Chapter 3
Chapter 3
1
Definitions and keyconcepts
➢ Access - a subject or object’s ability to use, manipulate, modify, or affect
another subject or object.
3
Cont.…
➢ Security Blueprint - the plan for the
implementation of new security measures in the
organization.
➢ Security Model - a collection of specific security
rules that represents the implementation of a
security policy.
➢ Security Posture or Security Profile - a general
label for the combination of all policies,
procedures, technologies, and programs that make
up the total security effort currently in place.
4
Cont.…
➢ Subject - an active entity that interacts with an information system and
causes information to move through the system for a specific end
purpose
5
Cont.…
Balancing information security and access
➢ When considering information security, it is
important to realize that it is impossible to obtain
perfect security.
➢ Security is not an absolute; it is a process not a
goal.
➢ Security should be considered a balance
between protection and availability.
➢ To achieve balance, the level of security must
allow reasonable access yet protect against threats.
6
Cont…
Data Responsibilities
Data owner: responsible for the security and
use of a particular set of information.
Data custodian:responsible for storage,
maintenance, and protection of information.
Data users: end users who work with
information to perform their daily jobs
supporting the mission of the organization.
77
Cont…
➢Information security’s primary mission is to
ensure that systems and their contents
remain the same!
➢“Organizations must understand the
environment in which information systems
operate so their information security
programs can address actual and potential
problems.”
8
Sources of IS security risks
➢Vandals (Hackers, crackers)
➢Internal traitors
➢Economic spies
➢Non reliability of software
➢Natural disasters: flooding, fire, storms,
➢ earthquake…
➢War and terrorists actions
➢Cyber attacks
9
IS security threats, types of
Attack and Protection Schemes
➢ Vulnerability: A weaknesses or fault in a system or protection mechanism that
opens Some examples of vulnerabilities package, an system port, it to attack are
a flaw and door. Some unprotected well-known vulnerability have or damage. in a
software an unlocked been examined, documented, and published; others remain
latent (or undiscovered)
➢ A vulnerability is a point where a system is susceptible to attack.
10
Key Actions to identifyVulnerabilities
➢ Understand common attacks. Attacks on and within your network
come in many different varieties. Many times the attackers do not even
know who they are attacking, but there are instances of networks or
organizations that are specifically targeted. Learning the different
methods used to compromise computers and networks will give you
the necessary perspective to proceed.
➢ Inventory your vulnerabilities. Establish a full list of potential
vulnerabilities. Take special care to identify anything unknown about
your network.
➢ Use vulnerability scanning tools. Many tools exist to check the
existing security state of your network. These tools check for open
ports, unpatched software and other weaknesses. Some of these
programs focus on a specific machine, while others can scan your
entire network.
11
IS security Threats
Threat
➢ A threat is a potential cause of an incident that may result in harm to a
system or organization.
➢ It is something that may happen that may cause some
unwanted consequence.
12
Cont…
✓ Attack: an intentional or unintentional act that fan cause damage to or otherwise
compromise information and /or the system that support it.
✓ Exposure: A condition or state of being exposed. In information security, exposure
exists when a vulnerability known to an attacker is present.
✓ Risk: The probability that something unwanted will happen. Organizations must minimize
risk to match their risk appetite the quantity and nature of risk the organization is willing
to accept.
✓ Threat: A category of objects, persons, or other entities that presents a danger to an asset.
Threats are always present and can be purposeful or undirected. For example, hackers
purposefully threaten unprotected information systems, while severer storms incidentally
threaten buildings and their contents.
✓ A threat is a possible danger to the system: e.g. a person, a thing (a faulty piece
of equipment), or an event (a fire or a flood).
13
Cont…
Security Consequences of Risks
➢ Failure/End of service
➢ Reduction of QoS, down to Denial of Service
(DoS)
➢ Internal problems in the enterprise
➢ Trust decrease from partners (client, providers,
share-holders)
➢ Technology leakage
➢ Human consequences (personal data, sensitive
data - medical, insurances, …)
14
Cont…
▪ In general Security is about
• Threats(bad things that may happen, e.g.
your
money getting stolen)
• Vulnerabilities (weaknesses in your defenses, e.g.
your front door being made of thin wood and
glass)
• Attacks (ways in which the threats may be
actualized,
• e.g. a thief breaking through your weak front
door while you and the neighbors are on
holiday)
15
IS security threats in Domain of typical
IT infrastructure
16
Cont…
Common Threats in the User Domain
➢ Lack of user awareness
➢ User apathy toward policies
➢ User violating security policy
➢ User inserting CD/DVD/USB with personal files
➢ User downloading photos, music, or videos
➢ User destructing systems, applications, and data
➢ Disgruntled employee attacking organization or committing
sabotage
➢ Employee blackmail or extortion
17
Cont…
Common Threats in the Workstation Domain
➢ Unauthorized workstation access
➢ Unauthorized access to systems, applications, and
data
➢ Desktop or laptop operating system vulnerabilities
➢ Desktop or laptopapplication software
vulnerabilities or patches
➢ Viruses, malicious code, and other malware
➢ User inserting CD/DVD/USB with personal files
➢ User downloading photos, music, or videos
18
Cont…
Common Threats in the LAN Domain
19
Cont…
Common Threatsin the LAN-to-WAN
Domain
➢Unauthorized searching and port scanning
➢Unauthorized access
➢Internet Protocol (IP) router, firewall, and
network appliance operating system
vulnerability
➢Local users downloading unknown file
types from unknown sources
20
Cont…
Common Threats in the WANDomain
➢ Open, public, and accessible data
➢ Most of the traffic being sent as clear text
➢ Vulnerable to eavesdropping
➢ Vulnerable to malicious attacks
➢ Vulnerable to Denial of Service(DoS) and Distributed
Denial of Service (DDoS) attacks
➢ Vulnerable to corruption of information and data
➢ Insecure Transmission Control Protocol/Internet
Protocol (TCP/IP) applications
➢ Hackers and attackers e-mailing Trojans, worms,
and malicious software freely and constantly
21
Cont…
Common Threats in the Remote Access
Domain Internet
➢ Brute force user ID and password attacks
➢ Multiple logon repeats and access control attacks
➢ Unauthorized remote access to IT systems,
applications, and data
➢ Confidential data compromised remotely
➢ Data leakage in violation of data
classification standards
22
Cont…
Common Threats in the Systems/Applications
Domain Cloud Computing
➢ Unauthorized access to data centers, computer rooms, and
wiring closets
➢ Difficult-to-manage servers that require high availability
➢ Server operating systems software vulnerability
Management
➢ Security required by cloud computing virtual
environments
➢ Corrupt or lost data
23
Cont…
24
Cont…
25
Cont…
Deliberate SoftwareAttacks
➢ Deliberate software attacks occur when an
individual or group designs and deploys software
to attack a system.
➢ Referred to malicious code, malicious software or
malware
➢ Designed to damage, destroy, or deny service
to the target systems.
➢ The more common instances of malicious code are
viruses and worms, Trojanhorses, logic
bombs, and back doors
26
Cont…
Deliberate SoftwareAttacks Virus
➢ Segments of code
➢ Attaches itself to existing program
➢ Takes control of program access
➢ Replication
Worms
➢ Malicious program
➢ Replicates constantly
➢ Doesn’t require another program
➢ Can be initiated with or without the user download
27
Cont…
Deliberate SoftwareAttacks
Other Malware
➢ Trojan Horse
▪ Hide their true nature
▪ Reveal the designed behavior only when activated
➢ Back door or trap door
▪ A virus or worm that installs a back door or trap door
component in a system, which allows the attacker to
access the system at will with special privileges
28
Cont…
Forces of Nature
➢ Pose some of most dangerous threats
➢ Unexpected and occur with little or no warning
▪ Fire
▪ Electrostatic discharge
▪ Dust contamination
▪ Flood
▪ Earthquake
▪ Lightning
▪ Landslide
▪ Mudslide
29
Cont…
Acts of Human Error or Failure
➢ Acts performed without intent or malicious
purpose by authorized user
➢ Greatest threat to organization information security
✓ Organization’s own employees
✓ Closest to the data
✓ Mistakes
▪ Revelation of classified data
▪ Entry of erroneous data
▪ Accidental deletion or modification of data
▪ Storage of data in unprotected areas
▪ Failure to protect information
30
Cont…
Acts of Human Error or Failure Prevention
➢Training
➢Ongoing awareness activities
➢Controls
▪ Require user to type a critical command twice
▪ Verification of commands
31
Acts of Human Error….
➢ Includes acts performed intent without malicious
➢ Causes include:
▪ Inexperience
▪ Improper training
▪ Incorrect assumptions
➢ Employees are amongthe greatest threats to an
organization’s data
32
Acts of Human Error…
➢Employee mistakes can easily lead to:
▪ Revelation of classified data
▪ Entry of erroneous data
▪ Accidental data deletion or
modification
▪ Data storage in unprotected areas
▪ Failure to protect information
➢Many of these threats can be prevented with
controls
33
Acts of Human Error
34
Cont…
➢ Missing, Inadequate or Incomplete Planning/policy
and Controls
➢ Missing, inadequate, or incomplete organizational policy
or planning makes an organization vulnerable to loss,
damage, or disclosure of information assets when other
threats lead to attacks.
➢ Similarly, missing, inadequate, or incomplete controls that
is, security safeguards and information asset protection
controls that are missing, misconfigured, antiquated, or
poorly designed or managed make an organization more
likely to suffer losses when other threats lead to attacks.
35
Cont…
Sabotage orVandalism
➢ Deliberate sabotage of a computer system orbusiness
➢ Acts to destroy anasset
➢ Damage to an image of an organization
➢ Hackterist or cyberactivist
➢ Interfere with or disrupt systems in protest tothe operations, policies, or
actions of anorganization
➢ Cyber terrorism
➢ Cyber terrorists hack systems to conduct terrorist activities via
network or Internet pathways.
➢ Theft
36
Deliberate Acts of Espionage
or Trespass
➢Access of protected information by
unauthorized individuals
➢Competitive intelligence (legal) vs. industrial
espionage (illegal)
➢Shoulder surfing occurs anywhere a person
accesses confidential information
➢Controls let trespassers know they are
encroaching on organization’s cyberspace
➢Hackers uses skill, guile, or fraud to bypass
controls protecting others’ information
37
Shoulder surfing
38
Deliberate Acts of Theft
➢Illegal taking of another’s physical,
electronic, or intellectual property.
➢Physical theft is controlled relatively
easily.
➢ Electronic theft is more complex
problem; evidence of crime not
readily apparent.
39
Hackers: Hackers are individuals who gain illegal
entry into a computer system, often without
malicious intent but simply to see if they can do it.
It is a term used by some to mean “clever
programmer” and by others, especially those in
popular media, to mean “someone who tries to
break into computer systems. Hackers are
computer experts who spend enormous amount of
time trying to breach the security of networks, web
servers and email servers. Usually they use a
selection of specialist software to identify
weakness, which are then exploited.
40
Cont.…
➢Threats fall into three main categories:
❖ natural threats
❖ unintentional threats
❖ intentional threats
The intentional threats can come from
insiders or outsiders.
Outsiders can include:
▪ foreign intelligence agents
▪ terrorists criminals corporate raiders
▪ crackers
41
Inside or Outside?
• Although most security mechanisms protect
best against outside intruders, survey after
survey indicates that most attacks are by
insiders. Estimates are that as many as 80%
of system penetrations are by fully
authorized users.
42
The Insider
• There are a number of different types of insiders:
disgruntled employee, the coerced employee, and
the greedy employee. One of the most dangerous
types of insiders may simply be lazy or untrained.
He or she doesn’t bother changing passwords,
doesn’t learn how to encrypt files, doesn’t get
around to erasing old disks, and leaves sensitive
printout in piles on the floor.
43
Security Threats
MalwareAttack:
A generic term for that has
malicious purpose software
Examples
Viruses Trojan
horses Spy-
wares
New ones: Spam/scam , identity theft, e-
payment frauds, web phishing….. etc.
44
Types of Threats/Attacks …
(Chuck Easttom)
➢ Hacking Attack:
▪ Any attempt to gain unauthorized access to
your system
➢ Denial of Service (DoS) Attack
▪ Blocking access from legitimate users
➢ Physical Attack:
▪ Stealing, breakingor damaging of
computing devices
45
Malicious Software
46
Malware Attack
Worms
▪ An independent program that
reproduces by copying itself from one
computer to another
▪ It can do as much harm as a virus
▪ It often creates denial of service
▪ Harm the network by consuming the
bandwidth
47
Malware Attacks…
Trojan horses
▪ (Ancient Greek tale of the city of Troy
and the wooden horse) - ??
▪ Secretly downloading a virus or some other typeof
mal-ware on to your computers.
▪ Popularmechanism for disguising a virus or
a worm
48
Cont…
• Trojan Horses: A destructive program that masquerades as a benign
application. Unlike viruses, Trojan horses do not replicate themselves
but they can be just as destructive. It is generally a non- self-
replicating type of malware program containing malicious code
49
Cont…
Viruses: A Computer Virus is a small program designed to cause some
kind of damage in the infected computer, by deleting data,
capturing information, or by altering the normal operation of the
machine. It is a self-replicating program that spreads by inserting
copies of itself into other executable code or documents. It could steal
or delete information, make the computer slower, or simply mess with
the Operating System. In present days the most common are viruses
which steal information from Internet Banking, so the attacker can
transfer your money to his account, pay bills or buy something on the
Internet
50
Backdoors
➢ Backdoor is a program or a set of related programs that a hacker
➢ The key is that the hacker knows how to get into the backdoor
undetected and is able to use it to hack the system further and look for
important information.
51
Malware Attack…
➢Spy-wares
▪ “A software that literally spies on what you do onyour
computer.”
▪ Example: Simple Cookies and Key Loggers
➢ Logic Bomb
one of oldest types of malicious software
code embedded in legitimate program (Trojan horse)
activated when specified conditions met
eg presence/absence of some file particular date/time
particular user
particular series of keystrokes
when triggered typically damage system
modify/delete files/disks
52
Malware Attack…
Zombie
▪ Program which secretly takes over another networked
computer
▪ then uses it to indirectly launch attacks
53
Social Engineering
➢ Social Engineering is a kind of attacks that uses the
weakest link. (one of the security principles – secure
the weakest link)
➢ It takes advantage of our human characteristics to
exploit us, tricking us to break normal security
procedures
➢ Social Engineering succeeds because people are
people- want to, be advantageous/get something
the shortest way.(egoistic)
54
Social Engineering
➢ Social-engineering schemes use 'spoofed‘ e-mails to lead
consumers to counterfeit websites designed to trick recipients into
divulging financial data such as credit card numbers, account
usernames, passwords and social security numbers by Hijacking
brand names of banks, e-retailers and credit card companies.
➢ Phishing is an attempt to criminally and fraudulently acquire
sensitive information, such as usernames, passwords and credit
card details, by masquerading as a trustworthy entity in an
electronic communication. eBay, PayPal and online banks are
common targets.
➢ Phishers often convince recipients to respond.
➢ Pharming is crimeware misdirects users to fraudulent sites
or proxy servers (bogus website), typically through DNS
hijacking or poisoning.
55
Cont…
Eavesdropping: Alternatively referred to
as ear wigging, is a used to describe the
process of listening, term or examining
someone without their monitoring, or
knowledge. For example, a user could
eavesdrop on someone’s e-mail or chat
conversation. Eavesdropping is secretly
listening to the private conversation of others
without their consent.
56
Cont…
• It is the unauthorized real-time interception of a private
communication, such as a phone call, instant message,
video conference or fax transmission. The term eavesdrop
derives from the practice of actually standing under the
eaves of a house, listening to conversations inside. This is
commonly thought to be unethical and there is an old
saying that "eavesdroppers seldom hear anything good of
themselves...eavesdroppers always try to listen to matters
that concern them.
57
Cont…
Sniffing: is the use of a network interface to receive
data not intended for the machine in which the
interface resides. A variety of types of machines
need to have this capability. A token-ring bridge, for
example, typically has two network interfaces that
normally receive all packets traveling on the media
on one interface and retransmit some, but not all, of
these packets on the other interface.
58
Cont…
➢ Another example of a device that incorporates sniffing is
one typically marketed as a “network analyzer.” A network
analyzer helps network administrators diagnose a variety of
obscure problems that may not be visible on any one
particular host. These problems can involve unusual
interactions between more than just one or two machines
and sometimes involve a variety of protocols interacting in
strange ways.
➢ Sniffing programs could be used to gather passwords, read
inter-machine e-mail, and examine client-server database
records in transit.
59
Wiretaps: refers to listening in on electronic communications on
telephones, computers, and other devices. Many governments us it as a
law enforcement tool, and it is also used in fields like corporate
intelligence to gain access to privileged information. Depending on
where in the world one is, wiretapping may be tightly controlled with
laws that are designed to protect privacy rights, or it may be a widely
accepted practice with little or no protections for citizens. Several
advocacy organizations have been established to help illegal wiretapping.
There are a number of ways to carry out a wiretapping operation,
ranging from concealing electronic devices in a phone to tapping into a
telecommunications line somewhere along its travel from the device to
a routing or exchange center. In many countries, governments have
agreements with telecommunications companies which ensure easy
access to lines of communication for this purpose. It is used to monitor
websites that presumably contain dangerous or sensitive materials, and
the people that access them
60
Control
Control: A means to prevent vulnerability from being exploited.
Security controls
➢ Once threat vectors are considered, organizations rely on various controls to accomplish in-depth
defense as part of their security architecture. A security control is any mechanism that you put in
place to reduce the risk of compromise of any of the three CIA objectives: confidentiality, integrity,
and availability.
➢ There are several ways to classify these security controls; one of them is based on the nature of the
control itself. These controls fall into one of three categories:
Administrative Controls
➢ Administrative controls are largely policy and procedure driven. You will find many of the
administrative controls that help with an enterprise’s information security in the human resources
department. Some of these controls are as follows:
➢ Security-awareness training
✓ Firewalls
✓ Smart cards
✓ Routers
62
Cont…
Physical Controls
While trying to secure an environment with good technical and administrative controls, it is
also necessary that you lock the doors in the data center. This is an example of a physical
control. Other examples of physical controls include the following:
➢ Security guards
➢ Locks
➢ Fire-suppression systems
63
A Model for Internetwork Security
While computer systems today have some of the best security systems ever, they are more vulnerable
than ever before.
Computer and network security comes in many forms, including encryption algorithms, accessto
facilities, digital signatures, and using fingerprints and face scans as passwords.
The OSI security architecture provides a systematic frame work for defining security attacks,
mechanisms and services.
The OSI security architecture focuses on security attacks, mechanisms and services.
Security attack:-Any action that compromises the security of information owned by an
organization.
Security mechanism:- A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a securityattack.
Security service:-A processing or communication service that enhances the security of the data
processing systems and the information transfers of an organization. The services are intended to
counter security attacks, and they make use of one or more security mechanisms to provide the
service.
64
Security attacks, Mechanisms and Services
• Categories of Attacks/Threats
Source
Destination
Normal flow of information Attack
Interruption Interception
Modification Fabrication75
66
Cont…
Interruption
Interception
Fabrication
➢ Fabrication: An attack on
authenticity
71
Security attack types
• The attacks can also be classified by the following
criteria.
− Passive or active,
− Internal or external,
− At different protocol layers.
Passive vs. active attacks
• A passive attack attempt to learn or make use of the
information without changing the content of the message
and disrupting the operation of the communication.
• Examples of passive attacks are:
-- Eavesdropping , traffic analysis, and traffic monitoring.
72
Attack Types
73
Passive AttackTypes
➢ Passive attacks do not affect system
resources
▪ Eavesdropping, monitoring
▪ The goal of the opponent is to obtain
information thatis being transmitted
➢ Two types of passive attacks
➢ Release of message contents
➢ Traffic analysis
➢ Passive attacks are very difficult to detect
▪ Message transmission apparently normal
▪ No alteration of the data
▪ Emphasis on prevention rather than detection
▪ By means of encryption
74
Passive AttackTypes
75
Cont.…
Release of Message Contents
76
Cont…
Traffic Analysis
77
Cont…
•Active attack attempts to interrupt, modify, delete, or fabricate
messages or information thereby disrupting normal operation of
the network.
• Someexamples of active attacksinclude:
78
Contd.
2. Active attacks:- are types of attacks which
attempt to alter system resources or affect their
operation
▪ Are easier to detect since the information stream is altered
and involves the other party.
80
Cont…
A. Masquerading:- The entity pretends to be a differententity.
81
Cont…
Masquerade
82
Cont…
Replay
83
Cont…
Modification of Messages
84
Cont…
Denial of Service
85
Security attack types…
Internal vs. External attacks
• External attacks are carried out by hosts that don’t
belong to the network domain, sometimes they are
called outsider.
– E.g.itcan causes congestion by sendingfalse routing
information thereby causes unavailability of services.
• In case of internal attack, the malicious node from the
network gains unauthorized access and acts as a genuine
node and disrupts the normal operation of nodes.
• They are also known as insider.
86
Security attack types…
• Attacks on different layers of the TCP/IP model:
• The security attacks can also be classified as according to the
TCP/IP layers. Table shows the attack types at each layer.
Layer Attacks
Application layer E-mail bombing, Repudiation, data
corruption, malicious code attack (Trojan,
maleware,virus,...)
middle attack
87
Security attack types…
Denial of Service attack
• This attack aims to attack the availability of message, device or
the entire network service at large.
• The attackermay use radio signal jamming and the
battery
exhaustion method (e.g, in wireless networks)
Impersonation
• If the authentication mechanism is not properly implemented, a
malicious node can act as a genuine node and monitor the
network traffic.
88
Security Services
▪ A security service is the collection of mechanisms, procedures and
89
Security Services Types
A. Confidentiality (privacy):- is the protection of
transmitted data from passive attacks.
❖ The other aspect of confidentiality is the protection of traffic flow
from analysis.
❖ The attacker will not be able to observe the source and
destination, frequency, length or other characteristics of
the traffic on a communications facility.
A. Integrity(has not been altered):-
ensures that the messages are received with
no duplication, insertion, modification,
reordering or replays.
90
Cont…
91
Cont…
92
Security Mechanisms
1. Encipherment:- is the use of mathematical algorithms to transform
was created by a known sender, and that it was not altered intransit.
93
Cont…
4. Data Integrity:- a variety of mechanisms used to assure the integrity of
data unit or stream of data units.
94
Confidentiality
99
Audit
100
Service vs. Layer Mapping
Service /Layer 1 2 3 4 6 7
Confidentiality, Connectionless Y Y Y Y
Confidentiality, Connection Y Y Y Y Y
Confidentiality, Selected Field Y Y
Confidentiality, Traffic Flow Y Y
Authentication, Data Origin ? Y Y Y
Authentication, Peer Entity Y Y Y
Integrity, Message Y Y Y
Integrity, MessageStream Y Y
Access Control ? Y Y Y
Non-Repudiation, Origin Non- ? Y Y Y
Repudiation,Receipt Y
102
Design Issues in the Model
4. Specify a protocol to be used by the two principles that makes use of the
security algorithm and the secret information to achieve a particular security
service.
103
Other Considerations
2. Host hardening
− Firewalls, Packet filtering
104
Network Penetration Attacks and Firewalls
1.
4.Alarm Intrusion Suspicious
Detection Packet
Network2. Suspicious System
Internet
Administrator Packet passed
Attacker
3. Log
Packet
Hardened
Server Log File Corporate Network
106
106
Encryption for Confidentiality
Client PC Server
Bob Alice
“100100110001”
I’m Bob
Prove it!
Client PCAttacker (Authenticate Yourself)Server
Bob (Eve)
Alice
108
Secure Dialog System
Secure Dialog
Client PC
Bob Automatically Handles Server
Negation of Security Options Alice
Authentication
Encryption
Integrity Attacker cannot read
messages, alter
messages, or
impersonate 109
Hardening Host Computers
1. The Problem
▪ Computers installed out of the box have known vulnerabilities
• Not just Windows computers
▪ Hackers can take them over easily
▪ They must be hardened—a complex process that involves many actions
2. Elements of Hardening
▪ Physical security
▪ Secure installation and configuration
▪ Fix known vulnerabilities
▪ Turn off unnecessary services (applications)
▪ Harden all remaining applications
▪ Manage users and groups
▪ Manage access permissions
• For individual files and directories, assign access permissions specific users and
groups
▪ Back up the server regularly
▪ Advanced protections
110