CSC 482/582: Computer Security

Slides:



Advertisements
Similar presentations
Mr C Johnston ICT Teacher
Advertisements

Security+ Guide to Network Security Fundamentals
1 An Overview of Computer Security computer security.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Information Security Technological Security Implementation and Privacy Protection.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
SEC835 Database and Web application security Information Security Architecture.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
CIT 380: Securing Computer Systems Security Solutions.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
8 – Protecting Data and Security
Information Systems Security
Security Issues in Information Technology
CIT 480: Securing Computer Systems
CS457 Introduction to Information Security Systems
Threat Modeling for Cloud Computing
Securing Network Servers
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Information Security, Theory and Practice.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Critical Security Controls
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Design for Security Pepper.
Security Standard: “reasonable security”
Chapter 1: Introduction
Secure Software Confidentiality Integrity Data Security Authentication
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security Engineering.
Business Risks of Insecure Networks
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security in Networking
Chapter 3: IRS and FTC Data Security Rules
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Robert Leonard Information Security Manager Hamilton
CSC 482/582: Computer Security
Information Security Awareness
Cybersecurity Am I concerned?
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
An Overview of Computer Security
Securing Windows 7 Lesson 10.
IS4680 Security Auditing for Compliance
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Computer Security By: Muhammed Anwar.
Test 3 review FTP & Cybersecurity
6. Application Software Security
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

CSC 482/582: Computer Security Fundamentals of Computer Security CSC 482/582: Computer Security

About Me James Walden Associate Professor of Computer Science waldenj@nku.edu http://faculty.cs.nku.edu/~waldenj Interests: Software Security Mobile Application Security Web Application Security Empirical Software Engineering

Topics What is Security? Security Concepts States of Information Confidentiality Integrity Availability States of Information Policies and Principles Security Controls

What is Security? Security is the prevention of certain types of intentional actions from occurring in a system. The people who might attack a system are called threats, attackers, or adversaries. Threats carry out attacks to compromise a system. Attacks work by exploiting vulnerabilities in a system. The goal of attacks is to obtain assets from a system, which may be informational or physical in nature. Security controls reduce the ability of threats to obtain assets from a system by exploiting vulnerabilities.

We all have Assets: The Value of a Hacked PC http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/

Safety vs. Security The key difference between safety and security is the presence of an adversary, an intelligent attacker who intentionally causes the system to fail. Safety Measures Home: fire alarm. Car: crumple zones. Computer: UPS. Security Measures Home: door lock. Car: alarm. Computer: password.

Components of Security Integrity Figure from Goodrich and Tamassia, Introduction to Computer Security, Pearson, 2011. Confidentiality Availability

Confidentiality Confidentiality is the avoidance of the unauthorized disclosure of information. Assets for which confidentiality is critical: Personal information Trade secrets Military plans

Confidentiality Controls Access Control: rules and policies that limit access to certain people and/or systems. File permissions (which users can access) Firewall settings (which IP addresses can access) Cryptography: transform information so that it can only be read using a secret key. Advanced Encryption Standard (AES) Transport Layer Security (TLS)

Integrity Integrity is the property that information has not be altered in an unauthorized way. Assets for which integrity is critical: Operating system files Software updates and downloads Bank account records

Integrity Controls Anti-Virus: checks for malicious code that may take control of the system. Checksums: compute a mathematical function on data to check with stored value to verify that data was not changed by an adversary. Logs: record actions on system to detect violations of integrity by a program or a human reader.

Availability Availability is the property that information is accessible and modifiable in a timely fashion by those authorized to do so. Assets for which availability is critical: Industrial control systems Authentication server for your network Current stock quotes

Availability Controls CAPTCHA: Ask client to perform task that only a human can supposedly do, like identify a word in an image, to prevent too many automated requests. Failover: Use redundant servers, disks, network connections with automated failover in case one system fails. Resource Limits: Limit resources (time, memory, disk space, etc.) that can be used by a process or thread, terminating threads that exceed limits.

Other Security Components Authenticity Figure from Goodrich and Tamassia, Introduction to Computer Security, Pearson, 2011. Anonymity Assurance

Assurance Information assurance is the practice of finding reasons for justified confidence that claims about security are correct. An assurance case consists of The claim about the security of the system. A division of the claim into sub-claims. Justifications based on assumptions and evidence.

States of Information Storage: information in permanent storage (disk or tape) that is not currently being accessed. Processing: information in memory (RAM or cache) that is currently being used by a program. Transmission: information in transit between one node and another on a network.

Securing Information in All States Internet Information in Transmission Information in Storage Information in Processing

Security Policies A security policy is a definition of what it means to be secure for a system or organization. Policies describe who is permitted to perform which actions with system assets. Security controls are used to enforce security policies. Not every policy item will be enforced by a control. From http://oit.nku.edu/security/policies-and-guidelines.html Acceptable Use Policy Antivirus Policy Security Policy LISTSERV and Mass Email Policy

Security Principles Security Principles Economy of mechanism Fail-safe defaults Complete mediation Open design Separation of privilege Least privilege Least common mechanism Psychological acceptability Work factor Compromise recording Figure from Goodrich and Tamassia, Introduction to Computer Security, Pearson, 2011.

Security Controls Security controls are policies, technologies, or human factors that protect a system from attacks in one of three ways: Prevention: prevent attackers from violating security policy. Ex: firewall. Detection: detect attackers’ violation of security policy. Ex: anti-virus. Recovery: stop attack, assess and repair damage. Ex: backups.

Types of Security Controls Technologies Hardware/software used to ensure confidentiality, integrity, or availability. Policy and practice. Security requirements and activities. Education, training, and awareness. Understanding of threats and vulnerabilities and how to protect against them.

Prevention Controls Firewalls Authentication File Access Control Prevent unauthorized network connections. Authentication Prevent unauthorized users from using system. File Access Control Prevent unauthorized access to files. Cryptography Prevent confidentiality violation even if intruder has access to data.

Detection Controls Change management process Intrusion detection Require security approval of network changes. Intrusion detection Automated network and/or host based intrusion detection systems. Network scans Audit network for rogue/missing machines. Verify security status of each network device. Log monitoring Monitor sensitive logs (e.g. firewall) in real time.

Recovery Controls Snapshots Version Control Systems Filesystem and VM snapshots allow reversion to a previous correct state of the system. Version Control Systems Version control systems like git allow sets of files to be reverted to a previous correct state. Configuration Management Systems like puppet automatically deploy servers based on configuration stored in a version control system. Backups Off-system/site backups permit recovery when all is lost.

Evaluating Security Controls What assets are you trying to protect? What are the risks to those assets? How well does the security control mitigate those risks? What additional risks does the security control cause? What costs and trade-offs does the security control impose?

Example: Password Vault Asset: passwords. Risks: use of passwords by someone else to gain access to private email, bank, health information. Mitigate: encrypted storage prevents use of passwords without vault key. Other risks: lose access to all passwords if you forget the vault key. Costs/tradeoffs: if vault is on PC, lose access elsewhere. If vault is networked, passwords may not be encrypted in transit, will be accessible to attackers who don’t have access to your PC.

Security Risk A risk is any event that could result in an adversary obtaining unauthorized access to assets. To evaluate a risk, we need to evaluate both: Probability of risk occurring. Cost incurred by risk if it occurs. To reduce risk, we minimize the product of probability and cost of a risk.

Legal Issues What you are permitted to do What you are required to do Copyright and DMCA limitations Cryptography export regulations Network monitoring for intrusions What you are required to do Data breach notification laws Privacy regulations

Security is a Human Problem Social engineering The practice of psychological manipulation to obtain information or to perform attacks for an attacker. Kevin Mitnick testified before Congress “I was so successful in that line of attack that I rarely had to resort to a technical attack.” Circumvention Users write down passwords, leave screens unlocked. Insider attacks Insiders are legitimate users with authorized access who act as a threat. Disgruntled employees, planted spies, subverted people. Organizations: the key here is that those responsible for security have the power to enforce security. Otherwise there is confusion, and the architects need not worry if the system is secure because they won’t be blamed if someone gets in. This arises when system administrators, for example, are responsible for security, but only security officers can make the rules. Preventing this problem (power without responsibility, or vice versa) is tricky and requires capable management. What’s worse is that security is not a direct financial incentive for most companies because it doesn’t bring in revenue. It merely prevents the loss of revenue obtained from other sources. People problems are by far the main source of security problems. Outsiders are attackers from without the organization; insiders are people who have authorized access to the system and, possibly, are authorized to access data and resources, but use the data or resources in unauthorized ways. It is speculated that insiders account for 80-90% of all security problems, but the studies generally do not disclose their methodology in detail, so it is hard to know how accurate they are. (Worse, there are many slightly different definitions of the term “insider,” causing the studies to measure slightly different things!) Social engineering, or lying, is quite effective, especially if the people gulled are inexperienced in security (possibly because they are new, or because they are tired).

What do you trust? Your vendor’s software Your encryption libraries “Yet another picture frame malware incident” http://blog.trendmicro.com/trendlabs-security-intelligence/yet-another-digital-picture-frame-malware-incident/ Your encryption libraries RSA warns customers to stop using BSAFE lib http://rt.com/usa/nsa-weak-cryptography-rsa-110/ Your ISP ISP hijacks DNS and adds affiliates to URLs http://erichelgeson.github.io/blog/2013/12/31/i-fought-my-isps-bad-behavior-and-won/

Can you trust your compiler? Ken Thompson’s compiler hack from “Reflections on Trusting Trust.” Modified C compiler does two things: If compiling a compiler, inserts the self-replicating code into the executable of the new compiler. If compiling login, inserts code to allow a backdoor password. After recompiling and installing old C compiler: Source code for Trojan horse does not appear anywhere in login or C compiler. Only method of finding Trojan is analyzing binary.

Key Points Definitions Components of security Security, security policy, security control, threat, attack, asset. Components of security Confidentiality, Integrity, Availability Protect CIA in all states of information: Storage, Processing, Transmission Security Controls Actions: Prevention, Detection, Recovery Types: Technology, policy, education Five questions for evaluating security controls Risk Analysis Probability × cost of the risk Trust and Security

References Anderson, Security Engineering 2nd Edition, Wiley, 2008. Bishop, Computer Security: Art and Science, Addison-Wesley, 2002. Goodrich and Tammasia, Introduction to Computer Security, Pearson, 2011.

Released under CC BY-SA 3.0 This presentation is released under the Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) license You are free: to Share — to copy and redistribute the material in any medium to Adapt— to remix, build, and transform upon the material to use part or all of this presentation in your own classes Under the following conditions: Attribution — You must attribute the work to James Walden, but cannot do so in a way that suggests that he endorses you or your use of these materials. Share Alike — If you remix, transform, or build upon this material, you must distribute the resulting work under this or a similar open license. Details and full text of the license can be found at https://creativecommons.org/licenses/by-nc-sa/3.0/