacker’s code3. Determine the number of bytes long enough to

overwrite the return address4. Overflow the buffer that rewrites the original return

address of the function call with the address of the attacker’s code

Defense method – Always add statements to check bounds when dealing with buffers in a program

Page 49: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Repudiation

In some situations the owner of the data may want to deny ownership of the data to evade legal consequences He may argue that he has never sent or received

the data in question

Defense method – Use stronger encryption and authentication algorithms

Page 50: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Intrusion An unauthorized user gains access to someone else’s

computer systems. Configuration loopholes, protocol flaws, and software side effects may all be exploited by intruders

Intrusion detection is a technology for detecting intrusion incidents. Closing TCP and UDP ports that may be exploited by intruders can also help reduce intrusions

IP scans and Port scans are common hacking tools. However, it can also help users to identify in their own systems which ports are open and which ports may be vulnerable.

Page 51: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Traffic Analysis

The purpose is to determine who is talking to whom by analyzing IP packets. Even if the payload of the IP packet is encrypted, the attacker may still obtain useful information from analyzing IP headers

Defense method – Encrypt IP headers. But an IP packet with an encrypted IP header cannot be routed to destination. Thus, network gateways are needed

Network gateway also protects internal network topology

Page 52: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

(1) Sender forwards an IP packet to gateway A. (2) gateway A encrypts sender’s IP packet and routes it to the next router in the Internet. (3) The IP packet from Gateway A is delivered to gateway B. (4) Gateway B removes its header, decrypts the encrypted IP packet of the sender, and forwards it to the receiver.

Page 53: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Denial of Service Attacks

To block legitimate users from getting services they can normally get from servers

DoS – launched from a single computer

DDoS – launched from a group of computers

Page 54: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

DoSSYN flooding is a typical and effective technique used by DoS attacks. The smurf attack is another typical type of DoS attacks

Attacker sends an excessive number of crafted ping requests to a large number of computers within a short period of time, where the source IP address in the crafted ping request is replaced with the victim’s IP address. Therefore, each computer that receives the crafted ping request will respond to the victim’s computer with a pong message.

Page 55: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

DDoS A typical DDoS attack proceeds as follows:

1. Compromise as many networked computers as possible

2. Install special software in the compromised computers to carry out a DoS attack at a certain time later; these computers are called zombies

3. Issue an attack command to every zombie computer to launch a DoS attack on the same target at the same time

Page 56: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Spam Mail

Spam mails are uninvited email messages, which may be commercial messages or phishing messages

While not intended to bring the user’s computer out of service, spam mails do consume computing resources

Spamming also occurs in Web search engines, Instant Messaging, blogs, mobile phone messaging, and other network applications

Defense method – spam fillers are software solutions to detect and block spam mails from reaching the user’s mailbox

Page 57: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Slide 57

Slide 57

Figure 1-12 The Nigerian National Petroleum Company

Page 58: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Malicious Software

Software intended to harm computers is malicious software. Malicious software is also referred to as malware

VirusWormsTrojan horsesLogic bombsBackdoorsSpyware

Page 59: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Viruses and Worms• A computer virus is a piece of code that can reproduce

itself • It is not a standalone program, and so it must attach itself to

a host program or file• A host program or file that contains a virus is called an

infected host• A computer worm is also a piece of code that can reproduce

itself. Unlike a virus, a worm is a stand alone program

Defense method – Do not download software from untrusted Web sites or other

sources Do not open any executable file created by someone you do not

know Make sure software patches are installed and up to date

Page 60: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Trojan Horse Trojan horses are software programs that appear to

do one thing, but secretly also do other things

Trojan horses often disguise themselves as desirable and harmless software applications to lure people to download them

Defense method – The same measures of combating viruses and worms can also be used to combat Trojan horses. Virus scans can also detect, quarantine, and delete Trojan horses

Page 61: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Logic BombsLogic bombs are subroutines or instructions embedded in a program. Their execution are triggered by conditional statements

Defense method – Employers should take good care of their employees, so that

none would be tempted to place a logic bomb Project managers should hire an outside company or form a

special team of reviewers from a different group of people other than the developer to review the source code

Relevant laws should be established so that employees who planted logic bombs will face criminal charges

Page 62: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

BackdoorsBackdoors are secret entrance points to a program

They may be inserted by software developers to provide a short cut to enter a password-protected program when attempting to modify or debug code

Defense method – Check source code by an independent team

Page 63: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

• SpywareSpyware is a type of software that installs itself on the user’s computer

Spyware is often used to monitor what users do and harass them with popup commercial messages

Browser Hijacking – a technique that changes the settings of the user’s browsers

Zombieware – software that takes over the user’s computer and turns it into a zombie for launching DDoS attacks or into a relay which carries out harmful activities such as sending spam email or spreading viruses.

Page 64: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Spyward can also do a list of other things, including

Monitoring – monitor and report to a web server or to the attacker’s machine a user’s surfing habits and patterns

Password sniffing – sniff user passwords by logging users’ keystrokes using a keystroke logger

Adware – software that automatically displays advertising materials on the user’s computer screen

Defense method – use anti-spyware software to detect and block spyware

Page 65: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Hackers

Hackers Computer hackers are people with special knowledge of

computer systems. They are interested in subtle details of software, algorithms, and system configurations Black-Hat Hackers – hack computing systems for their own benefit

White-Hat Hackers – hack computing systems for the purpose of searching for security loopholes and developing solutions

Grey-Hat Hackers – wear a white hat most of the time, but may also wear a black hat once in a while

When discovering security vulnerabilities in a software product, white-hat hackers and grey-hat hackers would often work directly with the vendors of products to help fix the problems

Page 66: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Script Kiddies

Script kiddies are people who use scripts and programs developed by black-hat hackers to attack other people’s computers

Even though they do not know how to write

hacking tools or understand how an existing hacking tool works, script kiddies could inflict a lot of damage

Page 67: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Cyber Spies

Collecting intelligence through intercepted network communications is the job of cyber spies

Countries have intelligence agenciesMilitary organizations have intelligence units

They intercept network communications and decipher encrypted messages

Page 68: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Vicious Employees, Cyber Terrorists and Hypothetical Attackers

Vicious EmployeesVicious employees are people who intentionally breach security to harm their employers

Cyber Terrorists Cyber terrorists are terrorists who use computer and network

technologies to carry out their attacks and produce public fear

Hypothetical Attackers black-hat hackers script kiddies greedy cyber spies who are willing to betray their countries

or organizations for monetary benefits vicious employees

Page 69: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Basic Security Model

The basic security model consists of four components: cryptosystems, firewalls, anti-malicious-software systems (AMS software), and intrusion detection system (IDS)

Page 70: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Network model of cryptosystem

Page 71: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

J. Wang. Computer Network Security Theory and Practice. Springer, 2009

Example Security Resources

CERT www.cert.org

SANS Institute www.scans.org

Microsoft Security www.microsoft.com/security/default.mspx

NTBugtraq www.ntbugtraq.com

Page 72: MOHAMMED EL-AFFENDI Introduction to Security. What is Security? Protecting and Preserving the confidentiality, integrity, availability of information

Assignment 1

Write a short report that explains how buffer overflow attacks are performed. Use examples to illustrate your answer.

Explain how Rainbow Tables are constructed and how do they work