220 likes | 329 Views
New Surveys (1-3-2001). Poll of 1,400 CIOs by RIH Consulting (U.S. Companies with > 100 employees More than 90% are confident with their firm’s network security Last August: 58% increased spending on security Computer Security Institute:
E N D
New Surveys (1-3-2001) • Poll of 1,400 CIOs by RIH Consulting (U.S. Companies with > 100 employees • More than 90% are confident with their firm’s network security • Last August: 58% increased spending on security • Computer Security Institute: • 50% failed to report break-ins (Computer Security Institute) • $265 million in 1999 losses • PWC: Fortune 1,000 firms lost $45 billion; high-tech firms most vulnerable http://computerworld.com/cwi/story/0%2C1199%2CNAV47_STO55809_NLTpm%2C00.html
Are There Problems? • Famous sites are hacked continuously • Example: NY Times site hacked 9-13-98 • Site was closed down for hours • Hackers replaced content with a hacker manifesto plus offensive materials • More public awareness! WSJ, Sept. 14, 1998
Recent Headline (Jan 6, 2001) • “FBI Teams Up with Business to Fight Cybercrime“ Reuters • FBI now encouraging companies to share info (with secure e-mail and web site) about break-ins • One hacking estimate: $1.6 trillion annual loss globally • FBI is working on 1,200 cybercrime cases, up from 450 in early 1998
Recent Case • Pacific Bell’s site cracked by 16-year old hacker • Downloaded info from 200,000 user accounts • When confiscated, 63,000 were cracked • Pac Bell sent out recommendation to change all 330,000 subscribers’ pws. Infoworld, 2-24-2000, p. 64
Recent Case • CD Universe • 300,000 credit card numbers were pulled from database • Faxed CD Universe offering to destroy the numbers for $100,000; was refused • Hacker published 25,000 on his web site • SSL didn’t help! Infoworld, 2-24-2000, p. 64; Wall Street Journal, 1-11-2000, p. B10
Recent Attacks: DoS • Highly-visible sites such as • Amazon • eBay • Yahoo! • Buy.com • They weren’t attacked directly; users’ computers were! • Those computers repeatedly “hit” the sites
Respondents’ Increases in Cost, Frequency Computer Security Institute and FBI Survey; Infoworld, 5-15-22000, p. 20
Security (CERT) Incidents Source: CERT’s site
Federal Government and Cybercrime • The Federal Government spends $10 million annually on computer crime-related law enforcement • There are 16,000 law enforcement agencies • Therefore, the Federal Government spends $625 per agency!
Security Breaches Abound • Perfect Technologies: tested 50 sites • Security breaches in all 50 • In 8: accessed any file • In 2: executed financial transactions • In 2: gained full admin control • Range of time needed: 10 minutes to 10 hours PC World, June 2000, p. 104
Gartner Group’s Grim Estimate 50% to 75% of all commercial sites can be hacked. PC World, June 2000, p. 104
Ominous Prediction The Gartner Group predicted that there was an 80% chance that by 2001 a high-profile web site would be hacked, resulting in a huge stock price tumble for the firm. Infoworld, 7-19-99, p. 24
What does a hacked site contain? • If you dare, go to: www.onething.com/archive/index.htm for an archive of hacked sites.
Some Stats (3-8-99) Internet World 3-8-99
Security • Is Web-enabling an application less secure than a dial-up traditional application? • Many say “NO” • Dial-up access opens up risks, whatever the access mechanism • Planning can help minimize the risks • However, the risks are huge
Hackers • Have philosophies and culture that probably should be understood by the security staff! • Some discuss curiosity • Some discuss leverage • Some reflect on their exploits
What a Hacker Does • Case you (what server, which version) • Scan you (probe all ports with packets) • Gain access (exploit weaknesses) • Live there (capture info or attack others) • Cover up the tracks (delete or edit logs) By Ed Skoudis (The Counter Hack)
Some Cautions • A weak system can’t be protected with cryptography • Schneier: “If you think cryptography can solve your problem, then you don’t understand your problem and you don’t understand cryptography.” • User-remembered secrets “terribly weaken” a system PC Week, 8-10-98, p. 36
A Moving Target • As larger and larger keys are devised, computing power grows to break them. • Networks of PCs can become a “supercomputer.” • Electronic Frontier Foundation has built hardware for $250,000 to decrypt 56-bit key in 4 hours. Infoworld, 7-19-99, p. 24
One Tactic • Hacker calls into known corporate exchange • Randomly dialing numbers • Finds employee with pcAnywhere running for remote office access • Gains instant access to entire corporate network PC Week, 8-24-98, p. 62
Default Installations Poor passwords Few backups Open ports Lack of packet filtering Poor logging Vulnerable CGI Windows Unicode Windows ISAPI buffer overflows Windows IIS flaws Unprotected shared folders Windows null-session leakage Windows LAN Manager password hash Unix remote procedure call buffer overflows Unix Sendmail vulnerabilities Unix bind weaknesses Unix trust relationships/C code Unix remote print daemon buffer overflows Unix sadmind/mountd buffer overflow Unix default SNMP authenticators Top 20 Internet Risks SANS Institute www.sans.org/top20.html eWeek, Oct 15, 2001, p. 60
Virus Attacks—Rapid Acceleration eWeek, 6-19-2000, p. 68 + CERT site