Copyright © 1995-2007 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Mr C Johnston ICT Teacher
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
1 An Overview of Computer Security computer security.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authorization.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
E-Commerce Security and Fraud Issues and Protections
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Securing Information Systems
A First Course in Information Security
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Computer & Network Security
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Chap1: Is there a Security Problem in Computing?.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Wireless and Mobile Security
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Management System Ali Saeed Khan 29 th April, 2016.
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 17 Risks, Security and Disaster Recovery
Business Risks of Insecure Networks
Security in Networking
E-Commerce Security and Fraud Issues and Protections
Chapter 9 E-Commerce Security and Fraud Protection
Operating System Security
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture notes Fall 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administrative Course Evaluations –Today at the break Final Exam –Monday December AM-1PM –Open Book, Open Note Research Paper –Due next Friday (December 7) –Up to one week extension (minor penalty)

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Security Systems Lecture 13 – November 30, 2007 Trusted Computing (continued), Select Topics in Security Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE OS Support for Trusted Computing (1) Separation of address space –So running processes don’t interfere with one another. Key and certificate management for processes –Process tables contain keys or key identifiers needed by application, and keys must be protected against access by others. –Processes need ability to use the keys.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE OS Support for Trusted Computing (2) Fine grained access controls on persistent resources. –Protects such resources from untrusted applications. The system must protect against actions by the owner of the system.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Boot Windows Partition Contains  Encrypted OS  Encrypted Page File  Encrypted Temp Files  Encrypted Data  Encrypted Hibernation File Boot Partition Contains: MBR, Loader, Boot Utilities (Unencrypted, small) Where’s the Encryption Key? 1.SRK (Storage Root Key) contained in TPM 2.SRK encrypts VEK (Volume Encryption Key) protected by TPM/PIN/Dongle 3.VEK stored (encrypted by SRK) on hard drive in Boot Partition VEK2 3 Windows SRK 1 Disk Layout & Key Storage Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE BitLocker™ Architecture Static Root of Trust Measurement of early boot components Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Vista co-existence BitLocker encrypts Windows partition only You won’t be able to dual-boot another OS on the same partition OSes on other partitions will work fine Attempts to modify the protected Windows partition will render it unbootable –Replacing MBR –Modifying even a single bit Slide From Steve Lamb at Microsoft

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE No more running as root or administrator You may have full access within a virtual system, and to applications within the system it may look like root, but access to other virtual systems will be mediated. UserID’s will be the cross product of users and the virtual systems to which they are allowed access. All accessible resources must be associated with a virtual system.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Security Systems Lecture 13 – November 30, 2007 Select Topics and Review Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Requested Topics Discuss kinds of attacks Risk Analysis How are attacks funded? Privacy and the web, etc Security for routing protocols DNS Security Trusted OS implementations Security Case Studies –I’ll use these as a basis for review

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Glossary of Attacks This is not a complete list Availability –Denial of Service (DoS AND DDoS) ▪Over consumption of resources –Network, ports, etc –Take down name servers, other critical components ▪Exploits to crash system ▪Cache poisoning

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Glossary of Attacks This is not a complete list Confidentiality –Eavesdropping –Key Cracking –Exploiting Key Mismanagement –Impersonation ▪Exploiting protocol weakness ▪Discovered passwords ▪Social Engineering –Exploiting mis-configurations

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Glossary of Attacks This is not a complete list Integrity –Breaking Hash Algorithms –Exploiting Key Mismanagement –Impersonation ▪Exploiting protocol weakness ▪Discovered passwords ▪Social Engineering –Exploiting mis-configurations

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Glossary of Attacks This is not a complete list Miscellaneous –Spam –Phishing –Malware attacks ▪Spyware ▪Viruses ▪Worms ▪Trojan Horse –Man in the middle

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Risk Management Security is not absolute One must balance: –Likelihood of attack –Defense costs –Cost of lost opportunity –Cost on users –Losses from attack Successful Risk Management –Considers ways to affect all of the above

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Funding of Attacks Used to be unfunded –Bragging rights Now networks and underground economy –Organized crime –Direct gain from attack

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Privacy – The Trail We Leave Identifiers –Types ▪IP Address ▪Cookies ▪Login IDs ▪MAC Address and other unique IDs –Where saved ▪Log files –Persistence ▪How often does Ip address change ▪How can it be mapped to user identification

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Privacy – Retention Policies PII (personally identifiable information) –Is like toxic waste –Don’t keep it if you can avoid it Regulations –Vary by Jurisdiction –But if you keep it, it is “discoverable”

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Privacy – Protecting It Proxies and intermediaries Anonymous means of payment Browser settings Document settings Alternate identifiers Password choices Protection against spyware too

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE More of the Topics From Above Next Week

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Review - Topics Cryptography Key Management Identity Management (and Authentication) Policy (and Authorization) Attacks –Classic –The human element Defenses –Firewalls, Intrusion Detection and Response, Encryption, Tunnels, Defenses to Malware Architectures and Trusted Computing

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Hypothetical Case Studies Past exams –Electronic voting (Fall 2004) –Medical records (Fall 2003) –Intrusion Detection and Response (Fall 2005)

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Electronic Voting You have been asked to design a system to support the collection and counting of votes for the next election. In particular, you have been asked to design a system that will accurately tabulate votes entered by voters at poling places throughout the state and to transmit those votes to the county clerk of each county where the totals will be tabulated. (a) Threats. What are the threats in such a system? What can go wrong? (b) Requirements. What are the requirements for authentication, authorization, assurance, audit, and privacy? Explain who and what must be authenticated, what authorizations are required, what assurance is needed for the software, and what kind of records must be maintained (as well as what kinds of records should not be maintained). (c) Considering the requirements listed above, and how they relate to the assurance problem, i.e. how can steps taken for authentication, authorization and audit be used to ensure that the software has not been modified to improperly record or transmit votes? (d) What technologies proposed for digital rights management be used to provide stronger assurance that the system’s integrity has not been compromised. What is similar about the two problems, and how would such technologies be applied to the voting problem.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Medical Records You have been hired as a consultant to advise on the design of a security mechanism that will be used to protect patient data in a new medical records system. This system will manage and support the transmission of patient records, including very large images files for X-rays, MRI, CAT-scans and other procedures. The system must provide appropriate levels of protection to meet HIPAA privacy regulations, and it must allow the access to records needed by physicians and specialists to which patients are referred. (a) Describe appropriate requirements for confidentiality, integrity, accountability, and reliability/availability in such a system. (b) In what part's) of the system (e.g., where in the protocol stack would you include support for each of the requirements identified in (a)? Why would you place mechanisms where you suggested; what were the issues you considered? (c) What security mechanisms and approaches to implement those mechanisms would you use to meet the requirements in (a) as implemented in the parts of the system you identified in (b)?

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Intrusion Detection and Response You have been asked to design a system that will provide effective response to new attacks. The system you design will have two components, an intrusion detection component designed to detect attacks, and a dynamic policy enforcement mechanisms that will dynamically adjust policies based on what is learned about attacks from the intrusion detection component. Your system is supposed to provide an effective defense against viruses, worms, as well as attacker targeted penetration attempts to the systems in your organization.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Current Event CNN - Your computer may be part of criminal network Your computer may be part of criminal network The FBI has identified at least 2.5 million unsuspecting computer users who have been victims of so-called "botnet" activity. Hackers install viruses, worms and other attack programs that allow them to take over the computers and use them to commit cyber crimes. "Today, botnets are the weapon of choice for cyber criminals," said FBI Director Robert Mueller in a statement. "They seek to conceal their criminal activities by using third-party computers as vehicles for their crimes."