COMP3371 Cyber Security Week 10

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

DMZ (De-Militarized Zone)
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
System Security Scanning and Discovery Chapter 14.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
EC-Council’s Certified Ethical Hacker (CEH) Richard Henson May 2012.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 7: Using Windows Servers to Share Information.
Chapter 6: Packet Filtering
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Topic 5: Basic Security.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security fundamentals Topic 10 Securing the network perimeter.
COMP3371 Cyber Security Richard Henson University of Worcester November 2015.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Computer Security Sample security policy Dr Alexei Vernitski.
COMP1321 Digital Infrastructures Richard Henson University of Worcester April 2016.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
COMP3123 Internet Security Richard Henson University of Worcester November 2011.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Security fundamentals
Chapter 40 Internet Security.
Network security Vlasov Illia
Chapter 7: Using Windows Servers
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 5 Providing Network Services
DDoS Attacks on Financial Institutions Presentation
Working at a Small-to-Medium Business or ISP – Chapter 8
Instructor Materials Chapter 7 Network Security
Network Wiring and Reference
Domain 4 – Communication and Network Security
Networking for Home and Small Businesses – Chapter 6
Introduction to Networking
Introduction to Networking
Firewalls.
Footprinting and Scanning
Networking for Home and Small Businesses – Chapter 6
CompTIA Security+ Study Guide (SY0-401)
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
Guide to Computer Network Security
* Essential Network Security Book Slides.
COMP1321 Digital Infrastructures
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Faculty of Science IT Department By Raz Dara MA.
COMP3371 Cyber Security Week 8
Firewalls Chapter 8.
Applications Layer Functionality & Protocols
Networking for Home and Small Businesses – Chapter 6
Computer Security By: Muhammed Anwar.
G061 - Network Security.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

COMP3371 Cyber Security Week 10 Richard Henson University of Worcester December 2016

Learning Objectives… Weigh the cost of safeguarding data against the risk of losing various types of data Use of high level Information Security policy to drive change in an organisation Use of vulnerability/penetration testing to check access to the organisation’s network (and information about it!) from outside Known vulnerabilities exploited through specific TCP ports

The Cost of Losing Organisational Data Plenty of data around to supporting the observation that organisations have been leaking data for years actual problem has to be worse… could be far worse… not all data losses ever get reported! Is there is a cost to the organisation of losing their data? can a figure be put on this cost?

The Direct Cost of Losing Personal Data Same systemic failures and potential cover-ups as for organisation data… Direct cost to the organisation probably regarded as very low? why? public reaction to loss? is all personal data equal?

Costs of Tightening Up Security Human cost of completing new documentation… essential part of tightening up procedures cost of re-educating and re-training staff to make best use of new procedures Associated with employing new technology cost of purchase cost of installation cost of auditing/day-to-day management

Indirect Costs of Losing Data Cost of falling foul of the law… time spent in court fines Cost of bad publicity public embarrassment & loss of credibility making statements explaining how it wasn’t as bad as reported (!) stock market price may fall…

Indirect costs - continued Cost of losing respect of customers send their personal data (and custom) elsewhere Cost of business insurance will be asked questions to get cyber liability insurance c.f. car insurance if assessed as higher risk premiums more expensive Research: http://eprints.worc.ac.uk/2439

Changing an Organisation’s culture and attitude to Information Security Change in culture takes time attitudes need to change first research: http://eprints.worc.ac.uk/4248/ Accepted first stage… develop, agree, and share an information security policy covered in detail in COMP3357…

Putting Policy into Action Whole point of having a policy is that it WILL effectively secure the data need a strategy to implement policy! Development of information security strategy… should include explaining purpose of policy awareness training, etc. MUST follow…

Vulnerability Testing Finding out about the network, website, etc. to see how it could be exploited Similar to the more commonly known “penetration testing”… does not attempt to penetrate the network defences considered “ethical” and not illegal!

What & Why of “Footprinting” Definition: “Gathering information about a “target” system” Could be Passive (non-penetrative) or Active (probing…) Purpose: find out as much information about the digital and physical evidence of the target’s existence as possible need to use multiple sources… may (“black hat” hacking) need to be done secretly

Rationale for “passive” Footprinting The hacker may be able to gather what they need from public sources (e.g. the organisation’s website) organisation needs to know what it is telling the world about itself… Methodology: Use search engine start by finding the domain name & URLs of popular pages e.g. www.worc.ac.uk Use tools to map/mirror the main website…

Information Gathered without Penetration Testing Domain Names User/Group names System Names IP addresses Employee Details/Company Directory Network protocols used & VPN start/finish Company documents Intrusion detection system used

Website Connections & History History: use www.archive.org: The Wayback Machine Connections: use robtex.com Business Intelligence: sites that reveal company details e.g. www.companieshouse.co.uk

More Company Information… “Whois” & CheckDNS.com: lookups of IP/DNS combinations details of who owns a domain name details of DNS Zones & subdomains Job hunters websites: e.g. www.reed.co.uk www.jobsite.co.uk www.totaljobs.com

People Information Company information will reveal names Use names in search engines Facebook LinkedIn Google Earth reveals: company location(s)

Physical Network Information (“active” footprinting or phishing) External “probing” should be detectable by a good defence system… (could be embarrassing!) e.g. Traceroute: Uses ICMP protocol “echo” reveals names/IP addresses of intelligent hardware: e.g. Routers, Gateways, DMZs

Email Footprinting Using the email system to find the organisation’s email names structure “passive” monitor emails sent IP source address structure of name “active” email sending programs : test whether email addresses actually exist test restrictions on attachments

Phishing to extract user data (not intelligence gathering) Send email user a message with a link or attachment link is a form which tries to get their personal data attachment contains malware which will infect their system Rather obvious to IT professionals… accounts wouldn’t be used by network infiltrators trying to hide their tracks

Utilizing Google etc. (“passive”) Google: Advanced Search options: Uses [site:] [intitle:] [allintitle:] [inurl:] In each case a search string should follow e.g. “password” Maltego graphical representations of data

Proxy Hacking (or Hijacking) Attacker creates a copy of the targeted web page on a proxy server artificially raises search engine ranking with methods like: keyword stuffing linking to the copied page from external sites… authentic page will rank lower… may even be seen as duplicated content (!) and search engine may then remove it from its index

Reconnaissance/Scanning Three types of scan: Network (already mentioned) identifies active hosts Port send client requests until a suitable active port has been found… Vulnerability assessment of devices for weaknesses that can be exploited

Legality and Vulnerability Scanning Depends on whether you have asked! running tests requires equipment and an experts time… would normally charge for such a service, so… normal to contact org.! Hacker wouldn’t want organisation to know so… certainly wouldn’t ask permission! illegal but gambles on not being caught!

Ethical Hacking Principles Hacking is a criminal offence in the UK covered through The Computer Misuse Act (1990) tightened in 2006 Can only be done ”legally” by a trained (or trainee) professional a computing student would be considered in this context under the law

Ethical Hacking principles Even if it legal, doesn’t mean it is ethical! Professionals only hack without permission if there is reason to believe a law is being broken if not… they must ask permission otherwise definitely unethical (and illegal… “gaining access without permission”)

Typical Types of External Attacks - 1 Exhaustive “brute force” attacks using all possible combinations of passwords to gain access Inference taking educated guesses on passwords, based on information gleaned TOC/TOU (Time of check/use) 1. use of a “sniffer” to capture log on data 2. (later) using captured data & IP address in an attempt to impersonate the original user/client

Typical Types of External Attacks - 2 Three other types of attacks that firewalls should be configured to protect against: denial of service (DOS) attacks distributed denial of service (DDOS) attacks IP Spoofing (pretence that the data is coming from a “safe” source IP address

“Scanning” Methodology Check for Live Systems Check for open ports “Banner Grabbing” e.g. bad html request Scan for vulnerabilities Draw Network diagram(s) Prepare proxies…

TCP & UDP ports Hackers use these to get inside firewalls etc. Essential to know the important ones: 20, 21 ftp 80 http 389 Ldap 22 ssh 88 Kerberos 443 https 23 telnet 110 pop3 636 Ldap/SSL 25 smtp 135 smb 53 dns 137-9 NetBIOS 60 tftp 161 snmp

Network Layers and Hacking Schematic TCP/IP stack interacting at three of the 7 OSI levels (network, transport, application): HTTP FTP HTTPS NFS DNS SNMP ports X X X X X X TCP UDP IP

Secure web page service client (browser) requests information (HTML page) using https… (port 443) server (IIS, web server) processes the request, sends HTML page back to the client as https… Client: can view digital certificate Server: has digital certificate

PKI/HTTPs Presentations? First two sessions of 2017. Dates & locations to follow… details covered in seminars HTTPs/SSL etc… big changes afoot in 2017… for latest thinking (Symantec) see… https://www.brighttalk.com/webcast/10589/232735 (you’ll need to register)

Blocking TCP ports with a Firewall Very many TCP and UDP ports: 0 - 1023 are tightly bound to application services 1024 – 49151 more loosely bound to services 49152 – 65535 are private, or “dynamic” In practice, any port over 1023 could be assigned dynamically to a service… One of the more useful features of a firewall is that ports can be configured, and therefore data flow can be monitored and controlled

Blocking TCP ports with a Firewall Generally, TCP ports should be: EITHER open for a service (e.g. HTTP on port 80) OR… blocked if no service, to stop opportunists But if the firewall only allows “official services” this can cause problems for legitimate users e.g. if port 25 is blocked, email data cannot be sent

Protecting Against TCP/IP Attacks, Probes and Scans TCP/IP protocol stack has been largely unchanged since the early 1980's: more than enough time for hackers to discover their weaknesses often attack through a particular TCP port

TCP Port 21: FTP (File Transfer Protocol) FTP servers excellent BUT by their very nature they open up very big security holes those that allow anonymous logins are used: to launch attacks on the server itself, by connecting to the C: drive and downloading viruses or overwriting/deleting files to store pirated files and programs Precaution: configure FTP servers NOT to accept anonymous logins only allow access to port 21 through the firewall to that particular server

TCP Port 23: Telnet Telnet is really good for providing access to servers and other devices accessing a server via Telnet is very much like being physically located at the server console Protecting against Telnet is simple: block ALL access to port 23 from the outside block perimeter networks to the inside Protecting internal servers from attack from the inside: configure them to accept telnet connections from very few sources block port 23 completely…

TCP Port 25: SMTP Email programs large, complex, accessible… Therefore an easy target… Buffer overrun: attacker enters more characters – perhaps including executable code - into an email field (e.g. To: ) than is expected by an email server error could be generated hackers could gain access to the server and the network SPAM attack: protocol design allows a message to go directly from the originator's email server to the recipient's email server can ALSO be relayed by one or more mail servers in the middle BUT… this is routinely abused by spammers forward message to thousands of unwilling recipients

Port 25 SMTP: solution… Buffer Overrun: Spam Attack Solution: put server on a perimeter network Spam Attack Solution: DISABLE the relaying facility…

TCP and UDP Port 53: DNS (Domain Name Service) One of the core protocols of the Internet without it, domain name to IP address translation would not exist PROBLEMS: If a site hosts DNS, attackers will try to: modify DNS entries download a copy of your DNS records (a process called zone transfer)

Port 53 DNS: Solution… Solution: configure firewall to accept connections from the outside to TCP port 53 only from your secondary DNS server the one downstream from you e.g. your ISP consider creating two DNS servers: one on your perimeter network, the other on the internal network: perimeter DNS will answer queries from the outside internal DNS will respond to all internal lookups configure a Stateful inspection firewall to allow replies to internal DNS server, but deny connections being initiated from it

TCP Port 79: Finger A service that enumerates all the services you have available on your network servers: invaluable tool in probing or scanning a network prior to an attack! To deny all this information about network services to would-be attackers, just block port 79…

TCP Ports 109-110: POP (Post Office Protocol) POP easy-to-use… but sadly it has a number of insecurities The most insecure version is POP3 which runs on port 110 if the email server requires POP3, block all access to port 110 except to that server if POP3 not used, block port 110 entirely…

TCP Ports 135 and 137 NetBIOS The Microsoft Windows protocol used for file and print sharing last thing you probably want is for users on the Internet to connect to your servers' files and printers! Block NetBIOS. Period!

UDP Port 161 SNMP SNMP is important for remote management of network devices: but also it poses inherent security risks stores configuration and performance parameters in a database that is then accessible via the network… If network is open to the Internet, hackers can gain a large amount of very valuable information about the network… So… if SNMP is used: allow access to port 161 from internal network only otherwise, block it entirely

Denial of Service (DoS) Attacks An attempt to harm a network by flooding it with traffic so that network devices are overwhelmed and unable to provide services. One of the primary DOS attacks uses Ping, an ICMP (Internet Control Message Protocol) service: sends a brief request to a remote computer asking it to echo back its IP address

“Ping” Attacks Dubbed the "Ping of Death“ Two forms: Protection: the attacker deliberately creates a very large ping packet and then transmits it to a victim ICMP can't deal with large packets the receiving computer is unable to accept delivery and crashes or hangs an attacker will send thousands of ping requests to a victim so that its processor time is taken up answering ping requests, preventing the processor from responding to other, legitimate requests Protection: block ICMP echo requests and replies ensure there is a rule blocking "outgoing time exceeded" & "unreachable" messages

Distributed Denial of Service Attacks/IP Spoofing Related : A DDOS attack has occurred when attackers gain access to a wide number of PCs and then use them to launch a coordinated attack against a victim often rely on home computers, since they are less frequently protected (they can also use worms and viruses) If IP spoofing is used, attackers can gain access to a PC within a protected network by obtaining its IP address and then using it in packet headers

Protection against DDOS & IP Spoofing Block traffic coming into the network that contains IP addresses from the internal network… In addition, block the following private IP, illegal and unroutable addresses: Illegal/unroutable: 255.255.255.255, 27.0.0.0, 240.0.0.0, & 0.0.0.0 “Private” addresses useful for NAT, or Proxy Servers (RFC 1918): 10.0.0.0-10.255.255.255 172.16.0.0-172.31.255.255 192.168.0.0-192.168.255.255 Finally, keep anti-virus software up-to-date, & firewall software patched and up-to-date

Organisational Data Security Strategy: Where to start? Can’t START with technology needs to start with ISSUES that need addressing Should be primarily “top down” concerned with policies, not technical matters… can be supplemented by “bottom up” approach Technologies can be used to put policies into practice degree of success in the latter depends on: communication of policies understanding of technologies

Role of the Adviser/Consultant (1) Specialist knowledge of Information Security in organisations Aware of the need to convince senior management that the cost involved in achieving a quality standard is worthwhile In an SME: the adviser can provide moral, intellectual, and evidential support for the IT manager’s position In a microbusiness: there is no IT manager… adviser will usually be supporting the most IT-literate employee against a sceptical senior mgt…

Role of Adviser/Consultant (2) Needs to have good credentials to be credible: plenty of experience in this area contacts in the industry good track record for: knowledgeability keeping up to date communication of knowledge Needs to be able to put technical problems into terms that non-technologists can understand…. many expensive technical “solutions” available… would probably be unnecessary if systems and procedures were properly implemented!

How achieving a quality standard could help with business strategy Whatever the business: any new work will have a cost cost needs to be qualified More cost means less profit… what is the ROI of achieving a high level of information security (assurance)?

Potential Financial Benefits of Information Assurance Need to be sold to senior mgt… less risk of losing valuable (even strategically important…) data less likely to get embarrassing leaks, which could even get to the media (!) less likely to fall foul of the law (!) an ever growing set of examples of businesses who have done both of the above evidence that they lost customers and share price dropped…

Protection against the Threats Internal threats? should be addressed directed through implementation of IS policy External Threats? normally addressed through: 1. vulnerability scanning 2. action taken from vulnerability reports