560 likes | 722 Views
Computer Security for the Appropriately Paranoid. A Broad Overview Joseph Kashi, MS, JD. Data Security. Several Different Problem Areas. Wireless security Internet security Wired network security . Identity theft issues Confidentiality
E N D
Computer Securityfor the Appropriately Paranoid A Broad Overview Joseph Kashi, MS, JD
Several Different Problem Areas Wireless security Internet security Wired network security
Identity theft issues • Confidentiality • Any wireless device can be undetectably intercepted given time • Federal law enforcement agencies report that wireless and embedded devices are often targets
Mobile Devices • Notebook computers • flash drives • Wireless networks • Bluetooth – phones, networks, printers • GSM cell phones • PDAs and BlackBerry
Electronic Data Loss • Includes identity theft, losses from which topped $48 billion loss in 2008 despite federal statutes • Can be more damaging because usually not known ever or for many months in case of breach of confidentiality, identity theft or credit damage
Physical Loss or Compromise • Data loss can be devastating – Gulf War plans were a classic example • Physical loss affects not only data but entire network security • Upside – You know it’s compromised and can react accordingly
Short-Term vs. Long Term • Wireless will be the basic network standard in 7 or 8 years • Avoid if possible for next 18-24 months – certainly no confidential data • Wait for new 802.11i hardware
Curse of the Defaults • For ease of set up, most wireless devices ships with all security turned off as basic default • Most users never enable any security • Security never complete – at best slows down and deters intruders
Hidden Dangers • Wi-Fi default is connect to any nearby computer as part of ad hoc network • Windows XP default is to bridge between mobile Wi-Fi device and any other connected network interface, possibly exposing your entire network
Initial Wi-Fi Setup • Change your router setup password to something other than the published default • Change your SSID to a non-obvious and unpublished name
Add Security to Net Setup • Most small networks use basic MS file and printer sharing protocols - these are totally insecure • Default is no password and standard network name
Small Net Setup • Choose a non-obvious workgroup name • Avoid Microsoft defaults such as MSHOME • Don’t settle for the first working network configuration which by default has no security, to aid lay setup
Router Setup • Access and configure your Wi-Fi router with a direct Ethernet cable connection • Use Internet Explorer and standard IP address 192.168.0.1. or 192.168.1.1 • These are published and known
Router Setup • Enable security - some studies found more than 2/3 of all Wi-Fi networks made no changes at all to totally insecure defaults • Your aim is to close, at least partially, and otherwise totally open door
Locating the Wi-Fi Router • Set up a “DMZ” using a second firewall to protect the internal hard-wired LAN • Place all Wi-Fi and Internet connections outside the hard-wired network’s firewall • Locate the Wi-Fi router to minimize leakage of signal outside office
Router Setup • Don’t advertise – disable the wireless SSID broadcast known as beaconing • Do this only after you have completely setup all computers that are to connection to your Wi-Fi network
Enable Security • There are several possibilities – default is no security • WEP, a “Weak” encryption with many basic vulnerabilities • WPA needs same upgraded hardware
WEP Encryption • Lowest common denominator, but with serious systemic weakness • Keys easily vulnerable to cracking regardless of key length • Rotating keys helps but awkward
MAC Address Filtering • Every Ethernet device has an unique identifier known as a MAC • MAC filtering lists allowed or blocked Ethernet devices – not much help if WEP • Easily fooled - done by most routers, firewalls and hacker freeware
Access Restrictions • Newer routers also act as network hubs and allow security policies that can limit undesired types and times of network usage • Some benefit but require some knowledge to set up
WPA Encryption • More secure but less open interim follow on to WEP – keys are automatically and securely rotated • Requires new WPA capable hardware, all of which should be the same brand and model, with upgraded firmware
Hardware Firewall • Adds some protection against hacking through the wired Internet connection • Generally useful and unobtrusive unless using VPN tunnel or other means of remote access • Use XP and 802.1X
Basic Hardening Tips • Change ALL defaults on ALL devices • Check for possibly conflicting access points and peer to peer networks – these may be an unguarded backdoor. • Enable at least WEP • Search for rogue LANs with notebook
Other Hardening Tips • If possible, reduce router transmission power to minimum that works • Install network traffic transmission monitoring hardware/software • Upgrade older Wi-Fi hardware – the network runs at the lowest common denominator
The Future is 802.11i • Secure wireless connection - strong hardware encryption and authentication • New industry standard not fully gelled • Requires total Wi-Fi network rebuild with new 802.11i hardware throughout entire network
Long Term Fixes • More powerful handsets with stronger encryption • New versions of WAPI that fix obvious security holes (www.wapiforum.org) • UL-style security ratings for wireless and Internet security products and services (www.ICSA.net)
Virtual Private Networks • These offer some additional security, particularly with private tunneling software protocols for wireless users • Look for good performance and lower future costs as DSL networks become more common • DSL networks a new approach that could extend to wireless
Until Then • Treat wireless devices like a cell phone • Wireless known to be possibly insecure • Most confidential data, such as litigation strategy, should not be sent wireless
Other Security Tips • Call back vs.. direct dial in • Intrusion detection software: Black Ice • Set security configuration and user rights carefully • Change security passwords regularly
Internet Security Tips • Instant messaging = insecure • Internet itself is definitely more secure than wireless due to packet routing • PGP encryption - easy but not fool-proof • Encrypt passwords and logins, use an authentication server w/ digital signature
Internet Security Tips • Dynamic Vs. Static IP networks - low cost option for DSL users • Firewalls- Linksys Ethernet switch, DSL router and hardware firewall. • DSL and other inexpensive broadband network routers include hardware firewalls that can block incoming calls
Internet Security Tips • Commercial personal software firewall such as McAfee Firewall seems very effective • Avoid downloading and using highly interactive programs from untrusted sources. Some programs send data surreptitiously or are insecure, e.g. ICQ
Curse of the Defaults • For ease of set up, most wireless devices ships with all security turned off as basic default • Most users never enable any security • Security never complete – at best slows down and deters intruders
Mobile Wi-Fi Woes • Mobile computers often set to “ad hoc” network wireless mode, which can connect with any nearby computer • We saw examples of inadvertent penetration at yesterday’s Wi-Fi session • Always install Wi-Fi as “infrastructure mode”
Wi-Fi Is Insecure • Many cracking programs available free • War-driving and War-chalking • Default installations are totally insecure
Does PDA Mean“Portable Disaster Area”? Some Practical Thoughts about Mobile Security
Cell Phone Woes • The most primitive portable device - cells are insecure. • GSM security model cracked as early as 1998. • Loaning a phone or GSM card for even a few minutes can compromise your security
PDAs • PDAs that depend upon Wi-Fi access have the same security problems as notebook computers • BlackBerry is a proprietary format that can be made substantially more secure • You need to fix a PDA’s basic Wi-Fi and Bluetooth security holes
Mobile Security Holes • Wi-Fi and/or Bluetooth typically installed in notebook computers – hundreds of millions sold each year • Usually enabled by default even when not used • A major but non-obvious security hole – I physically turn off power to my wireless devices
Bluetooth Security Model • Theoretically, Bluetooth is not a bad security model but security is unfortunately optional • Trusted and locked down device pairing possible
Bluetooth Today • Bluetooth sets initially were very low power and hard to intercept • Newer models have more power and can be intercepted to 100 meters or more
Bluetooth Security Holes • IEEE has recently published on Web a variety of papers describing proven methods of easily cracking Bluetooth transmissions – even industry group admits security holes • Programs like Blue Stumbler and SNARF attack are available on the web
Bluetooth Holes Part 2 • Windows servers often configure to connect to all Bluetooth devices in range – a major security breach • Former employees can take connection data
Bluetooth Holes Part 3 • Phone cards or unsecured headsets may be borrowed and company connection data and security compromised • Windows registry retains all connection data for all devices ever used
Bluetooth Networks • “Piconets” sometimes set up automatically that can allow anyone in range to see your files • Discloses your embedded link security information • Worse if you also have other simultaneous network access
Protecting Bluetooth – Part 1 • Never use “unit” authentication keys • Always use “combination” authentication keys with manual PIN input • Use a longer PIN – minimal 4 digit PIN easily cracked by brute force challenges
Protecting Bluetooth Part 2 • Auto PIN number generation is insecure and allows device impersonation • Never establish device pairing or first meeting in a public or other non-secure environment • Eavesdropping feasible – link data disclosed to third parties
Protecting Bluetooth Part 3 • Always enable security mode on all devices • You are only as secure as the weakest link that may transmit connection information • Mode 3 security should be used if possible
Protecting Bluetooth Part 4 • Use only trusted devices • Turn off device pairing mode