680 likes | 689 Views
This chapter explores the key security objectives of confidentiality, integrity, and availability, along with various types of security threats and attack methods. It also discusses trapdoors, malicious code, viruses and worms, and network security attacks such as web site defacing and denial of service.
E N D
Chapter 1 [SB] chapters 1,13,14,15,16,17,18 Articles J1,J2 Prof. Ehud Gudes Security Ch1
Security objectives • Confidentiality – No leakage of sensitive or private information Only authorized access is allowed (both Read and Write) • Integrity – no modification or destruction of information (both accidental and malicious) • Availability – Timely Response, No denial of service , Quality of service • Security – all-together, but mainly confidentiality! Prof. Ehud Gudes Security Ch1
Integrity vs. Security • Integrity – Disallow Invalid update – Read is not a problem! • Security - Disallow unauthorized access – Read is a problem! Prof. Ehud Gudes Security Ch1
Aspects of Integrity • Preciseness, Accuracy • Consistency • Meaningfulness and correctness • Integrity problems may happen accidentally or maliciously Prof. Ehud Gudes Security Ch1
Integrity - Types of errors • A single user enters invalid data - Integrity. • Access by Multiple users causing invalid or inconsistent database – Concurrency • System (Hardware or Software) Failures – Recovery • Abort of Transactions which may leave database in Inconsistent state - Recovery Prof. Ehud Gudes Security Ch1
Aspects of Availability • Timely response • Fair allocation • Fault tolerance • Utility and Usability, Quality of Service • Controlled concurrency • No denial of service Prof. Ehud Gudes Security Ch1
Examples for Security Problems • Computer Crime • Access to Proprietary Information • Disruption of Operations (Denial of service) • Violation of Privacy • Theft of Proprietary Software Prof. Ehud Gudes Security Ch1
Types of Security Threats • Hardware • Theft • Eavesdropping • Fire, Flood Terror. • Software • Illegal use • Illegal modification • Theft • Data • Destruction • Illegal disclosure • Illegal modification Prof. Ehud Gudes Security Ch1
Security Threats - Locations Prof. Ehud Gudes Security Ch1
Attackers • Insiders – According to studies, about half of the attacks to a system come from insiders [Neu99]. • Hackers – Usually try to show off their ability by penetrating systems • Spies –Industrial or government espionage. Prof. Ehud Gudes Security Ch1
Methods of Attacks • Bypassing authentication (e.g. guessing password) • Using Authority dishonestly (e.g. System people ) • Utilizing human error or carelessness • Utilizing “holes” in Software - Trapdoors • Bypassing access control • Using Viruses • Use Inference from authorized access Prof. Ehud Gudes Security Ch1
Attack methods • Preparation —Information gathering, scanning, planting malicious code, masquerading (spoofing) • Activation —perpetrator-controlled, timed, victim activated • Mission — active (affects integrity and availability), and passive misuse (eavesdropping, inference), denial of service Prof. Ehud Gudes Security Ch1
Trap-doors • A Trap-door is a “hole” in a legal program module through which an invalid access can be performed. • Such hole may be left intentionally or unintentionally • Example – a hole in the password checking module (Thompson’s example) Prof. Ehud Gudes Security Ch1
Malicious Code • Trojan Horses — A Trojan Horse is an apparently useful program that has hidden functions, usually harmful. A Trojan Horse can violate integrity more easily than confidentiality. • Viruses – A virus is a program that attaches itself to another program, propagates, and usually causes some data destruction. General virus detection is a difficult problem, but we can detect specific viruses. • Worms — A worm is a program that propagates itself without infecting the host. Prof. Ehud Gudes Security Ch1
Viruses and worms • Self-propagating • May destroy information and clog services • A mix of vandalism and ego trip • Take advantage of operating system and utilities flaws and uniformity of systems • Examples of malicious software • May also be used by organizations or government agencies Prof. Ehud Gudes Security Ch1
Virus - Stages of an Attack Prof. Ehud Gudes Security Ch1
Network Security Attacks • classify as passive or active • passive attacks are eavesdropping • release of message contents • traffic analysis • are hard to detect so aim to prevent • active attacks modify/fake data • masquerade • replay • modification • denial of service • hard to prevent so aim to detect
Web site defacing and hijacking • Alteration of the web pages of some institution • Visitors may be hijacked to other sites, sometimes impostor sites • Political motivation or hacking • Take advantage of web server weaknesses, e.g., CGI scripts or lack of isolation of pages; also through OS • Cross-site scripting - XSS • Phishing Prof. Ehud Gudes Security Ch1
Dist. Denial of Service • Multiplication of messages towards some site • Requires previously inserted software by perpetrator (slaves) • A site may become inaccessible • Political motivation or vandalism • Uses flaws or features of network protocols and OS flaws Prof. Ehud Gudes Security Ch1
Illegal database access • Illegal access to web-connected databases • Stealing of information, e.g., credit card numbers. • SQL injection • Exploit poor database authorization, implementation, or alternate routes Prof. Ehud Gudes Security Ch1
Cyberwar and Terrorism • Massive attack to the computer systems of some country or institution or to the Internet itself • Carried out by organized groups or a government • Uses all the other attacks Prof. Ehud Gudes Security Ch1
איך מתקיפים • התקפה פאסיבית ציתות(Interception) • התקפה על סודיות • התקפות אקטיביות הפרעה(Interruption) • התקפה על זמינות שינוי(Modification) • התקפה על שלמות זיוף(Fabrication) • התקפה על אמיתות שידור חוזר (Replay) Prof. Ehud Gudes Security Ch1
תוצאות מקוות • הטרדה - Intrusion • …. Denial of service • גניבת אינפורמציה • מרמה Prof. Ehud Gudes Security Ch1
תכנון ההתקפה • איום לא מכוון • באגים….. • שכחתי את הסיסמא….. • איום מכוון • איום טבעי • אסונות טבע Prof. Ehud Gudes Security Ch1
מקור ההתקפה • מתוך משתמשי המערכת • מתוך הארגון • מחוץ לארגון, אבל פיסית מבפנים • מארגון אחר “מהימן” • מחוץ לארגון • מה-Internet Prof. Ehud Gudes Security Ch1
דוגמאות • העברת חלקי אגורות לחשבונו של עובד הבנק • גניבת סרטי גיבוי ומחיקת דיסקים ע”י עובד החברה • הצפת מרכז המחשבים. • ברכה לחג המולד - סוס טרויאני ב-PostScript • וירוסים ב- Mail attachments – I Love you virus • תשלומים בעזרת כרטיסי אשראי בטלפון (ב- Internet) • סוס טרויאני - Windows NT registration • שינוי הדף של ה-C.I.A ב-Web • Internet Worm • פרסום הדיסק של יזהר אשדות • התקפת ה-DDOS על Yahoo, Amazon , CNN ועוד Prof. Ehud Gudes Security Ch1
Most popular Attack methods ([P] sidebar 1.3 ) • Exploiting OS vulnerability – 33% • Exploiting unknown application – 27% • Guessing Passwords – 22% • Abusing valid user accounts – 17% • Using internal denial of service – 12% Prof. Ehud Gudes Security Ch1
Countermeasures • Access control/ authorization --provide confidentiality and integrity • Authentication-- proper identification • Auditing-- basis for prosecution or improvements to the system • Cryptography-- a mechanism to hide information and prove identity and rights Prof. Ehud Gudes Security Ch1
Security Functional Requirements • technical measures: • access control; identification & authentication; system & communication protection; system & information integrity • management controls and procedures • awareness & training; audit & accountability; certification, accreditation, & security assessments; contingency planning; maintenance; physical & environmental protection; planning; personnel security; risk assessment; systems & services acquisition • overlapping technical and management: • configuration management; incident response; media protection
Basic Security Mechanisms Prof. Ehud Gudes Security Ch1
Security Mechanisms Area Procedures and Mechanisms External Procedures Security clearance of personnel Protection of passwords Information classification and security policy formulation Application program controls Audit Periods processing Physical environment Secure areas for files / processors / terminals Radiation shielding Data storage Data encryption Duplicate copies Prof. Ehud Gudes Security Ch1
Security Mechanisms cont. Area Procedures and Mechanisms Processor software Authentication of user Access control Threat monitoring Audit trail of transactions Processor hardware Memory protection States of privilege Reliability Communication lines Data encryption Prof. Ehud Gudes Security Ch1
Counter Measures (Stallings) • technical measures: • access control; identification & authentication; system & communication protection; system & information integrity • management controls and procedures • awareness & training; audit & accountability; certification, accreditation, & security assessments; contingency planning; maintenance; physical & environmental protection; planning; personnel security; risk assessment; systems & services acquisition • overlapping technical and management: • configuration management; incident response; media protection
מדיניות הגנה • על מה להגן? • משאבים, נתונים • כנגד אילו איומים? • ציתות, שנוי, Denial of service • על אילו חלקים מהמערכת להגן? • חמרה, תכנה Prof. Ehud Gudes Security Ch1
שיקולים בבחירת מדיניות הגנה • מידת ההגנה שרוצים לספק : בד”כ תלוי בנזק שיכול הארגון “לספוג” • מחיר ההגנה • מחיר פיסי (כספי) • קלות ונוחות השימוש • מודל הערכת סיכונים (להלן) תמיד נוגדים זה את זה - שיקולי עלות/תועלת • במי בוטחים - Trust Model Prof. Ehud Gudes Security Ch1
שיקולים בבחירת מדיניות הגנה לאחר בחירת מדיניות ההגנה, יש לבחור מהם מנגנוני ההגנה שבעזרתם מממשים את מדיניות ההגנה. Prof. Ehud Gudes Security Ch1
מנגנוני הגנה • הגנה פיסית • הגנה אישית/ מנהלית • אמצעי ניטור - מעקב • בקרת גישה • בקרת זרימה • בקרת היקש • מנגנונים קריפטוגרפים Prof. Ehud Gudes Security Ch1
דוגמאות • Firewalls • Smart cards • הצפנה • הקשחה של מערכות הפעלה • Access Control • הגנות פיסיות Prof. Ehud Gudes Security Ch1
מערכות בטוחות צריכות להכיל מנגנונים (ידניים או ממוחשבים), לזהוי והגנה כנגד כל סוגי האיומים. אפילו אם מנגנון בודד חסר, המערכת עלולה להיות לא בטוחה לחלוטין. חוזקה של שרשרת האבטחה היא כחוזק החוליה החלשה ביותר שבה. Prof. Ehud Gudes Security Ch1
Summary - Security objectives • Confidentiality – no leakage of sensitive or private information • Integrity – no modification or destruction of information • Availability – • No denial of service Prof. Ehud Gudes Security Ch 2
The meaning of security • Security implies providing these objectives in the presence of the attacks discussed earlier • Security requires technical, management, and physical countermeasures • We mainly consider technical aspects here • A related aspect is privacy, a legal and ethics concern • How we achieve all the above without sacrificing basic democratic principles! Prof. Ehud Gudes Security Ch1
Principles for Security • Accountability • Awareness • Ethics • Multidisciplinary • Proportionality • Integration • Non-repudiation • Timeliness • Reassessment • democracy Prof. Ehud Gudes Security Ch1
The principle of Effectiveness A security control is effective if: • It is easy to use • Efficient (not too much overhead) • Appropriate (not impeding legal access) • And actually USED! Remember: the strength of a chain is that of its weakest segment! Prof. Ehud Gudes Security Ch1
Need for conceptual structure • Security is an all-levels problem • In current systems we have disjoint, ad hoc solutions at each level • We should start from high-level policies that can be mapped to the lower levels • We need precise models to guide system development Prof. Ehud Gudes Security Ch1
Management and Administrative Aspects • PC measures • Unix Issues - e.g. use of Accounts, Passwords • Network issues - Insiders vs. Outsiders, firewalls • Computer emergency response teams (CERT) • Risk Analysis Prof. Ehud Gudes Security Ch1
Security Measures Administrative Security Measures Physical Security Measures Technical Security Measures Legal Security Measures Prof. Ehud Gudes Security Ch1
PC measures • Secure equipment. Do not leave PCs, printers unattended. Secure equipment. • Secure secondary media. • Perform periodic backups • Practice separation of authority • Add security boards or plugs • Use authorized software only • Provide access control and/or encryption to files • Provide automatic logout and screen save locks • Assure machine identification Prof. Ehud Gudes Security Ch1