L esson 1 Course Introduction. UTSA IS 3523 ID & Incident Response Overview Course Administrivia Info Assurance Review Incident Response.

Slides:



Advertisements
Similar presentations
Identifying and Responding to Security Incidents in the Law Firm
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
1 Telstra in Confidence Managing Security for our Mobile Technology.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Network Security Testing Techniques Presented By:- Sachin Vador.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Network and Server Attacks and Penetration Chapter 12.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
1 Hackers 101 Julie Keil JoAna Swan John Adamo John Ponessa Arturo Jose` Ortiz.
Network security policy: best practices
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
APA of Isfahan University of Technology In the name of God.
A First Course in Information Security
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
L esson 1 Course Introduction. UTSA IS 6353 Incident Response Overview Course Administrivia Info Assurance Review Incident Response.
PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Introduction to Computer Ethics
Honeypot and Intrusion Detection System
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Information Systems Security Operations Security Domain #9.
IS4463 Secure Electronic Commerce 5:30-6:45 PM Robert Kaufman –Background –Contact information Syllabus and Class Schedule Student Background Information.
ID-IR Review. UTSA IS 3532 IR-ID Overview Incident Response Takeaways Test 2 Final Paper.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Chap1: Is there a Security Problem in Computing?.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Lesson 1 Course Introduction
Role Of Network IDS in Network Perimeter Defense.
IS3220 Information Technology Infrastructure Security
Filip Chytrý Everyone of you in here can help us improve online security....
Information Management System Ali Saeed Khan 29 th April, 2016.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Proactive Incident Response
Lesson 1 IS-6353 Course Introduction
Secure Software Confidentiality Integrity Data Security Authentication
Security in the Workplace: Information Assurance
Security in Networking
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

L esson 1 Course Introduction

UTSA IS 3523 ID & Incident Response Overview Course Administrivia Info Assurance Review Incident Response

UTSA IS 3523 ID & Incident Response IS3523 Intrusion Detection and Incident Response 5:30-6:45 PM M/W Robert Kaufman –Background –Contact information Syllabus and Class Schedule Student Background Information –

UTSA IS 3523 ID & Incident Response Student Information Name Reliable address to

UTSA IS 3523 ID & Incident Response Text Books Course Text: –Incident Response and Computer Forensics Mandia, Kevin and Prosise, Chris, Osborne/McGraw Hill Publishing, ISBN X Additional References: –Principles of Computer Security, Conklin, White, Cothren, Williams, and Davis –Hacking Exposed, by McClure, Scambray, Kurtz –Cyber crime Investigator’s Field Guide, by Bruce Middleton

UTSA IS 3523 ID & Incident Response Grading Grades –2 Tests –Final –Many Projects/Labs

A Sampling of Malicious Activity March EBay gets hacked March Melissa virus hits Internet April Chernobyl Virus hits May Hackers shut down web sites of FBI, Senate, and DOE June Worm.Explore.Zip virus hits July Cult of the Dead Cow (CDC) releases Back Orifice Sept Hacker pleads guilty to attacking NATO and Gore web sites Oct Teenage hacker admits to breaking into AOL Nov BubbleBoy virus hits Dec Babylonia virus spreads Feb Several sites experience DOS attacks Feb Alaska Airlines site hacked May Love Bug virus ravages net July2001 – Code Red Runs Rampant Sept 2001 – Nimda Explodes Jan 2003 – Slammer Worm

UTSA IS 3523 ID & Incident Response You have to have security, or else… 2001 CSI/FBI Computer Crime and Security Survey –538 security “practitioners” in the U.S. 91% reported computer security breaches within the previous 12 months 70% reported their Internet connection as a frequent point of attack (up from 59% in 2000) 64% suffered financial losses due to breaches, 35% could quantify this loss. Losses due to computer security breaches totaled (for the 186 respondents reporting a loss) $377,828,700 Average loss $2,031,337 –Source: Computer Security Institute

UTSA IS 3523 ID & Incident Response And the hits just keep coming… 2002 CSI/FBI Computer Crime & Security Survey –503 security “practitioners” in the U.S. 90% detected computer security breaches 40% detected penetrations from the outside 80% acknowledged financial losses due to breaches $455,848,000 in losses due to computer security breaches totaled (for the 223 respondents reporting a loss) 26 reported theft of proprietary info ($170,827,000) 25 reported financial fraud ($115,753,000) 34% reported intrusions to law enforcement 78% detected employee abuse of internet access privileges, i.e. pornography and inappropriate use –Source: Computer Security Institute

UTSA IS 3523 ID & Incident Response And coming A 2003 FBI/CSI Computer Crime and Security Survey revealed the following: –60% had a security breach in the last year. –78% detected employee abuse of internet privileges. –85% admitted to being infected by a computer virus. –Average loss from insider access was $300,000 –Average loss due to virus attack $283,000 –Average loss from Telecom eavesdropping is $1,205,000 –Average loss from outsider penetration was $226,000 –The average reported loss from net abuse was $536,000 –Source: Computer Security Institute

UTSA IS 3523 ID & Incident Response Internet Security Software Market $7.4 Billion est $4.2 Billion $3.1 Billion $2 Billion ’97 & ’98 figures based on a study released by market research firm International Data Corp. in Framingham, Mass. ’99 & ’02 figures from IDC study based on a survey of 300 companies with more than $100 million in annual revenues

UTSA IS 3523 ID & Incident Response DISA VAAP Results PROTECTIONPROTECTION DETECTIONDETECTION REACTIONREACTION 38,000 Attacks 24,700 Succeed 13,300 Blocked 988 Detected 23,712 Undetected 267 Reported 721 Not Reported

UTSA IS 3523 ID & Incident Response Computer Security The Prevention and/or detection of unauthorized actions by users of a computer system. In the beginning, this meant ensuring privacy on shared systems. Today, interesting aspect of security is in enabling different access levels.

UTSA IS 3523 ID & Incident Response What are our goals in Security? The “CIA” of security –Confidentiality –Integrity Data integrity Software Integrity –Availability Accessible and usable on demand –(authentication) –(nonrepudiation)

UTSA IS 3523 ID & Incident Response The “root” of the problem Most security problems can be grouped into one of the following categories: –Network and host misconfigurations Lack of qualified people in the field –Operating system and application flaws Deficiencies in vendor quality assurance efforts Lack of qualified people in the field Lack of understanding of/concern for security

UTSA IS 3523 ID & Incident Response Computer Security Operational Model Protection = Prevention+ (Detection + Response) Access Controls Encryption Firewalls Intrusion Detection Incident Handling

UTSA IS 3523 ID & Incident Response Proactive –vs- Reactive Models “Most organizations only react to security threats, and, often times, those reactions come after the damage has already been done.” “The key to a successful information security program resides in taking a pro-active stance towards security threats, and attempting to eliminate vulnerability points before they can be used against you.”

UTSA IS 3523 ID & Incident Response So What Happens When Computer Security Fails? Incident Response Methodology--7 Step Process –Preparation: Proactive Computer Security –Detection of Incidents –Initial Response –Formulate Response Strategy –Investigate the Incident –Reporting –Resolution

UTSA IS 3523 ID & Incident Response 7 Components of Incident Response Pre-Incident Preparation Detection of Incidents Initial Response Formulate Response Strategy Data Collection Data Analysis Reporting Investigate the Incident Resolution Recovery Implement Security Measures Page 15, Fig 2-1, Mandia 2nd Edition

Pre-Incident Preparation Detection of Incidents Incident Response Team FormedNotification Checklist Completed Initial Response Formulate Response Strategy Is it really an Incident? Yes No Follow-Up Pursue and accumulate evidence and/or secure system Secure System Reporting Implement Security Measures Forensic Duplication Investigation Forensic duplication? Accumulate Evidence Yes No Perform Network Monitoring Isolate and Contain Can Pursue Both Paths Simultaneously Page 18, Fig 2-1, Mandia 1 st Edition

UTSA IS 3523 ID & Incident Response Resources in the Fight SANS CERT CC FIRST DOE CIAC CERIAS NIST

UTSA IS 3523 ID & Incident Response SANS System Administration, Networking, and Security (SANS) Institute Global Incident Analysis Center Security Alerts, Updates, & Education NewsBites, Security Digest, Windows Digest Certification

UTSA IS 3523 ID & Incident Response Carnegie Mellon CERT CC Computer Emergency Response Team Coordination Center Started by DARPA Alerts & Response Services Training and CERT Standup Clearing House

UTSA IS 3523 ID & Incident Response FIRST Forum of Incident Response and Security Teams Established 1988 Govt & Private Sector Membership Over 70 Members Coordinate Global Response

UTSA IS 3523 ID & Incident Response DOE CIAC Computer Incident Advisory Capability Established 1989 Part of Lawrence Livermore Lab Awareness training and education Trend, threat, vulnerability data collection and analysis

UTSA IS 3523 ID & Incident Response CERIAS Center for Education and Research in Information Assurance and Security Home of Gene Spafford A "University Center" InfoSec Research & Education Members: Academia, Govt, & Industry

UTSA IS 3523 ID & Incident Response NIST National Institute of Science and Technology (NIST) Operares Computer Security Resource Clearinghouse (CSRC) Raising Awarenss Multiple Disciplines Main Source of Fed Govt Standards

UTSA IS 3523 ID & Incident Response So How Many Vulnerabilties Are Out? Lets See What the CERT CC Says.

UTSA IS 3523 ID & Incident Response

History Lesson The Art of War, Sun Tzu Lesson for you Know the enemy Know yourself…and in a 100 battles you will never be defeated If ignorant both of your enemy and of yourself you are certain in every battle to be in peril

UTSA IS 3523 ID & Incident Response History Lesson The Art of War, Sun Tzu Lesson for the Hacker Probe him and learn where his strength is abundant and where deficient To subdue the enemy without fighting is the acme of skill One able to gain victory by modifying his tactics IAW with enemy situation may be said to be divine

UTSA IS 3523 ID & Incident Response Hacker Attacks Intent is for you to know your enemy Not intended to make you a hacker Need to know defensive techniques Need to know where to start recovery process Need to assess extent of investigative environment

UTSA IS 3523 ID & Incident Response Anatomy of a Hack FOOTPRINTINGSCANNINGENUMERATION GAINING ACCESS ESCALATING PRIVILEGE PILFERING COVERING TRACKS CREATING BACKDOORS DENIAL OF SERVICE Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Footprinting Objective Target Address Range Acquire Namespace Information Gathering Surgical Attack Don’t Miss Details Technique Open Source Search whois Web Interface to whois ARIN whois DNS Zone Transfer Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Scanning Objective Bulk target assessment Determine Listening Services Focus attack vector Technique Ping Sweep TCP/UDP Scan OS Detection Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Enumeration Objective Intrusive Probing Commences Identify valid accounts Identify poorly protected shares Technique List user accounts List file shares Identify applications Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Gaining Access Objective Informed attempt to access target Typically User level access Technique Password sniffing File share brute forcing Password file grab Buffer overflows Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Escalating Privilege Objective Gain Root level access Technique Password cracking Known exploits Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Pilfering Objective Info gathering to access trusted systems Technique Evaluate trusts Search for cleartext passwords Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Cover Tracks Objective Ensure highest access Hide access from system administrator or owner Technique Clear logs Hide tools Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Creating Back Doors Objective Deploy trap doors Ensure easy return access Technique Create rogue user accounts Schedule batch jobs Infect startup files Plant remote control services Install monitors Trojanize Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Denial of Service Objective If unable to escalate privilege then kill Build DDOS network Technique SYN Flood ICMP Attacks Identical src/dst SYN requests Out of bounds TCP options DDOS Source: Hacking Exposed, McClure, Sacmbray, and Kurtz

UTSA IS 3523 ID & Incident Response Hacker Exploits per SANS RECONNAISSANCESCANNING EXPLOIT SYSTEMS KEEPING ACCESS COVER TRACKS Source: SANs Institute

UTSA IS 3523 ID & Incident Response Hacking Summary Threat: Hacking on the rise Security posture usually reactive Losses increasing 7 Step Process Hacker Techniques