Title: Security Fundamentals
1Security Fundamentals
- Robin Anderson
- UMBC, Office of Information Technology
2A Little About Me
- Unix SysAdmin, Specialist with the Office of
Information Technology at UMBC - Taught Unix Administration and SANS Level One
Security courses at UMBC - Certified by the SANS Institute GIAC program in
UNIX Security and Incident Handling
3Topics Outline
- Post-Mortems in the News
- Identifying Threats
- Countering Threats
- The (Vulnerable) Network
- Questions You Need to Ask
- Recommendations You Want to Make
- Resources Online
4What Happened to Amazon?
- Website defacing
- Hackers broke in put up phony web pages
- (And now, newer worms/viruses are doing the
same!) - September 2000 OPEC 1
- February 2000 Amazon , eBay 2
- November 1999 NASA/Goddard 3
- October 31,1999 Associated Press 4
- August 1999 ABC 5
- June 1999 U.S. Army
5What Happened to Yahoo?
- Denial of Service (DoS)
- February 2000 Yahoo and CNN 1
- Multiple Hits
- September 2000 Slashdot defaced
- May 2000 Slashdot suffered DoS
- ? The irony is that slashdot.org is a popular
"news for nerds" website
6If Theyre Vulnerable
7The Fundamental Theorem
- You have computers because they perform some
function that furthers your organizations goals - If you lose the use of those computers, their
function is compromised - So - anything that interferes with your
organizations effort to achieve its goals is a
security concern
8What Are You Protecting?
- Information
- Availability of the Systems
- Reputation Goodwill
9Your Information
- Crown Jewels
- Trade secrets, patent ideas, research
- Financial information
- Personnel records
- Organizational structure
10Your Availability
- Internal use
- When employees cant use the network, servers, or
other necessary systems, they cant work - Website / online transactions
- Often when systems are unavailable, the
organization is losing money
11Your Reputation
- Public trust
- If your organization is hacked, how reliable will
people think you are you in other areas? - Who wants to do business with companies that leak
credit card information? - Being a good neighbor
- Your organization may be hacked so it can be used
as a springboard to attack others
12A Simple Network
Firewall
Router
Router
Internet
13 Attacked!
Firewall
Router
Router
3
4
1
2
Internet
5
6
9
7
8
10
14What Are These Threats?
- DoS coming from the Internet
- Severed Physical link
- Masquerader / Spoofer
- They look like theyre already inside
- Password sniffer
15What Are These Threats? (2)
- Alan brought a floppy from home that has a virus
on it - Beatrice is about to be fired and shes going
to be angry about it - Carter is careless with his passwords he writes
them down and loses the paper
16What Are These Threats? (3)
- David has unprotected shares on his NT box
- Evan installed a modem on his PC (PCAnywhere)
- Severed Power / HVAC
17What Are Threat Vectors?
- Vectors are the pathways by which threats enter
your network
18Threat Vectors - Internal
- Careless employees
- Floyd the clumsy janitor
- Contraband hardware / software
- Oops, did I just type that?
- Random twits (somewhere between careless
malicious) - Malicious employees
- Current or former employees with axes to grind
- Anyone who can get physical access
19Threat Vectors - External
- Competitors / spies / saboteurs
- Casual incidental hackers
- Some hackers dont want your systems except to
use them to get at their real target - Malicious hackers
- Accidental tourists
- Natural disasters
- Be ready to face down the hurricane
20What Are Threat Categories?
- Categories are the different kinds of threat you
may encounter
21Threat Categories
- Opportunistic
- Basic ankle biters and script kiddies
- More advanced hackers, hacker groups out trolling
- Targeted
- These attackers know what they want anything
from data to disruption to springboards - Omnipotent
- Government-sponsored professional hackers
22Threat Consequences
- Bad press
- Breach of confidentiality
- Medical data
- Credit card information
- Attack platform (youve been subverted!)
- Loss of income
- How much does it cost you in sales to have your
databases, website, etc, down for any given
length of time? - Loss of trade secrets (crown jewels)
23The 3 Goals of Security
- Ensure Availability
- Ensure Integrity
- Ensure Authorization Authentication
24Threats to Availability
- Denial of Service (DoS)
- Connection flooding
- Destroying data
- Hardware failure
- Manual deletion
- Software agents virus, trojans
25Threats to Integrity
- Hardware failure
- Software corruption
- Buggy software
- Improperly terminated programs
- Attacker altering data
26Threats to Authorization
- Attacker stealing data
- Lost / Stolen passwords
- Information Reconnaissance
- Organization information
27Countering These Threats
- is what security is all about.
28Defining Security
- Security is a process
- Training is ongoing
- Threats change, admins need to keep up
- Security is inconvenient, all staff needs
training - Security is also about policies
- There is no silver bullet to fix it all
- For example, a firewall wont save you
- Remember the Maginot Line
29Notes
- The underlying assumption in the next section is
that you, as the auditor, admin, or manager, are
in a position to make security recommendations - The following list of questions should not be
considered in any way to be exhaustive, but a
starting point to build your own list
30Questions You Need to Ask
- What is the physical access policy to systems,
routers, and backup media? - Are the servers and main routers in a
controlled-access environment? - Who monitors access?
- Are desktop systems / workstations physically
secured?
31Questions You Need to Ask
- Is there a documented security policy?
- Where is it located?
- Who is responsible for maintaining it?
- Is the policy being consistently enforced?
- Who is the enforcer for the organization?
- Is there a firewall?
- Who maintains it and its rule-sets?
- Do its rules match the policy?
32Questions You Need to Ask
- What is the backup policy schedule?
- What kind of backup media software is used?
- Where is the backup media stored? Is there an
off-site safe/storage rotation? - If the systems were utterly destroyed today, how
up to date could you bring their replacements? - Have the backups ever been tested (via a restore)
for completeness and integrity?
33Questions You Need to Ask
- Does the organization know what is on its
network? - If so, how does it know?
- Where are the records kept?
- Who has access to them?
34Questions You Need to Ask
- Are routine network vulnerability scans run?
- If so, what tools are used?
- Where are the reports stored?
- Who has access to the tool and the reports?
- Is any routine network monitoring done?
- If so, what tools are used?
- Where are the reports stored?
- Who has access to the tool and the reports?
35Questions You Need to Ask
- What kind of power management contingencies are
available? - Uninterruptible Power Supplies (UPS)?
- Power regulation?
- Backup generators?
- Mean time to recovery from outage?
36Questions You Need to Ask
- What kind of authentication does your
organization use? - Passwords
- Multi-use, one-time?
- Expiration?
- Biometric authentication?
- Smart-cards
37Questions You Need to Ask
- If you use passwords, how does your organization
replace lost ones? - Any policy on verifying users identity, etc?
38Questions You Need to Ask
- What kind of network connections does your
organization allow? - Are they clear-text protocols (like telnet,
rlogin, rsh, ftp)? - Can your organization migrate to using encrypted
protocols (like ssh, stunnel, etc)?
39Recommendations You Really Want to Make
- No matter what, recommend a dedicated security
officer - One individual responsible for security
- NOT the sys admin, network admin
- Qualifications
- Training
- Certification (CISSP, SANS)
- Demonstrated proficiency
40Recommendations You Really Want to Make
- Routine Vulnerability Scanning
- Tools like Saint, Nessus, Legion, Nmap, SARA
- Principle of Least Privilege
- Documented Procedures for Incident Handling
41So, What Is a Security Officer?
- Protector
- Internal, external
- Assessor
- Monitor
- Contact point
- Law enforcement
- Internal
- External
42What Does It All Mean?
- Its a dangerous world, but were not necessarily
doomed! - Security is an ongoing process (its worth
repeating!) - Ask the questions youve seen here
- Ask any others you think of
- Ask them all again tomorrow new challenges are
arising every day!
43Acknowledgements
- Andy Johnston, manager and co-conspirator
- Jon Lasser, author of Think UNIX
- Stephen Northcutt, SANS instructor and author of
Network Intrusion Detection
44Resources Online
- Training and Certifications
- SANS Institute
- http//www.sans.org/
- CISSP Certification for Information System
Security Professional - http//www.cissps.com
45Resources Online (2)
- News Alerts
- Security Focus
- http//www.securityfocus.com/
- CERT was Computer Emergency Response Team
- http//www.cert.org/
- CIAC Computer Incident Advisory Capability
- http//ciac.llnl.gov/
46Resources Online (3)
- Federal Information Sharing Organizations
- NIPC National Infrastructure Protection Center
- http//www.nipc.gov
- Infragard Guarding the Nations Infrastructure
- http//www.infragard.net
- Infragard Maryland Chapter
- http//www.mdinfragard.org
47Resources Online (4)
- SSH
- http//www.ssh.fi
- http//www.openssh.org
- SSH tunnel
- http//linuxdoc.org/HOWTO/mini/VPN.html
- http//www.ccs.neu.edu/groups/systems/howto/howto
-sshtunnel.html - Stunnel
- http//mike.daewoo.com.pl/computer/stunnel/
- http//www.stanton.dtcc.edu/stanton/cs/admin/note
s/ssl/
48Resources Online (5)
- Network Monitoring Software
- Snort
- http//www.snort.org
- Network Vulnerability Scanners
- Saint
- http//wdsilx.wwdsi.com/saint
- Nessus
- http//www.nessus.org
49Resources Online (6)
- Kerberos
- http//web.mit.edu/kerberos/www
- This Presentation
- http//www.gl.umbc.edu/robin/security.html