Security Goals and Mechanisms
Security Goals and Mechanisms
Security Goals and Mechanisms
FAST-NUCES
What is This Class About ?
Make a Difference
FAST-NUCES
How Can You Make a Difference?
FAST-NUCES
Computer Security Today
FAST-NUCES
Why Computer Security ?
FAST-NUCES
The Sony Breach
FAST-NUCES
Top Data Breaches
FAST-NUCES
Further Example
Stuxnet Worm
Computer worm detected in January 2010
Initially spread via MS Windows and
targets Siemens industrial software and
equipment (SCADA)
Spies on and disrupts industrial systems
Possible sabotage against uranium
enrichment infrastructure in Iran
Rustock Botnet
Network of 1.7 million infected systems (zombies)
Capability of sending 22 million spam messages per day
Active from around 2007 to March 2011
Taken down by Microsoft, U.S. Fed Agents and University of Washington
On July 18, 2011, Microsoft put a bounty of US$ 250 K on the individual
behind Rustock botnet.
FAST-NUCES
… more trouble ahead
FAST-NUCES
Who is who ?
FAST-NUCES
Security is fun too!
FAST-NUCES
Security Goals and Mechanisms
FAST-NUCES
A Formal View
FAST-NUCES
Security Goals
FAST-NUCES
Confidentiality
Confidentiality
Protection of resources from unauthorized disclosure
Check: Who is authorized to access which resources?
Security measures
Encryption of data, resource hiding
Examples
An attacker eavesdrop a telephone conversation
An attacker reads the emails on your computer
FAST-NUCES
Integrity
Integrity
Protection of resources from unauthorized
manipulation
Check: Who has does what on which resources?
Security measures
Authorization, checksums, digital fingerprints
Examples
An attacker changes the receipt of a bank transaction
An attacker tampers with files on your computer
FAST-NUCES
Availability
Availability
Protection of resources from unauthorized disruption
Check: When and how are which resources used?
Security Measures
Restriction, redundancy, load balancing
Examples
An attacker crashes the web server of a company
An attacker formats the hard disk of your computer
FAST-NUCES
Threats & Attacks
FAST-NUCES
Examples of Attacks
FAST-NUCES
Security Mechanisms
FAST-NUCES
Prevention
Prevention of attacks
Prevention of attacks prior to violation of security goals
Examples
Data reduction and separation
Removal or separation of information and resources
Authentication and encryption
Restriction of access to information and resources
Limitations
Inapplicable in many settings, e.g. open services
FAST-NUCES
Detection
Detection of attacks
Detection of attacks during violation of security goals
Examples
Anti-virus scanners
Detection of malicious code on computers
Network intrusion detection
Detection of attacks in computer networks
Limitations
Ineffective against unknown and “invisible” attacks
FAST-NUCES
Recovery
Recovery
Recovery from attacks after violation of security goals
Examples
Computer forensics
Investigation and analysis of security incidents
Malware analysis
Observation and analysis of malicious software
Limitations
Severe damage might have already occurred
FAST-NUCES
Further Concepts
FAST-NUCES
History of Attacks
FAST-NUCES
Brain: Where it all started …..
Brain released in January 1986, is considered to be the
first computer virus for MS-DOS.
Infects the boot sector of storage media formatted with
the DOS File Allocation Table (FAT) file system.
Written by two brothers, Basit Farooq Alvi and Amjad
Farooq Alvi from lahore.
FAST-NUCES
Morris
The Morris worm (November
2, 1988) was one of the
first computer
worms distributed via
the Internet.
It was written by a student at
Cornell University, Robert
Tappan Morris.
The small program disables
roughly 6,000 computers (10%
of the internet) by flooding
their memory banks with
copies of itself.
He is fined $10,000 and
sentenced to three years'
probation.
FAST-NUCES
Melissa
Melissa virus, created by David L Smith, was reported
in 1999
Exploited MS-Word, Outlook
The virus was attached along with emails which had a
message: “Here is that document you asked for, don’t
show it to anybody else”
On activation, it sends the same to the top 50 people in
the contacts list
Caused a heavy damage due to heavy traffic and it lead
to the shutting down of email gateways of companies
like Intel Corp., Alcatel Lucent, Microsoft .etc
FAST-NUCES
ILoveLetter worm
The "I Love You" virus (5 may 2000) infects millions of
Windows PC overnight
Started spreading as an email message with the subject line
"ILOVEYOU" and the attachment "LOVE-LETTER-FOR-
YOU.txt.vbs“
Opening the attachment activated the Visual Basic script
The worm did damage on the local machine, overwriting image
files, and sent a copy of itself to the first 50 addresses in
the Windows Address Book used by Microsoft Outlook.
Also sends passwords and usernames stored on infected
computers back to the virus's author.
Authorities trace the virus to a young Filipino computer student,
but he goes free because the Philippines has no laws against
hacking and spreading computer viruses.
FAST-NUCES
CodeRed
FAST-NUCES
Nimda
FAST-NUCES
SQL Slammer aka Sapphire worm
FAST-NUCES
SQL Slammer
FAST-NUCES
Current Trends
FAST-NUCES
Historical hackers (prior to 2000)
Profile:
Male
Between 14 and 34 years of age
Computer addicted
No social life
FAST-NUCES
Financially Motivated
Shift in late 2000s
Spam
Pharmaceuticals
Fake products
Carding/Fraud
Identify theft, credit fraud
FAST-NUCES
Politically Motivated
Stuxnet
FAST-NUCES
Politically Motivated
FAST-NUCES
Typical Botherder: 0x80" (pronounced X-eighty)
High school dropout
“…most of these people infect are so stupid they really ain't got no business being on
the Internet in the first place.“
Working hours: approx. 2 minutes/day to manage Botnet
Monthly earnings: $6,800 on average
Daily Activities:
Chatting with people while his bots make him money
Recently paid $800 for an hour alone in a VIP room ….
Job Description:
Controls 13,000+ computers in more than 20 countries
Infected Bot PCs download Adware then search for new victim PCs
Adware displays ads and mines data on victim's online browsing habits.
Bots collect password, e-mail address, SS#, credit and banking data
FAST-NUCES
Some things in the news
FAST-NUCES
Texas CISO, Feb 2010
Trends from 2010
Malware, worms, and Trojan horses
spread by email, instant messaging, malicious or infected websites
Botnets and zombies
improving their encryption capabilities, more difficult to detect
Scareware – fake/rogue security software
Attacks on client-side software
browsers, media players, PDF readers, etc.
Ransom attacks
malware encrypts hard drives, or DDOS attack
Social network attacks
Users’ trust in online friends makes these networks a prime target.
Cloud Computing - growing use will make this a prime target for attack.
Web Applications - developed with inadequate security controls
Budget cuts - problem for security personnel and a boon to cyber criminals.
FAST-NUCES
Same list in Oklahoma Monthly Security Tips Newsletter
Monetization of Exploits
FAST-NUCES
Marketplace for Vulnerabilities
Option 1: Bug Bounty Programs
Google vulnerability reward program: 3K $
Mozilla big bounty program: 500 $
Pwn2Own competition: 15K $
Option 2:
ZDI, iDefense purchases: 2K-10K $
Zero Day Initiative | 3Com | TippingPoint, a division of
3Com, http://www.zerodayinitiative.com/
Vulnerability Contributor Program // iDefense Labs,
http://labs.idefense.com/vcp/
FAST-NUCES
Marketplace for Vulnerabilities
Option 3: Black Market
FAST-NUCES
Underground Economy
• Spam service
• Rent-a-bot
• Cash-out
FAST-NUCES
Marketplace for Pay-Per-Install (PPI)
FAST-NUCES
Credit: Zulfikar Ramzan
FAST-NUCES
FAST-NUCES
FAST-NUCES
FAST-NUCES
Recommended reading
FAST-NUCES
Why are there security vulnerabilities?
Lots of buggy software...
Why do programmers write insecure code?
Awareness is the main issue
FAST-NUCES
If you remember only one thing from this course:
FAST-NUCES
Summary
FAST-NUCES
Summary
FAST-NUCES
Acknowledgements
FAST-NUCES