L1 Intro Infosec sp22
L1 Intro Infosec sp22
L1 Intro Infosec sp22
Vijay Atluri
atluri@rutgers.edu
http://sites.rutgers.edu/vijay-atluri
Information Security
Text Book
• William Stallings and Lawrie Brown, Computer
Security: Principles and Practice, 4th edition
2
Information Security
Objectives
3
Information Security
A quick note!
• This course is about security defense, not how to
attack
– Defense is too complex to focus mostly on specific attacks
– Nevertheless, we will learn the modus operandi of a few
• Unless you understand the threats you face, you cannot prepare
for defense
4
Information Security
5
Information Security
6
Information Security
8
Information Security
What is Security?
• “The quality or state of being secure—to be
free from danger”
• A successful organization should have
multiple layers of security in place:
– Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security
9
Information Security
Why do we care?
• 2001 AD - The Wild Wild West!!
• Out-of-the-box Linux PC hooked to Internet, not
announced:
– [30 seconds] First service probes/scans detected
– [1 hour] First compromise attempts detected
– [12 hours] PC fully compromised:
• Administrative access obtained
• Event logging selectively disabled Source –CERT Report
• System software modified to suit intruder
• Attack software installed
• PC actively probing for new hosts to intrude
• Example sites that report incidents
– Computer Emergency Response Team (CERT)
– The Cyber Security Hub
– The New Jersey Cybersecurity and Communications Integration
Cell (NJCCIC)
10
Information Security
11
Information Security
12
Information Security
SERVER CLIENT
Database Database
13
Information Security
Terminals Terminals
Intercept Tap
Crosstalk
Malicious code
Unauthorized access
Failure of protection mechanisms
Database 14
Information Security
Contributing Factors
• Lack of awareness of Internet threats and risks
– Security measures are often not considered until an Enterprise has
been penetrated by malicious users
• Wide-open network policies
– Many Internet sites allow wide-open Internet access
• Vast majority of Internet traffic is unencrypted
– Network traffic can be monitored and captured
• Security is still too often an afterthought
– rather than being an integral part of the design process
• the inherent nature of internet
– targeted towards flexibility, interoperability, connectivity rather than
security
– Lack of security in TCP/IP protocol suite
• Most TCP/IP protocols not built with security in mind
– New generation of protocols address this to a certain extent (Internet
Engineering Task Force (IETF))
15
Information Security
Contributing Factors
• Complexity of security management and administration
• In developing a particular security mechanism or algorithm, one
must always consider potential attacks on those security features
• Procedures used to provide particular services are often
counterintuitive
• Exploitation of software (e.g., protocol implementation) bugs
• Cracker skills keep improving
• easy to commit crime due to
– lack of forensic evidence
– anonymity
– sensitive data repositories are vulnerable targets
– rare regular auditing of computer usage
– non-existing regulatory policies and laws
• Cookies and privacy concerns
• executable contents (Java applets, activeX controls)
• push technology
• CGI scripts
16
Information Security
Contributing Factors
• Security algorithms require that some secret
information (e.g., keys) require creation, distribution,
and protection of that secret information
• Attackers only need to find a single weakness, while
the designer must find and eliminate all weaknesses
• Security requires regular and constant monitoring
• Perceived as no return on investment by many
– Most organizations are reactive than proactive
• Often need to sacrifice efficiency/user-friendliness
17
Information Security
concerned with
unauthorized
Integrity modification of
Confidentiality information
concerned with
unauthorized
disclosure of
information
Availability
concerned with
improper denial of
access to
information
19
Vulnerabilities, Threats
and Attacks
• Categories of vulnerabilities
• Corrupted (loss of integrity)
• Leaky (loss of confidentiality)
• Unavailable or very slow (loss of availability)
• Threats
• Capable of exploiting vulnerabilities
• Represent potential security harm to an asset
Threat
Consequences,
and the
Types of
Threat Actions
That Cause
Each
Consequence
Based on
RFC 4949
Achieving Security
•
Policy
– what?
– specifies the requirements to be implemented
– includes software, hardware, physical, personnel, procedural
– specifies goals but does not specify how to achieve them
•
Mechanism
– how?
– specifies how the policy can be implemented
•
Assurance
– how well?
– ensures how well the mechanism meets the policy requirements
– low assurance mechanisms are easy to implement whereas high
assurance mechanisms are very difficult to implement
• Evaluation
– Process of measuring assurance 26
Computer Security Strategy
Security Policy Security
• Formal statement of rules Implementation
and practices that specify or • Involves four
regulate how a system or complementary courses of
organization provides action:
security services to protect • Prevention
sensitive and critical system
• Detection
resources
• Response
• Recovery
Assurance Evaluation
• Encompassing both system • Process of examining a
design and system computer product or system
implementation, assurance with respect to certain
is an attribute of an criteria
information system that • Involves testing and may
provides grounds for having also involve formal analytic
confidence that the system or mathematical techniques
operates such that the
system’s security policy is
enforced
Fundamental Security
Design Principles
Economy of Fail-safe Complete
Open design
mechanism defaults mediation
Least
astonishment
Attack Surfaces
Consist of the reachable and exploitable vulnerabilities
in a system
Examples:
Vulnerabilities created by
personnel or outsiders, such as
social engineering, human error,
and trusted insiders
Included in this category are
network protocol vulnerabilities,
such as those used for a denial-of- Particular focus is Web server
service attack, disruption of software
communications links, and various
forms of intruder attacks
Information Security
Security Techniques
• 1) Prevention
– Prevent attackers from violating security policy
– Involves implementing mechanisms that users cannot override
and are trusted to be implemented in correct and unalterable
ways.
– E.g., access control
• 2) Detection
– Detect attackers’ violation of security policy
• Goal is to determine that an attack is underway, or has occurred
and report it.
– auditing/intrusion detection
– incident handling
– Sometime detection is the only option, e.g.,
• Accountability in proper use of authorized privileges
• Modification of messages in a network
32
Information Security
• 3) Recovery
– Stop attack, assess and repair damage
– Continue to function correctly even if attack succeeds
– i.e., Resuming correct operation either after an attack or
even while an attack is underway.
• 4) Tolerance
– practicality
33
Information Security
34
Information Security
35
Information Security
Securing Components
• Computer can be subject of an attack and/or
the object of an attack
– When the subject of an attack, computer is used as an
active tool to conduct attack
– When the object of an attack, computer is the entity being
attacked
36
Information Security
Security Trade-offs
• confidentiality
• integrity
• availability
versus
• cost
• functionality
• ease of use
38
Information Security
Risk Assessment
• Threats
– possible attacks
• Vulnerabilities
– weaknesses
• Assets
– information and resources
• Risk
– combination of threats, vulnerabilities and assets
• R=V*P*S
– where R= risk, V= value of an asset, P = probability of occurrence of threat, S =
vulnerability of the asset to the threat (i.e., severity of effect of the threat)
• more sophisticated models can be developed
39
Information Security
Risks
• Electronic systems are susceptible to abuse, misuse and
failure
• direct financial loss resulting from fraud
• theft of valuable confidential information
• loss of business opportunity due to disruption of service
• unauthorized use of resources
• loss of customer confidence
• costs resulting from uncertainties
• false and malicious web sites posing as selling agents
• theft of customer data from selling agents
• privacy and the use of cookies
• customer impersonation
40
Information Security
Operational Issues
• Cost-Benefit Analysis
– Is it cheaper to prevent or recover?
• Risk Analysis
– Should we protect something?
– How much should we protect this thing?
• Laws and Customs
– Are desired security measures illegal?
– Will people do them?
41
Information Security
Human Issues
• Organizational Problems
– Power and responsibility
– Financial benefits
• People problems
– Outsiders and insiders
– Social engineering
42
Information Security
Tying Together
Threats
Policy
Specification
Design
Implementation
Operation
43
Standards
• Standards have been developed to cover management practices and the
overall architecture of security mechanisms and services
• The most important of these organizations are:
o National Institute of Standards and Technology (NIST)
• NIST is a U.S. federal agency that deals with measurement science, standards, and technology
related to U.S. government use and to the promotion of U.S. private sector innovation
o Internet Society (ISOC)
• ISOC is a professional membership society that provides leadership in addressing issues that
confront the future of the Internet, and is the organization home for the groups responsible
for Internet infrastructure standards
• the organization home for the groups responsible for Internet infrastructure standards,
including the Internet Engineering Task Force (IETF) and the Internet Architecture
Board(IAB). These organizations develop Internet standards and related specifications,all of
which are published as Requests for Comments (RFCs).
46
Information Security
47
Information Security
48
Information Security
49
Information Security
50
Information Security
52