380 likes | 860 Views
Principles of Security. Burgess Ch.9. Principles of Security (Burgess Ch.9). Aspects of Security No Access without security check Security maintenance can reduce Privacy Integrity is ensured through effective Security Trust is a substitute for security
E N D
Principles of Security Burgess Ch.9
Principles of Security(Burgess Ch.9) • Aspects of Security • No Access without security check • Security maintenance can reduce Privacy • Integrity is ensured through effective Security • Trust is a substitute for security • Security often effects Reliability and Safety • More Security = Less Convenience • Hence the frequent use of Trust agreements FIT2018 (c) Monash University
Physical Security • Physical access to host equipment, devices and communication media • Software security depends on “adequate” host security • Level of security depends on value of asset • Adequate security often consists of several overlapping schemes (No single security mechanism is perfect!) FIT2018 (c) Monash University
Scope of Security • Applies to local system resources as well as remote network resources • Many major fraud cases perpetrated by insiders • But Internet is huge and also represents a significant threat • Threats may also include accidental and “natural” sources FIT2018 (c) Monash University
Basic Components of Security • Restriction of access: Privacy of resource/data • Authentication: Verification of Identity • Trust: Inherent security of known source • Integrity: Guarantee against corruption/loss FIT2018 (c) Monash University
Common Trust Relationships • Many implied trusts in computer systems • Unix NFS trusts the agent that mounts remote file systems (usually root user) • rlogin, rsh, rexec commands trust root users from hosts registered in .rhosts and hosts.equiv files • downloaded executable code is “trusted” (Trojan Horse) • After authentication of a known host, data downloaded during that session is trusted • Trust relationships imply assumed security, and if overused can expose security holes. FIT2018 (c) Monash University
Security Policy • Is a definition of security requirements for local users • Used to determine • if/when a breach has occurred • what to do about it FIT2018 (c) Monash University
Factors in Security Policy • Source of threat • Remote threat? • Internal threat (different host or same host?) • Interruption of service? • User error or accident? • Level of threat • Sophisticated spies? • Tourists – curious? Just looking? • Braggers – trying to impress? FIT2018 (c) Monash University
Factors in Security Policy • Cost of implementation (Technical and Personal) • Loss of convenience tolerated by users • Nature of protected asset – total cost of loss/damage • Secrets – government, trade, operational • Personnel data – employees, patients, customers … • Critical system service – web, email, directory, keyserver • System abuse – where system is used to aid/abet damage elsewhere FIT2018 (c) Monash University
Factors in Security Policy • Consequence of security breach • Financial loss • Legal liability • Operational loss • lost business, missed deadline • Loss of reputation (Integrity) • damage to trust relationships FIT2018 (c) Monash University
System Integrity - Protecting against Loss • Loss of Data – Backup through Redundancy • Traditional: tape backup • Disks now bigger, faster & cheaper • CDROM is at least as fast as tape • May also Backup and restore through Network • Loss of Service • Downtime can be just as serious as lost data • UPS protects against power outage • Redundant CPU, network hardware & connections prevent downtime due to equipment failure or circuit interruption • Careful network design helps prevent DoS attack FIT2018 (c) Monash University
System and Network Security • Only an insignificant percentage of network users are malicious, but since Internet is so huge, this amounts to a significant threat! • Obscurification – Security through Obscurity • Hiding information to make it difficult for intruders • But if black-hats can see that there is nothing worth finding, they will often leave a system alone • Open Source vs Corporate code FIT2018 (c) Monash University
System and Network Security • “Honey Pot” machines – sacrificial system, easily rebuilt if compromised - no real loss • Security Holes • bugs in systems that may be exploited by attackers • setuid-root programs (eg passwd sendmail finger) • Firewalls can prevent access systems with security holes • See CERT and SANS news://comp.security.announce • Homogeneous networked hosts • Easier to install and maintain • More likely to be able to fix all security holes FIT2018 (c) Monash University
System and Network Security • Modem pools • may allow back-door connections around network security features and firewalls • Laptops and portable systems • Theft of a laptop can yield enough information to compromise other hosts • Backups • Secure storage of backup is often overlooked. • Why break into a system when the information can be obtained by stealing the backups? FIT2018 (c) Monash University
Non-Technical aspects of Security • Otherwise impenetrable system can still be compromised using “Social Engineering” • An unwary user may be tricked into revealing the keys to sensitive information • Phone call from bogus SysAdmin who needs info to repair or install • Bogus Market survey with questions that reveal enough info to be able to guess passwords or key information • Discarded documents with account numbers or other pertinent data FIT2018 (c) Monash University
Non-Technical aspects of Security • Bragging • Misguided users bragging about how good their system is, re actually giving information away • Egotistical crackers may over emphasize their success to provoke a situation where more information is revealed • Security Policy needs to include steps to minimise these social issues • user education • clearly stated policy on disclosing information over the phone • Check Lists FIT2018 (c) Monash University
TCP/IP Security • IP is “best effort” datagram – ie no sequence • TCP offers guaranteed delivery of data stream over IP – breaks stream into segments and provide own sequence, error detection and correction • Sequence provided by byte position in data stream • Packets protected by checksum and positive acknowledgment of received sequence number • Packets with errors are dropped, leading to acknowledgement timeout and retransmission FIT2018 (c) Monash University
TCP/IP Security • TCP connections are full duplex streams • Initial sequence numbers established during initial connection using “3-Way Handshake” FIT2018 (c) Monash University
Common Network Host Attack Methods • Ping attack - “Ping of Death” • RFC791 specifies maximum segment size 64Kb • Some systems can transmit segments larger than this, but not all can receive them! • ping –s 65510 targethost • In vulnerable systems leads to buffer overflow and unpredictable results – often serious system corruption FIT2018 (c) Monash University
Common Network Host Attack Methods • Denial of Service (DoS) attack • Generating requests for service faster than service can be supplied may cause server to grind to a halt! • Also Distributed DoS - Synchronising multiple clients to request services simultaneously FIT2018 (c) Monash University
Common Network Host Attack Methods • TCP/IP Spoofing • Generating TCP packets with false source address • Not common until recently, since this requires user programs running with system privileges to be able to send raw IP frames • False packets must also have expected sequence numbers, or they will be rejected by the target • Acknowledgements sent back to real host usually cause it to immediately reset the connection FIT2018 (c) Monash University
Common Network Host Attack Methods • SYN flooding • The 3-way handshake can be used as part of a DoS attack • Attacker connects (SYN) with a spoofed source IP address • Target system replies with a SYN+ACK to the real host and waits for an ACK • if the real host cannot reset the connection, then the target system waits forever! • Many spoofed incomplete connection requests eventually exhaust target system resources. Prevent valid connections from being accepted. • Recent systems resistant to this form of attack. May also be protected by routers that drop packets with forged addresses FIT2018 (c) Monash University
Common Network Host Attack Methods • TCP Sequence attack • A form of IP Spoofing • A false IP packet transmitted by a third party can be inserted into an existing connection stream • Relies on being able to correctly guess the next sequence number at that point in the stream • Allows an observer to commandeer a TCP session and impersonate other hosts with trusted access or after authentication has occurred • More difficult now that TCP has been modified to allow random initial sequence numbers FIT2018 (c) Monash University
Common Network Host Attack Methods • Fragmentation attack “Teardrop” • Exploits a bug in the reassembly of UDP packets in some old versions of TCP/IP • Attacker send two or more forged UDP packets with sequence numbers and length values such that the datagrams overlap • When the target attempts to allocate memory for buffer space, it generated faulty system call parameters that cause the operating system to panic • Most modern implementations of TCP/IP no longer vulnerable to this problem FIT2018 (c) Monash University
Common Network Host Attack Methods • ICMP Flooding - “Smurf” • A form of DDoS attack. • The attacker sends a spoofed ICMP echo request packet to the broadcast address of a large network • All the hosts in that network then reply to the echo request but send to the target, not the attacker! • The large number of replies arriving in rapid succession flood the target and consume all system resources. FIT2018 (c) Monash University
Common Network Host Attack Methods • DNS Cache poisoning • The DNS is often used as a way to verify the IP address of a remote connection request. • In systems where connections are controlled by host.equiv or .rhost files, this sort of attack can be used to allow the attacker to impersonate a trusted host, and so gain access. • A forged DNS reply to a request from the target machine to it DNS server can be used to insert the attackers IP address in the target host DNS cache, in place of the actual address of the trusted host. • A sort time later (before the cached DNS entry expires) the attacker’s host can request a connection and will be accepted FIT2018 (c) Monash University