Ch. 11: IS Security Gerhard Steinke BUS 3620 According to Internetworldstats.com, there are 2,095,006,005 internet users worldwide Steinke
It is now unsafe to turn on your computer... Steinke
Network vulnerabilities Slammed on All Sides Viruses Employee Error Rogue Insiders Software Bugs Corporate Spies Script Kiddies Web Defacements Password Crackers Network vulnerabilities Denial of Service War Drivers “SneakerNet” Backdoors Worms Trojans Buffer Overflows “Blended Threats” Steinke
Definition: Information Security Confidentiality Protecting information from unauthorized disclosure Integrity Protecting information from unauthorized alternation/destruction Availability Ensuring the availability and access to the information Availability Integrity Confidentiality
The Threat: Who Are They? Internal (authorized users (intentional & unintentional), contract worker, etc.) Hackers (‘script kiddies’ to experts) Industrial Espionage (legal? acceptable in some countries and sometimes government funded) Foreign Espionage Criminal (financial or criminal motivation) Other (terrorists, political activists) Steinke
The Cyber Security Threat The threat is global The attack sophistication is increasing The skill level required to become a threat is decreasing We live in a “Target Rich” environment Exposure time and response time are critical Steinke
What Are They Doing? Corrupting Information Disclosing Information Viruses, worms File deletion Data tampering (medical & financial), Web page hacks Disclosing Information Public release of private data Selling of private or financial data (e.g., stolen charge card numbers) Stealing Service Using site as intermediary for attacks Denial of Service (preventing the use of IT resources) Network flooding Crashing systems or services Steinke
Security Awareness - Posters Steinke
Technical Security Measures: Firewalls A system which examines network packets entering/leaving an organization and determines whether the packets are allowed to travel ‘through’ the firewall Organization Steinke 4
Firewalls - DMZ Steinke
Intrusion Detection System (IDS) Intrusion Prevention System (IPS) attempts to detect/prevent someone breaking into your system running in background and notifies you when… Match Alarm Steinke
Decryption Exercise Can you decrypt these? mfuttubsu cepninotry Steinke
Why Encryption? Disguising message in order to hide its substance Based in logic and mathematics Confidentiality Message wasn’t changed Authentication who really sent message? Integrity was message altered? Non-repudiation so sender cannot deny they sent message Steinke
Encryption Substitution Cipher (13) ABCDEFGHIJKLMNOPQRSTUVWXYZ NOPQRSTUVWXYZABCDEFGHIJKLM Transposition Cipher Rearranging all characters in the plaintext Attack: frequency of letters Concealment – hide in text Break Encryption by brute force - try all possible keys key length Steal, bribe, replace encryption software, flaws in system Steinke
Steganography Hiding information http://www.jjtc.com/Steganography/ http://www- users.aston.ac.uk/~papania1/stegano.html S-tools demo Steinke
Symmetric / Secret Key same key for encryption and decryption confidentiality secure key distribution required otherwise could impersonate sender as well scalability - n users require n*(n-1)/2 keys Steinke
Asymmetric or Public/Private Key Encryption Two keys – one encrypts, the other decrypts Public and Private keys generated as a pair Private key for user Public key for distribution Each key decrypts what the other encrypts Confidentiality, integrity, authentication and non-repudiation Intensive computations, slow
Picture of Asymmetric
Hash / Message Digest Function Create hash value / digital fingerprint Provides integrity checking Shorter than original message Variable length message to fixed length hash value One way function, can’t go back Appended to message Examples: MD5 - 128 bit hash SHA - 160 bit, by NIST, NSA in DSS (Digital Signature Standard)
Digital Signatures Create a hash value Encrypt hash value with your private key Attach to message to be sent Encrypt with recipients public key Send
What does Digital Signature do? Integrity – Message not changed Authentication - Verify sender identity and message origin Creates non-repudiation Applications: Used to authenticate software, data, images Used with electronic contracts, purchase orders Protect software against viruses
Security Basics Security policy document security principles Educate users - what and why of security Physical Security Monitor network Passwords Steinke
PC Security gateway to network access to information on PC power on password, screen saver password encryption password protect files, disk drive erase information when deleting a file Steinke
Software Control control program change requests require multiple authorizations require full documentation independent testing of changes check with operations before acceptance procedure to handle emergency situations Steinke
Operational Controls investigate error messages, reports, alarms monitor communication lines for failures, problems monitor network status for operational, out- of-service stations monitor traffic queues for congestion control tapes, disks and other system materials to ensure proper labeling and retention Steinke
maintain backup for programs, tapes and other material examine system printouts, program dumps, recovery printouts monitor vendor and maintenance personnel control testing during operational hours ensure that changes to hardware and software are necessary Steinke
Biometrics Identify people by measuring some aspect of individual anatomy or physiology, some deeply ingrained skill, or other behavioral characteristic or something that is a combination of the two Handwritten signatures Face Recognition Fingerprints Iris Codes Voice Retina Prints DNA Identification Palm Prints Handwriting Analysis
Errors All recognition systems are subject to error ‘Fraud’ / ‘false positive’ A client is accepted as authenticated when they should have been rejected ‘Insult’ / ‘false negative’ A client is rejected as NOT authenticated when in fact they should have been accepted.
Face Recognition The oldest way There is widespread acceptance (and requirement!) for photo ID The issuing of other authentication devices (like passwords, key cards, digital signatures) usually depends on facial recognition by the agents of the issuing authority Photo-ID is not particularly reliable, but has a very significant deterrent effect
Facial Scan Strengths: Weaknesses: Attacks: Defenses: Database can be built from driver’s license records, visas, etc. Can be applied covertly (surveillance photos). (Super Bowl 2001) Few people object to having their photo taken Weaknesses: No real scientific validation Attacks: Surgery Facial Hair Hats Turning away from the camera Defenses: Scanning stations with mandated poses
Fingerprints Accounts for the majority of sales of biometric equipment The ridges that cover the fingertips make patterns, that were classified in the 1800’s These patterns have loops of several distinct types, branches, and endpoints. Because of the association with criminals, commercial users are very reluctant to impose fingerprinting systems upon their clients Fingerprint sensors on laptops
Iris Codes Iris patterns believed to be unique The patterns are easy enough to detect They do not wear out They are protected by the eyelids and cornea Easier to capture and process than fingerprints A processing technique is used to generate a 256 byte iris code Low false acceptance rates
Iris Codes Practical difficulties: Capturing the iris image is intrusive The subject has to be co-operative
Voice Recognition Strengths: Weaknesses: Attacks: Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception Weaknesses: Background noise No large database of voice samples Attacks: Tape recordings Identical twins / soundalikes
Hand Scan Typical systems measure 90 different features: Overall hand and finger width Distance between joints Bone structure Primarily for access control: Machine rooms Olympics Strengths: No negative connotations – non-intrusive Reasonably robust systems Weaknesses: Accuracy is limited http://www.cjonline.com/images/040502/new.handscan.jpg
Other Biometrics Retina Scan Facial Thermograms Vein identification Very popular in the 1980s military; not used much anymore. Facial Thermograms Vein identification Scent Detection Gait recognition Handwriting
Space Required for each Biometric Approx Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes
A Comprehensive Security Program Policies & Management Sponsorship Procedures Reporting Practices and Procedures Assessment Service Provider Compliance Awareness and Training
Security Principles impossible to provide complete security match to value of assets provide good security but keep system easy to use easy to use, little security <-----> difficult to use, high security Steinke