CSE 4482: Computer Security Management: Assessment and Forensics

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Chapter 11 Firewalls.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Learning Objectives Upon completion of this material, you should be able to:
Chapter 12 Network Security.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Security Technology. Objectives Understand the role of physical design in the implementation of a comprehensive security program Understand firewall technology.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. BRUCE SCHNEIER,
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 5 Firewall Planning and Design By Whitman, Mattord, & Austin© 2008 Course Technology.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Protection Mechanisms
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security fundamentals Topic 10 Securing the network perimeter.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Technical Devices for Security Management Kathryn Hockman COSC 481.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Security Methods and Practice CET4884
Computer Data Security & Privacy
Click to edit Master subtitle style
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
* Essential Network Security Book Slides.
Chapter 8 Network Perimeter Security
Introduction to Network Security
Protection Mechanisms in Security Management
Presentation transcript:

CSE 4482: Computer Security Management: Assessment and Forensics Instructor: Suprakash Datta (datta[at]cse.yorku.ca) ext 77875 Lectures: Tues (CB 122), 7–10 PM Office hours: Wed 3-5 pm (CSEB 3043), or by appointment. Textbooks: 1. "Management of Information Security", M. E. Whitman, H. J. Mattord, Nelson Education / CENGAGE Learning, 2011, 3rd Edition 2. "Guide to Computer Forensics and Investigations", B. Nelson, A. Phillips, F. Enfinger, C. Steuart, Nelson Education / CENGAGE Learning, 2010, 4th Edition. 4/16/2017 1

Objectives On completing this chapter, you should be able to: Describe the various access control approaches, including authentication, authorization, and biometric access controls Identify the various types of firewalls and the common approaches to firewall implementation Enumerate and discuss the current issues in dial-up access and protection Identify and describe the types of intrusion detection systems and the two strategies on which they are based Explain cryptography and the encryption process, and compare and contrast symmetric and asymmetric encryption Management of Information Security, 3rd ed. 2

Introduction Technical controls Usually an essential part of information security programs Insufficient if used alone Must be combined with sound policy and education, training, and awareness efforts Management of Information Security, 3rd ed. 3

Introduction (cont’d.) Figure 10-1 Sphere of security Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 4

Technical security mechanisms Access controls Firewalls intrusion detection systems (host , network) scanning and analysis tools vulnerability assessment encryption systems

Access Controls The four processes of access control Identification Obtaining the identity of the person requesting access Authentication Confirming the identity of the person Authorization Determining which actions that a person can perform in that physical or logical area Accountability Documenting the activities of the authorized individual and systems “Triple A of security” Management of Information Security, 3rd ed. 6

Examples: name, first initial and surname Identification A mechanism that provides information about a supplicant that requests access Identifier (ID) The label applied to the supplicant Must be a unique value that can be mapped to one and only one entity within the security domain Examples: name, first initial and surname Management of Information Security, 3rd ed. 7

Authentication mechanism types Something you know Something you have Something you are Something you produce Strong authentication Uses at least two different authentication mechanism types (e.g. Bank ABM card + Pin) Management of Information Security, 3rd ed. 8

Authentication (cont’d.) Something you know A password, passphrase, or other unique code A password is a private word or combination of characters that only the user should know A passphrase is a plain-language phrase, typically longer than a password, from which a virtual password is derived Passwords should be at least eight characters long and contain at least one number and one special character Management of Information Security, 3rd ed. 9

Brute force password cracking @ about 8 million guesses per second Table 10-1 Password power Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 10

Authentication (cont’d.) Something you (user or system) have Examples: A card, key, or token A dumb card (such as an ATM card) with magnetic stripes Card no. (and other info) stored on magnetic stripe Machine encrypts pin, sends to a database for verification A smart card (contains a processor) Contains CPU, RAM, ROM, encryption hardware Stores encrypted Pin, user info 100 x as much data as magnetic stripe Can verify PIN, generate a certificate for transaction Management of Information Security, 3rd ed. 11

Authentication (cont’d.) A cryptographic token (a processor in a card that has a display); provides a one-time-password Tokens may be either synchronous (use time to generate one-time password) or asynchronous (challenge-response for authentication) Figure 10-3 Access control tokens Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 12

Authentication (cont’d.) Something you are Something inherent in the user that is evaluated using biometrics Most technologies that scan human characteristics convert the images to obtain minutiae (unique points of reference that are digitized and stored in an encrypted format) Examples: fingerprints, retina, iris Effective, may be expensive Management of Information Security, 3rd ed. 13

Authentication (cont’d.) Something you produce Something the user performs or produces Includes technology related to signature recognition and voice recognition Less expensive, less reliable than biometrics Management of Information Security, 3rd ed. 14

Authentication (cont’d.) Figure 10-4 Recognition characteristics Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 15

Interesting variant User authentication through keystroke dynamics (computers, mobile devices)

Evaluating Biometrics Biometric evaluation criteria False reject rate (Type I error) Percentage of authorized users who are denied access False accept rate (Type II error) Percentage of unauthorized users who are allowed access Crossover error rate (CER) Point at which the number of false rejections equals the number of false acceptances Management of Information Security, 3rd ed. 17

Error rates Biometrics Type 2 Type 1 Fingerprint 0% 1% Voiceprint 1.6% From http://www.techrepublic.com/article/reduce-multi-factor-authentication-costs-with-behavioral-biometrics/6150761 Biometrics Type 2 Type 1 Fingerprint 0% 1% Voiceprint 1.6% 1.8% Typeprint 0.01% 3%

Acceptability of Biometrics Figure 10-4 Recognition characteristics Note: Iris Scanning has experienced rapid growth in popularity and due to it’s acceptability, low cost, and effective security Source: Harold F. Tipton and Micki Krause. Handbook of Information Security Management. Boca Raton, FL: CRC Press, 1998: 39–41. Management of Information Security, 3rd ed. 19

Types of authorization Each authenticated user The system performs an authentication process to verify the specific entity and then grants access to resources for only that entity Members of a group The system matches authenticated entities to a list of group memberships, and then grants access to resources based on the group’s access rights Across multiple systems A central system verifies identity and grants a set of credentials to the verified entity Management of Information Security, 3rd ed. 20

Accountability Monitors actions so that they can be attributed to an authenticated entity Examples: attempts to read write data, attempts to modify privileges, attempts to gain unauthorized access Most common technique: logs Examples: security application logs, security hardware logs, OS logs

Managing Access Controls A formal access control policy Determines how access rights are granted to entities and groups Includes provisions for periodically reviewing all access rights, granting access rights to new employees, changing access rights when job roles change, and revoking access rights as appropriate Management of Information Security, 3rd ed. 22

Next: Firewalls From http://www.hardwaresecrets.com/imageview.php?image=6731

TCP/IP:logical communication http://flylib.com/books/2/959/1/html/2/images/mir08f01.jpg

TCP/IP:logical communication http://www.tcpipguide.com/free/diagrams/ipsectransport.png

Firewalls Any device that prevents a specific type of information from moving between two networks Between the outside (untrusted network: e.g., the Internet), and the inside (trusted network) May be a separate computer system a service running on an existing router, server separate network of supporting devices Management of Information Security, 3rd ed. 26

Enforce security policy Monitor/log activity Firewalls Can Limit access Separate different parts of a network Dynamically change permissions Enforce security policy Monitor/log activity

Firewalls Cannot Protect against malicious insiders Protect against unforeseen threats Protect against connections not passing through it (e.g. direct dialup). Limited use against viruses

The Development of Firewalls Packet filtering firewalls First generation firewalls Simple networking devices that filter packets by examining every incoming and outgoing packet header Selectively filter packets based on values in the packet header Can be configured to filter based on IP address, type of packet, port request, and/or other elements present in the packet Management of Information Security, 3rd ed. 29

The Development of Firewalls (cont’d.) Table 10-4 Packet filtering example rules Typically use filtering rules based on IP addresses, Direction, port numbers. Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 30

Development of Firewalls - contd Application-level firewalls Second generation firewalls dedicated computers kept separate from the first filtering router (edge router) Commonly used in conjunction with a second or internal filtering router - or proxy server The proxy server, rather than the Web server, is exposed to the outside world from within a network segment called the demilitarized zone (DMZ), an intermediate area between a trusted network and an untrusted network Implemented for specific protocols Management of Information Security, 3rd ed. 31

Development of Firewalls - contd Stateless vs stateful inspection Stateless: simple, memoryless, oblivious Stateful inspection firewalls Third generation firewalls Keeps track of each network connection established between internal and external systems using a state table State tables track the state and context of each packet exchanged by recording which station sent which packet and when Management of Information Security, 3rd ed. 32

Development of Firewalls - contd Stateful inspection firewalls (cont’d.) Can restrict incoming packets by allowing access only to packets that constitute responses to requests from internal hosts If the stateful inspection firewall receives an incoming packet that it cannot match to its state table It uses ACL rights to determine whether to allow the packet to pass Stateless firewalls: Network and link layers, Stateful firewalls: Transport, Network and link layers Management of Information Security, 3rd ed. 33

Statis vs Dynamic Firewalls Static: fixed rules, configured by admin Dynamic packet filtering firewall Fourth generation firewall Can adapt to changing conditions by creating and/or changing rules Understands how the protocol functions, and opens and closes ports depending on application An intermediate form between traditional static packet filters and application proxies Management of Information Security, 3rd ed. 34

Packet-filtering firewalls: notes Does not examine packet contents, only headers Application level firewalls examine packet contents

Application gateway http://download.oracle.com/docs/cd/B19306_01/network.102/b14212/img/net81083.gif

Application gateway (proxy) Application aware client and the server connect to these proxies instead of connecting directly to each other can look in to individual sessions can drop a packet based on information in the application protocol headers or in the application payload. E.g.: SMTP proxies can be configured to allow only helo, mail from:, rcpt to: to pass through the firewall

Application gateway: uses IP address hiding/translation Header modification Prevent port/protocol spoofing Content-based filtering (prevent sensitive data from being emailed out) URL filtering MIME filtering

Application gateway: drawbacks End-to-end semantics lost Slower processing, lower throughput Not all applications amenable to this strategy Other strategies: circuit gateways, MAC layer firewall

Firewall Architectures Each firewall generation can be implemented in several architectural configurations Common architectural implementations Packet filtering routers Screened-host firewalls Dual-homed host firewalls Screened-subnet firewalls Management of Information Security, 3rd ed. 40

Packet filtering routers Most organizations with an Internet connection use some form of router between their internal networks and the external service provider Many can be configured to block packets that the organization does not allow into the network Such an architecture lacks auditing and strong authentication The complexity of the access control lists used to filter the packets can grow to a point that degrades network performance Management of Information Security, 3rd ed. 41

Packet filtering routers (cont’d.) Figure 10-5 Packet filtering firewall Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 42

Screened-host firewall systems Combine the packet filtering router with a separate, dedicated firewall such as an application proxy server Allows the router to screen packets Minimizes network traffic and load on the internal proxy The application proxy examines an application layer protocol, such as HTTP, and performs the proxy services Bastion host A single, rich target for external attacks Should be very thoroughly secured Management of Information Security, 3rd ed. 43

Screened-host firewall systems(cont’d.) Figure 10-6 Screened-host firewall Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 44

Dual-homed host firewalls The bastion host contains two network interfaces One is connected to the external network One is connected to the internal network Requires all traffic to travel through the firewall to move between the internal and external networks Network-address translation (NAT) is often implemented with this architecture, which converts external IP addresses to special ranges of internal IP addresses These special, nonroutable addresses consist of three different ranges: 10.x.x.x: greater than 16.5 million usable addresses 192.168.x.x: greater than 65,500 addresses 172.16.0.x - 172.16.15.x: greater than 4000 usable addresses Management of Information Security, 3rd ed. 45

Generalize this idea to… A host firewall (not router) with 2 NICs placed between external and internal router. More isolation, higher cost, slower processing, single point of failure

Dual-homed host firewalls – contd. Figure 10-7 Dual-homed host firewall Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 47

Screened-Subnet Firewalls Consists of one or more internal bastion hosts located behind a packet filtering router, with each host protecting the trusted network The first general model uses two filtering routers, with one or more dual-homed bastion hosts between them The second general model shows connections routed as follows: Connections from the untrusted network are routed through an external filtering router Connections from the untrusted network are routed into—and then out of—a routing firewall to the separate network segment known as the DMZ Second general model (cont’d.) Connections into the trusted internal network are allowed only from the DMZ bastion host servers Management of Information Security, 3rd ed. 48

Screened-Subnet Firewalls(contd) Figure 10-8 Screened subnet (DMZ) Management of Information Security, 3rd ed. Source: Course Technology/Cengage Learning 49

Selecting the Right Firewall Firewall technology: What type offers the right balance between protection and cost for the organization’s needs? Cost: What features are included in the base price? At extra cost? Are all cost factors known? Maintenance: How easy is it to set up and configure the firewall? How accessible are the staff technicians who can competently configure the firewall? Future growth: Can the candidate firewall adapt to the growing network in the target organization? Management of Information Security, 3rd ed. 50