Computer Security Management Class Work
Computer Security Management Class Work
Introduction
to Information Security
Chapter 1, pages 1 – 8
Introduction
“In the last 20 years, technology has permeated every facet of
the business environment. The business place is no longer static
– it moves whenever employees travel from office to office, from
office to home, from city to city. Since business have become
more fluid, …, information security is no longer the sole
responsibility of a small dedicated group of professionals, …, it is
now the responsibility of every employee, especially managers.”
http://www.businessandleadership.com/fs/img/news/200811/378x/business-traveller.jpg
http://www.koolringtones.co.uk/wp-content/uploads/2010/01/mobile-phones.jpg
Internet corporation
http://www.jaffer.com/products/ProductList.aspx?ID=1
Introduction (cont.)
http://www.forbes.com/sites/firewall/2010/12/13/the-lessons-of-gawkers-security-mess/
Information Technology
• Information Technology – technology involving
development and use of computer systems and
networks for the purpose of processing and
distribution of data
in many organizations, information/data is seen as the
most valuable asset
disruption
modification
destruction, …
Information Security (cont.)
cryptography
Where/how do we start
building or evaluating
a security system?
CNSS Security Model
• CNSS = Committee on National Security Systems
• McCumber Cube – Rubik’s cube-like detailed model
for establishment and evaluation of information security
to develop a secure system, one must consider not only
key security goals (CIA) but also how these goals relate
to various states in which information resides and full
range of available security measures
CNSS Security Model (cont.)
Desired goals:
Measures:
Information states:
Are all 27 aspects of security
worth examining
at every company?
Threats
• Security threat – any action/inaction that could
cause disclosure, alteration, loss, damage or
unavailability of a company’s/individual’s assets
Forces of Nature
fire, flood, earthquake, hurricane, tsunami, electrostatic
discharge, dust contamination
organization must implement controls to limit damage
as well as develop incident response plans and business
continuity plans
Threat Events (cont.)
Threat Events
a) Use of Malware
assumes the use of specialized software (malware)
to damage or destroy information, or to deny access
to the target system
types of malware:
VIRUS
WORM
TROJAN HORSE
LOGIC BOMB
ROOTKIT
SPYWARE
ADWARE
Threat Events: Deliberate Software Attacks
http://www.witiger.com/ecommerce/viruses.htm
Threat Events: Deliberate Software Attacks
http://www.smartcomputing.com/editorial/article.asp?article=articles/archive/l0902/03l02/03l02.asp
Threat Events: Deliberate Software Attacks
b) Password Cracking
attempt to reverse-calculate a password
requires that a copy of Security Account Manager (SAM)
- a registry data file - be obtained
SAM file (c:\windows\system32\config\SAM) contains the
hashed representation of the user’s password – LM or NTLM hash
algorithms are used
cracking procedure: hash any random password using the
same algorithm, and then compare to the SAM file’s entries
SAM file is locked when Windows is running: cannot be opened,
copied or removed (unless pwdump is run by the administrator)
off-line copy of SAM’s content can be obtained (e.g.) by booting
the machine on an alternate OS such as NTFSDOS or Linux
Threat Events: Deliberate Software Attacks
zombie target
zombie
zombie
zombie
master
Threat Events: Deliberate Software Attacks
http://npercoco.typepad.com/.a/6a0133f264aa62970b0148c819bb6c970c-pi
Threat Events: Deliberate Software Attacks
http://www.usenix.org/event/lisa05/tech/full_papers/kim/kim_html/fig1.gif
Threat Events: Deliberate Software Attacks
Threat Events: Deliberate Software Attacks
e) Sniffing
use of a program or device that can monitor data
traveling over a network
unauthorized sniffers can be very
dangerous – they cannot be detected,
yet they can sniff/extract critical
information from the packets traveling
over the network
wireless sniffing is particularly simple,
due to the ‘open’ nature of the
wireless medium
Threat Events: Deliberate Software Attacks
f) Man-in-the-Middle Attacks
gives an illusion that two computers are communicating
with each other, when actually they are sending and
receiving data with a computer between them
spoofing and/or sniffing can be involved
examples:
passive – attacker records,
alters and resends data at
a later time
active – attacker intercepts,
alters and sends data
before the original
arrives to the recipient
Threat Events: Deliberate Software Attacks
http://flylib.com/books/en/2.513.1.34/1/
Threat Events: Deliberate Software Attacks
http://blbaliyase.blogspot.ca/2009/11/dns-cache-poisoning.html
Threat Events: Deliberate Software Attacks
Social Engineering
process of using social skills to manipulate people into
revealing vulnerable information
example: phishing and pharming
g) Phishing
attempt to gain sensitive personal information by
posing as a legitimate entity
SIMPLE PHISHING: an email is sent to the victim informing
them of a problem (e.g. with their email or banking account)
and asking them to provide their username, password, etc.;
‘From’ email address is spoofed to look legitimate, ‘Reply To’
email address is an account controlled by the attacker
Threat Events: Deliberate Software Attacks
SOPHISTICATED PHISHING: an email is sent to the victim
containing a link to a bogus website that looks legitimate
http://www.informacija.rs/Clanci/Phishing-Obmanjivanje-korisnika.html
Threat Events: Deliberate Software Attacks
“In the past, malicious content has traditionally been hosted on servers in places
like Europe. But, now the bad guys are shifting their infrastructures to sites that
are hosted in countries that traditionally have had better reputations.”
http://community.websense.com/blogs/securitylabs/archive/2012/05/10/canada-s-cybercrime-report-
card-better-or-worse-in-2012.aspx
Threat Events: Deliberate Software Attacks
i) Pharming
phishing is accomplished by getting users to type in or
click on a bogus URL
pharming redirects users to false website without them
even knowing it – typed in or clicked on URL looks OK
performed through DNS
poisoning – user’s local
DNS Cache or DNS server
are ‘poisoned’ by a virus
http://www.itmatrix.com/FraudManagement/AntiPharming.html
Threat Events: Deliberate Software Attacks