Title: Threats to IT Assets
1Chapter 3
2Objectives
- In this chapter, you will
- Describe general categories of attacks
- Identify the major attack routes to the corporate
office - Identify the major attack routes to the corporate
IT environment - Develop a threat taxonomy
3Categories of Attacks
- Intentional vs. Unintentional
- Intentional
- Active
- Passive
4Attacks on the Corporate Office Physical
Security
- Theft
- Computer equipment
- Office equipment
- Data
- Countermeasures
- Guards
- Cameras
- Badge readers
- Alarm systems
5Attacks on the Corporate Office Physical
Security
- Damage
- Computer equipment
- Office equipment
- Data
- Countermeasures
- Guards
- Cameras
- Badge readers
- Alarm systems
6Attacks on the Corporate Office Physical
Security
- Service disruption
- Electricity
- HVAC
- Telecom / Network cabling
- Countermeasures
- Guards
- Cameras
- Badge readers
- Alarm systems
7Attacks on the Corporate Office Physical
Security
- Unauthorized access to systems
- System console
- System equipment
- Desktops / laptops
- Countermeasures
- Console passwords
- System locks
- Screensaver passwords
- Badge readers
8Attacks on the Corporate Office Physical
Security
- Unauthorized access to information
- Printed information
- Open windows / doors that allow for eavesdropping
- Information on media
- Countermeasures
- Proper destruction
- Cover windows in sensitive areas
- Badge readers
9Attacks on the Corporate Office Employees
- Social engineering
- Phone calls
- In-person visits
- E-mail
- Countermeasures
- Security policy
- Education
10Attacks on the Corporate Office Employees
- E-mail attachments
- Malware
- Countermeasures
- Antivirus software
- E-mail filtering
- Education
11Attacks on the Corporate Office Employees
- Hoaxes
- E-mail
- Faxes
- Regular mail
- Countermeasures
- Security policy
- Approved communication vehicles
- Education
12Attacks on the Corporate Office Employees
- Malicious Web sites
- Malware
- Countermeasures
- Antivirus software
- Web filtering software
- Education
13Attacks on the Corporate Office Information
Aggregation
- Trash
- Classified information
- Usernames and passwords
- Project information
- Countermeasures
- Proper destruction of sensitive information
14Attacks on the Corporate Office Information
Aggregation
- Phone lists
- Employee names
- Contact information
- Organizational roles
- Countermeasures
- Restrict availability of information
15Attacks on the Corporate Office Information
Aggregation
- Newsgroups
- Technical information
- System architecture
- Employee names
- E-mail addresses
- Countermeasures
- Avoid posting to newsgroups
- Avoid using company e-mail addresses
- Avoid discussing sensitive information
16Attacks on the Corporate Office Information
Aggregation
- Conversations
- Eavesdropping
- Information brokers
- Countermeasures
- Avoid discussing sensitive information outside of
work - Education
17Attacks on the Corporate Office Information
Aggregation
- Cell phones
- Eavesdropping on conversations
- Countermeasures
- Avoid discussing sensitive information on cell
phones
18Attacks on the Corporate Office Information
Aggregation
- Pagers
- Eavesdropping on pages
- Countermeasures
- Avoid sending sensitive information
19Attacks on the Corporate Office Information
Aggregation
- Covert channels
- Storage
- Timing
- Countermeasures
- Resource utilization monitoring
- File permissions
20Attacks on the Corporate IT Environment Phone
Attacks
- Voice mail
- Eavesdropping of voice messages
- Countermeasures
- Strong passwords
- Frequent password changes
21Attacks on the Corporate IT Environment Phone
Attacks
- Phone switches
- Phone bandwidth theft
- Control over phone switching
- Countermeasures
- System software updates
- Strong passwords
- Frequent password changes
- Restrict connections
22Attacks on the Corporate IT Environment Phone
Attacks
- War dialing
- Connect to network via listening modem(s)
- Countermeasures
- Restrict incoming analog lines
- Restrict use of modems
23Attacks on the Corporate IT Environment Malware
- ActiveX / JavaScript
- Macros
- Trojan horses
- Viruses
- Worms
- Zombies
24Attacks on the Corporate IT Environment Malware
- Countermeasures
- Antivirus software
- Patching operating systems and applications
- E-mail filtering
- Web filtering
- Use of firewall to restrict network traffic
25Attacks on the Corporate IT Environment System
Attacks
- Password cracking
- Guessing user passwords
- Guessing application / service account passwords
- Guessing administrative passwords
- Countermeasures
- Strong password policies
- Frequent password changes
- Patching
26Attacks on the Corporate IT Environment System
Attacks
- Software bugs
- Buffer overflows
- Countermeasures
- Patching
- Remove unnecessary services and applications
27Attacks on the Corporate IT Environment System
Attacks
- Port scanners
- Active ports
- Determine running services and applications
- Countermeasures
- Patching
- Remove unnecessary services and applications
- Firewalls
28Attacks on the Corporate IT Environment System
Attacks
- E-mail
- Bombing
- Relaying
- Spoofing
- Countermeasures
- Patching
- Block relays
- Configure e-mail server for proper authentication
29Attacks on the Corporate IT Environment System
Attacks
- SQL injection
- Database data manipulation
- Database data enumeration
- Countermeasures
- Input validation
- Patching
30Threat Taxonomy
31Threat Taxonomy
- Source
- Effect
- Method
- Threat components
- Authorization
- Target
- Damage
32Summary
- Providing a secure physical environment is the
first step in ensuring that company information
is safe. - Unless all company employees are effectively
educated, social engineering is often a
successful method for breaking into company
systems. - By aggregating information from trash, Web sites,
press releases, and public conversations, an
attacker can form a picture of sensitive
information. - Attackers can steal information from voice
mailboxes containing sensitive company data, or
they can break into PBX switches to steal phone
resources. - Passive attack methodologies include viruses,
worms,Trojan horses, and a variety of other
malicious codes.
33Summary
- Regardless of the network-based defenses in
place, system attacks are serious business, and
constant vigilance must be maintained to thwart
attacks at the system level. - In addition to the operating systems and
application software that present vulnerabilities
for the attacker, network protocols can also be
manipulated. - A threat taxonomy is a categorization that
affords security professionals the ability to
organize and classify threats to computer systems
and networks.