Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.

Slides:



Advertisements
Similar presentations
Attacks Framework Attacks Physical Access Attacks -- Wiretapping Server Hacking Vandalism Dialog Attacks -- Eavesdropping Impersonation Message Alteration.
Advertisements

Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Chapter 9 Copyright 2004 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 5 th edition.
Security+ Guide to Network Security Fundamentals
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Chapter 1 Introduction to Security
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Introduction & Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Revised by Huei Lee.
Threats and Attacks Principles of Information Security, 2nd Edition
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
1 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
7 Information Security.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Chap1: Is there a Security Problem in Computing?.
Cybercrime What is it, what does it cost, & how is it regulated?
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Computer Security By Duncan Hall.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.
1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Securing Information Systems
Securing Information Systems
Threats By Dr. Shadi Masadeh.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Unit 1: Class overview, general security concept, threats and defenses
Figure 1-7: Eavesdropping on a Dialog
Faculty of Science IT Department By Raz Dara MA.
Introduction to Cybercrime and Security
Forensic and Investigative Accounting
Computer Security By: Muhammed Anwar.
Presentation transcript:

Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall

2 Figure 1-1: CSI/FBI Computer Crime and Security Survey How Bad is the Threat? Survey conducted by the Computer Security Institute (  Based on replies from 503 U.S. Computer Security Professionals.  If fewer than 20 firms reported quantified dollar losses, data for the threat are not shown.

3 Figure 1-1: CSI/FBI Computer Crime and Security Survey ThreatPercent Reporting an Incident 1997 Percent Reporting an Incident 2002 Average Annual Loss per Firm (x1000) 1997 Average Annual Loss per Firm (x1000) 2002 Viruses82%85%$76$283 Laptop Theft 58%65%$38$89

4 Figure 1-1: CSI/FBI Computer Crime and Security Survey ThreatPercent Reporting an Incident 1997 Percent Reporting an Incident 2002 Average Annual Loss per Firm (x1000) 1997 Average Annual Loss per Firm (x1000) 2002 Denial of Service 24%40%$77$297 System Penetration 20%40%$132$226 Unauthorized Access by Insiders 40%38%NA

5 Figure 1-1: CSI/FBI Computer Crime and Security Survey ThreatPercent Reporting an Incident 1997 Percent Reporting an Incident 2002 Average Annual Loss per Firm (x1000) 1997 Average Annual Loss per Firm (x1000) 2002 Theft of Intellectual Property 20% $954$6,571 Financial Fraud 12% $958$4,632 Sabotage14%8%$164$541

6 Figure 1-1: CSI/FBI Computer Crime and Security Survey ThreatPercent Reporting an Incident 1997 Percent Reporting an Incident 2002 Average Annual Loss per Firm (x1000) 1997 Average Annual Loss per Firm (x1000) 2002 Telecom Fraud 27%9%NA Telecom Eaves- dropping 11%6%NA Active Wiretap 3%1%NA

7 Figure 1-2: Other Empirical Attack Data Riptech  Analyzed 5.5 billion firewall log entries in 300 firms in five-month period  Detected 128,678 attacks—an annual rate of 1,000 per firm  Only 39% of attacks after viruses were removed were directed at individual firms

8 Figure 1-2: Other Empirical Attack Data Riptech  23% of all firms experienced a highly aggressive attack in a 6-month period  Only one percent of all attacks, highly aggressive attacks are 26 times more likely to do severe damage than even moderately sophisticated aggressive attacks

9 Figure 1-2: Other Empirical Attack Data SecurityFocus  Data from 10,000 firms in 2001  Attack Frequency 129 million network scanning probes (13,000 per firm) 29 million website attacks (3,000 per firm) 6 million denial-of-service attacks (600 per firm)

10 Figure 1-2: Other Empirical Attack Data SecurityFocus  Attack Targets 31 million Windows-specific attacks 22 million UNIX/LINUX attacks 7 million Cisco IOS attacks All operating systems are attacked!

11 Figure 1-2: Other Empirical Attack Data U.K. Department of Trade and Industry  Two-thirds of U.K. firms surveyed lost less than $15,000 from their worst incident  But 4% lost more than $725,000

12 Figure 1-2: Other Empirical Attack Data MessageLabs  One in every 200 to 400 messages is infected  Most users are sent infected several times each year  The percentage of s that are infected is rising

13 Figure 1-2: Other Empirical Attack Data Honeynet project  Fake networks set up for adversaries to attack  To understand how adversaries attack  Windows 98 PC with open shares and no password compromised 5 times in 4 days  LINUX PCs took 3 days on average to compromise

14 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134  1998: 3,474 (75% growth from the year before)  1999: 9,859 (164% growth from the year before)  2000: 21,756 (121% growth from the year before)  2001: 52,658 (142% growth from the year before)  Tomorrow?

15 Figure 1-3: Attack Trends Growing Randomness in Victim Selection  In the past, large firms were targeted  Now, targeting is increasingly random  No more security through obscurity for small firms and individuals

16 Figure 1-3: Attack Trends Growing Malevolence  Most early attacks were not malicious  Malicious attacks are becoming the norm

17 Figure 1-3: Attack Trends Growing Attack Automation  Attacks are automated, rather than humanly- directed  Essentially, viruses and worms are attack robots that travel among computers  Attack many computers in minutes or hours

18 Figure 1-4: Framework for Attackers Elite Hackers  Hacking: intentional access without authorization or in excess of authorization  Cracking versus hacking  Technical expertise and dogged persistence  Use attack scripts to automate actions, but this is not the essence of what they do

19 Figure 1-4: Framework for Attackers Elite Hackers  White hat hackers This is still illegal Break into system but notify firm or vendor of vulnerability  Black hat hackers Do not hack to find and report vulnerabilities Gray hat hackers go back and forth between the two ways of hacking

20 Figure 1-4: Framework for Attackers Elite Hackers  Hack but with code of ethics Codes of conduct are often amoral “Do no harm,” but delete log files, destroy security settings, etc. Distrust of evil businesses and government Still illegal  Deviant psychology and hacker groups to reinforce deviance

21 Figure 1-4: Framework for Attackers Virus Writers and Releasers  Virus writers versus virus releasers  Only releasing viruses is punishable

22 Figure 1-4: Framework for Attackers Script Kiddies  Use prewritten attack scripts (kiddie scripts)  Viewed as lamers and script kiddies  Large numbers make dangerous  Noise of kiddie script attacks masks more sophisticated attacks

23 Figure 1-4: Framework for Attackers Criminals  Many attackers are ordinary garden-variety criminals  Credit card and identity theft  Stealing trade secrets (intellectual property)  Extortion

24 Figure 1-4: Framework for Attackers Corporate Employees  Have access and knowledge  Financial theft  Theft of trade secrets (intellectual property)  Sabotage  Consultants and contractors  IT and security staff are biggest danger

25 Figure 1-4: Framework for Attackers Cyberterrorism and Cyberwar  New level of danger  Infrastructure destruction Attacks on IT infrastructure Use IT to establish physical infrastructure (energy, banks, etc.)

26 Figure 1-4: Framework for Attackers Cyberterrorism and Cyberwar  Simultaneous multi-pronged attacks  Cyberterrorists by terrorist groups versus cyberwar by national governments  Amateur information warfare

27 Figure 1-5: Framework for Attacks Attacks Physical Access Attacks -- Wiretapping Server Hacking Vandalism Dialog Attacks -- Eavesdropping Impersonation Message Alteration Penetration Attacks Social Engineering -- Opening Attachments Password Theft Information Theft Scanning (Probing) Break-in Denial of Service Malware -- Viruses Worms

28 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent improper access  Prioritize assets  Specify access control technology and procedures for each asset  Test the protection

29 Figure 1-6: Attacks and Defenses (Study Figure) Site Access Attacks and Defenses  Wiretaps (including wireless LANs intrusions  Hacking servers with physical access

30 Figure 1-6: Attacks and Defenses (Study Figure) Social Engineering  Tricking an employee into giving out information or taking an action that reduces security or harms a system  Opening an attachment that may contain a virus  Asking for a password claming to be someone with rights to know it  Asking for a file to be sent to you

31 Figure 1-6: Attacks and Defenses (Study Figure) Social Engineering Defenses  Training  Enforcement through sanctions (punishment)

32 Figure 1-6: Attacks and Defenses (Study Figure) Dialog Attacks and Defenses  Eavesdropping  Encryption for Confidentiality  Imposters and Authentication  Cryptographic Systems

33 Figure 1-7: Eavesdropping on a Dialog Client PC Bob Server Alice Dialog Attacker (Eve) intercepts and reads messages Hello

34 Figure 1-8: Encryption for Confidentiality Client PC Bob Server Alice Attacker (Eve) intercepts but cannot read “ ” Encrypted Message “ ” Original Message “Hello” Decrypted Message “Hello”

35 Figure 1-9: Impersonation and Authentication Client PC Bob Server Alice Attacker (Eve) I’m Bob Prove it! (Authenticate Yourself)

36 Figure 1-10: Message Alteration Client PC Bob Server Alice Dialog Attacker (Eve) intercepts and alters messages Balance = $1 Balance = $1 Balance = $1,000,000 Balance = $1,000,000

37 Figure 1-11: Secure Dialog System Client PC Bob Server Alice Secure Dialog Attacker cannot read messages, alter messages, or impersonate Automatically Handles Negation of Security Options Authentication Encryption Integrity

38 Figure 1-12: Network Penetration Attacks and Firewalls Attack Packet Internet Attacker Hardened Client PC Hardened Server Internal Corporate Network Passed Packet Dropped Packet Internet Firewall Log File

39 Figure 1-13: Scanning (Probing) Attacks Attack Packets to , , etc. Internet Attacker Corporate Network Host Host I’m Here

40 Figure 1-14: Single-Message Break-In Attack 1. Single Break-In Packet 2. Server Taken Over By Single Message Attacker

41 Figure 1-15: Denial-of-Service (DoS) Flooding Attack Message Flood Server Overloaded By Message Flood Attacker

42 Figure 1-16: Intrusion Detection System (IDS) 1. Suspicious Packet Internet Attacker Network Administrator Hardened Server Corporate Network 2. Suspicious Packet Passed 3. Log Suspicious Packet 4. Alarm Intrusion Detection System (IDS) Log File

43 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment  Operational execution  Enforcement

44 Figure 1-17: Security Management Comprehensive Security  Closing all avenues of attack  Asymmetrical warfare Attacker only has to find one opening  Defense in depth Attacker must get past several defenses to succeed  Security audits Run attacks against your own network

45 Figure 1-17: Security Management General Security Goals (CIA)  Confidentiality Attackers cannot read messages if they intercept them  Integrity If attackers change messages, this will be detected  Availability System is able to server users

46 Figure 1-18: The Plan—Protect— Respond Cycle Planning  Need for comprehensive security (no gaps)  Risk analysis (see Figure 1-19) Enumerating threats Threat severity = estimated cost of attack X probability of attack Value of protection = threat severity – cost of countermeasure Prioritize countermeasures by value of prioritization

47 Figure 1-19: Threat Severity Analysis StepThreat Cost if attack succeeds Probability of occurrence Threat severity Countermeasure cost Value of protection Apply countermeasure? Priority 6 7 A $500,000 80% $400,000 $100,000 $300,000 Yes 1 B $10,000 20% $2,000 $3,000 ($1,000) No NA C $100,000 5% $5,000 $2,000 $3,000 Yes 2 D $10,000 70% $7,000 $20,000 ($13,000) No NA

48 Figure 1-18: The Plan—Protect— Respond Cycle Planning  Security policies drive subsequent specific actions (see Figure 1-20) Selecting technology Procedures to make technology effective The testing of technology and procedures

49 Figure 1-20: Policy-Driven Technology, Procedures, and Testing Policy Technology (Firewall, Hardened Webserver) Procedures (Configuration, Passwords, Etc.) ProtectionTesting (Test Security) Attempt to Connect to Unauthorized Webserver Only allow authorized personnel to use accounting webserver

50 Figure 1-18: The Plan—Protect— Respond Cycle Protecting  Installing protections: firewalls, IDSs, host hardening, etc.  Updating protections as the threat environment changes  Testing protections: security audits

51 Figure 1-18: The Plan—Protect— Respond Cycle Responding  Planning for response (Computer Emergency Response Team)  Incident detection and determination Procedures for reporting suspicious situations Determination that an attack really is occurring Description of the attack to guide subsequent actions

52 Figure 1-18: The Plan—Protect— Respond Cycle Responding  Containment Recovery Containment: stop the attack Repair the damage  Punishment Forensics Prosecution Employee Punishment  Fixing the vulnerability that allowed the attack