Title: Which is the Cuckoo's Egg?
1Which is the Cuckoo's Egg?
- 45 million
- Quebec
- Drug arrest
- Hacking scam
- Poland, Brazil, Manitoba, and the United States
- Age 17 to 26
- Computer network
2Cuckoo's Egg
- Drug arrest
- Canada police have broken up a major
international computer-hacking network - Target unprotected personal computers around the
world - Police arrested 16 people age between 17 and 26
- Online to attack and gain control of as many as
one million computers worldwide
3Csilla Farkas Associate Professor Dept. of
Computer Science and Engineering University of
South Carolina farkas_at_cse.sc.edu http//www.cse.s
c.edu/farkas
4Financial Loss
Dollar Amount Losses by Type
Total Loss (2006) 53,494,290 CSI/FBI Computer
Crime and Security Survey Computer Security
Institute
5Security Protection
6What is Wrong with the Following Specification?
- The CEO of ReallySecure Inc. instructed the
system administrator of the organizations
computing resources to implement security
mechanisms, including - Hardware firewall
- Authentication mechanisms
- Access control
- Secure communication
- Encryption capabilities
7Risk Management Framework (Business Context)
8Understand the Business Context
- Who cares?
- Identify business goals, priorities and
circumstances, e.g., - Increasing revenue
- Meeting service-level agreements
- Reducing development cost
- Generating high return investment
- Identify security risk to consider
9Identify Business and Technical Risks
- Why should business care?
- Business risk
- Direct threat
- Indirect threat
- Consequences
- Financial loss
- Loss of reputation
- Violation of customer or regulatory constraints
- Liability
- Tying technical risks to the business context in
a meaningful way
10Synthesize and Rank the Risks
- What should be done first?
- Prioritization of identified risks based on
business goals - Allocating resources
- Risk metrics
- Risk likelihood
- Risk impact
- Risk severity
- Number of emerging risks
11Define the Risk Mitigation Strategy
- How to mitigate risks?
- Available technology and resources
- Constrained by the business context what can the
organization afford, integrate, and understand - Need validation techniques
12Carry Out Fixes and Validate
- Perform actions defined in the previous stage
- Measure completeness against the risk
mitigation strategy - Progress against risk
- Remaining risks
- Assurance of mechanisms
- Testing
13Measuring and Reporting
- Continuous and consistent identification and
storage of risk information over time - Maintain risk information at all stages of risk
management - Establish measurements, e.g.,
- Number of risks, severity of risks, cost of
mitigation, etc.
14What is Being Protected, Why, and How?
15Security Objectives
16Security Tradeoffs
Security
Functionality
COST
Ease of Use
17Achieving Security
- Policy
- What to protect?
- Mechanism
- How to protect?
- Assurance
- How good is the protection?
18Policy
Organizational policy
Information systems policy
19Security by Obscurity
- Hide inner working of the system
- Bad idea!
- Vendor independent open standard
- Widespread computer knowledge
20Security by Legislation
- Instruct users how to behave
- Not good enough!
- Important
- Only enhance security
- Targets only some of the security problems
21Security Mechanism
- Prevention
- Detection
- Tolerance and Recovery
22IdentificationAuthentication
23Authentication
- Allows an entity (a user or a system) to prove
its identity to another entity - Typically, the entity whose identity is verified
reveals knowledge of some secret S to the
verifier - Strong authentication the entity reveals
knowledge of S to the verifier without revealing
S to the verifier
24User Authentication
- What the user knows
- Password, personal information
- What the user possesses
- Physical key, ticket, passport, token, smart card
- What the user is (biometrics)
- Fingerprints, voiceprint, signature dynamics
25Access Control
26Access Control
- Protection objects system resources for which
protection is desirable - Memory, file, directory, hardware resource,
software resources, etc. - Subjects active entities requesting accesses to
resources - User, owner, program, etc.
- Access mode type of access
- Read, write, execute
27Access Control
- Access control components
- Access control policy specifies the authorized
accesses of a system - Access control mechanism implements and enforces
the policy - Separation of components allows to
- Define access requirements independently from
implementation - Compare different policies
- Implement mechanisms that can enforce a wide
range of policies
28Closed v.s. Open Systems
Closed system
Open System
(minimum privilege)
(maximum privilege)
Access requ.
Access requ.
Allowed accesses
Disallowed accesses
Exists Rule?
Exists Rule?
yes
no
yes
no
Access denied
Access permitted
Access permitted
Access denied
29Firewalls
30Traffic Control Firewall
External Network
31Firewall Objectives
- Keep intruders, malicious code and unwanted
traffic or information out - Keep proprietary and sensitive information in
Proprietary data
External attacks
32- Cryptography
- - Secret-Key Encryption
- - Public-Key Encryption
- - Cryptographic Protocols
33Insecure communications
Confidential
34Encryption and Decryption
Plaintext
Ciphertext
Plaintext
Encryption
Decryption
35Conventional (Secret Key) Cryptosystem
Plaintext
Ciphertext
Plaintext
Encryption
Decryption
Sender
Recipient
K
CE(K,M) MD(K,C)
K needs secure channel
36Public Key Cryptosystem
Recipients public Key (Kpub)
Recipients private Key (Kpriv)
Plaintext
Ciphertext
Plaintext
Encryption
Decryption
Sender
Recipient
CE(Kpub,M) MD(Kpriv,C)
Kpub needs reliable channel
37Cryptographic Protocols
- Messages should be transmitted to destination
- Only the recipient should see it
- Only the recipient should get it
- Proof of the senders identity
- Message shouldnt be corrupted in transit
- Message should be sent/received once only
38Detection/Response
39Misuse Prevention
- Prevention techniques first line of defense
- Secure local and network resources
- Techniques cryptography, identification,
authentication, authorization, access control,
security filters, etc.
Problem Losses occur!
40Intrusion Management
- Intrusion Prevention protect system resources
- Intrusion Detection (second line of defense)
discriminate intrusion attempts from normal
system usage - Intrusion Recovery cost effective recovery models
41Anomaly versus Misuse
Non-intrusive use
Intrusive use
Looks like NORMAL behavior
False negative Non-anomalous but Intrusive
activities
Does NOT look Like NORMAL behavior
False positive Non-intrusive but Anomalous
activities
like
42Malicious Code Detection
- Virus and Worm
- Programming Flaws
- Application Specific Code
- Distributed, heterogeneous platforms
- Complex applications
- Security Applications vs. Secure Applications
- Build security into the system
43Response/Tolerance
44Incident Response
- Federal Communications Commission Computer
Security Incident Response Guide, 2001,
http//csrc.nist.gov/fasp/FASPDocs/incident-respon
se/Incident-Response-Guide.pdf - Incident Response Team, R. Nellis,
http//www.rochissa.org/downloads/presentations/In
cidence20Response20Teams.ppt - NIST special publications, http//csrc.nist.gov/pu
blications/nistpubs/index.html
45Intrusion Recovery
- Actions to avoid further loss from intrusion
- Terminate intrusion and protect against
reoccurrence - Law enforcement
- Enhance defensive security
- Reconstructive methods based on
- Time period of intrusion
- Changes made by legitimate users during the
effected period - Regular backups, audit trail based detection of
effected components, semantic based recovery,
minimal roll-back for recovery
46What is Survivability?
- To decide whether a computer system is
survivable, you must first decide what
survivable means.
47Effect Modeling and Vulnerability Detection
Seriously effected components
Weakly effected component
Cascading effects
Not effected components
48Due Care and Liability
- Organizational liability for misuse
- US Federal Sentencing Guidelines chief executive
officer and top management are responsible for
fraud, theft, and antivirus violations committed
by insiders or outsiders using the companys
resources. - Fines and penalties
- Base fine
- Culpability score (95-400)
- Good faith efforts written policies, procedures,
security awareness program, disciplinary
standards, monitoring and auditing, reporting,
and cooperation with investigations
49How to Respond?
50How to Respond?
51How to Respond?
52Roles and Responsibilities
- User
- Vigilant for unusual behavior
- Report incidents
- Manager
- Awareness training
- Policies and procedures
- System administration
- Install safeguards
- Monitor system
- Respond to incidents, including preservation of
evidences
53Computer Incident Response Team
- Assist in handling security incidents
- Formal
- Informal
- Incident reporting and dissemination of incident
information - Computer Security Officer
- Coordinate computer security efforts
- Others law enforcement coordinator,
investigative support, media relations, etc.
54Incident Response Process 1.
- Preparation
- Baseline Protection
- Planning and guidance
- Roles and Responsibilities Training
- Incident response team
55Incident Response Process 2.
- Identification and assessment
- Symptoms
- Nature of incident
- Identify perpetrator, origin and extent of attack
- Can be done during attack or after the attack
- Gather evidences
- Key stroke monitoring, honey nets, system logs,
network traffic, etc. - Legislations on Monitoring!
- Report on preliminary findings
56Incident Response Process 3.
- Containment
- Reduce the chance of spread of incident
- Determine sensitive data
- Terminate suspicious connections, personnel,
applications, etc. - Move critical computing services
- Handle human aspects, e.g., perception
management, panic, etc.
57Incident Response Process 4.
- Eradication
- Determine and remove cause of incident if
economically feasible - Improve defenses, software, hardware, middleware,
physical security, etc. - Increase awareness and training
- Perform vulnerability analysis
58Incident Response Process 5.
- Recovery
- Determine course of action
- Reestablish system functionality
- Reporting and notifications
- Documentation of incident handling and evidence
preservation
59Follow Up Procedures
- Incident evaluation
- Quality of incident (preparation, time to
response, tools used, evaluation of response,
etc.) - Cost of incident (monetary cost, disruption, lost
data, hardware damage, etc.) - Preparing report
- Revise policies and procedures
60Questions?