Talking points Attacks are more frequent, more aggressive, require more time to repair and prevent Machines get compromised in 2003 for the same reasons.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Security Update Server Registration, Active scanning and Windows patching.
By Hiranmayi Pai Neeraj Jain
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
(n)Code Solutions Presentation on the importance of a Secure Technology Infrastructure.
Computer Viruses.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Chapter 7 HARDENING SERVERS.
Network and Server Attacks and Penetration Chapter 12.
University of WashingtonComputing & Communications Recent Computer Security Incidents Terry Gray Director, Networks & Distributed Computing 03 October.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
1 Secure Your Business PATCH MANAGEMENT STRATEGY.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
EDUCAUSE Security 2006 Internet John Brown University.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Viruses.
The Cost of Cheap Understanding Your IT Investment Options.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Staying Safe Online Keep your Information Secure.
CERN’s Computer Security Challenge
Proposed mid-term Security Strategies for CERN Prepared by ad-hoc working group members: Lionel Cons, Francois Fluckiger, Denise Heagerty, Jan Iven, Jean-Michel.
CSI-E Computer Security Investigator – Enterprise.
Information Security Management: Protecting IT Assets from Current and Future Threats John McCumber Strategic Program Manager.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
How CERN reacted to the Blaster and Sobig virus attack Christian Boissat, Alberto Pace, Andreas Wagner.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
CERN IT Department CH-1211 Genève 23 Switzerland t Windows Desktop Applications Life-cycle Management Sebastien Dellabella, Rafal Otto Internet.
A Basic Introduction to Computer Security John H. Porter University of Virginia Department of Environmental Sciences.
Security at NCAR David Mitchell February 20th, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Page 1 8 Oct 2004 IT Security Awareness Dangers in the Networked World Lai Zit Seng NUS School of Computing.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Virus Hits Wikipedia The virus writers created a page on the German Wikipedia that linked to a fake fix for a new version of an old malicious Windows worm.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
NetTech Solutions Protecting the Computer Lesson 10.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Writing Security Alerts tbird Last modified 2/25/2016 8:55 PM.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Computer Security Sample security policy Dr Alexei Vernitski.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
WannaCry/WannaCrypt Ransomware
WannaCry/WannaCrypt Ransomware
Critical Security Controls
Threats to computers Andrew Cormack UKERNA.
Technology Update TSAG Meeting 5/11/04.
Information Security Session October 24, 2005
Introduction to Internet Worm
Presentation transcript:

Talking points Attacks are more frequent, more aggressive, require more time to repair and prevent Machines get compromised in 2003 for the same reasons they did in 1990: bad passwords, unpatched software (CERT)

Talking points cont. Cost of attacks includes lost productivity, time to fix machines, time to research incident and create response strategy, potential legal liability Assume 4 hours average to repair or rebuild a machine hit with an automated exploit like Nimda or Blaster; frequently lost productivity is longer term; does not include time to research & design recovery strategy

Bad passwords CERT advisory 1990: no password or default passwords second highest reason for successful compromises Spring 2002: machines at Stanford compromised through weak or nonexistent passwords Response: scan proactively for Windows systems with bad passwords (2 people 1 week to research & configure; ongoing management & communication)

MS SQL Slammer (1/25/2003) Exploits MS DB servers without patch for MS (7/2002) – 6 months from vuln to exploit About 50 Stanford machines infected – buggy code not installed by default – but many users hit because they didn’t know they needed the patch (200 hrs) Response – block SQL Server traffic at border between SUNet and Internet (1 person, 1 hour – plus research)

Bugbear (6/6/2003) Virus infects machine if user double-clicks attachment; spreads automatically if MS not installed (available March 2001 – 2+ years from vuln to automated exploit) Confidential data (human resources records, health care information) randomly sent to external addrs – NB CA privacy law in effect on 7/1/2003

Bugbear cont. Campus SMTP service completely disabled for 9+ hours to prevent loss of confidential information Long-term: campus SMTP service completely redesigned to require all on campus to pass through centrally managed anti-virus servers

Bugbear cont. Cost of response: 10 ITSS staff for 3 days (immediate research and response); ongoing communications with distressed users (those infected by virus and those impacted by change in architecture) Only 20+ machines known infected on campus

RPC Hell (8/2003 to present) Microsoft announces critical Windows vulnerability 7/16/2003 Vulnerability is accessible to anyone with network access to unpatched machine Stanford has blocked that network access at perimeter for over a year

RPC Hell (8/2003 to present) Stanford sees first attacks 7/30/2003 (2 weeks from vuln to exploit) despite perimeter filtering – brought in by laptop? Because early attacks were not widespread, we did more “basic research” – no info from Symantec or other “usual suspects” – and had to develop our own recovery strategy

RPC Hell cont. 10 exploits known for July 2003 vulnerabilities, including Blaster & Welchia 7 exploits seen “in wild” at Stanford machines infected  14 man years to repair & restore to functionality Over 100 pages of documentation published

RPC Hell cont. 20 managers & architects from ITSS, schools & departments in average 2 hours of meetings per day for two weeks to develop response (400 hours) New network registration system developed and implemented in ResComp before return of students

RPC Hell cont. Automated system to detect unpatched and/or infected machines and encourage rapid repairs deployed, may be leverage- able for other (future) vulnerabilities & exploits Increased attention to centralized software management, at least for Windows machines

Summary Time from vuln announcement to automated exploit is getting much shorter Incidents require increasingly “violent” ITSS intervention and response Numbers of compromised machines are going up a lot – compare in spring of 2002 to with RPC exploits Legal liability is much higher thanks to new laws