Computer security 101 computer security 101 Eric Pancer Computer Security Response Team

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
CSA 223 network and web security Chapter one
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Threats to I.T Internet security By Cameron Mundy.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Internet Security facilities for secure communication.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
 a crime committed on a computer network, esp. the Internet.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Types of Electronic Infection
Security at NCAR David Mitchell February 20th, 2007.
Protecting Students on the School Computer Network Enfield High School.
Managing Information System Security: Principles GP Dhillon Associate Professor Virginia Commonwealth University.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Small Business Security Keith Slagle April 24, 2007.
Computer security By Isabelle Cooper.
Internet Safety Internet Safety LPM
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Role Of Network IDS in Network Perimeter Defense.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
Managing Windows Security
Instructor Materials Chapter 7 Network Security
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Information Security Session November 11, 2004
Risk of the Internet At Home
Information Security Session October 23, 2006
Intrusion Detection system
Operating System Concepts
Presentation transcript:

computer security 101 computer security 101 Eric Pancer Computer Security Response Team

april, welcome!  Why Are You Here?  Why Am I Here?

april, sponsors Information Services Computer Security Response Team

incidents and trends

april, what defines an incident?  A computer security incident covers a large range of violations, including:  Harassment,  Denial/Interruption of Service,  Malware Infection (worm, virus),  Unauthorized Access,  Misuse of Data or Services,  Copyright Infringement,  Spam?

april, general statistics CERT/CC: Incidents Reported 1991 – – 1, – 2, – 2, – 9, – 52, – 137,529

april, in our backyard  W32.Blaster Worm  Exploited a vulnerability patched in July,  Unleashed August,  900+ Infections from August 11, 2003 to October 11,  Persists at approximately 8-10 infections weekly.  ‘Bots  Exploits common vulnerabilities.  Variants released weekly.  Centrally controlled.  Growing more and more malicious.  700+ unique hosts since January, 2004.

april, even more alarming  W32.Slammer Worm  January,  Attacked…  …unpatched MS-SQL 2000 servers…  …unpatched desktops with Microsoft Desktop Engine…  Interrupted Bank of America ATM Services.  Caused a “meltdown” of University network services due to other “bugs” on the network.  Vulnerability was announced June, 2002!

april, how do we find violations?  Intelligence gathering is performed in many ways – though human interaction and communication is still the best method.  Reports to  Internal reports.  Monitoring network flows.  Searching for attack patterns.  Hearsay, rumors, gossip.

april, sample report Date: Fri, 9 Apr :57: From: To: Cc: Subject: Abuse! Suspicious Activity!!! Hello, You are being contacted regarding suspicious activity logged from a host on your network. We found that the address was attempting to connect to the VPN port 500 (TCP) on Apr 8 at 18:15:41 (EST). Log Entries (All times are EDT): *Apr 8 18:15: x *Apr 8 18:15: x Please review the log information included below. The data reflected in the log could be interpreted as a user from your domain attempting to probe a federal government network. Please investigate this immediately and take action to prevent further probing of the network.

april, network flows 19 Apr 04 10:49: tcp > RS 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp ?> EST 19 Apr 04 10:49: tcp > EST 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp > FIN 19 Apr 04 10:49: tcp > RST 19 Apr 04 10:50: tcp > TIM 19 Apr 04 10:51: udp ACC 19 Apr 04 10:50: tcp CON 19 Apr 04 10:51: udp ACC 19 Apr 04 10:50: tcp > RST 19 Apr 04 10:51: udp ACC 19 Apr 04 10:51: udp ACC 19 Apr 04 10:51: udp ACC 19 Apr 04 10:50: tcp > EST 19 Apr 04 10:51: udp ACC 19 Apr 04 10:51: udp ACC 19 Apr 04 10:50: tcp > RST 19 Apr 04 10:51: udp ACC

april, known signatures alert tcp $HOME_NET any -> $EXTERNAL_NET 135 \ (msg:"SCAN - Microsoft Directory and File Services"; \ stateless; flags:S,12; threshold: type threshold, track by_src, \ count 520, seconds 600; classtype:network-scan; priority:7; sid: ; rev:1;) [**] [1: :1] SCAN - Microsoft Directory and File Services [**] [Classification: Detection of a Network Scan] [Priority: 7] 04/19/04-01:54: :2460 -> :135 TCP TTL:126 TOS:0x0 ID:49784 IpLen:20 DgmLen:48 DF ******S* Seq: 0xC6D0AB86 Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK

april, is it 1984?  Are you Big Brother?  Why do you care?  Do you read my ?  Isn’t the network secure?  I don’t do anything malicious, so don’t look at what I do please.

general concepts

april, common myths  “Why should I care, I have nothing to hide.”  “Why does anyone care about my computer?”  “It’s too difficult to get access to my computer or personal information…”  “If someone tries to [insert malicious activity here], I will notice!”  “Ignorance is bliss!”

april, are you at risk? Using the following puts you at risk: Computers Credit Cards Banks Airlines Automobiles …many more…

april, CIA – the building blocks Confidentiality AuthenticityIntegrity

april, confidentiality  Ensures privacy.  Applies to both data on disks and network communication.  Accomplished through encryption:   s/mime  pgp  ssh and ipsec Confidentiality

april, integrity  Develops trust of the network and computer systems.  Applies to both data on disks and network communication.  Integrity is increased by proper data and system management. Integrity

april, authenticity  Another catalyst for trust.  Required for data on disk and network communication.  Prevents ID theft, “man in the middle” attacks, etc. Authenticity

april, vulnerability life cycle vulnerability discussion concept code exploit automation research

april, assumptions  Researchers will continue to find new bugs and vulnerabilities.  Active exploitation of these vulnerabilities will continue through worms, viruses, etc.  Technology will continue to progress and the quality of code will continue to fall. Santa Claus is real!

terminology

april, denial of service  The overload of a system preventing the normal use of that system.  A denial of service (DoS) attack is a common method to prevent users from accessing websites.

april, scanning  Enumerating the security of a computer system and/or the service(s) they provide.  A “portscan” commonly occurs to check the type of computer operating system being used.  Thousands of portscans against the University have taken place in the time you have read this slide!

april, exploit  A piece of malicious code or action against a computer system to elevate privileges or gain further access.  Exploits mostly act on bugs found in software or hardware. These bugs are usually due to human error coding or system misconfiguration.

april, virus  A virus is a piece of code that modifies existing applications or data to change the behavior of that application or of data.  Viruses rely on human interaction to ensure their survival and propagation.

april, worm  A worm is a program that propagates itself over a network, reproducing itself and changing as needed, to survive and adapt.  The term worm is derived from tapeworm as coined in John Brunner’s book “Shockwave Rider.”

april, (ro)bot  A software program or computer that performance repetetive functions; usually commanded as part of a botnet (see next slide).  Although robots were first introduced to spider the world wide web, the term bot has come to represent an increasing threat against computer users.

april, botnet  A collection of computers acting in conjunction with one another to perform automated tasks.  Botnets can be built using viruses, worms or other attacks. These botnets (sometimes thousands of computers) can then carry out “scan and ‘sploit” actions automatically.

april, feeling overwhelmed yet?

defending with technology

april, start with the basics  Basic computer security is through technology is easy; use…  A firewall,  Anti-Virus Software,  Patch your computer quickly, when required,  Strong passwords!

april, firewalls  The most useful tool in your bag of defenses.  Prevents intruders from accessing services on your computer.  Validates/normalizes network traffic.  May provide reports and trend analysis.  Available for all major operating systems – usually for free!

april, anti-virus software  Stops viruses and worms sent by , attachments, downloads, etc.  Detects malicious software through intelligent heuristics.  Available for all major desktop and server operating systems.  A requirement; not an option.

april, patches  (Usually) free updates to your computer; can be downloaded from the Internet.  Available before most exploits surface.  Automated, usually.  Critical to overall security.  Chant: “We Must Patch, We Must Patch…”

april, strong passwords  Keeps you on-target with best practices.  Is composed of 8 or more characters and includes letters, numbers and 2 special characters, including  Not based on any dictionary word from any language.  Changes regularly; not shared.

april, coordinated efforts result in success! Goal

behavioral changes

april, what technology doesn’t solve  Security technologies adapt as threats appear. They are not able to (easily) combat:  Threats,  Hoaxes,  Scams,  The behavior of others.

april, the clue factor

april, education and awareness  Education and awareness are key to increasing the security posture of the University, and global Internet.  Dispells the FUD (fear, uncertainty, doubt).  Addresses problems before they exist.  Extends the radius of clue.  Creates inclusion in the entire infosecurity effort.

april, self-education  You can increase your own awareness of security related issues.  Subscribe to mailing lists for security notifications.  Visit security related websites.  Contact us, we’re always willing to help.  Voice your concern on security related issues, helping raise awareness in others.

april, test your efforts  Contact us and we can schedule a vulnerability scan for your department or network.  Register your network with us; we can send you reports of suspicious behavior.  Help us tailor an awareness program for your department.  Remember: security is about sharing knowledge and contacts, not technology.

april, thank you!  Questions?  Contact CSRT: Computer Security Response Team or… Eric Pancer pgp: C E5 51E7 683C F765 62F7 7F8E 7ACB CFF3