Computer Security. Security.di.unimi.it/sicurezza1314/ Chapter 1: 1



Similar documents
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Computer and Network Security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Loophole+ with Ethical Hacking and Penetration Testing

CRYPTUS DIPLOMA IN IT SECURITY

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

EECS 588: Computer and Network Security. Introduction

FORBIDDEN - Ethical Hacking Workshop Duration

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Gregg Gerber. Strategic Engagement, Emerging Markets

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

EECS 588: Computer and Network Security. Introduction January 14, 2014

Advanced Persistent Threat

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

ICOM 5018 Network Security and Cryptography

Figure 9-1: General Application Security Issues. Application Security: Electronic Commerce and . Chapter 9

Penetration Testing //Vulnerability Assessment //Remedy

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Course Title: Course Description: Course Key Objective: Fee & Duration:

What is Really Needed to Secure the Internet of Things?

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

Web application security: automated scanning versus manual penetration testing.

Malware: Malicious Code

Simple Steps to Securing Your SSL VPN

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Security and Privacy

Certified Cyber Security Analyst VS-1160

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Preliminary Course Syllabus

Advanced & Persistent Threat Analysis - I


Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Security Goals Services

One Minute in Cyber Security

Firewall and UTM Solutions Guide

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Cybercrime Prevention and Awareness

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

The Key to Secure Online Financial Transactions

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

IBM Protocol Analysis Module

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

OPC & Security Agenda

Detailed Description about course module wise:

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Unknown threats in Sweden. Study publication August 27, 2014

Penetration Testing Service. By Comsec Information Security Consulting

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

A Systems Engineering Approach to Developing Cyber Security Professionals

Are you prepared to be next? Invensys Cyber Security

Implementing Cisco IOS Network Security

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

Certified Ethical Hacker Exam Version Comparison. Version Comparison

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Introduction to Computer Security

Summary of the SEED Labs For Authors and Publishers

Symantec Endpoint Protection

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Android Security - Common attack vectors

CEH Version8 Course Outline

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Enterprise-Grade Security from the Cloud

TUSKEGEE CYBER SECURITY PATH FORWARD

The Hillstone and Trend Micro Joint Solution

End-to-End Application Security from the Cloud

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

What Do You Mean My Cloud Data Isn t Secure?

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Computer Security (EDA263 / DIT 641)

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Transcription:

Computer Security Security.di.unimi.it/sicurezza1314/ Chapter 1: 1

Info corso di Sicurezza Docente corso Andrea Lanzi: andrea.lanzi@unimi.it Pagina corso: http://security.di.unimi.it/sicurezza1314/ Orario di ricevimento su appuntamento via e-mail. Chapter 1: 2

Chapter 1: History of Computer Security Chapter 1: 3

Introduction Security is a journey, not a destination. Computer security has been travelling for forty years. The challenges faced have kept changing. So have the answers to familiar challenges. Security mechanisms must be seen in the context of the IT landscape they were developed for. Chapter 1: 4

Epochs 1930s: people as computers 1940s: first electronic computers 1950s: start of an industry 1960s: software comes into its own 1970s: age of the mainframe 1980s: age of the PC 1990s: age of the Internet 2000s: age of the Web Chapter 1: 5

Starting Point: Anderson Report, 1972 In recent years the Air Force has become increasingly aware of the problem of computer security. This problem has intruded on virtually any aspect of USAF operations and administration. The problem arises from a combination of factors that includes: greater reliance on the computer as a data processing and decision making tool in sensitive functional areas; the need to realize economies by consolidating ADP resources thereby integrating or co-locating previously separate data processing operations; the emergence of complex resource sharing computer systems providing users with capabilities for sharing data and processes with other users; the extension of resource sharing concepts to networks of computers; and the slowly growing recognition of security inadequacies of currently available computer systems. Quoted from the Anderson report Chapter 1: 6

1970s: Mainframes Data Crunchers Technology: Winchester disk (IBM) 35-70 megabytes memory. Application: data crunching in large organisations and government departments. Protection of classified data in the defence sector dominates security research and development. Social security applications and the like. Security controls in the system core: operating systems, database management systems Computers and computer security managed by professionals. Chapter 1: 7

1970s: Security Issues Military applications: Anderson report Multi-level security (MLS) Bell LaPadula model Status today: High assurance systems developed (e.g. Multics) but do not address today s issues. Non-classified but sensitive applications DES, public research on cryptography Privacy legislation Statistical database security Status today: cryptography is a mature field, statistical database security reappearing in data mining. Chapter 1: 8

1980s: PCs Office Workers Technology: Personal Computer, GUI, mouse, Application: word processors, spreadsheets, i.e. office work. Liberation from control by the IT department. Single-user machines processing unclassified data: No need for multi-user security or for MLS. Risk analysis: no need for computer security. Security evaluation: Orange Book (TCSEC, 1983/85): Driven by the defence applications of the 1970s. Chapter 1: 9

1980s: Security Issues Research on MLS systems still going strong; Orange Book, MLS for relational databases. Clark-Wilson model: first appearance of commercial security in mainstream security research. Worms and viruses: research proposals, before appearing in the wild. Also the worm comes from Xerox park (1982) Intel 80386 drops support for segmentation. Chapter 1: 10

1980s: An Early Worm First internet worm 1988, the famous Morris's Worm Buffer overflow on Fingerd daemon, force password on remote login, bad configurations of Sendmail. The worm penetrated 5-10 \% of the machines on internet. The person responsible for the worm was brought to court and sentenced to a $ 10,050 fine and 400 hours of community service. Chapter 1: 11

1990s: Internet Surfers Paradise? Technology: Internet, commercially used. Applications: World Wide Web (static content), email, entertainment (music, movies), Single-user machine that had lost its defences in the previous decade is now exposed to the hostile Internet. No control on who can send what to a machine on the Internet. Chapter 1: 12

1990s: Internet Surfers Paradise? Technology: Internet, commercially used, Web 1.0. Applications: Web surfing, email, entertainment, Single-user machine that had lost its defences in the previous decade now exposed to hostile Internet. No control on who can send what to a machine on the Internet. Buffer overrun attacks: Aleph One (1996): Smashing the Stack for Fun and Profit Add-on security controls: firewalls, SSL, browser sandbox as reference monitor, Chapter 1: 13

1990s: Security Issues Crypto wars: is wide-spread use of strong cryptography a good idea? Internet security treated as a communications security problem. Buffer overrun attacks: Aleph One: Smashing the Stack for Fun and Profit Internet security is mainly an end systems issue! Java security model: the sandbox. Trusted Computing; DRM Status today: mature security protocols (IPsec, SSL/TLS), better software security. Chapter 1: 14

2000s: Web e-commerce Technology: Web services, WLAN, PKI?? Web 2.0: dynamic content B2C applications: Amazon, ebay, airlines, on-line shops, Google,... Criminal activity replaces hackers. Legislation to encourage use of electronic signatures. PKIs have not taken off; e-commerce has essentially evolved without them. Chapter 1: 15

2000s: Security Issues SSL/TLS for secure sessions. Software security: the problems are shifting from the operating systems to the applications (SQL injection, cross-site scripting, DNS attack). Security controls moving to application layer: Web pages start to perform security checks. Access control for virtual organisations: e.g. federated identity management. Security of end systems managed by the user (take care of your system). Chapter 1: 16

2000s: Security Issues Botnet as a new attack organization. CyberCrime is born which aim is to exploit technologies business to make money. APT attack: Advanced persistent threat (APT) usually refers to a group, such as a government, with both the capability and the intent to persistently and effectively target a specific entity. The term is commonly use to espionage using a variety of intelligence gathering techniques to access sensitive information. Different actors: Cybercrimimal, Hacktivists, Governments. Chapter 1: 17

2000s: Security Issues Chapter 1: 18

2000s: Security Issues Chapter 1: 19

2000s: Security Issues Chapter 1: 20

2000s: Target Attacks Stuxnet is a computer virus that was discovered in June 2010. It was designed to attack Siemens Step7 software running on a Windows operating system. Stuxnet almost ruined one-fifth of the Iranian nuclear centrifuge by spinning out of control while simultaneously replaying the recorded system values. Duqu, a new worm was found, thought to be related to Stuxnet. The Laboratory of Cryptography and System Security (CrySyS) of Budapest University analyzed the malware, naming the threat Duqu. The exfiltrated data may be used to enable a future Stuxnet-like attack (2011) Chapter 1: 21

2000s: Eletronic weapon Exploit Kit and attack companies: Hacking Team, Milan, Italy and Vupen France (0-day attack) They provide rootkit, zero day to the government to espionage. FBI Behind the attack of anonimity network TOR. Chapter 1: 22

Summary Innovations (mouse, GUI, PC, WWW, worms, viruses) find their way out of research labs into the mass market. Innovations are not always used as expected: email on the Internet, SMS in GSM. Also the users are inventive! When new technology are used in innovative ways, old security paradigms may no longer apply and the well engineered old security solutions become irrelevant. We can start all over again Chapter 1: 23