CyberSecurity - Ian Theofilos

Download Report

Transcript CyberSecurity - Ian Theofilos

Access Control Terminology

Access Controls  Control how users and systems communicate and interact

Process Terminology

Identification   Method for determining a subject is who it says it is User name, PIN number, smart card, account number Authenticated   Provided a second matching piece to the identification method Password, passphrase, PIN number Authorized  Has appropriate access to the requested resource

Strong Authentication

Types of authentication  Something a person has  Something a person knows  Something a person is Strong Authentication includes at least 2 of the 3 Only 1 is considered _______________

Biometrics – Something a Person Is

A unique personal attribute Type I Error  Rejected an authorized user Type II Error  Accepts a non-authorized imposter Crossover Error Rate (CER)   Point where Type I Error distribution and Type II Error distribution meet The lower the number, the better

Popular Biometrics

Fingerprint Palm scan Hand Geometry  Length and width of the hand and fingers Retina Scan Iris Scan Signature Dynamics Keyboard Dynamics Voice Print Facial Scan Hand Topology  Side picture of the hand

Biometrics Compared

Passwords – Something a Person Knows

Passphrases refer to multiple word passwords Personal Identification Numbers (PIN) refer to numeric numbers Considered weak  People use familiar words or numbers   Words are susceptible to dictionary and brute force attacks Users can’t remember strong passwords so they write them down

Making Passwords Stronger

Forced password lifetimes  Shorter makes it more secure, but too short and users forget which is active  60 days is good compromise Enforced minimum lengths Forced special characters, case changes No reuse Lock out users at low clipping level (acceptable failed attempts)  For how long?

Better Passwords Through Technology

Password Generators  Produce passwords using random but pronounceable passwords Password Checkers/Crackers  L0phtcrack  John the Ripper  Brutus

Variations on a Theme

Cognitive Passwords   Fact or opinion based information Best for seldom used authentication needs One-Time Use Passwords   Synchronous token device Token and server preshare private key Time based – token device and server clock are sync’ed, time value used as plaintext Event based – token and server share authentication value list Asynchronous token device Server prompts with challenge code, user enters code into token device which returns a response code, user enters response into server

Digital Signatures

-------BEGIN SIGNATURE----- IQB1AwUBMVSiA5QYCuMfgNYjAQFAKgL/ ZkBfbeNEsbthba4BlrcnjaqbcKgNv+a5kr453 7y8RCd+RHm75yYh5xxA1ojELwNhhb7cltrp 2V7LlOnAelws4S87UX80cL BtBcN6AACf11 qymC2h+Rb2j5SSU+rmXWru+=QFMx -------END SIGNATURE------

Cards – Something a Person Has

Memory Cards  Hold information only  Credit cards, ATM cards Smart Cards  Process information and hold information  Information on card actively protected by authentication

Authorization Criteria

Roles  Based on job function or assignment Groups Physical location  Interactive login, for example Logical location  IP address, for example Time of day Transaction type  Amount of money to be transferred, for example

Restrictions to Remember

Default to NO ACCESS  Access Control Lists (ACL) commonly default to deny Base granted access on Need To Know  Least-privilege principal Single sign on whenever possible  Scripts   Kerberos is recognized standard in heterogeneous environments SESAME - Secure European System for Applications in a Multivendor Environment

Access Control Models

Discretionary Access Control (DAC)  Owner (creator) can access resource and dictate who else can access it  Does not lend itself to central management Mandatory Access Control (MAC)  Operating system controls access based on owners sensitivity level  Commonly used in military systems

Role Based Access Control (RBAC)   Subjects role determines access Managed centrally Rule Based Access Control   Access matched against rules Common in network devices Constrained Interfaces  Limits data access and functionality  ATM machines, for example Content Dependant Access Control  Restrictions based on data content  Firewalls commonly use this to stop worms, viruses

Access Control Matrixes

Table of subjects and objects indicating actions subjects can take upon objects Common in DAC model Capability Tables  Access rights a specific subject has for a specific object ACL’s   Lists of subjects that have access to a specific object Very common in networking devices, firewalls

Centralized Access Control

Remote Authentication Dial-in User Service (RADIUS) Terminal Access Controller Access Control System (TACACS)

Decentralized Access Controls

Security Domains  Realm of distributed trust  Hierarchical or peer implementations  Microsoft domains are a specific version

Typical Scenario - Hybrid

Most enterprises combine both centralized and decentralized control methods     May have Kerberos centralized user database Use TACACS+ tied to Kerberos to authenticate dial-up and router users Use Windows 2000 file servers at each location to allow autonomous distributed security domains Workgroup printers are shared via Windows desktop peering

Control Types

Preventative  Avoid undesirable events Detective  Identify undesirable events Corrective  Fix undesirable events that have occurred Deterrent  Discourage undesirable events Recovery  Restore resources Compensation  Provide alternatives to other types of controls

Services Provided by Various Security Controls

Fences, locks, lighting  Preventative   Corrective Recovery Security guard  Preventative     Detective Corrective Deterrent Recovery Separation of duties  Preventative  Deterrent Security awareness training  Preventative  Detective Personnel procedures   Preventative Detective   Deterrent Compensation

Services Provided by Various Security Controls

ACL’s  Preventative Encryption  Preventative  Deterrent Audit logs  Detective Smart cards  Preventative Intrusion Detection System   Preventative Detective   Corrective Deterrent Antivirus Software  Preventative    Detective Corrective Recovery

Common Access Control Practices

Deny access to systems by anonymous & guest accounts Limit and monitor use of admin accounts Remove obsolete user accounts when employees leave company Suspend inactive accounts after 30-60 days Disable unneeded system features & services Use nondescriptive logon ID’s Rename root and administrator logon ID’s Remove redundant accounts, ACL’s, roles, groups

Fun with Auditing

Enforces accountability Must be reviewed Must be backed up and protected  Good hackers always go after the audit logs Guaranteed integrity is key to using logs as evidence  To be admissible in court, logs must be generated in the normal course of business

Common Audit Events

System performance Logon attempts + date/time (successful & unsuccessful) Lockouts of users Alteration of config files Error messages Files opened and closed File modifications ACL violations

Unauthorized Disclosure

Object Reuse  Data left on floppies, backup tapes, or hard drives can be read   Sectors containing data can be marked bad, thus hiding data Low level format, degauss, or destroy the media Emanation Security   Capturing electrical and electromagnetic radiation from devices TEMPEST – US Government standard for emanation protection

Intrusion Detection Systems

Sniff network traffic (network-based) or monitor individual computers (host-based) Signature Based Detection  Must be loaded with “fingerprints” of known attacks  Not effective against new attacks Statistical Intrusion Detection  Looks for statistical anomalies in traffic

Sniffers

Captures network traffic real-time Allows admins or hackers to eavesdrop on data Employees can use sniffers undetected in some networks

Honeypots

Unprotected system set up to lure would be attackers Attackers can then be tracked, attacks cataloged, other systems hardened appropriately Enticement  Legally admissible, target is simply not well protected Entrapment  Not legally admissible, target invites the hacker in

Threats to Access Control

Dictionary Attack  Lists or dictionaries are used as a source of passwords or plain text  Countermeasures Do not allow single word based passwords – use dictionary attacks against your own users to find weak passwords Rotate passwords often Employ one-time password techniques Protect password files and stores

Threats to Access Control

Brute Force Attack   Attack attempts every possible combination of potential inputs Countermeasures Employ stringent clipping levels and auditing of login attempts Use brute force attacks against your own users to uncover weak passwords Protect password files and stores Login Spoofing   Hacker replaces legitimate login screens with fakes Countermeasure

Threats to Access Control

Login Spoofing   Hacker replaces legitimate login screens with fakes Countermeasure Security awareness training Display number of failed login attempts

Homework Assignment

Read Chapter 5, except:  State Machine Models & Modes of Operation (pgs 240-249) Paper  Write a 2 3 page technical brief on the “Slammer” worm   Include vulnerable software details, countermeasures, and information about testing systems for the vulnerability.

Discuss the impact and current investigation of the worm.

 Summarize the events and alerts that occurred as the weekend unfolded.