790 likes | 1k Views
EE579T / CS525T Network Security 1: Course Overview and Computer Security Review. Prof. Richard A. Stanley. Overview of Tonight’s Class. Administration Is network security a problem, or just an interesting topic? What is different between computer security and network security?
E N D
EE579T / CS525TNetwork Security1: Course Overview and Computer Security Review Prof. Richard A. Stanley WPI
Overview of Tonight’s Class • Administration • Is network security a problem, or just an interesting topic? • What is different between computer security and network security? • Review of computer security WPI
Administration WPI
Organizational Details • Prof. Stanley contact information • Office: A-K 009 • Hours: by appointment • Phone: (508) 276-1060 • Email: rstanley@ece.wpi.edu WPI
Administrivia • Class will normally meet 6:00 - 8:50 PM every Wednesday here. Please be on time. • Break from approx. 7:15 to 7:30 PM • If class is cancelled for bad weather, you should receive notice. Double-check with ECE Dept. (5231) or with me if in doubt. • It may be necessary to cancel a class during the term. If so, you will be notified. WPI
Course Text • Network Security Essentials, William Stallings, Prentice Hall, 1999 ISBN 0-13-016093-8 • Additional material will be in the form of handouts and pointers to research materials WPI
Course Web Page • http://www.ece.wpi.edu/courses/ee579t/ • Slides will be posted to the page before class, barring any unfortunate problems WPI
Grading • Mid-term exam (30%) • Homework (20%) • Class participation (20%) • Course project (30%) WPI
Policies • Homework is due at the class following the one in which it is assigned. It will be accepted up to the second class after that in which it is assigned, but not after that, except in truly emergency situations. By definition, emergencies do not occur regularly. • There is a difference between working in teams and submitting the same work. If work is a team product, it must be clearly labeled as such. WPI
Getting to Know You • Your interests and expertise in this area • My interest and experience in this area • What you would like from the course WPI
Network Security: What’s the Big Deal? • Not a new problem • Not just a creation of the press • Not just for rocket scientists • As professionals, failure to understand and implement appropriate security can come back to haunt you in terms of liability and reputation WPI
Points to Ponder • 85% of businesses surveyed reported attacks against their networks in 2000 • 64% reported financial losses, totaling $378M -- this represents only the 186 companies willing to share this information! • Theft of proprietary information and financial fraud top the list of losses • Majority of attacks now from outside. Source: "Issues and Trends: 2001 CSI/FBI Computer Crime and Security Survey" WPI
More Statistics • 91% detected employee misuse of systems • 94% detected computer viruses • 40% detected system penetration from outside • 38% detected denial of service attacks • 36% reported intrusions to law enforcement Source: "Issues and Trends: 2001 CSI/FBI Computer Crime and Security Survey" WPI
What’s the Problem? • Financial liability • Due diligence • Simple negligence • Gross negligence • Goodwill • One bad press release cancels 1000 attaboys This is a “you bet your business” issue WPI
Computer security involves preventing, detecting, and responding to unauthorized actions on a computer system. Network security means the same thing for a group of networked computers To understand network security, you must first understand computer security. There is no “easy” way around this. WPI
One View Network Security Computer Security WWW Security WPI
Why Networks Matter • If computers cannot be secured individually, the network cannot be secure • Networking makes the most individually secure computer on the network only as secure as the least individually secure computer on the network. • Networking offers new vulnerabilities • Speed of mischief increases exponentially WPI
And Most Especially... • Mobile code is a basic staple of the internet, and other networks as well • This a wholly new paradigm • Users are not usually aware of mobile code • Novelty and convenience trump security every time • Consider the dancing pigs WPI
Analogy • One can easily define the security perimeter of a single computer. You can probably even literally “put your arms around it.” • One cannot easily define the perimeter of a group of networked computers, except under a set of trivial conditions that are meaningless in practice. • So, where to put the security? And HOW to make it happen? WPI
Role of Technology • Technology is a useful tool, not a panacea. • A clear policy, evenly enforced, is the most critical element of success. • Don’t ignore the fundamentals. • Caterpillar’s entire network was compromised by not revoking a former employee’s password. • Perfection does not exist in the real world WPI
Why Isn’t This Topic More Theoretical? In theory, there is no difference between theory and practice. In practice, there is. Yogi Berra WPI
Remember the Security Theorem • Proving a computer to be secure required: • Knowledge of the security of each state transition • An exhaustive catalog of all possible states • Knowledge of the initial conditions • Now, how do we apply this approach to a network with changing topology? WPI
Why Is A Proof Elusive? • A secure network must be secure under all conditions of operation • This demands proof that there is no condition under which it could operate that is insecure, i.e. the negative proposition. • However, formal logic teaches us it is impossible to prove a negative • Q.E.D. WPI
Computer Security Review Or: How I Learned to Stop Worrying and Love Uncertainty WPI
Security Requirements • Customers expect “reasonably secure” handling of their sensitive data • The Devil is in the details • What is “reasonable?” • What is “secure?” • What data is “sensitive?” • When is it your responsibility? WPI
A Curious Property of Information • Information is the only thing that can be stolen and still leave the owner in possession of it • This poses some serious problems, which the course will address • Networks increase the seriousness of the problem, as compared to single computers WPI
The Security Dilemma • Security is something most users want, but that most know little about • Security gets in the way of using the network • The tighter the security, the harder the system is to use, and the more likely it is that the users will bypass security measures WPI
The Totally Secure System • Is relatively simple to build • Is provably secure • Is useless for any practical purposes Our job is to learn how to design computer networks to provide the necessary level of security without going overboard. WPI
Confidentiality Integrity Availability Authenticity Reliability and safety Vulnerability assessment Risk management Interception Modification Denial of service Spoofing Dangerous conditions Exploitation of unguarded conditions Wasted resources Security Needs, Threats WPI
Security Objectives Integrity & Authenticity A – I - C Availability Confidentiality Protect, detect and recover from insecurities WPI
Security = Asset protection Risk Analysis Protect Detect Correct Manage WPI
Identification & Authentication • Identification • A unique entity descriptor • Authentication • verifying the claimed identification • These are crucial to network security These are two sides of the same coin, but they are NOT the same thing WPI
Password • Most commonly used • Relatively easy to compromise or break • Many threats • Usability issues • First line of defense, but not a very solid one WPI
Password Problems • Security/sharing • System is only as secure as the weakest link • Vulnerable to brute force attack • Dictionary attacks easy, in any language • Other intelligent searches • Exhaustive attacks • Password file vulnerable • Spoofing, man-in-the middle WPI
Authentication • Validates you are who you claim to be • Something you know • Something you have • Something you are • Something you do • Somewhere you are • An intruder who has the authentication keys looks just like the real user! WPI
Something You Know • Password • PIN • Some other piece of information (e.g. your mother’s maiden name -- very popular) • NB: anyone who obtains this information is -- so far as the computer knows -- you. Is there a problem here? WPI
Something You Have • Physical token • Physical key • Magnetic card • Smart card • Calculator • What if you lose it? WPI
Something You Are • Biometrics • Fingerprints • Face geometry • Voiceprints • Retinal scanning • Hand geometry • False positives, negatives • User acceptance WPI
Something You Do • Mechanical tasks • Signature (pressure, speed) • Joystick • False positives, negatives • Potential for forgery, replay, etc. WPI
Somewhere You Are • Limit use by user location • Vet location by GPS, etc. • Reliability, dependability, complexity WPI
But First: Security Awareness • View the world as if you had to design a security solution for whatever situation you are in • Even paranoiacs have real enemies • Assumptions are your enemy WPI
Access Control • Provides limits on who can do what with objects on the computer • Can’t happen without identification and authentication • Is not the same as identification and authentication WPI
Subjects and Objects • Remember your English grammar • Subjects act • Objects are acted upon • These roles are not graven in stone • If you hit the ball, you are the subject • If the ball hits you, you are the object • It is just the same in computer science WPI
Access Control Model Reference Monitor Subject Request Object WPI
Reference Monitor • Makes access control work • You can tell it • What a subject is allowed to do • What may be done with an object • In order to specify these things, you need to know all the possibilities, or you need to define things narrowly so that what you don't know doesn’t become allowed WPI
Access Control Matrix • A = set of access operations permitted • S = set of subjects • O = set of objects WPI
Security Model Types • Formal (high-assurance computing) • Bell-LaPadula • Biba • Chinese Wall • Informal (policy description) • Clark-Wilson WPI
Bell-LaPadula • Describes access policies and permissions • S is the set of subjects • O is the set of objects • A is the set of access operations = {execute, read, append, write}={e,r,a,w} • L is the set of security levels with partial ordering £ WPI