 Background  Penetration Studies  Example Vulnerabilities  Classification Frameworks  Theory of Penetration Analysis Computer Security: Art and Science.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Vulnerability Analysis. Formal verification Formally (mathematically) prove certain characteristics Proves the absence of flaws in a program or design.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
CSUF Chapter CSUF Operating Systems Security 2.
Section 3.2: Operating Systems Security
Malicious Logic What is malicious logic Types of malicious logic Defenses Computer Security: Art and Science © Matt Bishop.
Security+ Guide to Network Security Fundamentals
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Irwin/McGraw-Hill Copyright © 2004 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS6th Edition.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
New Data Regulation Law 201 CMR TJX Video.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Bina Nusantara 2 C H A P T E R INFORMATION SYSTEM BUILDING BLOCKS.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
9/10/2015 What’s New? Edline at Valley View!! Joyce Potempa Technology Department presentation to Building Support Staff February 2, 2010 Institute Day.
Cryptography and Network Security
Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7.
Security and Privacy Strategic Global Partners, LLC.
Presented by Amlan B Dey.  Access control is the traditional center of gravity of computer security.  It is where security engineering meets computer.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
ACM 511 Introduction to Computer Networks. Computer Networks.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 2 Information System Building Blocks.
2-1 A Federation of Information Systems. 2-2 Information System Applications.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Introduction Contain two or more CPU share common memory and peripherals. Provide greater system throughput. Multiple processor executing simultaneous.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Computer Security Sample security policy Dr Alexei Vernitski.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
UNIT V Security Management of Information Technology.
8 – Protecting Data and Security
CS 395: Topics in Computer Security
The Components of Information Systems
The Components of Information Systems
Malware, Phishing and Network Policies
Penetration Testing Computer Science and Software Engineering
Unit 1.6 Systems security Lesson 2
Chapter 33: Virtual Machines
Chapter 29: Program Security
Information System Building Blocks
Chapter 33: Virtual Machines
Presentation transcript:

 Background  Penetration Studies  Example Vulnerabilities  Classification Frameworks  Theory of Penetration Analysis Computer Security: Art and Science ©2004 Matt Bishop

 System architecture: based on strict file typing  Entities: ordinary users, privileged users, privileged programs, OS tasks ▪ Ordinary users tightly restricted ▪ Other 3 can access file data without restriction but constrained from compromising integrity of system  No assemblers; compilers output executable code  Data files, executable files have different types ▪ Only compilers can produce executables ▪ Writing to executable or its attributes changes its type to data  Class exercise: obtain status of privileged user  Layer 3 exercise Computer Security: Art and Science ©2004 Matt Bishop

 System had tape drives  Writing file to tape preserved file contents  Header record indicates file attributes including type  Data could be copied from one tape to another Computer Security: Art and Science ©2004 Matt Bishop

 System cannot detect change to executable file if that file is altered off-line Computer Security: Art and Science ©2004 Matt Bishop

 Consider a file “privileged.exe” that can only be executed by privileged users.  Write small program to change type of any file from data to executable (data-2-exe.exe)  Compiled, but could not be used yet as it would alter file attributes, making target a data file  Write this to tape  Write a small utility to copy contents of tape 1 to tape 2(copy-and-change-type.exe)  Utility also changes header record of contents to indicate file was a compiler (and so could output executables) Computer Security: Art and Science ©2004 Matt Bishop

 Run copy program (copy-and-change-type.exe)  As header record copied, type of data-2-exe.exe becomes “compiler”  Reinstall data-2-exe.exe program as a new compiler  Compile and create privileged.exe normally, and change machine code to give privileges to anyone calling it (this makes it data, of course)  Now use new compiler(data-2-exe.exe) to change privileged.exe type from data to executable  Write third program to call privileged.exe  Now you have privileges Computer Security: Art and Science ©2004 Matt Bishop

 Prevent unprivileged users from loading executables off tape. Computer Security: Art and Science ©2004 Matt Bishop

 Goal: determine whether corporate security measures were effective in keeping external attackers from accessing system  Layer 1  Testers focused on policies and procedures  Both technical and non-technical Computer Security: Art and Science ©2004 Matt Bishop

 Searched Internet  Got names of employees, officials  Got telephone number of local branch, and from them got copy of annual report  Constructed much of the company’s organization from this data  Including list of some projects on which individuals were working Computer Security: Art and Science ©2004 Matt Bishop

 Corporate directory would give more needed information about structure  Tester impersonated new employee ▪ Learned two numbers needed to have something delivered off-site: employee number of person requesting shipment, and employee’s Cost Center number  Testers called secretary of executive they knew most about ▪ One impersonated an employee, got executive’s employee number ▪ Another impersonated auditor, got Cost Center number  Had corporate directory sent to off-site “subcontractor” Computer Security: Art and Science ©2004 Matt Bishop

 Controls blocking people giving passwords away not fully communicated to new employees  Testers impersonated secretary of senior executive ▪ Called appropriate office ▪ Claimed senior executive upset he had not been given names of employees hired that week ▪ Got the names Computer Security: Art and Science ©2004 Matt Bishop

 Testers called newly hired people  Claimed to be with computer center  Provided “Computer Security Awareness Briefing” over phone  During this, learned: ▪ Types of computer systems used ▪ Employees’ numbers, logins, and passwords  Called computer center to get modem numbers  These bypassed corporate firewalls  Success Computer Security: Art and Science ©2004 Matt Bishop