Ilovepdf Merged Compressed
Ilovepdf Merged Compressed
Authentication
NIST SP 800-63-3 (Digital Authentication
Guideline, October 2016) defines digital user
authentication as:
E-Authentication using
Token and Credential
• Password, PIN,
answers to • Smartcard, • Fingerprint,
prearranged electronic retina, face
questions • Voice pattern,
keycard, handwriting,
physical key typing rhythm
Authentication
logic using Authentication
f rst factor logic using
second factor
ol on
ol on
oc t i
oc t i
ot ica
ot ica
pr ent
pr ent
th
th
Au
Au
Pass Pass
Fail Fail
Client Client
Assurance
• There are
three Level
separate
concepts: Potential
impact
Areas of
risk
More specifically Four levels of
is defined as: assurance
Describes an
organization’s Level 1
The degree of confidence
degree of in the vetting process
•Little or no confidence in the
asserted identity's validity
used to establish the
certainty that a identity of the individual
to whom the credential Level 2
user has was issued •Some confidence in the asserted
identity’s validity
presented a
credential that Level 3
•High confidence in the asserted
The degree of confidence
refers to his or her that the individual who
identity's validity
Exploiting
Specific Popular Exploiting
multiple
account password user
password
attack attack mistakes
use
Password
Password File
User ID Salt Hash code
Salt
•
slow hash Load •
function •
Password File
User id
User ID Salt Hash code
Salt
Select Password
slow hash
function
Hashed password
Compare
(b) Verifying a password
Make
available
only to
Vulnerabilities
privileged
users
• Password checker
o Compile a large dictionary of passwords not to use
• Bloom filter
o Used to build a table based on hash values
o Check desired password against this table
Memory Cards
• Can store but do not process data
• The most common is the magnetic stripe card
• Can include an internal electronic memory
• Can be used alone for physical access
o Hotel room
o ATM
• Provides significantly greater security when combined
with a password or PIN
• Drawbacks of memory cards include:
o Requires a special reader
o Loss of token
o User dissatisfaction
Smart Tokens
• Physical characteristics:
o Include an embedded microprocessor
o A smart token that looks like a bank card
o Can look like calculators, keys, small portable objects
• User interface:
o Manual interfaces include a keypad and display
for human/token interaction
• Electronic interface
o A smart card or other token requires an electronic interface to
communicate with a compatible reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o Classified into three categories:
• Static
• Dynamic password generator
• Challenge-response
Smart Cards
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor
• Memory
• I/O ports
• Typically include three types of memory:
o Read-only memory (ROM)
• Stores data that does not change during the card’s life
o Electrically erasable programmable ROM (EEPROM)
• Holds application data and programs
o Random access memory (RAM)
• Holds temporary data generated when applications are executed
Biometric Authentication
• Attempts to authenticate an individual based on
unique physical characteristics
• Based on pattern recognition
• Is technically complex and expensive when
compared to passwords and tokens
• Physical characteristics used include:
o Facial characteristics
o Fingerprints
o Hand geometry
o Retinal pattern
o Iris
o Signature
o Voice
Name (PIN)
Biometric Feature
sensor extractor Biometric
database
User interface
(a) Enrollment
Name (PIN)
Biometric Feature
sensor extractor Biometric
database
Biometric Feature
sensor extractor Biometric
database
Can serve the same purposes as other national Has human-readable data printed on its
ID cards, and similar cards such as a driver ’s surface
license, for access to government and •Personal data
commercial services •Document number
•Card access number (CAN)
•Machine readable zone (MRZ)
2. Se
rvic
e re q
1. User requests service 3. R uest
(e.g., via Web browser) edir
ect t
9. A o eID
uthe mes
ntica sage
tion
10. S r esul
ervi t for
ce g war
rant ded
ed
Host/application
server
Biometric Feature
sensor extractor Biometric
database
User interface
(a) Enrollment
Name (PIN)
Biometric Feature
sensor extractor Biometric
database
Biometric Feature
sensor extractor Biometric
database
LAN switch
Iris Merge
Remote
Iris
database
Network
switch
Figure 3.14 General Iris Scan Site Architecture for UAE System
Thank You!
• Questions?
Firewalls and Intrusion
Prevention Systems
The Need For Firewalls
• Internet connectivity is essential
• However it creates a threat
• Effective means of protecting LANs
• Inserted between the premises network and the
Internet to establish a controlled link
• Can be a single computer system or a set of two or more systems
working together
• Used as a perimeter defense
• Single choke point to impose security and auditing
• Insulates the internal systems from external networks
Firewall Characteristics
Design goals
All traffic from inside to outside, and vice versa, must pass
through the firewall
IP address
Application User Network
and protocol
protocol identity activity
values
This type of
filtering is used by This type of
packet filter and filtering is used by
stateful inspection Typically for
an application- Controls access
firewalls inside users who
level gateway that based on
identify
relays and considerations
themselves using
monitors the such as the time or
some form of
exchange of request, rate of
secure
information for requests, or other
authentication
Typically used to specific activity patterns
technology
limit access to application
specific services protocols
Firewall Capabilities And Limits
Capabilities:
• Defines a single choke point
• Provides a location for monitoring security
events
• Convenient platform for several Internet
functions that are not security related
• Can serve as the platform for IPSec
Limitations:
• Cannot protect against attacks bypassing
firewall
• May not protect fully against internal threats
• Improperly secured wireless LAN can be
accessed from outside the organization
• Laptop, PDA, or portable storage device may be
infected outside the corporate network then
used internally
Internal (protected) network External (untrusted) network
(e.g. enterprise network) Firewall (e.g. Internet)
Internet Internet
Network Network
access access
• Source IP address
• Destination IP address
• Source and destination transport-level address
• IP protocol field
• Interface
Advantages:
• Filtering rules can be tailored to the host
environment
• Protection is provided independent of topology
• Provides an additional layer of protection
Personal Firewall
• Controls traffic between a personal computer or workstation
and the Internet or enterprise network
• For both home or corporate use
• Typically is a software module on a personal computer
• Can be housed in a router that connects all of the home
computers to a DSL, cable modem, or other Internet interface
• Typically much less complex than server-based or stand-alone
firewalls
• Primary role is to deny unauthorized remote access
• May also monitor outgoing traffic to detect and block worms
and malware activity
Internet
Boundary
router
LAN
switch
Web Email DNS
server(s) server server
LAN
switch
Application and database servers
Workstations
He
IP er H
yl I P
ad
Pa cure
d
oa
IP ader
Se
Se
e
c
ad c
He PSe
er
Se ayloa
I
cu
P
re d
He IP
er
IP
ad
Ethernet Ethernet
switch IP IP
switch IP IP
Header Payload Header Payload
Firewall Firewall
with IPSec with IPSec
Boundary
router
External
DMZ network
Web
server(s) External
firewall
Internal DMZ network
LAN
switch
LAN
switch
host-resident
firewall
Workstations
Figure 9.4 Example Distributed Firewall Configuration
Firewall Topologies
•Includes personal firewall software and firewall software
Host-resident firewall on servers
Distributed firewall
•Used by large businesses and government organizations
configuration
Intrusion Prevention Systems
(IPS)
• Also known as Intrusion Detection and Prevention
System (IDPS)
• Is an extension of an IDS that includes the capability to
attempt to block or prevent detected malicious activity
• Can be host-based, network-based, or distributed/hybrid
• Can use anomaly detection to identify behavior that is
not that of legitimate users, or signature/heuristic
detection to identify known malicious behavior can
block traffic as a firewall does, but makes use of the
types of algorithms developed for IDSs to determine
when to do so
Host-Based IPS
(HIPS)
• Can make use of either signature/heuristic or anomaly
detection techniques to identify attacks
• Signature: focus is on the specific content of application network
traffic, or of sequences of system calls, looking for patterns that
have been identified as malicious
• Anomaly: IPS is looking for behavior patterns that indicate
malware
• Examples of the types of malicious behavior addressed by a
HIPS include:
• Modification of system resources
• Privilege-escalation exploits
• Buffer-overflow exploits
• Access to e-mail contact list
• Directory traversal
HIPS
• Capability can be tailored to the specific platform
• A set of general purpose tools may be used for a desktop or
server system
• Some packages are designed to protect specific types of servers,
such as Web servers and database servers
• In this case the HIPS looks for particular application attacks
• Can use a sandbox approach
• Sandboxes are especially suited to mobile code such as Java
applets and scripting languages
• HIPS quarantines such code in an isolated system area then runs
the code and monitors its behavior
• Areas for which a HIPS typically offers desktop protection:
• System calls
• File system access
• System registry settings
• Host input/output
The Role of HIPS
• Many industry observers see the enterprise endpoint, including
desktop and laptop systems, as now the main target for
hackers and criminals
• Thus security vendors are focusing more on developing endpoint
security products
• Traditionally, endpoint security has been provided by a collection
of distinct products, such as antivirus, antispyware, antispam,
and personal firewalls
• Approach is an effort to provide an integrated, single-product
suite of functions
• Advantages of the integrated HIPS approach are that the various
tools work closely together, threat prevention is more
comprehensive, and management is easier
• A prudent approach is to use HIPS as one element in a defense-
in-depth strategy that involves network-level devices, such as
either firewalls or network-based IPSs
Network-Based IPS
(NIPS)
• Inline NIDS with the authority to modify or discard
packets and tear down TCP connections
• Makes use of signature/heuristic detection and anomaly
detection
• May provide flow data protection
• Requires that the application payload in a sequence of packets
be reassembled
• Methods used to identify malicious packets:
• Bastion host
• Network-based IPS
• Host-based firewalls
• Distributed or hybrid IPS
• Personal firewall
• Snort inline
Thank You!
• Questions?
Software
Security
Table
11.1
TOP 25
Most
Dangerous
Software
Errors
Security Flaws
• Critical Web • These flaws occur as a
consequence of insufficient
application security checking and validation of
flaws include five data and error codes in
related to insecure programs
software code • Awareness of these issues is a
• Unvalidated input critical initial step in writing
• Cross-site scripting more secure program code
• Buffer overflow • Emphasis should be placed on
• Injection flaws the need for software
• Improper error developers to address these
handling known areas of concern
Reducing Software
Vulnerabilities
• The NIST report NISTIR 8151 presents a range of
approaches to reduce the number of software
vulnerabilities
• It recommends:
• Stopping vulnerabilities before they occur by using
improved methods for specifying and building software
Program
executing algorithm, Network Link
processing input data,
generating output
GUI Display
Operating System
Database
Machine Hardware
Explicitly validate
Must identify all assumptions on
data sources size and type of
values before use
Input Size & Buffer
Overflow
• Programmers often make assumptions about the
maximum expected size of input
• Allocated buffer size is not confirmed
• Resulting in buffer overflow
• Testing may not identify vulnerability
• Test inputs are unlikely to include large enough inputs to
trigger the overflow
Commonly seen in
Exploit
scripted Web
applications assumption that XSS reflection
Attacks where • Vulnerability involves
all content from vulnerability
input provided the inclusion of script one site is • Attacker
by one user is code in the HTML equally trusted
content includes the
subsequently • Script code may need to and hence is malicious script
output to access data associated permitted to content in data
with other pages
another user interact with supplied to a site
• Browsers impose
security checks and other content
restrict data access to
pages originating from
from the site
the same site
Validating
Input Syntax
It is necessary
By only
to ensure that Alternative is
Input data accepting
data conform to compare the
should be known safe
with any input data with
compared data the
assumptions known
against what is program is
made about the dangerous
wanted more likely to
data before values
remain secure
subsequent use
Alternate Encodings
Growing requirement to
May have multiple means of support users around the globe
encoding text and to interact with them using
their own languages
Disadvantage is that
Range of inputs is very bugs triggered by other
large forms of input would
be missed
Developed by Professor Barton
Miller at the University of
Wisconsin Madison in 1989 Intent is to determine if Combination of
the program or approaches is needed
function correctly for reasonably
handles abnormal comprehensive
inputs coverage of the inputs
Simple, free of
assumptions, cheap
Security issues:
• Correct algorithm implementation
• Correct machine instructions for algorithm
• Valid manipulation of data
Correct Algorithm
Implementation
Another variant is when
Initial sequence numbers the programmers
Issue of good program used by many TCP/IP deliberately include
development technique implementations are too additional code in a
predictable program to help test and
debug it
Often code remains in
production release of a
program and could
Algorithm may not inappropriately release
correctly handle all information
Combination of the
problem variants
sequence number as
an identifier and May permit a user to bypass
authenticator of security checks and
packets and the failure perform actions they would
to make them not otherwise be allowed to
sufficiently perform
Consequence of unpredictable enables
deficiency is a bug in the attack to occur
the resulting program This vulnerability was
that could be exploited exploited by the Morris
Internet Worm
Ensuring Machine Language
Corresponds to Algorithm
• Issue is ignored by most programmers
• Assumption is that the compiler or interpreter generates or
executes code that validly implements the language
statements
• Requires comparing machine code with original
source
• Slow and difficult
• Development of computer systems with very high
assurance level is the one area where this level of
checking is required
Correct Data Interpretation
• Data stored as • Different languages
bits/bytes in provide different
computer capabilities for
restricting and
• Grouped as words or validating interpretation
longwords of data in variables
• Accessed and
manipulated in memory • Strongly typed languages are
or copied into processor more limited, safer
registers before being • Other languages allow more
used liberal interpretation of data
• Interpretation depends on and permit program code to
machine instruction explicitly change their
executed interpretation
Correct Use of Memory
• Issue of dynamic memory allocation
• Unknown amounts of data
• Allocated when needed, released when done
• Used to manipulate Memory leak
• Steady reduction in memory available on the heap to the
point where it is completely exhausted
• Many older languages have no explicit support for
dynamic memory allocation
• Use standard library routines to allocate and release memory
• Modern languages handle automatically
Race Conditions
• Without synchronization of accesses it is possible that
values may be corrupted or changes lost due to
overlapping access, use, and replacement of shared values
• Arise when writing concurrent code whose solution
requires the correct selection and use of appropriate
synchronization primitives
• Deadlock
• Processes or threads wait on a resource held by the other
• One or more programs has to be terminated
Operating System Interaction
Programs execute • Mediates and shares access to resources
on systems under • Constructs execution environment
the control of an • Includes environment variables and
arguments
operating system
Another source of
untrusted program input
Least privilege
•Run programs with least privilege needed to complete their
function
Programmers make
assumptions about
their operation
Programs use system • If incorrect behavior is not what
is expected
calls and standard • May be a result of system
library functions for optimizing access to shared
common operations resources
• Results in requests for services
being buffered, resequenced,
or otherwise modified to
optimize system use
• Optimizations can conflict with
program goals
Preventing Race
Conditions
• Programs may need to access a common system resource
• Need suitable synchronization mechanisms
• Most common technique is to acquire a lock on the shared file
• Lockfile
• Process must create and own the lockfile in order to gain access to the
shared resource
• Concerns
• If a program chooses to ignore the existence of the lockfile and access the
shared resource the system will not prevent this
• All programs using this form of synchronization must cooperate
• Implementation
Safe Temporary Files
• Many programs use temporary files
• Often in common, shared system area
• Must be unique, not accessed by others
• Commonly create name using process ID
• Unique, but predictable
• Attacker might guess and attempt to create own file between
program checking and creating
• Secure temporary file creation and use requires the use
of random names
Other Program Interaction
Programs may use functionality and services of other
programs
• Security vulnerabilities can result unless care is taken with this interaction
• Such issues are of particular concern when the program being used did not
adequately identify all the security concerns that might arise
• Occurs with the current trend of providing Web interfaces to programs
• Burden falls on the newer programs to identify and manage any security issues that
may arise
• Questions?
Operating
System Security
Strategies
• The 2010 Australian Signals Directorate (ASD) lists the
“Top 35 Mitigation Strategies”
• Over 85% of the targeted cyber intrusions investigated
by ASD in 2009 could have been prevented
• The top four strategies for prevention are:
• White-list approved applications
• Patch third-party applications and operating system vulnerabilities
• Restrict administrative privileges
• Create a defense-in-depth system
System
security begins Initial
Should stage
installation
with the should install and validate all
installation of the minimum Critical that the patches on the
system be kept
the operating necessary for
up to date, with
test systems
system the desired before
all critical
system deploying them
security related
patches installed in production
Full installation
Ideally new and hardening
systems process should
should be occur before the
constructed system is
on a protected deployed to its
network intended location
Remove
Unnecessary
Services, • When performing the
Applications, initial installation the
Protocols supplied defaults should
not be used
• Default configuration is set
to maximize ease of use and
• If fewer software packages functionality rather than
security
are available to run the risk
is reduced • If additional packages are
• System planning process needed later they can be
installed when they are
should identify what is required
actually required for a
given system
• System planning process
should consider:
Configure
• Categories of users on the system
Users, Groups,
and • Privileges they have
Generates significant
Range of data acquired
Information can be volumes of information
should be determined
generated by the system, and it is important that
during the system planning
network and applications sufficient space is allocated
stage
for them
Automated analysis is
preferred
Data Backup and Archive
Performing regular Needs and policy
backups of data is Backup Archive relating to
a critical control backup and
that assists with archive should be
maintaining the The process of The process of determined
integrity of the making copies of retaining copies of
during the system
data over extended
system and user data at regular
periods of time in planning stage
intervals
data order to meet legal
and operational
requirements to
May be legal or access past data
operational Kept online or
requirements for offline
the retention of
data
Stored locally or
transported to a
remote site
• Trade-offs include
ease of
implementation and
cost versus greater
security and
robustness against
different threats
Linux/Unix Security
• Patch management
• Keeping security patches up to date is a widely recognized and critical
control for maintaining security
Users administration
Patch and access controls
management •Systems implement
discretionary access controls
• “Windows Update” and resources
“Windows Server
•Vista and later systems include
Update Service” assist mandatory integrity controls
with regular
•Objects are labeled as being of
maintenance and should
low, medium, high, or system
be used integrity level
• Third party applications •System ensures the subject’s
also provide automatic integrity is equal or higher than
update support the object’s level
•Implements a form of the Biba
Integrity model
Windows Security
Users Administration and Access
Controls
Windows systems also define Combination of share and
privileges NTFS permissions may be
•System wide and granted to user used to provide additional
accounts security and granularity when
accessing files on a shared
resource
• Free, easy to use tool that checks for compliance with Microsoft’s security
recommendations
Virtualization
• A technology that provides an abstraction of the
resources used by some software which runs in a
simulated environment called a virtual machine (VM)
• Benefits include better efficiency in the use of the
physical system resources
• Provides support for multiple distinct operating systems
and associated applications on one physical system
• Raises additional security concerns
Hypervisor
• Software that sits between the hardware and the VMs
• Acts as a resource broker
• It allows multiple VMs to safely coexist on a single
physical server host and share that host’s resources
• Virtualizing software provides abstraction of all physical
resources and thus enables multiple computing stacks,
called virtual machines, to be run on a single physical
host
• Each VM includes an OS, called the guest OS
• This OS may be the same as the host OS, if present, or a
different one
Hypervisor Functions
• Execution management of VMs
• Devices emulation and access control
• Execution of privileged operations by
hypervisor for guest VMs
• Management of VMs (also called VM
The principal lifecycle management)
functions performed • Administration of hypervisor platform and
by a hypervisor are: hypervisor software
Virtualized Systems
• In virtualized systems, the available hardware resources must
be appropriately shared among the various guest OS’s
• These include CPU, memory, disk, network, and other
attached devices
• CPU and memory are generally partitioned between these,
and scheduled as required
• Disk storage may be partitioned, with each guest having
exclusive use of some disk resources
• Alternatively, a “virtual disk” may be created for each guest,
which appears to it as a physical disk with a full file-system,
but is viewed externally as a single ”disk image” file on the
underlying file-system
• Attached devices such as optical disks, or USB devices are
generally allocated to a single guest OS at a time
Software Defined
Networks (SDNs)
SDNs enable network segments to logically span multiple servers
within and between data centers, while using the same underlying
physical network
• These abstract all layer 2 and 3 addresses from the underlying physical network into
whatever logical network structure is required
• This structure can be easily changed and extended as needed
• The IETF standard DOVE (Distributed Overlay Virtual Network) which uses
VXLAN (Virtual Extended Local Area Network) can be used to implement such an
overlay network
• With this flexible structure, it is possible to locate virtual servers, virtual IDS, and
virtual firewalls anywhere within the network as required
Containers
• A recent approach to virtualization is known as container
virtualization or application virtualization
• In this approach, software known as a virtualization container,
runs on top of the host OS kernel and provides an isolated
execution environment for applications
• Unlike hypervisor-based VMs, containers do not aim to
emulate physical servers
• All containerized applications on a host share a common OS
kernel
• For containers, only a small container engine is required as
support for the containers
• Containerization sits in between the OS and applications and
incurs lower overhead, but potentially introduces greater
security vulnerabilities
Virtualization Security
Issues
• Security concerns include:
• Guest OS isolation
• Ensuring that programs executing within a guest OS may
only access and use the resources allocated to it
• Guest OS monitoring by the hypervisor
• Which has privileged access to the programs and data in
each guest OS
• Virtualized environment security
• Particularly image and snapshot management which
attackers may attempt to view or modify
Securing Virtualization
Systems
• Carefully plan the
Organizations security of the
virtualized system
using • Secure all elements of
a full virtualization
virtualization solution and maintain
their security
should:
• Ensure that the
hypervisor is properly
secured
Access must
be limited to
just the
appropriate
guest OSs
Systems
manage access
to hardware
resources
Virtual Firewall
Provides firewall capabilities for the network traffic flowing
between systems hosted in a virtualized or cloud
environment that does not require this traffic to be routed
out to a physically separate network supporting traditional
firewall services
VM Host-Based
VM Bastion Host Hypervisor Firewall
Firewall
• Questions?