cosc 4765 security?. this system is secure. this will make your network secure we have secure...

27
Cosc 4765 Security?

Upload: jessie-may

Post on 29-Dec-2015

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Cosc 4765

Security?

Page 2: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

This system is secure.

• This will make your network secure

• We have secure e-commerce.

• What does that mean?

• Secure from what or whom?

• Secure from an employee theft?

• Secure from Social Engineering?

• Secure from a small explosion in the hallway?

Page 3: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Security?

• Involves people:– Things people know, relations between people

and how they relate to computers

• Digital Security – involves computers

• complex, unstable, and buggy

Page 4: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

People and computers

• Computers are mathematical in nature.– Math is perfect, reality is subjective– Math is defined and computers are ornery– Math is logical, while people are erratic,

capricious, and barely comprehensible.1

• Security is fundamentally a people problem!

Page 5: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Why aren't computers secure?• And why aren't applications secure?• Computer companies are businesses.

– They do a risk assessment and figure what is the most cost effective way to get their product to market.

– Software manufacturers are not hold held accountable for their products

• Microsoft has not been found at fault once for a breach into a computer running a windows product. Some bad press, but little else.

• Instead, their stock goes up with a new release of their O/S.

– But a bank using that software, could go under because of security breach.

Page 6: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Security and people

• Increased security annoys users!

• Think about the security that has been implemented on campus.– How often have you complained about it?– Complained about the things you can't do

anymore?

Page 7: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Security and economics

• If CEO of Microsoft walked into the boardroom and said the next version of Windows will be secure, but cut the companies earning by one third.– The board will fire him.

• On the other hand, bad press goes away– Have several press conferences saying "security

is our top priority".

Page 8: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Security and economics• Example: Firewalls

– There are everywhere. Over last 10 years more companies and people are using firewalls

– Many are so badly configured that they are barely effective

» May actually cause more problems

– Everyone is on the firewall bandwagon.– Why?

• All the best practices guide say to use one.

• Economically they work, because of lawsuits.– Because they are following the guides, so they are making a best

attempt at security, even if they are broken into.

Page 9: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Vulnerabilities

• Hardware and physical– In the computer itself secure?

• Software– Bugs, modifications, viruses, trojan horses, logic

bombs, back doors, information leaks, etc.• Data

– Leaks and badly formed (accidentally or intentional)• Network

– Physical, hardware, software, data, etc.• People

Page 10: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

The nature of attacks

• The nature of attacks haven't really changed much (digital and real world):– embezzlement, theft, robbery, invasion of

privacy, and identity theft.– racketeering, vandalism, voyeurism,

exploitation, extortion, con games, and fraud.– stalking, and physical harm

Page 11: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Computer attacks

• The real difference from real world attacks and computer attacks is these three:

1. more widespread and common• automation is the key.

2. harder to track, capture, and convict the attackers• because they may not even be in the country, let alone in

town where the "attack" happened.

3. More devastating.• with automation you can do more in a shorter time.

Page 12: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Computer attacks (2)

• Technique Propagation– Physical techniques are harder to master and

the people must be able learn how to do it.

– computer attacks can be done by people with little knowledge or expertise

• publish a script and 1,000s will attempt.– script kiddies. Common for people to make simple

modifications to viruses as well.

Page 13: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

The nature of Adversaries• Who are these people?

– Hackers, criminals, businesses, governments?– Basically they are the same as in the real world

• Criminals looking for easy money

• thieves and robbers

• industrial spies stealing secrets

• intelligence agencies looking for “intelligence”

• hackers looking for the “secret knowledge”

• People wanting to make a “social statement”

Page 14: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

The nature of Adversaries (2)

• Sometimes easier to think of them by what do/want:– Raw damage– Malicious insiders– Financial gain– Information– publicly.

Page 15: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Different types of attackers

• Amateurs and Insiders:– Usually people who never had intent to attack a system, but

observe a weakness and take advantage of it– Often they are insiders who may become disgruntled or greedy

and abuse their power, other times it is much more innocuous– Examples:

• A user notices opening disk and cpu accounting policies, so they use the computer system at work for their own purposes.

• A programmer inserts a backdoor so that they may access the system later without being noticed

– Not all insiders are necessarily amateurs. Sometimes (rarely) they are hired as spies or by organized crime to infiltrate organizations.

Page 16: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Different types of attackers (2)

• The Script Kiddie– Usually teenaged kids, not very smart. Sometimes they can be

University or even Graduate Students!– Get packaged up “scripts” of exploits from various sources– IRC Channels, Web Pages, Friends– Often make many mistakes

• Typing/spelling errors• Typing “dir” at a UNIX prompt• May unintentionally ruin a machine after getting in

– Usually have a bag of (old) exploits– Will persistently scan for vulnerable machines– Not a problem as long as you are patched and ready

Page 17: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Different types of attackers (3)

• The Professional Hacker/Black Hat– Usually someone with in-depth knowledge– Can create new exploits (zero day exploits)– May have various motives

• Hack for fun, Money, Fame, Politically motivated

– Will often distribute exploits to Kiddies after they’ve been discovered

• Their tracks will get lost in the noise

Page 18: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Security Needs• Generally, what kinds of security are

necessary:– multilevel security

• Not all data is created equal.

– authentication• Who are you? origin of data?

– integrity• is it real? has it been tampered with?

– Audit• logs, verification, and such

Page 19: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Security Needs (2)

– privacy• Hotly debated!

• Government argues against this one regularly.

– anonymity• personal, medical, commercial

Page 20: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

5 Security Design questions

1. In a given application should the protection mechanisms in a computer focus on data, operations, or users?

2. In which layer of the computer system should a security mechanism be placed?

3. Do you prefer simplicity and higher assurance – to a feature rich security environment?

Page 21: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

5 Security Design questions (2)

4. Should the tasks of defining and enforcing security be given over to a central entity or left to individual components?

5. How can you prevent an attacker from getting access to a layer below the protection mechanism?

Page 22: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

A Good Security System

• A mixture of the following:– Prevention– Detection– Response

Page 23: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Back to the Question:What is Computer Security?

• Security can be defined by these three terms:– Confidentiality

• Only those who are authorized to access the system and/or data

– Integrity• The system is functioning the way we except it to• The data is accurate and what is excepted.

– Availability• It is usable, responds in a timely matter, and meets the

service’s needs.

• Where these three intersection is one definition of computer security.

Page 24: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

Cryptography

• Many argue this is the answer to our "security problems", prevention at the very least.

• Many other argue around this type of statement:– Cryptography is rarely ever the solution to a security

problem. Cryptography is a translation mechanism, usually converting a communications security problem into a key management problem and ultimately into a computer security problem. Hopefully, the resulting problem is easier to solve than the original problem. In summary, cryptography can enhance computer security; it is not a substitute for computer security.2

Page 25: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

A little history

• In the early 90s, most said there was little need for cryptography in computer security.– It was all about the Trust Computer Base (TCB)– Monitors, discretionary and mandatory access

control, and formal verification of security models and systems

• Now, in many ways it is the other extreme.– Why has it changed?

Page 26: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

References

• Computer Security, Dieter Gollmann, Wiley, 2003• Secrets & lies Digital Security in a Networked

World, Bruce Schneier, Wiley, 2004• Practical Cryptography, Ferguson & Schneier,

Wiley, 2003• Security in Computing, Pfleeger & Pfleeger,

Prentice Hall, 2003

Page 27: Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?

QA&