Computer Security I
CS 456
Security I
Configure a secure client
Anomymous Browseing
Encrypted e-mail
Cryptography
Information Security Systems Engineering
Trust Models, Threat Models
Secure Systems Test & Evaluation
Systems Security Testing
CS 456
Security I
Requirements:
No Whining
1 Paper
1 Secure e-mail
1 AD Lab
1 Crypto Project
1 Midterm
1 Final
CSIA Track
WARNING
The material that you will learn in the CSIA track is dual
use.
The ethical and legal implications of your use of
information and techniques presented should always be
part of your decisions.
Information Systems Security
Information assurance
Electronic information
Ubiquity
Importance
Corruptibility
Information systems
Characteristics
Types
Pervasive
Information Assurance
Security
Keep information in a known and trusted state that can be
used appropriately.
Trust
Generally an entity can be said to 'trust' a second entity
when the first entity makes an assumption that the
second entity will behave exactly as the first entity
expects
ITU-T X.509, 3.3.54
Threats
Threat profiles identify specific threats that are most
likely to put your environment at risk.
Unauthorized probing of system or data
Unauthorized access
Introduction of malicious code
Unauthorized modification or disclosure of data
Denial of service attacks
Vulnerabilities
Vulnerabilities are characteristics of an information
system's architecture, implementation, use or
maintenance that has or could compromise the
information.
Electronic Information
Data
Communications
Executables
System states
Analog information
Information Security Model
Information States
Security Measures
i on g
i ss ge s in
m r a es
Training
n s Sto oc
a r
Tr
Critical Information
Policies
Characteristics
Technology
Confidentiality
Integrity
Availability
Information States
Transmission
Storage
Processing
Information Transmission
Space
Radio waves
Copper
Analog
Digital
Glass
Snell's Law
Information Storage
All of the obvious
However
Caches
HW Buffers
Store and forward technologies
Copy machines (20 GB storage)
Cell phones (Rupert Murdock)`
Information Processing
Altered executables
Introduced executables
Scripts
Information Security Model
Information States
Security Measures
i o n
iss ge in g
n sm or a ess
Training
ra S t r oc
T
Critical Information
Policies
Characteristics
Technology
Confidentiality
Integrity
Availability
Critical Information Characteristics
Confidentiality
Integrity
Availability
CIA
Confidentiality
Only those who are authorized have access in information
Integrity
Information is in a known and trusted state
Availability
Information is available when needed
Confidentiality
Keeping information secret
Encryption
Authentication
Authorization
Non-repudiation
Integrity
Making sure the information is as it should be.
Message authentication code
Message digests
Availability
Making the information is available when it is
requested.
System design
Appropriate confidentiality and integrity techniques
No DdoS bad, bad, bad
Information Security Model
Information States
Security Measures
i o n
iss ge in g
n sm or a ess
Training
ra S t r oc
T
Critical Information
Policies
Characteristics
Technology
Confidentiality
Integrity
Availability
Security Measures
Technology
Policies & Procedures
Training & Awareness
Technology Measures
Programs
Software
Architecture
Design
Etc.
Policy and Procedures
What to do
How to do it
What is permissible
What is not
Policies
Sample Policies
www.sans.org/resources/policies
Many of these policies are part of the Employee
Handbook
These are the laws of the Corp
Procedures
Step by step description on how do something
Update anti-virus program
Configure a firewall
Etc.
Training
Training is dumb
Training is everything
Training, Education & Awareness
The most important security measure
Understanding:
Reasons for security
Reasons for info protection
Results of not doing it
Information Security Architecture
Management Stuff
Organization
Legal
Counsel CEO
CIO CFO
Compliance Security Security
Officer Officer Team
Plans
Business Plan
IT Plan
Site Security Plan
Disaster Recovery Plan
Business Continuity Plan
Incident Response Plan
IT Security Plan
Introduction
Mission
Scope
Relation to Business Plan
Strategic IT Goals
Accessibility
Role of technology in corporation
Role of technology in business
Security
Security Controls
Administrative Controls
Policies & Procedures for operations
HR concerns Employee termination procedure
Technical Controls
Security appliances/controls HW and SW
Firewalls, HIDS, etc.
Physical Controls
Protection of facilities and equipment
Locks, AC, fire abatement
Physical access trumps all
http://www.sans.org/critical-security-controls/guidelines.php
Data Classification
Risk Based
Time Value
Indefinite, long term, intermediate, critical
System Development
Unix philosophy:
Write programs that do one thing and do it well. Write programs to
work together. Write programs to handle text streams, because that is
a universal interface.
Mike Gancarz* sums up the Unix philosophy:
1. Small is beautiful.
2. Make each program do one thing well.
3. Build a prototype as soon as possible.
4. Choose portability over efficiency.
5. Store data in flat text files.
6. Use software leverage to your advantage.
7. Use shell scripts to increase leverage and portability.
8. Avoid captive user interfaces.
9. Make every program a filter.
SANS
Critical Security Controls
http://www.sans.org/critical-security-controls/guidelines.php
A Prioritized Baseline Of Information Security Measures And
Controls
Important for Large Distributed Organizations
Guiding Principles
Address the most common and damaging attacks
Consistent controls across the organization
Automated where possible
Continuously measured (automate, learn scripting)
Measure effectiveness
Critical Security Controls
Version 3.1
1. Inventory of Authorized and Unauthorized Devices
2. Inventory of Authorized and Unauthorized Software
3. Secure Configurations for Hardware and Software on Laptops, Workstations,
and Servers Secure
4. Continuous Vulnerability Assessment and Remediation
5. Malware Defenses
6. Application Software Security
7. Wireless Device Control
8. Data Recovery Capability
9. Security Skills Assessment and Appropriate Training to Fill Gaps
10. Configurations for Network Devices such as Firewalls, Routers, and Switches
Critical Security Controls
Version 3.1
11. Limitation and Control of Network Ports, Protocols, and Services
12. Controlled Use of Administrative Privileges
13. Boundary Defense
14. Maintenance, Monitoring, and Analysis of Security Audit Logs
15. Controlled Access Based on Need to Know
16. Account Monitoring and Control
17. Data Loss Prevention
18. Incident Response Capability
19. Secure Network Engineering
20. Penetration Tests and Red Team Exercises
Inventory of Authorized and Unauthorized
Devices
Attackers continuously monitor networks
Unprotected components, Misconfigured, Unpatched
Deploy an automated asset inventory discovery tool
Protect the asset inventory
Build inventory of information assets
Detect unauthorized asset within 24 hours and isolate
Inventory of Authorized and Unauthorized
Software
List of approved/necessary SW for each system
Deploy/build SW inventory tool
Include patch level
Deploy application white listing tool
Identify applications that require air-gapped systems
Attempts to install unapproved SW identified and
isolated within 24 hours
Secure Configurations for Hardware and
Software
Attackers again use network monitoring
Develop standard HW configurations for laptops,
workstations and servers
Develop secure standard images for each category of
HW
Any deviations are documented and put under CM
Vulnerability Assessment and Remediation
Continuous
Automated vulnerability scanners
Correlate with event logs
Immediate remediation
Patches must be evaluated on a test bench
Malware Defenses
Continuously monitor workstations, servers, etc.
Up-to-date anti-virus protection with daily updates
No auto-run from USBs, CDs, etc.
Automated scan of all removable media
E-mail scans especially attachments
Outbound traffic monitored
Large encrypted outbound traffic flagged
Application Software Security
Web application firewall
Inspects all traffic to the application
Encrypted traffic should be decrypted and inspected
Explicit error checking of all input
Test all in-house and third party applications
Harden all data bases
Remove all unnecessary code from the system
Wireless Device Control
Each device connected has an authorized configuration
and a documented owner
All access points are managed
Network scanning tools used
No rogue access points
Use WIDS
Access points are tuned to minimize leakage
Use WPA2 for all traffic
Data Recovery Capability
Automatic backups
Incremental regularly
Extensive testing of the backup system
All backups should be encrypted
Backup media should be protected with physical security
Security Skills Assessment
Security awareness training
Validated with policies and training
Awareness assessment via quizzes
Conduct exercises
Remediation for the slackers
Configurations for Network Devices
Firewalls, Routers, and Switches
Use standard secure configurations
Configurations should be documented and reviewed
All interconnects between different security levels should
enforce ingress and egress filtering
All network devices should use 2 factor authentication
Limitation and Control of Network Ports,
Protocols, and Services
Drop all traffic unless explicitly allowed
Regular port scans
Only servers/services visible to the Internet should be
specifically required by the business
All services needed for business should be reviewed
quarterly
Application firewalls in front of critical servers
Controlled Use of Administrative Privileges
Inventory all administrative accounts
Validate each account with each person
Password acceptance and protection
Administrator accounts used only for administrative
activities
Admin passwords are different from user passwords
Log all account creation and destruction activities
Boundary Defense
Maintain black lists of IP addresses
Deploy IDSs anad IPSs at all security levels
Record packets that pass through the DMZ
Clear separation of DMZ from internal networks
All WWW, FTP and SSH pass through a proxy on the
DMZ
Remote login (VPN) use 2 factor authentication
Maintenance, Monitoring, and Analysis of
Security Audit Logs
Validate audit logs for all HW and SW installed on it
Enough log storage space
All remote access is logged verbosely
Weekly reports on log anomalies
Ensure time on all devices is sync'd to a valid time
source
All traffic through a boundary device is logged
Use dedicated logging devices
Controlled Access Based on Need to Know
Establish a data classification scheme
Based on sensitivity and impact of exposure
File shares have defined controls that specify
authenticated users
Detailed logging of access to nonpublic data
Segment network into trust levels
Encrypt higher level data when in a lower level
Use of USB devices severely limited and controlled
Account Monitoring and Control
Disable all unused and unconnected accounts
Daily reports of account anomalies
Locked out, disabled, password violations
Unused
Disable on termination
Encrypt and move when account is locked out
Excessive login attempts
Daily log of unusual account activity
Data Loss Prevention
20 TB of sensitive data have been exfiltrated
Deploy storage encryption SW
Monitor outbound traffic
Periodic scans of servers for unencrypted sensitive data
types
Use outbound proxies to monitor outbound
documents/info
Systems will write to only approved USB devices (serial
no.)
Incident Response Capability
Written incident response plan and procedures
Assign IR responsibilities to specific people
Response time and reports specified
Computer anomaly reporting guidelines
Secure Network Engineering
At least a 3 tiered network design
DMZ, middleware, and private network
Compartmentalize data accordingly
Designed for rapid deployment of ACLs, rules,
signatures, etc.
Segment the enterprise into multiple separate trust
zones with boundary defenses
Penetration Tests and Red Team Exercises
Regular external and internal penetration tests
Regular red team exercises
Response to attacks and breaches
Fix everything found to be bad
Reduce the readable network/security files
Social engineering should be part of the penetration
testing
Use test beds for some of the testing