The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT
The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT
The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT
19.1
misuse.
19.2
Authentication
User identity most often established through passwords,
19.3
Program Threats
Trojan Horse
Code segment that misuses its environment.
Exploits mechanisms for allowing programs written by users
to be executed by other users.
Trap Door
Specific user identifier or password that circumvents normal
security procedures.
Could be included in a compiler.
Stack and Buffer Overflow
Exploits a bug in a program (overflow either the stack or
memory buffers.)
19.4
System Threats
Worms use spawn mechanism; standalone program
Internet worm
Exploited UNIX networking features (remote access) and bugs in
finger and sendmail programs.
Grappling hook program uploaded main worm program.
Viruses fragment of code embedded in a legitimate program.
Mainly effect microcomputer systems.
Downloading viral programs from public bulletin boards or
Denial of Service
Overload the targeted computer preventing it from doing any sueful
work.
19.5
19.6
Threat Monitoring
Check for suspicious patterns of activity i.e., several
19.7
19.8
FireWall
A firewall is placed between trusted and untrusted hosts.
The firewall limits network access between these two
security domains.
19.9
19.10
Intrusion Detection
Detect attempts to intrude into computer systems.
Detection methods:
Auditing and logging.
Tripwire (UNIX software that checks if certain files and
directories have been altered I.e. password files)
System call monitoring
19.11
19.12
Encryption
Encrypt clear text into cipher text.
Properties of good encryption technique:
Relatively simple for authorized users to incrypt and decrypt
data.
Encryption scheme depends not on the secrecy of the
algorithm but on a parameter of the algorithm called the
encryption key.
Extremely difficult for an intruder to determine the encryption
key.
Data Encryption Standard substitutes characters and
19.13
Encryption (Cont.)
Public-key encryption based on each user having two
keys:
decrypt data.
prime.
No efficient algorithm is know for finding the prime factors of
a number.
19.14
key cryptography.
19.15
19.16
Windows NT Example
Configurable security allows policies ranging from D to C2.
Security is based on user accounts where each user has a
security ID.
19.17