© 2015 Pearson Education Ltd. Chapter 8 Chapter 8.

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

4.01 How Web Pages Work.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
System and Network Security Practices COEN 351 E-Commerce Security.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Chapter 7 HARDENING SERVERS.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
Application Security Chapter 8 Copyright Pearson Prentice Hall 2013.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Data Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security.NET Chapter 1. How Do Attacks Occur? Stages of attack Examples of attacker actions 1. FootprintRuns a port scan on the firewall 2. PenetrationExploits.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
Chapter 8. Copyright Pearson Prentice-Hall 2010  Some attacks inevitably get through network protections and reach individual hosts  In Chapter 7, we.
Chapter 8.  Some attacks inevitably get through network protections and reach individual hosts  In Chapter 7, we looked at operating system and data.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 Application Security: Electronic Commerce and Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Software Security Testing Vinay Srinivasan cell:
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Application Security Chapter 8 Copyright Pearson Prentice Hall 2013.
Protecting Students on the School Computer Network Enfield High School.
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
TCP/IP (Transmission Control Protocol / Internet Protocol)
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Cost of disruptions  The cost of loss of reputation.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Security fundamentals Topic 9 Securing internet messaging.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Tonga Institute of Higher Education IT 141: Information Systems
Instructor Materials Chapter 5 Providing Network Services
Chapter 7: Identifying Advanced Attacks
Secure Software Confidentiality Integrity Data Security Authentication
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Test 3 review FTP & Cybersecurity
Module 4 System and Application Security
Presentation transcript:

© 2015 Pearson Education Ltd. Chapter 8 Chapter 8

© 2015 Pearson Education Ltd.  Explain why attackers increasingly focus on applications.  List the main steps in securing applications.  Know how to secure WWW services and e-commerce services.  Describe vulnerabilities in web browsers.  Explain the process of securing .  Explain how to secure voice over IP (VoIP).  Describe threats from Skype VoIP service.  Describe how to secure other user applications.  Know how to secure TCP/IP supervisory applications. 8-2

© 2015 Pearson Education Ltd. 8-3

© 2015 Pearson Education Ltd.  Some attacks inevitably get through network protections and reach individual hosts  In Chapter 7, we looked at host hardening  In Chapter 8, we look at application hardening  In Chapter 9, we will look at data protection 8-4

© 2015 Pearson Education Ltd. 8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 8-5

© 2015 Pearson Education Ltd.  Executing Commands with the Privileges of a Compromised Application ◦ If an attacker takes over an application, the attacker can execute commands with the privileges of that application ◦ Many applications run with super user (root) privileges 8-6

© 2015 Pearson Education Ltd. 8-7

© 2015 Pearson Education Ltd.  Few Operating Systems but Many Applications ◦ Application hardening is more total work than operating system hardening  Understanding the Server’s Role and Threat Environment ◦ If it runs only one or a few services, easy to disallow irrelevant things 8-8

© 2015 Pearson Education Ltd.  Basics ◦ Physical Security ◦ Backup ◦ Harden the Operating System ◦ Etc.  Minimize Applications ◦ Main applications ◦ Subsidiary applications ◦ Guided by security baselines 8-9

© 2015 Pearson Education Ltd. 8-10

© 2015 Pearson Education Ltd. 8-11

© 2015 Pearson Education Ltd.  Create Secure Application Program Configurations ◦ Use baselines to go beyond default installation configurations for high-value targets ◦ Avoid blank passwords or well-known default passwords  Install Patches for All Applications  Minimize the Permissions of Applications ◦ If an attack compromises an application with low permissions, it will not own the computer 8-12

© 2015 Pearson Education Ltd.  Add Application Layer Authentication, Authorizations, and Auditing ◦ More specific to the needs of the application than general operating system logins ◦ Can lead to different permissions for different users  Implement Cryptographic Systems ◦ For communication with users 8-13

© 2015 Pearson Education Ltd.  Custom Applications ◦ Written by a firm’s programmers ◦ Not likely to be well-trained in secure coding  The Key Principle ◦ Never trust user input ◦ Filter user input for inappropriate content 8-14

© 2015 Pearson Education Ltd.  Buffer Overflow Attacks ◦ In some languages, specific actions are needed ◦ In other languages, not a major problem  Login Screen Bypass Attacks ◦ Website user gets to a login screen ◦ Instead of logging in, enters a URL for a page that should only be accessible to authorized users 8-15

© 2015 Pearson Education Ltd.  Cross-Site Scripting (XSS) Attacks ◦ Usually caused if a website sends back information sent to it without checking for data type, scripts, etc. ◦ Example: If you type your username, it may include something like “Hello username” in the webpage it sends you 8-16

© 2015 Pearson Education Ltd.  Example ◦ Attacker sends the intended victim an message with a link to a legitimate website ◦ However, the link includes a script that is not visible in the browser window because it is beyond the end of the window ◦ The intended victim clicks on the link and is taken to the legitimate webpage ◦ The URL’s script is sent to the webserver with the HTTP GET command to retrieve the legitimate webpage 8-17

© 2015 Pearson Education Ltd.  Example cont. ◦ The webserver sends back a webpage including the script ◦ The script is invisible to the user (browsers do not display scripts) ◦ The script executes ◦ The script may exploit a vulnerability in the browser or another part of the user’s software 8-18

© 2015 Pearson Education Ltd.  SQL Injection Attacks ◦ For database access ◦ Programmer expects an input value—a text string, number, etc.  May use it as part of an SQL query or operation against the database  May accept a last name as input and return the person’s telephone number 8-19

© 2015 Pearson Education Ltd.  SQL Injection Attacks ◦ Attacker enters an unexpected string  Example: A last name followed by a full SQL query string  The program may execute both the telephone number lookup command and the extra SQL query  This may look up information that should not be available to the attacker  It may even delete an entire table 8-20

© 2015 Pearson Education Ltd. 8-21

© 2015 Pearson Education Ltd. 8-22

© 2015 Pearson Education Ltd.  Must Require Strong Secure Programming Training ◦ General principles ◦ Programming-language-specific information ◦ Application-specific threats and countermeasures 8-23

© 2015 Pearson Education Ltd. 8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 8-24

© 2015 Pearson Education Ltd.  Webservice versus E-Commerce Service ◦ WWW service provides basic user interactions  Microsoft Internet Information Server (IIS), Apache on UNIX, other webserver programs ◦ E-commerce servers add functionality—order entry, shopping cart, payment, etc.  Links to internal corporate databases and external services, such as credit card checking  Custom programs written for special purposes 8-25

© 2015 Pearson Education Ltd. 8-26

© 2015 Pearson Education Ltd. 8-27

© 2015 Pearson Education Ltd. Users should only be able to reach files below the WWW root, which is below the true system root. 8-28

© 2015 Pearson Education Ltd. In URLs,.. means move up one level. If allowed, user can get outside the WWW root box, into other directories. In URLs,.. means move up one level. If allowed, user can get outside the WWW root box, into other directories. 8-29

© 2015 Pearson Education Ltd.  IIS directory traversal attacks (Figure 8-11) ◦ Companies filter out “..” ◦ Attackers respond with hexadecimal representations for “..” (%E2%E2 SB) ◦ Typical of the constant “arms race” between attackers and defenders 8-30

© 2015 Pearson Education Ltd. 8-31

© 2015 Pearson Education Ltd. 8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 8-32

© 2015 Pearson Education Ltd.  Content Filtering ◦ Malicious code in attachments and HTML bodies (scripts) ◦ Spam: unsolicited commercial ◦ Volume is growing rapidly; slowing PCs and annoying users (pornography and fraud) ◦ Filtering for spam also rejects some legitimate messages 8-33

© 2015 Pearson Education Ltd. 8-34

© 2015 Pearson Education Ltd.  Employee training ◦ is not private; company has right to read ◦ Your messages may be forwarded without permission ◦ Never put anything in a message the sender would not want to see in court, printed in the newspapers, or read by his or her boss ◦ Never forward messages without permission 8-35

© 2015 Pearson Education Ltd. 8-36

© 2015 Pearson Education Ltd. 8-37

© 2015 Pearson Education Ltd. 8-38

© 2015 Pearson Education Ltd. Stan Steve KenTrudi Olivia Key cabinet for public keys Steve Stan writes a messsage to Steve Steve’s public key is fetched from the key cabinet and the message is encrypted with that key. Steve receives the message and decrypts it with his private key. Transmission network (the Internet for example)

© 2015 Pearson Education Ltd. DES alg DES key Encrypted DES key RSA alg RSA key Sender This is sent to the receiver Encrypted message PGP Pretty Good Privacy (PGPFreeware)

© 2015 Pearson Education Ltd. 128-bit hash Sender MD5 RSA alg RSA key Private RSA alg RSA key Public MD5 Same? Plain text ChecksumEncrypted checksum Encrypted checksum Checksum Digital signature

© 2015 Pearson Education Ltd. 8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 8-42

© 2015 Pearson Education Ltd. 8-43

© 2015 Pearson Education Ltd.  Eavesdropping  Denial-of-Service Attacks ◦ Even small increases in latency and jitter can be highly disruptive  Caller Impersonation ◦ Useful in social engineering ◦ Attacker can appear to be the president based on a falsified source address 8-44

© 2015 Pearson Education Ltd.  Hacking and Malware Attacks ◦ Compromised clients can send attacks ◦ Compromised servers can send disruptive signaling  Toll Fraud ◦ Attacker uses corporate VoIP network to place free calls  Spam over IP Telephony (SPIT) ◦ Especially disruptive because it interrupts the called party in real time 8-45

© 2015 Pearson Education Ltd.  Firewalls ◦ Many short packets ◦ Firewall must prioritize VoIP traffic ◦ Must handle ports for signaling  SIP uses Port 5060  H.323 uses Ports 1719 and 1720  Must create an exception for each conversation, which is assigned a specific port  Must close the transport port immediately after conversation ends 8-46

© 2015 Pearson Education Ltd.  Widely Used, Public VoIP Service  Uses Proprietary (patentskyddade) Protocols and Code ◦ Vulnerabilities? Backdoors? Etc. ◦ Firewalls have a difficult time even recognizing Skype traffic  Encryption for Confidentiality ◦ Skype reportedly uses strong security ◦ However, Skype keeps encryption keys, allowing it to do eavesdropping (tjuvlyssning) 8-47

© 2015 Pearson Education Ltd.  Inadequate Authentication ◦ Uncontrolled user registration; can use someone else’s name and appear to be them  Peer-to-Peer (P2P) Service ◦ Uses this architecture and its proprietary and rapidly changing protocol to get through corporate firewalls ◦ Bad for corporate security control  Skype File Sharing ◦ Does not work with antivirus programs 8-48

© 2015 Pearson Education Ltd. 8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 8-49

© 2015 Pearson Education Ltd.  TCP/IP Supervisory Protocols ◦ Many supervisory protocols in TCP/IP  ARP, ICMP, DNS, DHCP, LDAP, RIP, OSPF, BGP, SNMP, etc. ◦ The targets of many attacks ◦ The IETF has a program to improve security in all (the Danvers Doctrine) 8-50

© 2015 Pearson Education Ltd.  Example ◦ Simple Network Management Protocol (SNMP) ◦ Messages  GET messages to get information from a managed object  SET messages to change the configuration of a managed object  SET is often turned off because it is dangerous 8-51

© 2015 Pearson Education Ltd.  Example ◦ SNMP versions and security  Version 1: No security  Version 2: Weak authentication with a community string shared by the manager and managed devices  Version 3: Pair-shared secrets, optional confidentiality, message integrity, and anti- replay protection  Still needed: public key authentication 8-52

© 2015 Pearson Education Ltd.  IT Security People Must Work with the Networking Staff ◦ Ensure that appropriate security is being applied to supervisory protocols ◦ Not a traditional area for IT security in most firms 8-53

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher. © 2015 Pearson Education Ltd.