Download presentation
Presentation is loading. Please wait.
1
Oracle Financial System Project Team: Xuegong Wang Jun Lu ZhengChun Mo Patrick Zhu Thomas Verghese Weicheng Wong Date : 14 th November, 2001 Step 3
2
6/29/2015Survivable Network Analysis2 AGENDA Review User Scenarios Attacker Profiles Intrusion Scenarios Compromisable Components
3
6/29/2015Survivable Network Analysis3 Current Architecture Fire Wall Chinook DSL service Public network CMU DOMAIN kerberos Form User Light Client ADI/Data Query Oracle Net 8 Web Server Form ServerDB Mistral.cmu.edu acis.as.cmu.edu RC40 Mellon Bank Security FTP Batch process Email Server… SSL Proxy
4
6/29/2015Survivable Network Analysis4 Essential Components Oracle Database Web Server Form Server Firewall Kerberos Authentication System
5
6/29/2015Survivable Network Analysis5 Who are the attackers CMU Student Hackers Activists Former employee /Disgruntled employee
6
6/29/2015Survivable Network Analysis6 Intrusion 1 – Attacker Profile CMU Student Hackers – Attacker: Recreational hacker – Resources: limited – Time: Not have much free time as a CMU student, look for opportunity. – Tools: Readily available tool kit. – Access: External to system but inside the CMU domain – Risk: May not understand risk, but highly risk averse. – Objective: To develop hacking skills.
7
6/29/2015Survivable Network Analysis7 Intrusion 1 – Level of Attack Target-of-Opportunity Attack – The attacker has limited knowledge of internal system – The attacker uses readily available tools to scan and probe systems to take advantage of know vulnerabilities – There is a high frequency of these attacks
8
6/29/2015Survivable Network Analysis8 Intrusion Scenario 1: Denial of Service Fire Wall CMU DOMAIN Student Hacker Oracle Net 8 Web Server Form ServerDB Mistral.cmu.edu acis.as.cmu.edu RC40 Email Server… SSL Proxy
9
6/29/2015Survivable Network Analysis9 Intrusion 2 – Attacker Profile Activist – Attacker: political/ethical activist – Resources: limited, but could have expert/internal help. – Time: Patient, may target specific events. – Tools: Readily available tool kit – Access: External to system but somehow illegally get into the the CMU domain. – Risk: Understand risk and don’t care. – Objective: To impact CMU policy./To make specific target unhappy.
10
6/29/2015Survivable Network Analysis10 Intrusion 2 – Level of Attack Intermediate Attack – The attacker may have some knowledge of internal system. – The attacker uses readily available tools to scan and probe systems to take advantage of know vulnerabilities. – Higher level of success. – There is a medium frequency of these attacks.
11
6/29/2015Survivable Network Analysis11 Intrusion Scenario 2: Fire Wall CMU DOMAIN Activist Hacker Oracle Net 8 Web Server Form ServerDB Mistral.cmu.edu acis.as.cmu.edu RC40 Email Server… SSL Proxy
12
6/29/2015Survivable Network Analysis12 Intrusion 3– Attacker Profile Former employee of CMU – Attacker: Former/Disgruntled Employee – Resources: Have knowledge of process. – Time: Usually in a short period after being fired, also can be very patient. – Tools: Use customized system program. – Access: Easily get into the the CMU domain. Connect to the system through pre-setup laptop. – Risk: Understand risk – Objective: To get some money/To screw up the system.
13
6/29/2015Survivable Network Analysis13 Intrusion 3 – Level of Attack Sophisticated Attack – The attacker familiar with the internal system – May already setup security loopholes in the system. – There is a very low frequency of these attacks
14
6/29/2015Survivable Network Analysis14 Intrusion Scenario 3: Compromise Database Fire Wall CMU DOMAIN Hacker Oracle Net 8 Web Server Form ServerDB Mistral.cmu.edu acis.as.cmu.edu RC40 Email Server… SSL Proxy
15
6/29/2015Survivable Network Analysis15 Compromisable Components Oracle Database Web Server Form Server Firewall
16
6/29/2015Survivable Network Analysis16 Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.