Threats and Vulnerabilities. Ed Crowley



Similar documents
Build Your Own Security Lab

CYBERTRON NETWORK SOLUTIONS

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Kerem Kocaer 2010/04/14

Computer Security DD2395

CEH Version8 Course Outline

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Course Content: Session 1. Ethics & Hacking

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

SECURITY. Risk & Compliance Services

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Certified Ethical Hacker Exam Version Comparison. Version Comparison

External Supplier Control Requirements

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Integrated Protection for Systems. João Batista Territory Manager

Security aspects of e-tailing. Chapter 7

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

EC Council Certified Ethical Hacker V8

CRYPTUS DIPLOMA IN IT SECURITY

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Data Management & Protection: Common Definitions

ABB s approach concerning IS Security for Automation Systems

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Critical Controls for Cyber Security.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Medical Device Security Health Group Digital Output

93% of large organisations and 76% of small businesses

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Web App Security Audit Services

Network Security: A Practical Approach. Jan L. Harrington

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Practical Guidance for Auditing IT General Controls. September 2, 2009

[CEH]: Ethical Hacking and Countermeasures

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Presented by Evan Sylvester, CISSP

Malicious Network Traffic Analysis

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Risk Management Guide for Information Technology Systems. NIST SP Overview

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Effective Penetration Testing Netwerk Guardian LLC

How To Classify A Dnet Attack

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Malware: Malicious Code

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Overview. Packet filter

Data Management Policies. Sage ERP Online

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

CS5008: Internet Computing

Denial of Service (DoS) Technical Primer

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Information Security. Training

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Cyber Security Lexicon

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Seminar Computer Security

Ethical Hacking Course Layout

Common Cyber Threats. Common cyber threats include:

Cybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical

GiftWrap 4.0 Security FAQ

Top tips for improved network security

IDS : Intrusion Detection System the Survey of Information Security

Codes of Connection for Devices Connected to Newcastle University ICT Network

Description: Objective: Attending students will learn:

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Detailed Description about course module wise:

Enterprise Computing Solutions

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Network Incident Report

Security Testing in Critical Systems

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

INFORMATION SECURITY TRAINING CATALOG (2015)

CMPT 471 Networking II

Hacking: Information Gathering and Countermeasures

Cyril Onwubiko Networking and Communications Group ncg.kingston.ac.

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Transcription:

Threats and Vulnerabilities Ed Crowley

Threat and Vulnerability Objectives At the end of this course, you should be able to analyze and differentiate among types of: Malware Attacks Social engineering attacks Wireless attacks Application attacks Mitigation and deterrent techniques You should also be able to: Implement assessment tools and techniques to identify security threats and vulnerabilities Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning

http://www.wired.com/threatlevel/2010/03/tjx-

Threat Agents Adrian Lamo Kevin Mitnick Kevin Poulsen Alexey Ivanov Vasiliy Gorshkov Mafia Boy Manning Assange John Walker

Risk Primitives Vulnerability A weakness in system security procedures, system design, implementation, internal controls, etc., that could be exploited to violate system security... Threat Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification of data, and/or denial of service. Risk The probability that a particular threat will exploit a particular vulnerability... From NCSC-TG-004 Aqua Book See also RFC 2828

Threats and Vulnerabilities? Can be found in: People Lack of situational awareness Social engineering Insiders (bribes and incompetence) Processes Online Financial Transactions Conventional Financial Transactions Credit, debit, and ATM cards Technology Computer and Communications Systems Point of sale terminals VA databases, etc Threats and Vulnerabilities are Dynamic

Technology and Solutions If you think technology can solve your security problems, then: You don t understand the problems and You don t understand the technology. B. Schneier

Common Threats Malware Worms, Viruses, Trojans Conventional Attacks MiM, DDoS, Smurf, phishing Social Engineering Wireless Rogue Access Points, wardriving Web Application XSS, SQL Injection Insiders

Internet Threat Attributes, one Automation Automated infections (Worms and Trojan Horses) Morris Worm, 1988 Honey Pot Project Record (17 seconds) Stuxnet Speed of Exploit Propagation Negates traditional log based response process Distance doesn t matter No International Borders on the Internet Legal jurisdiction scope You may not have a perimeter (Blended threats)

25 Jan 2003 Blue color represents Slammer, 30 minutes after release In the first minute, the infected population doubled in size every 8.5 (±1) seconds. After approximately three minutes, the worm achieved max scanning rate (over 55 million scans per second)

Worms and Viruses Robert Morris Internet Worm, 1988 First conviction under the 1986 Federal Computer Security Act Father was the chief scientist at NSA s, National Computer Security Center (NCSC) Currently, a MIT associate professor

Malware Trojans and Spyware Trojans Email A virus posing as a photo of Russian tennis player Anna Kournikova. Spread twice as fast as I Love You. Polymorphic Encrypted DDOS Distributed Denial of Service Attack Mafia Boy and Tribal Flood knocked down Yahoo and Ebay. Stuxnet Spyware

INFOWar A military adversary who tries to undermine his target s ability to wage war by attacking the information or network infrastructure. Short term focus of affecting his target s ability to wage war. Objects: Military advantage Chaos AssymetricalWarfare

Proactive Solutions The notion of fixing a security flaw after it becomes a problem won t work on the Internet. Education and Training are critical components of any security plan. Periodic assessments are critical security components NIST 800-30 NSA IAM/IDM Assessment requires appropriate tools and processes Assessment reports become inputs to the mitigation process.

Assessment Tools Insecure.org --From online security tools survey Tools we will work with include: BackTrack Wireshark Nmap NetCat

Tools Assess Vulnerabilities In most environments, vulnerabilities result from system management process failures. Specifically, poor: System management System software configuration Applications software configurations Patch management Software management Access control, etc. User management and administration Weak password policy

Enterprise Vulnerabilities Likely symptoms of underlying systems management process failures Solution: Identify and correct management practices i.e. implement appropriate security policies and procedures

Mis-Management Categories One OS configuration Flawed or inappropriate Software maintenance Failure to apply patches Lack of configuration control Password/access control Failure to comply with password policy Improper access control settings

Mis-Management Categories Two Malicious software Presence Evidence of use Dangerous services Vulnerable services or processes Application configuration Improperly configured applications

Assessment Assessment is the first step for any enterprise that wants to start managing information risks correctly. By assessing networks in the same way as a determined attacker, you can approach risk management proactively. It is never impossible to break into a computer system, only improbable. Risk must be managed Appropriate to focus on: Structured and logical IP based network security assessment.

Recognized Assessment Standards NSA, IAM www.iatrp.com INFOSEC Assessment Methodology (IAM) framework helps consultants and security professionals outside the NSA provide assessment services to clients in line with a recognized standard. Three assessment levels Assessment (IAM) Evaluation (IEM) Red Team (Pen Testing) In process of being up leveled, see: http://www.isatrp.org/index.php UK CESG CHECK

CESG Check UK Government Communications Headquarters (GCHQ) Information assurance arm known as the Communications and Electronics Security Group (CSEG). CHECK focuses on Network Security Assessment Evaluates and accredits UK security testing teams Runs an assault course to test the attack and penetration techniques and methods demonstrated by attendees. CLAS (CSEG Listed Adviser Scheme) Covers information security in a broad sense and tackles areas such as BS7799 BS7799 iseventually adopted by ISO as ISO/IEC 17799, "Information Technology - Code of practice for information security management." in 2000. ISO/IEC 17799 was then revised in June 2005 and finally incorporated in the ISO 27000 series of standards as ISO/IEC 27002 in July 2007.

CHECK Competence Areas Network assessment tools including: DNS information retrieval tools Network mapping and probing tools ICMP, TCP, and UDP, TCP service banner grabbing SNMP information retrieval Understanding of common router and switches relating to access and configuration weaknesses: Telnet HTTP SNMP TFTP. Other Unix and Windows specific competencies

Online References NSA IAM/IEM Web Site http://www.cesg.gov.uk/site/check/index.cfm http://examples.oreilly.com/networksa/tools/

Questions?