Download presentation
Presentation is loading. Please wait.
1
Objectives Get a non-product-specific perspective onto security in IT Demystify the commonly used terminology – know your RC2 from AES Bring together various aspects of security into an integrated whole Make some simple recommendations
2
Agenda Defining Integrated Security (level 200) Some Techniques for Securing IT (level 250) Recommendations (level 200) Printed/online slides include a section that covers security risk analysis process – they are self-explanatory (7 easy slides – please read at your leisure) Warning: this is a fast and furious A-to-Z type of a session. Attend at your own risk.
3
Defining Security
4
Security Definition (Cambridge Dictionary of English) Ability to avoid being harmed by any risk, danger or threat …therefore, in practice, an impossible goal What can we do then? Be as secure as needed Ability to avoid being harmed too much by reasonably predictable risks, dangers or threats (Rafal’s Definition)
5
Assets What we are securing? Data Services (i.e. business etc. applications or their individually accessible parts) This session is not about securing: People (sorry), cables, carpets, typewriters and computers (?!) Indeed: we (IT people) will secure the data on the computer or services it offers and we will often request that a PC should be locked up with an armed guard but how this is done is not really our business Sometimes known as physical security
6
Digital Security as Extension of Physical Security of Key Assets Strong Physical Security of KA Strong Digital Security Good Security Everywhere Weak Physical Security of KA Strong Digital Security Insecure Environment Strong Physical Security of KA Weak Digital Security Insecure Environment
7
Aspects of Security Confidentiality ◄ Your data/service provides no useful information to unauthorised people Integrity ◄ If anyone tampers with your asset it will be immediately evident Authenticity ◄ We can verify that asset is attributable to its authors or caretakers Non-repudiation ◄ The author or owner or caretaker of asset cannot deny that they are associated with it Identity ◄ We can verify who is the specific individual entity associated with your asset
8
Additional Aspects of Data and Service Security Authorisation ◄ It is clear what actions are permitted with respect to your asset Loss ◄ Asset is irrecoverably lost (or the cost of recovery is too high) Denial of access (aka denial of service) ◄ Access to asset is temporarily impossible “Static” cryptography is useful but not sufficient: Backups etc. needed Behaviour (pattern) of access analysis needed
9
Cryptography Using really hard mathematics to implement most of the security aspects mentioned earlier “Static” Cannot detect or prevent problems arising from a pattern of behaviour Relies of physical security of Key Assets (such as master private keys etc.) Strength changes with time, depending on the power of computers and developments in cryptanalysis
10
Behaviour (Pattern) Analysis Prohibits reaching an asset if history of access is out-of- pattern, e.g.: Password lock-out after N unsuccessful attempts Blocking packets at a router if too many come from a given source Stopping a user from seeing more than N records in a database per day Time-out of an idle secure session “Active” Cannot prevent unauthorised use of asset – still need crypto Can prevent legitimate access – need easy and secure “unlock” mechanisms Strength varies with sophistication on known attacks
11
Integrated Security Security should be Integrated Security: Static + Active Across All Your Assets Based On Risk Assessment
12
1 st Conclusion As 100% security is impossible, you need to decide what needs to be secured and how well it needs to be secured In other words, you need: Asset list Risk impact estimate for each asset
13
Some Techniques for Securing IT
14
What is Really Secure? Look for systems From well-know parties With published (not secret!) algorithms That generate a lot of interest That have been hacked for a few years That have been analysed mathematically Absolutely do not “improve” algorithms yourself Employ someone to attempt a break-in
15
Behaviour (Pattern) Analysis Fairly new area (with exceptions) In addition to knowing your assets, you need to know your perimeter (edge) Do you? Active access inspection and pattern matching are the main techniques
16
Many Perimeters External – Network Edge Between you and internet etc. DMZ – De-militarized Zone Between network edge and all protected resources Only minimal protection possible Default Security Zone The traditional LAN High Security Zone “Network inside network” For key assets Perimeter (Edge) of Isolation Assets physically not connected to networks Useful for some key assets (e.g. master keys) Isolation Network Edge
17
Tools for Behaviour Analysis Traditional: Firewalls and Proxies around the perimeters (edges) Stateful packet inspection Traditional: Limiting number of accesses to Key Assets Password lock-outs Newer: Event Analysis and Active Agents Rules can be programmed into some security servers (ISA) or monitoring tools (MOM) Neural networks are showing some promise for out- of-pattern detection
18
Basic Crypto Terminology Plaintext The stuff you want to secure, typically readable by humans (email) or computers (software, order) Ciphertext Unreadable, secure data that must be decrypted before it can be used Key You must have it to encrypt or decrypt (or do both) Cryptanalysis Hacking it by using science Complexity Theory How hard is it and how long will it take to run a program
19
Symmetric Key Cryptography Encryption “The quick brown fox jumps over the lazy dog” “AxCv;5bmEseTfid3) fGsmWe#4^,sdgfMwi r3:dkJeTsY8R\s@!q3 %” “The quick brown fox jumps over the lazy dog” Decryption Plain-text input Plain-text output Cipher-text Same key (shared secret)
20
Symmetric Pros and Cons Weakness: Must agree the key beforehand Securely pass the key to the other party Strength: Simple and really very fast (order of 1000 to 10000 faster than asymmetric mechanisms) Super-fast if done in hardware (DES, Rijndael) Hardware is more secure than software, so DES makes it really hard to be done in software, as a prevention
21
Public Key Cryptography Knowledge of the encryption key doesn’t give you knowledge of the decryption key Receiver of information generates a pair of keys Publish the public key in a directory Then anyone can send him messages that only she can read
22
Public Key Encryption Encryption “The quick brown fox jumps over the lazy dog” “Py75c%bn&*)9|fDe^ bDFaq#xzjFr@g5=&n mdFg$5knvMd’rkveg Ms” “The quick brown fox jumps over the lazy dog” Decryption Clear-text Input Clear-text Output Cipher-text Different keys Recipient’s public key Recipient’s private key private public
23
Public Key Pros and Cons Weakness: Extremely slow Susceptible to “known ciphertext” attack Strength Solves problem of passing the key
24
Hybrid Encryption (Real World) As above, repeated for other recipients or recovery agents Digital Envelope Other recipient’s or agent’s public key (in certificate) in recovery policy Launch key for nuclear missile“RedHeat”is... Symmetric key encrypted asymmetrically (e.g., RSA) Digital Envelope User’s public key (in certificate) RNG Randomly- Generated symmetric “session” key Symmetric encryption (e.g. DES) *#$fjda^ju539!3t t389E *&\@ 5e%32\^kd
25
*#$fjda^ju539!3t 5e%32\^kd Launch key for nuclear missile“RedHeat”is... Launch key for nuclear missile“RedHeat”is... Symmetric decryption (e.g. DES) Digital Envelope Asymmetric decryption of “session” key (e.g. RSA) Symmetric “session” key Session key must be decrypted using the recipient’s private key Digital envelope contains “session” key encrypted using recipient’s public key Recipient’s private key Hybrid Decryption
26
Digital Signatures Want to give plain text data to someone, and allow them to verify the origin Integrity, authenticity & non-repudiation Much more on this in my PKI session SEC390 at 16:45 in room 6 today Much more on this in my PKI session SEC390 at 16:45 in room 6 today
27
DES, IDEA, RC2, RC5 Symmetric DES (Data Encryption Standard) is the most popular Keys very short: 56 bits Brute-force attack took 3.5 hours on a machine costing US$1m in 1993. Today it probably is done real-time. Triple DES (3 DES) not much more secure but may thwart NSA Just say no, unless value of data is minimal IDEA (International Data Encryption Standard) Similar to DES, but “not” from NSA 128 bit keys RC2 & RC5 (by R. Rivest) RC2 is older and RC5 newer (1994) - similar to DES and IDEA
28
Rijndael Standard replacement for DES for US government, and, probably for all of us as a result… Winner of the AES (Advanced Encryption Standard) competition run by NIST (National Institute of Standards and Technology in US) in 1997-2000 Comes from Europe (Belgium) by Joan Daemen and Vincent Rijmen. “X-files” stories less likely (unlike DES). Symmetric block-cipher (128, 192 or 256 bits) with variable keys (128, 192 or 256 bits, too) Fast and a lot of good properties, such as good immunity from timing and power (electric) analysis Construction deceptively similar to DES (S-boxes, XORs etc.) but really different
29
CAST and GOST CAST Canadians Carlisle Adams & Stafford Tavares 64 bit key and 64 bit of data Chose your S-boxes Seems resistant to differential & linear cryptanalysis and only way to break is brute force (but key is a bit short!) GOST Soviet Union’s “version” of DES but with a clearer design and many more repetitions of the process 256 bit key but really 610 bits of secret, so pretty much “tank quality” Backdoor? Who knows…
30
Careful with Streams! Do NOT use a block cipher in a loop Use a crypto-correct technique for treating streams of data, such as CBC (Cipher Block Chaining) .NET Framework implements it as ICryptoTransform on a crypto stream with any supported algorithm
31
RC4 Symmetric Fast, streaming encryption R. Rivest in 1994 Originally secret, but “published” on sci.crypt Related to “one-time pad”, theoretically most secure But! It relies on a really good random number generator And that is the problem
32
RSA, DSA, ElGamal, ECC Asymmetric Very slow and computationally expensive – need a computer Very secure Rivest, Shamir, Adleman – 1978 Popular and well researched Strength in today’s inefficiency to factorise into prime numbers Some worries about key generation process in some implementations DSA (Digital Signature Algorithm) – NSA/NIST thing Only for digital signing, not for encryption Variant of Schnorr and ElGamal sig algorithm ElGamal Relies on complexity of discrete logarithms ECC (Elliptic Curve Cryptography) Really hard maths and topology Better than RSA, in general and under a mass of research
33
Quantum Cryptography Method for generating and passing a secret key or a random stream Not for passing the actual data, but that’s irrelevant Polarisation of light (photons) can be detected only in a way that destroys the “direction” (basis) So if someone other than you observes it, you receive nothing useful and you know you were bugged Perfectly doable over 10-50km long fibre-optic link But seems pretty perfect, if a bit tedious and slow Don’t confuse it with quantum computing, which won’t be with us for at least another 50 years or so, or maybe longer…
34
MD5, SHA Hash functions – not encryption at all! Goals: Not reversible: can’t obtain the message from its hash Hash much shorter than original Two messages won’t have the same hash MD5 (R. Rivest) 512 bits hashed into 128 Mathematical model still unknown But it resisted major attacks SHA (Secure Hash Algorithm) US standard based on MD5
35
Diffie-Hellman, “SSL”, Certs Methods for key exchange DH is very clever since you always generate a new “key- pair” for each asymmetric session STS, MTI, and certs make it even safer Certs (certificates) are the most common way to exchange public keys Foundation of Public Key Infrastructure (PKI) SSL uses a protocol to exchange keys safely See session on PKI
36
Cryptanalysis Brute force Good for guessing passwords, and some 40-bit symmetric keys (in some cases needed only 27 attempts) Frequency analysis For very simple methods only (US mobiles) Linear cryptanalysis For stronger DES-like, needs 243 plain-cipher pairs Differential cryptanalysis Weaker DES-like, needs from 214 pairs Power and timing analysis Fluctuations in response times or power usage by CPU
37
Breaking It on $10 Million Symme-tric Key ECC Key RSA Key Time to Break MachinesMemory 56112420 < 5 mins 10000Trivial 80160760 600 months 43004GB 961921020 3 million years 114170GB 1282561620 10E16 years 0.16120TB From a report by Robert Silverman, RSA Laboratories, 2000
38
Some Recommendations
39
Strong Systems It is always a mixture! Changes all the time… Symmetric: Min. 128 bits for RC2 & RC5, 3DES, IDEA, carefully analysed RC4, 256 bit better Asymmetric: RSA, ElGamal, Diffie-Hellman (for keys) with minimum 1024 bits (go for the maximum, typically 4096, if you can afford it) Hash: Either MD5 or SHA but with at least 128 bit results, 256 better
40
Weak Systems Anything with 40-bits (including 128 and 56 bit versions with the remainder “fixed”) CLIPPER A5 (GSM mobile phones outside US) Vigenère (US mobile phones) Dates from 1585! Unverified certs with no trust Weak certs (as in many “class 1” personal certs)
41
Summary Decide what to secure and how Have someone fulfil the role of CSO (Chief Security Officer) Combine static crypto-based security with active behaviour (pattern) analysis Use reasonably strong security mechanisms Balance security against accessibility
42
Resources & Reading Visit www.microsoft.com/security www.microsoft.com/security Attend sessions on PKI (incl. SEC390) For more detail, read: Applied Cryptography, B. Schneier, John Wiley & Sons, ISBN 0-471-12845-7 Foundations of Cryptography, O. Goldereich, www.eccc.uni-trier.de/eccc-local/ECCC- Books/oded_book_readme.html www.eccc.uni-trier.de/eccc-local/ECCC- Books/oded_book_readme.html www.eccc.uni-trier.de/eccc-local/ECCC- Books/oded_book_readme.html Handbook of Applied Cryptography, A.J. Menezes, CRC Press, ISBN 0-8493-8523-7 PKI, A. Nash et al., RSA Press, ISBN 0-07-213123-3 Cryptography in C and C++, M. Welschenbach, Apress, ISBN 1-893115-95-X (includes code samples CD)
43
Community Resources http://www.microsoft.com/communities/default.mspx Most Valuable Professional (MVP) http://www.mvp.support.microsoft.com/ http://www.mvp.support.microsoft.com/Newsgroups Converse online with Microsoft Newsgroups, including Worldwide http://www.microsoft.com/communities/newsgroups/default.mspx User Groups Meet and learn with your peers http://www.microsoft.com/communities/usergroups/default.mspx
44
evaluations… evaluations… Please don’t forget to complete your online Evaluation Form
45
Risk Analysis for IT Security A Bonus Section for Your Reading Pleasure
46
Examples Asset: Internal mailbox of your Managing Director Risk Impact Estimate (examples!) Risk of loss: Medium impact Risk of access by staff: High impact Risk of access by press: Catastrophic impact Risk of access by a competitor: High impact Risk of temporary no access by MD: Low impact Risk of change of content: Medium impact
47
Creating Your Asset List List all of your named assets starting with the most sensitive Your list won’t ever be complete, keep updating as time goes on Create default “all other assets” entries Divide them into logical groups based on their probability of attacks or the risk of their “location” between perimeters
48
Risk Impact Assessment For each asset and risk attach a measure of impact Monetary scale if possible (difficult) or relative numbers with agreed meaning E.g.: Trivial (1), Low (2), Medium (3), High (4), Catastrophic (5) Ex: Asset: Internal MD mailbox Risk: Access to content by press Impact: Catastrophic (5)
49
Risk Probability Assessment Now for each entry measure probability the loss may happen Real probabilities (difficult) or a relative scale (easier) such as: Low (0.3), Medium, (0.6), and High (0.9) Ex: Asset: Internal MD mailbox Risk: Access to content by press Probability: Low (2)
50
Risk Exposure and Risk List Multiply probability by impact for each entry Exposure = Probability x Impact Sort by exposure High-exposure risks need very strong security measures Lowest-exposure risks can be covered by default mechanisms or ignored Example: Press may access MD mailbox: Exposure = P(Low=0.3) x I(Catastrophic=5) = 1.5 By the way, minimum exposure is 0.3 and maximum is 4.5 is our examples
51
Mitigation and Contingency For high-exposure risks have a plan: Mitigation: Reduce its probability or impact (so exposure) Transfer: Make someone else responsible for the risk Avoidance: avoid the risk by not having the asset Contingency: what to do if the risk becomes reality
52
2 nd Conclusion Security risk management is an ongoing activity which requires someone to be responsible for it Who? Your CSO – Chief Security Officer Do you have one?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.