12.07.2015 Views

Information and Security

Information and Security

Information and Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Information</strong> <strong>and</strong><strong>Security</strong>"No one can build hissecurity upon the noblenessof another person."- Willa CatherTopicsPort ScanningRisk ManagementWireless <strong>Security</strong>In the News - 6/20/2006America's universities admit that, in the first half of2006, they let a million Social <strong>Security</strong> numbersslip through their fingers.Accountants, banks <strong>and</strong> brokerages have proventhemselves to be half as competent at protectingyour critical data, conceding to more than 1.9million lost SSNs. And the health care industryfares even worse: 2.4 million.But the King of Data Giveaways, with over 40million Social <strong>Security</strong> numbers stolen in just sixmonths, is ...Your GovernmentLocal, state<strong>and</strong> federal.Ignore, for amoment, theinfamoustheft of 28.5millionrecords from a VA employee's laptop. You're stillleft with over 11 million stolen identities.How they got Lost...91% percent of the data was lifted via physicaltheft, where crooks stole tapes, printed records, orcomputer gear... especially laptops. In fact, over30.5 million records skipped out via laptop. That's73% of the records lost through physical means.Another 1.8 million records were exposed throughwhat can best be described as Official Stupidity.Lists of personal records were inadvertentlybroadcast via email, SSNs were posted online,dummies left downloaded databases on hotelcomputers, <strong>and</strong> viruses picked up from porn sitesharvested in-house databases.And In the End...Only 2.5 million identities were purloinedusing the method most romanticized onthe Web: hacking... just 5%. And thevast majority of those were inside jobs.And, yet, the government now wantsmore <strong>and</strong> more data, claiming that weshould "trust" them to protect it..."Cool" <strong>Security</strong> Story09/09/99 - Seattle, WashingtonThere was a power outage to 5,000homes <strong>and</strong> businesses in Seattle,Washington.And this is the reason...In the NewsStudy Shows IT <strong>Security</strong> Professionals WillNumber 2.1 Million by 2008 (8 November 2004)A study conducted by IDC projects that thenumber of IT security professionals worldwide willincrease to 2.1 million by 2008, a compoundannual growth rate of 13.7% from 2003. Inaddition, the study found that 93% managersresponsible for hiring security staff considercertifications to be important.Most industry observers also believe that h<strong>and</strong>sonskills are very important as well.


Case StudyI've Got a SecretClassified DocumentsHow many classified documents doesthe US Government have?How much does it cost to keep all thosesecrets?What do you think?Chapter 5Planning for <strong>Security</strong>If this is the information superhighway, it’s goingthrough a lot of bad, bad, neighborhoods.-- Dorian Berger, 1997Introduction Creation of information security program begins withcreation <strong>and</strong>/or review of organization’s information securitypolicies, st<strong>and</strong>ards, <strong>and</strong> practices Then, selection or creation of information securityarchitecture <strong>and</strong> the development <strong>and</strong> use of a detailedinformation security blueprint creates plan for future success Without policy, blueprints, <strong>and</strong> planning, organization isunable to meet information security needs of variouscommunities of interest<strong>Information</strong> <strong>Security</strong> Policy, St<strong>and</strong>ards<strong>and</strong> Practices Communities of interest must consider policies as basis forall information security efforts Policies direct how issues should be addressed <strong>and</strong>technologies used <strong>Security</strong> policies are least expensive controls to executebut most difficult to implement Shaping policy is difficultDefinitions Policy: course of action used by organization to conveyinstructions from management to those who perform duties Policies are organizational laws St<strong>and</strong>ards: more detailed statements of what must bedone to comply with policy Practices, procedures <strong>and</strong> guidelines effectively explainhow to comply with policy For a policy to be effective, must be properly disseminated,read, understood <strong>and</strong> agreed to by all members oforganizationEnterprise <strong>Information</strong> <strong>Security</strong> Policy (EISP) Sets strategic direction, scope, <strong>and</strong> tone for all securityefforts within the organization Executive-level document, usually drafted by or with CIO ofthe organization Typically addresses compliance in two areas Ensure meeting requirements to establish program <strong>and</strong>responsibilities assigned therein to various organizationalcomponents Use of specified penalties <strong>and</strong> disciplinary actionIssue-Specific <strong>Security</strong> Policy (ISSP) The ISSP: Addresses specific areas of technology Requires frequent updates Contains statement on organization’s position onspecific issue Three approaches when creating <strong>and</strong> managing ISSPs: Create a number of independent ISSP documents Create a single comprehensive ISSP document Create a modular ISSP document


Systems-Specific Policy (SysSP) SysSPs frequently codified as st<strong>and</strong>ards <strong>and</strong> proceduresused when configuring or maintaining systems Systems-specific policies fall into two groups Access control lists (ACLs) Configuration rulesSystems-Specific Policy (SysSP) (continued) Both Microsoft Windows <strong>and</strong> Novell Netware 5.x/6.x familiestranslate ACLs into configurations used to control access ACLs allow configuration to restrict access from anyone<strong>and</strong> anywhere Rule policies are more specific to operation of a systemthan ACLs Many security systems require specific configuration scriptstelling systems what actions to perform on each set ofinformation they processPolicy Management Policies must be managed as they constantly change To remain viable, security policies must have: Individual responsible for reviews A schedule of reviews Method for making recommendations for reviews Specific policy issuance <strong>and</strong> revision date<strong>Information</strong> Classification Classification of information is an important aspect of policy Policies are classified A clean desk policy stipulates that at end of business day,classified information must be properly stored <strong>and</strong> secured In today’s open office environments, may be beneficial toimplement a clean desk policyThe <strong>Information</strong> <strong>Security</strong> Blueprint Basis for design, selection, <strong>and</strong> implementation of allsecurity policies, education <strong>and</strong> training programs, <strong>and</strong>technological controls More detailed version of security framework (outline ofoverall information security strategy for organization) Should specify tasks to be accomplished <strong>and</strong> the order inwhich they are to be realized Should also serve as scalable, upgradeable, <strong>and</strong>comprehensive plan for information security needs forcoming yearsISO 17799/BS7799 One of the most widely referenced <strong>and</strong> often discussedsecurity models Framework for information security that statesorganizational security policy is needed to providemanagement direction <strong>and</strong> supportNIST <strong>Security</strong> Models Another possible approach described in documentsavailable from Computer <strong>Security</strong> Resource Center of NIST SP 800-12 SP 800-14 SP 800-18 SP 800-26 SP 800-30NIST Special Publication 800-14 <strong>Security</strong> supports mission of organization; is an integralelement of sound management <strong>Security</strong> should be cost-effective; owners have securityresponsibilities outside their own organizations <strong>Security</strong> responsibilities <strong>and</strong> accountability should be madeexplicit; security requires a comprehensive <strong>and</strong> integratedapproach <strong>Security</strong> should be periodically reassessed; security isconstrained by societal factors 33 Principles enumeratedIETF <strong>Security</strong> Architecture <strong>Security</strong> Area Working Group acts as advisory board forprotocols <strong>and</strong> areas developed <strong>and</strong> promoted by theInternet Society RFC 2196: Site <strong>Security</strong> H<strong>and</strong>book covers five basic areasof security with detailed discussions on development <strong>and</strong>implementation


VISA International <strong>Security</strong> Model VISA International promotes strong security measures <strong>and</strong>has security guidelines Developed two important documents that improve <strong>and</strong>regulate information systems: “<strong>Security</strong> AssessmentProcess”; “Agreed Upon Procedures” Using the two documents, security team can develop soundstrategy the design of good security architecture Only down side to this approach is very specific focus onsystems that can or do integrate with VISA’s systemsBaselining <strong>and</strong> Best Business Practices Baselining <strong>and</strong> best practices are solid methods forcollecting security practices, but provide less detail than acomplete methodology Possible to gain information by baselining <strong>and</strong> using bestpractices <strong>and</strong> thus work backwards to an effective design The Federal Agency <strong>Security</strong> Practices (FASP) site(fasp.nist.gov) designed to provide best practices for publicagencies <strong>and</strong> adapted easily to private institutionsHybrid Framework for a Blueprint of an<strong>Information</strong> <strong>Security</strong> System Result of a detailed analysis of components of alldocuments, st<strong>and</strong>ards, <strong>and</strong> Web-based informationdescribed previously Offered here as a balanced introductory blueprint forlearning the blueprint development processFigure 5-15 – Spheres of <strong>Security</strong>Hybrid Framework for a Blueprint of an<strong>Information</strong> <strong>Security</strong> System (continued) NIST SP 800-26 Management controls cover security processes designed bythe strategic planners <strong>and</strong> performed by securityadministration Operational controls deal with operational functionality ofsecurity in organization Technical controls address tactical <strong>and</strong> technical issuesrelated to designing <strong>and</strong> implementing security inorganizationDesign of <strong>Security</strong> Architecture Defense in depth Implementation of security in layers Requires that organization establish sufficient securitycontrols <strong>and</strong> safeguards so that an intruder faces multiplelayers of controls <strong>Security</strong> perimeter Point at which an organization’s security protection ends <strong>and</strong>outside world begins Does not apply to internal attacks from employee threats oron-site physical threatsKey Technology Components Firewall: device that selectively discriminates againstinformation flowing into or out of organization Demilitarized zone (DMZ): no-man’s l<strong>and</strong> between inside<strong>and</strong> outside networks where some organizations placeWeb servers Intrusion Detection Systems (IDSs): in effort to detectunauthorized activity within inner network, or on individualmachines, organization may wish to implement an IDSFigure 5-18 – Key Components<strong>Security</strong> Education, Training, <strong>and</strong> AwarenessProgram As soon as general security policy exist, policies toimplement security education, training <strong>and</strong> awareness(SETA) program should follow SETA is a control measure designed to reduce accidentalsecurity breaches <strong>Security</strong> education <strong>and</strong> training builds on the generalknowledge the employees must possess to do their jobs,familiarizing them with the way to do their jobs securely The SETA program consists of three elements: securityeducation; security training; <strong>and</strong> security awareness


<strong>Security</strong> Education Everyone in an organization needs to be trained <strong>and</strong> awareof information security; not every member needs formaldegree or certificate in information security When formal education for individuals in security is needed,an employee can identify curriculum available from localinstitutions of higher learning or continuing education A number of universities have formal coursework ininformation security<strong>Security</strong> Training Involves providing members of organization with detailedinformation <strong>and</strong> h<strong>and</strong>s-on instruction designed to preparethem to perform their duties securely Management of information security can developcustomized in-house training or outsource the trainingprogram<strong>Security</strong> Awareness One of least frequently implemented but most beneficialprograms is the security awareness program Designed to keep information security at the forefront ofusers’ minds Need not be complicated or expensive If the program is not actively implemented, employeesbegin to “tune out” <strong>and</strong> risk of employee accidents <strong>and</strong>failures increasesContinuity Strategies Incident response plans (IRPs); disaster recovery plans(DRPs); business continuity plans (BCPs) Primary functions of above plans IRP focuses on immediate response; if attack escalates or isdisastrous, process changes to disaster recovery <strong>and</strong> BCP DRP typically focuses on restoring systems after disastersoccur; as such, is closely associated with BCP BCP occurs concurrently with DRP when damage is major orlong term, requiring more than simple restoration ofinformation <strong>and</strong> information resourcesFigure 5-22 – Contingency PlanningTimelineContinuity Strategies (continued) Before planning can begin, a team has to plan effort <strong>and</strong>prepare resulting documents Champion: high-level manager to support, promote, <strong>and</strong>endorse findings of project Project manager: leads project <strong>and</strong> makes sure soundproject planning process is used, a complete <strong>and</strong> usefulproject plan is developed, <strong>and</strong> project resources areprudently managed Team members: should be managers or theirrepresentatives from various communities of interest:business, IT, <strong>and</strong> information securityFigure 5-23 – Major Steps inContingency PlanningIncident Response Planning Incident response planning covers identification of,classification of, <strong>and</strong> response to an incident Attacks classified as incidents if they: Are directed against information assets Have a realistic chance of success Could threaten confidentiality, integrity, or availability ofinformation resources Incident response (IR) is more reactive, than proactive, with theexception of planning that must occur to prepare IR teams to beready to react to an incidentIncident Planning First step in overall process of incident response planning Pre-defined responses enable organization to react quickly<strong>and</strong> effectively to detected incident if: Organization has IR team Organization can detect incident IR team consists of individuals needed to h<strong>and</strong>le systemsas incident takes place Planners should develop guidelines for reacting to <strong>and</strong>recovering from incident


Incident Detection Most common occurrence is complaint about technologysupport, often delivered to help desk Careful training needed to quickly identify <strong>and</strong> classify anincident Once attack is properly identified, organization can respondIncident Reaction Consists of actions that guide organization to stop incident,mitigate impact of incident, <strong>and</strong> provide information forrecovery from incident In reacting to an incident there are actions that must occurquickly: Notification of key personnel Documentation of incidentIncident Containment Strategies Before incident can be contained, areas affected must bedetermined Organization can stop incident <strong>and</strong> attempt to recovercontrol through a number or strategiesIncident Recovery Once incident has been contained, <strong>and</strong> control of systemsregained, the next stage is recovery First task is to identify human resources needed <strong>and</strong> launchthem into action Full extent of the damage must be assessed Organization repairs vulnerabilities, addresses anyshortcomings in safeguards, <strong>and</strong> restores data <strong>and</strong> servicesof the systemsDamage Assessment Several sources of information on damage, includingsystem logs; intrusion detection logs; configuration logs <strong>and</strong>documents; documentation from incident response; <strong>and</strong>results of detailed assessment of systems <strong>and</strong> data storage Computer evidence must be carefully collected,documented, <strong>and</strong> maintained to be acceptable in formalproceedings Individuals who assess damage need special trainingRecovery Once extent of damage determined, recovery process canbegin Process involves much more than simple restoration ofstolen, damaged, or destroyed data filesAutomated Response New systems can respond to incident threat autonomously Downsides of current automated response systems mayoutweigh benefits Entrapment is luring an individual into committing a crimeto get a conviction Enticement is legal <strong>and</strong> ethical, while entrapment is notDisaster Recovery Planning Disaster recovery planning (DRP) is planning thepreparation for <strong>and</strong> recovery from a disaster The contingency planning team must decide which actionsconstitute disasters <strong>and</strong> which constitute incidents When situations classified as disasters, plans change as tohow to respond; take action to secure most valuable assetsto preserve value for the longer term DRP strives to reestablish operations at the primary siteCrisis Management Actions taken during <strong>and</strong> after a disaster focusing on peopleinvolved <strong>and</strong> addressing viability of business Crisis management team responsible for managing eventfrom an enterprise perspective <strong>and</strong> covers: Supporting personnel <strong>and</strong> families during crisis Determining impact on normal business operations <strong>and</strong>, ifnecessary, making disaster declaration Keeping the public informed Communicating with major customers, suppliers, partners,regulatory agencies, industry organizations, the media, <strong>and</strong>other interested parties


Business Continuity Planning Outlines reestablishment of critical business operationsduring a disaster that impacts operations If disaster has rendered the business unusable forcontinued operations, there must be a plan to allowbusiness to continue functioning Development of BCP somewhat simpler than IRP or DRP;consists primarily of selecting a continuity strategy <strong>and</strong>integrating off-site data storage <strong>and</strong> recovery functions intothis strategyContinuity Strategies There are a number of strategies for planning for businesscontinuity Determining factor in selecting between options usually cost In general there are three exclusive options: hot sites; warmsites; <strong>and</strong> cold sites Three shared functions: time-share; service bureaus; <strong>and</strong>mutual agreementsOff-Site Disaster Data Storage To get sites up <strong>and</strong> running quickly, organization must haveability to port data into new site’s systems Options for getting operations up <strong>and</strong> running include: Electronic vaulting Remote journaling Database shadowingModel For a Consolidated Contingency Plan Single document set approach supports concise planning<strong>and</strong> encourages smaller organizations to develop, test, <strong>and</strong>use IR <strong>and</strong> DR plans Model is based on analyses of disaster recovery <strong>and</strong>incident response plans of dozens of organizationsThe Planning Document Six steps in contingency planning process Identifying mission- or business-critical functions Identifying resources that support critical functions Anticipating potential contingencies or disasters Selecting contingency planning strategies Implementing contingency strategies Testing <strong>and</strong> revising strategyFigure 5-24 – Contingency Plan FormatLaw Enforcement Involvement When incident at h<strong>and</strong> constitutes a violation of law,organization may determine involving law enforcement isnecessary Questions: When should organization get law enforcement involved? What level of law enforcement agency should be involved(local, state, federal)? What happens when law enforcement agency is involved? Some questions are best answered by organization’s legaldepartmentBenefits <strong>and</strong> Drawbacks of Law EnforcementInvolvement Involving law enforcement agencies has advantages: Agencies may be better equipped at processing evidence Organization may be less effective in convicting suspects Law enforcement agencies prepared to h<strong>and</strong>le warrants <strong>and</strong>subpoenas needed Law enforcement skilled at obtaining witness statements <strong>and</strong>other information collectionBenefits <strong>and</strong> Drawbacks of Law EnforcementInvolvement (continued) Involving law enforcement agencies has disadvantages: Once a law enforcement agency takes over case,organization loses complete control over chain of events Organization may not hear about case for weeks or months Equipment vital to the organization’s business may betagged evidence If organization detects a criminal act, it is legally obligated toinvolve appropriate law enforcement officials


<strong>Security</strong> DemoPort ScannerPort ScanningUnzip WinStrobe.zipCopy ports.ini to c:\windowsRun WinstrobeFile / Start / Server-1Run against your PCFile / Start / 127.0.0.1Analyzing The ResultsWhat ports were open?What services are running?Do you need those services?How can a hacker use this information?Did MBSA give us this infomation?Probing PortsOpen a comm<strong>and</strong> tooltelnet host portTo turn on local echoCTRL+]set localechoTelnet to ports 21, 23, 25, 110What can you find out about theseports?Case StudyCost of <strong>Security</strong>Case StudyStolen Computers Contain Wells FargoCustomer Data (5 November 2004)Four computers stolen from RegulusIntegrated Solutions LLS's Atlanta officecontain names, addresses, social security<strong>and</strong> account numbers belonging tothous<strong>and</strong>s of Wells Fargo student loan <strong>and</strong>mortgage customers. Wells Fargo hasnotified affected customers by mail <strong>and</strong> isoffering a free year of its credit monitoringservice.Some NumbersIf 5,000 accounts were compromised <strong>and</strong>500 of those offered took Wells Fargo up onthe free credit reporting for a year.Let's also assume there were 10 PCs (vs.just the 4 that were stolen) in the office.The cost of this incident is at least $125,000.The cost of having encryption software onthose 10 PCs would be well under $10,000.<strong>Security</strong>+Domain 2: WirelessConceptsWireless Application ProtocolWireless Local Area NetworksWired Equivalent PrivacyWireless Zero Configuration


InterferenceWiFi Frequency - 2.4 GhzDepending on coating, windows c<strong>and</strong>ecrease signals by 50-70%Solid Core Walls - 90+%Cordless phones, MicrowavesUse same frequenciesSpread Spectrum TechnologySimultaneous communicationsPrevents eavesdroppingFrequency hopping spread spectrum(FHSS)Direct sequence spread spectrum(DSSS)Frequency hopping spread spectrum(FHSS)Dwell Time: How LongHop Time: Switch TimeHopping SequenceDirect sequence spread spectrum(DSSS)Data is "spread out" in a predefinedpattern with a power level so low thatthe signal appears to be backgroundnoiseCSMA/CD vs. CSMA/CAInternet st<strong>and</strong>ard isCarrier Sensing, Multiple AccessCollision DetectionWireless usesCarrier Sensing, Multiple AccessCollision AvoidanceWhy CSMA/CA?Not all wireless nodes can hear eachother.CSMA/CAListen, wait, RTSWait for CTSTransmit Data, repeatWAPSimilar to WWW, w/Small ScreensWTLSWireless Transport Layer <strong>Security</strong>Based on TLSBased on SSLSupport for UDP/TCPSupport for long round-trip timesLow-b<strong>and</strong>width, limited memory, <strong>and</strong>processor capabilities


802.11Developed in 19892.4 Ghz using DSSS or FHSS1 - 2 Mbps, 300 foot range802.11bMost PopularDSSS1, 2, 5.5, 11 MbpsWEP 40 (64) <strong>and</strong> 128 encryption802.11b Channels802.11b applies to wireless LANs <strong>and</strong>provides 11 Mbps transmission (with afallback to 5.5, 2 <strong>and</strong> 1 Mbps dependingon Range <strong>and</strong> Signal Strength) in the2.4 GHz b<strong>and</strong>. 802.11b uses only DSSS(Acronym for direct-sequence spreadspectrum. DSSS is one of two types ofspread spectrum radio.) 802.11b was a1999 IEEE ratification to the original802.11 st<strong>and</strong>ard.http://www.research.umbc.edu/~dgorin1/451/wlan/wlan.htmWireless Channels802.11b PerformanceSpeed vs. Distance802.11a5 Ghz UNII B<strong>and</strong>s6,9,12,16,18,24,36,48,<strong>and</strong> 54MbpsRate Doubling TechnologyNot backwards compatibleDual Frequency WAPShorter Range (25-75 feet)More WAPsMore Expensive802.11g2.4 GhzUp to 54MbpsRate Doubling TechnologyBackwards compatible w/802.11bRange up to 300 feetMidrange CostsNot compatible with 802.11aComparisonAd-HocStations interact with each other


InfrastructureStations access via WAPMultiple NetworksSSIDService Set IdentifierNetwork nameBroadcast?Site SurveySiteSurveyWEPWired Equivalent PrivacyEncryption <strong>and</strong> AuthenticationShared KeyBased on PassphraseIEEE 802.11 st<strong>and</strong>ard states that WEPprovides for protection from “casualeavesdropping.”WEP FeaturesHas CRC-32 to provide integrityUses RC4 encryptionWEP is easy to implementSet keys on WAPs <strong>and</strong> ClientsWEP keys are user-definable, <strong>and</strong> can,<strong>and</strong> should, be changed oftenWEP AuthenticationIf the keys don't match, the system isrefused.In-DepthWardrivingWarDrivingHackers willsearch forwireless accesspoints with aportablecomputer <strong>and</strong> GPS...Video: war.driving.wmv


WarMappingAnd produce maps to share with theirfriends...It Can't Happen HereWardriving in HollywoodDo the rich <strong>and</strong> famous have openwireless access points?Tech TV tried to find outVideo: TTV_wardriving.asfOther attacksWireless MITMRouge WAPs sites40 Bit Encryption is WeakRC4 Encryption WeaknessesReusing keysAdditional Protection MethodsWireless Subnet outside firewallStrong AuthenticationWireless VPNIntegrating WirelessEnd of This Lesson

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!